Unnamed: 0 int64 0 350k | level_0 int64 0 351k | ApplicationNumber int64 9.75M 96.1M | ArtUnit int64 1.6k 3.99k | Abstract stringlengths 1 8.37k | Claims stringlengths 3 292k | abstract-claims stringlengths 68 293k | TechCenter int64 1.6k 3.9k |
|---|---|---|---|---|---|---|---|
13,400 | 13,400 | 14,448,725 | 3,682 | Methods and systems are disclosed for managing the communications and information resources of a user. Identity information relating to the user is received. The user's preference for withholding an incoming communication is obtained. An entry is created in a message log for the withheld communication. The user is not notified of receipt of the withheld communication, yet receipt of the withheld communication is logged in the message log. | 1. A method comprising:
presenting, to a first participant, a graphical user interface in association with an ongoing communication including the first participant, the graphical user interface comprising identification information associated with one or more additional participants of the ongoing communication; receiving an incoming communication intended for the first participant during the ongoing communication; presenting, to the first participant and without interrupting the ongoing communication, a notification of the incoming communication by way of the graphical user interface, the notification comprising multiple selectable actions related to the incoming communication; detecting, during the ongoing communication, a selection of an action from among the multiple selectable actions; and performing, using at least one processor, the selected action with respect to the incoming communication. 2. The method of claim 1, wherein presenting, to the first participant and without interrupting the ongoing communication, a notification of the incoming communication by way of the graphical user interface comprises providing a pop-up indicator to appear on the graphical user interface. 3. The method of claim 2, further comprising overlaying the pop-up indicator over at least a portion of the identification information associated with the one or more additional participants of the ongoing communication. 4. The method of claim 2, further comprising:
determining information related to the incoming communication; and presenting the information related to the incoming communication within the pop-up indicator. 5. The method of claim 4, wherein the information related to the incoming communication comprises an identity of a participant associated with the incoming communication. 6. The method of claim 4, wherein the information related to the incoming communication comprises an indication of a type of communication of the incoming communication. 7. The method of claim 5, wherein the type of communication of the incoming communication is different than a type of communication of the ongoing communication. 8. The method of claim 1, further comprising joining the incoming communication with the ongoing communication based on detecting the selection of the action from among the multiple selectable actions. 9. The method of claim 1, further comprising:
determining a characteristic of the incoming message; and based on the determined characteristic, identifying the one or more multiple selectable actions to include in the notification. 10. The method of claim 1, wherein performing, during the ongoing communication, the selected action comprises sending, to a participant associated with the incoming message, a response message. 11. The method of claim 10, wherein the incoming message is a first type of communication and the response message is sent via a second type of communication. 12. A method comprising:
presenting, to a first participant, a graphical user interface in association with an ongoing communication including the first participant and one or more additional participants; receiving, during the ongoing communication, an incoming communication intended for the first participant; determining one or more characteristics of the incoming communication intended for the first participant; identifying, based on the determined one or more characteristics of the incoming communication, an action related to the incoming communication; presenting, to the first participant and without interrupting the ongoing communication, a notification of the incoming communication by way of the graphical user interface, the notification comprising a selectable option associated with the action related to the incoming communication; detecting, without interrupting the ongoing communication, a selection of the selectable option associated with the action by the first participant; and performing, using at least one processor, the action with respect to the incoming communication in response to detecting the selection of the selectable option. 13. The method of claim 12, further comprising:
associating a predefined response with the one or more characteristics; and wherein identifying, based on the determined one or more characteristics of the incoming communication, the action related to the incoming communication comprises identifying the predefined response. 14. The method of claim 13, wherein performing the action with respect to the incoming communication comprises sending the predefined response to a participant associated with the incoming communication. 15. The method of claim 14, further comprising providing an option to the first participant to customize the predefined response. 16. The method of claim 12, wherein the action related to the incoming communication comprises terminating the ongoing communication. 17. The method of claim 16, further comprising:
determining that the ongoing communication has terminated; and presenting, to the first participant and via the graphical user interface, one or more additional options to communicate with the one or more additional participants. 18. A system comprising:
at least one processor; and at least one non-transitory computer readable storage medium storing instructions thereon that, when executed by the at least one processor, cause the system to:
present, to a first participant, a graphical user interface in association with an ongoing communication including the first participant, the graphical user interface comprising identification information associated with one or more additional participants of the ongoing communication;
receive an incoming communication intended for the first participant during the ongoing communication;
present, to the first participant and without interrupting the ongoing communication, a notification of the incoming communication by way of the graphical user interface, the notification comprising multiple selectable actions related to the incoming communication;
detect, during the ongoing communication, a selection of an action from among the multiple selectable actions; and
perform, using at least one processor, the selected action with respect to the incoming communication. 19. The system of claim 18, further comprising instructions that, when executed by the at least one processor, cause the system to overlay a pop-up indicator over at least a portion of the identification information associated with the one or more additional participants of the ongoing communication. 20. The system of claim 19, further comprising instructions that, when executed by the at least one processor, cause the system to:
determine a characteristic of the incoming message; and based on the determined characteristic, identify the one or more multiple selectable actions to include in the notification. | Methods and systems are disclosed for managing the communications and information resources of a user. Identity information relating to the user is received. The user's preference for withholding an incoming communication is obtained. An entry is created in a message log for the withheld communication. The user is not notified of receipt of the withheld communication, yet receipt of the withheld communication is logged in the message log.1. A method comprising:
presenting, to a first participant, a graphical user interface in association with an ongoing communication including the first participant, the graphical user interface comprising identification information associated with one or more additional participants of the ongoing communication; receiving an incoming communication intended for the first participant during the ongoing communication; presenting, to the first participant and without interrupting the ongoing communication, a notification of the incoming communication by way of the graphical user interface, the notification comprising multiple selectable actions related to the incoming communication; detecting, during the ongoing communication, a selection of an action from among the multiple selectable actions; and performing, using at least one processor, the selected action with respect to the incoming communication. 2. The method of claim 1, wherein presenting, to the first participant and without interrupting the ongoing communication, a notification of the incoming communication by way of the graphical user interface comprises providing a pop-up indicator to appear on the graphical user interface. 3. The method of claim 2, further comprising overlaying the pop-up indicator over at least a portion of the identification information associated with the one or more additional participants of the ongoing communication. 4. The method of claim 2, further comprising:
determining information related to the incoming communication; and presenting the information related to the incoming communication within the pop-up indicator. 5. The method of claim 4, wherein the information related to the incoming communication comprises an identity of a participant associated with the incoming communication. 6. The method of claim 4, wherein the information related to the incoming communication comprises an indication of a type of communication of the incoming communication. 7. The method of claim 5, wherein the type of communication of the incoming communication is different than a type of communication of the ongoing communication. 8. The method of claim 1, further comprising joining the incoming communication with the ongoing communication based on detecting the selection of the action from among the multiple selectable actions. 9. The method of claim 1, further comprising:
determining a characteristic of the incoming message; and based on the determined characteristic, identifying the one or more multiple selectable actions to include in the notification. 10. The method of claim 1, wherein performing, during the ongoing communication, the selected action comprises sending, to a participant associated with the incoming message, a response message. 11. The method of claim 10, wherein the incoming message is a first type of communication and the response message is sent via a second type of communication. 12. A method comprising:
presenting, to a first participant, a graphical user interface in association with an ongoing communication including the first participant and one or more additional participants; receiving, during the ongoing communication, an incoming communication intended for the first participant; determining one or more characteristics of the incoming communication intended for the first participant; identifying, based on the determined one or more characteristics of the incoming communication, an action related to the incoming communication; presenting, to the first participant and without interrupting the ongoing communication, a notification of the incoming communication by way of the graphical user interface, the notification comprising a selectable option associated with the action related to the incoming communication; detecting, without interrupting the ongoing communication, a selection of the selectable option associated with the action by the first participant; and performing, using at least one processor, the action with respect to the incoming communication in response to detecting the selection of the selectable option. 13. The method of claim 12, further comprising:
associating a predefined response with the one or more characteristics; and wherein identifying, based on the determined one or more characteristics of the incoming communication, the action related to the incoming communication comprises identifying the predefined response. 14. The method of claim 13, wherein performing the action with respect to the incoming communication comprises sending the predefined response to a participant associated with the incoming communication. 15. The method of claim 14, further comprising providing an option to the first participant to customize the predefined response. 16. The method of claim 12, wherein the action related to the incoming communication comprises terminating the ongoing communication. 17. The method of claim 16, further comprising:
determining that the ongoing communication has terminated; and presenting, to the first participant and via the graphical user interface, one or more additional options to communicate with the one or more additional participants. 18. A system comprising:
at least one processor; and at least one non-transitory computer readable storage medium storing instructions thereon that, when executed by the at least one processor, cause the system to:
present, to a first participant, a graphical user interface in association with an ongoing communication including the first participant, the graphical user interface comprising identification information associated with one or more additional participants of the ongoing communication;
receive an incoming communication intended for the first participant during the ongoing communication;
present, to the first participant and without interrupting the ongoing communication, a notification of the incoming communication by way of the graphical user interface, the notification comprising multiple selectable actions related to the incoming communication;
detect, during the ongoing communication, a selection of an action from among the multiple selectable actions; and
perform, using at least one processor, the selected action with respect to the incoming communication. 19. The system of claim 18, further comprising instructions that, when executed by the at least one processor, cause the system to overlay a pop-up indicator over at least a portion of the identification information associated with the one or more additional participants of the ongoing communication. 20. The system of claim 19, further comprising instructions that, when executed by the at least one processor, cause the system to:
determine a characteristic of the incoming message; and based on the determined characteristic, identify the one or more multiple selectable actions to include in the notification. | 3,600 |
13,401 | 13,401 | 14,554,713 | 3,681 | A computer-implemented method for recommending vacation options based on transaction data is implemented by a vacation recommendation computer device in communication with a memory. The method includes receiving a plurality of transaction data associated with a cardholder, processing the plurality of transaction data to determine a plurality of cardholder vacation characteristics, receiving a plurality of vacation options including at least one vacation attribute, identifying at least one vacation option responsive to the cardholder by comparing the plurality of cardholder vacation characteristics to the at least one vacation attribute, and recommending the at least one identified vacation option to the cardholder. | 1. A computer-implemented method for recommending vacation options based on transaction data, the method implemented by a vacation recommendation computer device in communication with a memory, the method comprising:
receiving a plurality of transaction data associated with a cardholder; processing the plurality of transaction data to determine a plurality of cardholder vacation characteristics; receiving a plurality of vacation options including at least one vacation attribute; identifying, by the vacation recommendation computer device, at least one vacation option responsive to the cardholder by comparing the plurality of cardholder vacation characteristics to the at least one vacation attribute; and recommending the at least one identified vacation option to the cardholder. 2. The method of claim 1, wherein processing the plurality of transaction data further comprises:
determining a cardholder vacation budget representing an amount the cardholder is likely to spend on vacation travel, by determining an average expenditure for the cardholder on recreation activities; and identifying the at least one vacation option by comparing the cardholder vacation budget to a plurality of option budgets each associated with one of the plurality of vacation options. 3. The method of claim 1, wherein processing the plurality of transaction data further comprises:
determining at least one merchant category wherein the cardholder has initiated multiple purchases; determining a cardholder vacation type representing a category of vacation travel in which the cardholder is interested based on the determined at least one merchant category; and identifying the at least one vacation option by comparing the cardholder vacation type to a plurality of option types each associated with one of the plurality of vacation options. 4. The method of claim 1, wherein processing the plurality of transaction data further comprises:
determining a cardholder vacation schedule representing a time period in which the cardholder is interested in vacation travel, based on historical transaction data; and identifying the at least one vacation option by comparing the cardholder vacation schedule to a plurality of option schedules associated with each of the plurality of vacation options. 5. The method of claim 1, wherein identifying the at least one vacation option further comprises:
identifying a plurality of vacation options; associating each identified vacation option with a quality score; and ranking the plurality of identified vacation options. 6. The method of claim 5, further comprising:
providing the plurality of identified vacation options to the cardholder based at least partially on the associated ranking. 7. The method of claim 1, further comprising:
providing the at least one vacation option to the cardholder by sending a message to at least one of a merchant and an advertiser. 8. A vacation recommendation computer device used to recommend vacation options based on transaction data, the vacation recommendation computer device comprising:
a processor; and a memory coupled to said processor, said processor configured to:
receive a plurality of transaction data associated with a cardholder;
process the plurality of transaction data to determine a plurality of cardholder vacation characteristics;
receive a plurality of vacation options including at least one vacation attribute;
identify at least one vacation option responsive to the cardholder by comparing the plurality of cardholder vacation characteristics to the at least one vacation attribute; and
recommend the at least one identified vacation option to the cardholder. 9. A vacation recommendation computer device in accordance with claim 8 wherein the processor is further configured to:
determine a cardholder vacation budget representing an amount the cardholder is likely to spend on vacation travel, by determining an average expenditure for the cardholder on recreation activities; and
identify the at least one vacation option by comparing the cardholder vacation budget to a plurality of option budgets each associated with one of the plurality of vacation options. 10. A vacation recommendation computer device in accordance with claim 8 wherein the processor is further configured to:
determine at least one merchant category wherein the cardholder has initiated multiple purchases;
determine a cardholder vacation type representing a category of vacation travel in which the cardholder is interested based on the determined at least one merchant category; and
identify the at least one vacation option by comparing the cardholder vacation type to a plurality of option types each associated with one of the plurality of vacation options. 11. A vacation recommendation computer device in accordance with claim 8 wherein the processor is further configured to:
determine a cardholder vacation schedule representing a time period in which the cardholder is interested in vacation travel, based on historical transaction data; and
identify the at least one vacation option by comparing the cardholder vacation schedule to a plurality of option schedules associated with each of the plurality of vacation options. 12. A vacation recommendation computer device in accordance with claim 8 wherein the processor is further configured to:
identify a plurality of vacation options;
associate each identified vacation option with a quality score; and
rank the plurality of identified vacation options. 13. A vacation recommendation computer device in accordance with claim 12 wherein the processor is further configured to:
provide the plurality of identified vacation options to the cardholder based at least partially on the associated ranking. 14. A vacation recommendation computer device in accordance with claim 8 wherein the processor is further configured to:
provide the at least one vacation option to the cardholder by sending a message to at least one of a merchant and an advertiser. 15. Computer-readable storage media for recommending vacation options based on transaction data, the computer-readable storage media having computer-executable instructions embodied thereon, wherein, when executed by at least one processor, the computer-executable instructions cause the processor to:
receive a plurality of transaction data associated with a cardholder; process the plurality of transaction data to determine a plurality of cardholder vacation characteristics; receive a plurality of vacation options including at least one vacation attribute; identify at least one vacation option responsive to the cardholder by comparing the plurality of cardholder vacation characteristics to the at least one vacation attribute; and recommend the at least one identified vacation option to the cardholder. 16. The computer-readable storage media in accordance with claim 15, wherein the computer-executable instructions cause the processor to:
determine a cardholder vacation budget representing an amount the cardholder is likely to spend on vacation travel, by determining an average expenditure for the cardholder on recreation activities; and identify the at least one vacation option by comparing the cardholder vacation budget to a plurality of option budgets each associated with one of the plurality of vacation options. 17. The computer-readable storage media in accordance with claim 15, wherein the computer-executable instructions cause the processor to:
determine at least one merchant category wherein the cardholder has initiated multiple purchases; determine a cardholder vacation type representing a category of vacation travel in which the cardholder is interested based on the determined at least one merchant category; and identify the at least one vacation option by comparing the cardholder vacation type to a plurality of option types each associated with one of the plurality of vacation options. 18. The computer-readable storage media in accordance with claim 15, wherein the computer-executable instructions cause the processor to:
determine a cardholder vacation schedule representing a time period in which the cardholder is interested in vacation travel, based on historical transaction data; and identify the at least one vacation option by comparing the cardholder vacation schedule to a plurality of option schedules associated with each of the plurality of vacation options. 19. The computer-readable storage media in accordance with claim 15, wherein the computer-executable instructions cause the processor to:
identify a plurality of vacation options; associate each identified vacation option with a quality score; and rank the plurality of identified vacation options. 20. The computer-readable storage media in accordance with claim 19, wherein the computer-executable instructions cause the processor to:
provide the plurality of identified vacation options to the cardholder based at least partially on the associated ranking. | A computer-implemented method for recommending vacation options based on transaction data is implemented by a vacation recommendation computer device in communication with a memory. The method includes receiving a plurality of transaction data associated with a cardholder, processing the plurality of transaction data to determine a plurality of cardholder vacation characteristics, receiving a plurality of vacation options including at least one vacation attribute, identifying at least one vacation option responsive to the cardholder by comparing the plurality of cardholder vacation characteristics to the at least one vacation attribute, and recommending the at least one identified vacation option to the cardholder.1. A computer-implemented method for recommending vacation options based on transaction data, the method implemented by a vacation recommendation computer device in communication with a memory, the method comprising:
receiving a plurality of transaction data associated with a cardholder; processing the plurality of transaction data to determine a plurality of cardholder vacation characteristics; receiving a plurality of vacation options including at least one vacation attribute; identifying, by the vacation recommendation computer device, at least one vacation option responsive to the cardholder by comparing the plurality of cardholder vacation characteristics to the at least one vacation attribute; and recommending the at least one identified vacation option to the cardholder. 2. The method of claim 1, wherein processing the plurality of transaction data further comprises:
determining a cardholder vacation budget representing an amount the cardholder is likely to spend on vacation travel, by determining an average expenditure for the cardholder on recreation activities; and identifying the at least one vacation option by comparing the cardholder vacation budget to a plurality of option budgets each associated with one of the plurality of vacation options. 3. The method of claim 1, wherein processing the plurality of transaction data further comprises:
determining at least one merchant category wherein the cardholder has initiated multiple purchases; determining a cardholder vacation type representing a category of vacation travel in which the cardholder is interested based on the determined at least one merchant category; and identifying the at least one vacation option by comparing the cardholder vacation type to a plurality of option types each associated with one of the plurality of vacation options. 4. The method of claim 1, wherein processing the plurality of transaction data further comprises:
determining a cardholder vacation schedule representing a time period in which the cardholder is interested in vacation travel, based on historical transaction data; and identifying the at least one vacation option by comparing the cardholder vacation schedule to a plurality of option schedules associated with each of the plurality of vacation options. 5. The method of claim 1, wherein identifying the at least one vacation option further comprises:
identifying a plurality of vacation options; associating each identified vacation option with a quality score; and ranking the plurality of identified vacation options. 6. The method of claim 5, further comprising:
providing the plurality of identified vacation options to the cardholder based at least partially on the associated ranking. 7. The method of claim 1, further comprising:
providing the at least one vacation option to the cardholder by sending a message to at least one of a merchant and an advertiser. 8. A vacation recommendation computer device used to recommend vacation options based on transaction data, the vacation recommendation computer device comprising:
a processor; and a memory coupled to said processor, said processor configured to:
receive a plurality of transaction data associated with a cardholder;
process the plurality of transaction data to determine a plurality of cardholder vacation characteristics;
receive a plurality of vacation options including at least one vacation attribute;
identify at least one vacation option responsive to the cardholder by comparing the plurality of cardholder vacation characteristics to the at least one vacation attribute; and
recommend the at least one identified vacation option to the cardholder. 9. A vacation recommendation computer device in accordance with claim 8 wherein the processor is further configured to:
determine a cardholder vacation budget representing an amount the cardholder is likely to spend on vacation travel, by determining an average expenditure for the cardholder on recreation activities; and
identify the at least one vacation option by comparing the cardholder vacation budget to a plurality of option budgets each associated with one of the plurality of vacation options. 10. A vacation recommendation computer device in accordance with claim 8 wherein the processor is further configured to:
determine at least one merchant category wherein the cardholder has initiated multiple purchases;
determine a cardholder vacation type representing a category of vacation travel in which the cardholder is interested based on the determined at least one merchant category; and
identify the at least one vacation option by comparing the cardholder vacation type to a plurality of option types each associated with one of the plurality of vacation options. 11. A vacation recommendation computer device in accordance with claim 8 wherein the processor is further configured to:
determine a cardholder vacation schedule representing a time period in which the cardholder is interested in vacation travel, based on historical transaction data; and
identify the at least one vacation option by comparing the cardholder vacation schedule to a plurality of option schedules associated with each of the plurality of vacation options. 12. A vacation recommendation computer device in accordance with claim 8 wherein the processor is further configured to:
identify a plurality of vacation options;
associate each identified vacation option with a quality score; and
rank the plurality of identified vacation options. 13. A vacation recommendation computer device in accordance with claim 12 wherein the processor is further configured to:
provide the plurality of identified vacation options to the cardholder based at least partially on the associated ranking. 14. A vacation recommendation computer device in accordance with claim 8 wherein the processor is further configured to:
provide the at least one vacation option to the cardholder by sending a message to at least one of a merchant and an advertiser. 15. Computer-readable storage media for recommending vacation options based on transaction data, the computer-readable storage media having computer-executable instructions embodied thereon, wherein, when executed by at least one processor, the computer-executable instructions cause the processor to:
receive a plurality of transaction data associated with a cardholder; process the plurality of transaction data to determine a plurality of cardholder vacation characteristics; receive a plurality of vacation options including at least one vacation attribute; identify at least one vacation option responsive to the cardholder by comparing the plurality of cardholder vacation characteristics to the at least one vacation attribute; and recommend the at least one identified vacation option to the cardholder. 16. The computer-readable storage media in accordance with claim 15, wherein the computer-executable instructions cause the processor to:
determine a cardholder vacation budget representing an amount the cardholder is likely to spend on vacation travel, by determining an average expenditure for the cardholder on recreation activities; and identify the at least one vacation option by comparing the cardholder vacation budget to a plurality of option budgets each associated with one of the plurality of vacation options. 17. The computer-readable storage media in accordance with claim 15, wherein the computer-executable instructions cause the processor to:
determine at least one merchant category wherein the cardholder has initiated multiple purchases; determine a cardholder vacation type representing a category of vacation travel in which the cardholder is interested based on the determined at least one merchant category; and identify the at least one vacation option by comparing the cardholder vacation type to a plurality of option types each associated with one of the plurality of vacation options. 18. The computer-readable storage media in accordance with claim 15, wherein the computer-executable instructions cause the processor to:
determine a cardholder vacation schedule representing a time period in which the cardholder is interested in vacation travel, based on historical transaction data; and identify the at least one vacation option by comparing the cardholder vacation schedule to a plurality of option schedules associated with each of the plurality of vacation options. 19. The computer-readable storage media in accordance with claim 15, wherein the computer-executable instructions cause the processor to:
identify a plurality of vacation options; associate each identified vacation option with a quality score; and rank the plurality of identified vacation options. 20. The computer-readable storage media in accordance with claim 19, wherein the computer-executable instructions cause the processor to:
provide the plurality of identified vacation options to the cardholder based at least partially on the associated ranking. | 3,600 |
13,402 | 13,402 | 14,280,137 | 3,622 | An online system or third party system allows advertisers to evaluate and test ad creatives before the ad creatives are presented to users in an ad campaign. Based on a set of test ad creatives for which feature scores and objective scores are determined by content evaluators (e.g., users, content processing algorithms), a model is trained to determine objective scores for an ad creative based on feature scores of the ad creative. The trained model is applied to a target ad creative, which has yet to be or has been presented to users, to determine one or more objective scores for the target ad creative based on feature scores of the target ad creative. Feedback is presented to an advertiser associated with the target ad creative based on the objective scores determined for the target ad creative. | 1. A method comprising:
receiving training data comprising:
a plurality of test ad creatives, each test ad creative associated with an advertiser and associated with one or more features, each feature associated with a question describing content of a test ad creative;
a plurality of feature scores for each test ad creative in the plurality of test ad creatives, each feature score of the test ad creative based at least in part on received answers to a question associated with a corresponding feature of the test ad creative; and
one or more objective scores for each test ad creative in the plurality of test ad creatives, each objective score of the test ad creative measuring how well the test ad creative achieves an objective;
training a model that is usable to determine one or more objective scores based on one or more feature scores using the training data; receiving a request to evaluate a target ad creative from a requesting advertiser of an online system for presentation to one or more users of the online system, the target ad creative comprising a plurality of feature scores based on received answers to questions describing content of the target ad creative; determining an objective score for one or more objectives for the target ad creative by applying the trained model to one or more features scores of the target ad creative; and presenting feedback to the requesting advertiser based at least in part on the objective scores of the target ad creative. 2. The method of claim 1, wherein a feature of an ad creative is selected from a group consisting of: an indication whether the target ad creative includes one or more regions capturing a user's attention, an indication of how readily the user identifies the advertiser associated with the ad creative, a measure of how closely the content of the ad creative is consistent with the user's knowledge of the advertiser, an indication whether the ad creative includes content that the user determines to be of interest, an indication whether the ad creative elicits a positive emotional response from the user, an indication of whether an ad creative captures the user's attention when presented along with other content, an indication whether the ad creative identifies an action for the user to perform, and any combination thereof. 3. The method of claim 1, wherein an objective of an ad creative is selected from a group consisting of: increasing awareness of a brand, increasing awareness of quality of the brand, increasing awareness of an image associated with the brand, increasing awareness of a product of the brand, increasing awareness of a service of the brand, increasing awareness of quality of a product of the brand, increasing awareness of an image associated with a service of the brand, increasing awareness of cost of a product of the brand, increasing awareness of cost of a service of the brand, increasing awareness of a cost to benefits ratio of a product of the brand, increasing awareness of a cost to benefits ratio of a service of the brand, and any combination thereof. 4. The method of claim 1, wherein a plurality of feature scores for a test ad creative are determined based at least in part on answers to one or more questions associated with corresponding features from multiple users presented with the test ad creative. 5. The method of claim 4, wherein one or more objective scores for the test ad creative are determined based at least in part on information identifying one or more objectives of the test ad creative received from multiple users. 6. The method of claim 1, wherein a plurality of feature scores for a test ad creative are determined based at least in part on one or more from a group consisting of: object detection algorithms, intensity filter algorithms, gradient filter algorithms, edge detection algorithms, histogram analysis, or any combination thereof. 7. The method of claim 1, wherein training the model to determine one or more objective scores based on one or more feature scores comprises:
determining weights associated with each feature score to generate an objective score by combining feature scores after application of the weights. 8. The method of claim 1, wherein the model is trained using linear regression or supervised learning. 9. The method of claim 1, wherein the request to evaluate the target ad creative includes one or more objectives for the target ad creative specified by the requesting advertiser. 10. The method of claim 9, wherein determining the objective score for one or more objectives for the target ad creative comprises:
determining an objective score for each of the one or more objectives for the target ad creative specified by the requesting advertiser by applying the trained model to the one or more feature scores of the target ad creative. 11. The method of claim 1, wherein the feedback includes an identification of an objective and information based on an objective score associated with the objective. 12. The method of claim 11, wherein the information based on the objective score associated with the objective comprises the objective score. 13. The method of claim 11, wherein the information based on the objective score comprises an identification of one or more features having at least a threshold contribution to the objective score by the trained model. 14. A method comprising:
receiving a request to evaluate an ad creative from an advertiser for presentation to one or more users of an online system, the ad creative comprising a plurality of feature scores based on received answers to questions describing corresponding features of the ad creative; determining an objective score for one or more objectives for the ad creative by applying a model to one or more feature scores of the ad creative, the model trained using feature scores and objective scores of additional ad creatives that were previously presented and each objective score providing a measure of success of the ad creative in achieving an objective; and presenting the feedback to the advertiser based at least in part on the objective scores of the ad creative. 15. The method of claim 14, wherein the request to evaluate the ad creative includes one or more objectives for the ad creative specified by the advertiser. 16. The method of claim 15, wherein determining the objective score for one or more objectives for the ad creative comprises:
determining an objective score for each of the one or more objectives for the ad creative specified by the advertiser by applying the trained model to the one or more feature scores of the ad creative. 17. The method of claim 14, wherein the feedback includes an identification of an objective and information based on an objective score associated with the objective. 18. The method of claim 14, wherein the information based on the objective score associated with the objective comprises the objective score. 19. The method of claim 14, wherein the information based on the objective score comprises an identification of one or more features having at least a threshold contribution to the objective score by the trained model. 20. The method of claim 14, wherein a feature of the ad creative is selected from a group consisting of: an indication whether the target ad creative includes one or more regions capturing a user's attention, an indication of how readily the user identifies the advertiser associated with the ad creative, a measure of how closely the content of the ad creative is consistent with the user's knowledge of the advertiser, an indication whether the ad creative includes content that the user determines to be of interest, an indication whether the ad creative elicits a positive emotional response from the user, an indication of whether an ad creative captures the user's attention when presented along with other content, an indication whether the ad creative identifies an action for the user to perform, and any combination thereof. 21. The method of claim 14, wherein an objective of the ad creative is selected from a group consisting of: increasing awareness of a brand, increasing awareness of quality of the brand, increasing awareness of an image associated with the brand, increasing awareness of a product of the brand, increasing awareness of a service of the brand, increasing awareness of quality of a product of the brand, increasing awareness of an image associated with a service of the brand, increasing awareness of cost of a product of the brand, increasing awareness of cost of a service of the brand, increasing awareness of a cost to benefits ratio of a product of the brand, increasing awareness of a cost to benefits ratio of a service of the brand, and any combination thereof. 22. The method of claim 14, wherein a plurality of feature scores for an additional test ad creative are determined based at least in part on answers to one or more questions associated with corresponding features from multiple users that were previously presented with one or more of the additional ad creatives. 23. A computer program product comprising a computer-readable storage medium having instructions encoded thereon that, when executed by a processor, cause the processor to:
receive a request to evaluate an ad creative from an advertiser for presentation to one or more users of an online system, the ad creative comprising a plurality of feature scores based on received answers to questions describing corresponding features of the ad creative; determine an objective score for one or more objectives for the ad creative by applying a model to one or more feature scores of the ad creative, the model trained using feature scores and objective scores of additional ad creatives that were previously presented and each objective score providing a measure of success of the ad creative in achieving an objective; and present the feedback to the advertiser based at least in part on the objective scores of the ad creative. | An online system or third party system allows advertisers to evaluate and test ad creatives before the ad creatives are presented to users in an ad campaign. Based on a set of test ad creatives for which feature scores and objective scores are determined by content evaluators (e.g., users, content processing algorithms), a model is trained to determine objective scores for an ad creative based on feature scores of the ad creative. The trained model is applied to a target ad creative, which has yet to be or has been presented to users, to determine one or more objective scores for the target ad creative based on feature scores of the target ad creative. Feedback is presented to an advertiser associated with the target ad creative based on the objective scores determined for the target ad creative.1. A method comprising:
receiving training data comprising:
a plurality of test ad creatives, each test ad creative associated with an advertiser and associated with one or more features, each feature associated with a question describing content of a test ad creative;
a plurality of feature scores for each test ad creative in the plurality of test ad creatives, each feature score of the test ad creative based at least in part on received answers to a question associated with a corresponding feature of the test ad creative; and
one or more objective scores for each test ad creative in the plurality of test ad creatives, each objective score of the test ad creative measuring how well the test ad creative achieves an objective;
training a model that is usable to determine one or more objective scores based on one or more feature scores using the training data; receiving a request to evaluate a target ad creative from a requesting advertiser of an online system for presentation to one or more users of the online system, the target ad creative comprising a plurality of feature scores based on received answers to questions describing content of the target ad creative; determining an objective score for one or more objectives for the target ad creative by applying the trained model to one or more features scores of the target ad creative; and presenting feedback to the requesting advertiser based at least in part on the objective scores of the target ad creative. 2. The method of claim 1, wherein a feature of an ad creative is selected from a group consisting of: an indication whether the target ad creative includes one or more regions capturing a user's attention, an indication of how readily the user identifies the advertiser associated with the ad creative, a measure of how closely the content of the ad creative is consistent with the user's knowledge of the advertiser, an indication whether the ad creative includes content that the user determines to be of interest, an indication whether the ad creative elicits a positive emotional response from the user, an indication of whether an ad creative captures the user's attention when presented along with other content, an indication whether the ad creative identifies an action for the user to perform, and any combination thereof. 3. The method of claim 1, wherein an objective of an ad creative is selected from a group consisting of: increasing awareness of a brand, increasing awareness of quality of the brand, increasing awareness of an image associated with the brand, increasing awareness of a product of the brand, increasing awareness of a service of the brand, increasing awareness of quality of a product of the brand, increasing awareness of an image associated with a service of the brand, increasing awareness of cost of a product of the brand, increasing awareness of cost of a service of the brand, increasing awareness of a cost to benefits ratio of a product of the brand, increasing awareness of a cost to benefits ratio of a service of the brand, and any combination thereof. 4. The method of claim 1, wherein a plurality of feature scores for a test ad creative are determined based at least in part on answers to one or more questions associated with corresponding features from multiple users presented with the test ad creative. 5. The method of claim 4, wherein one or more objective scores for the test ad creative are determined based at least in part on information identifying one or more objectives of the test ad creative received from multiple users. 6. The method of claim 1, wherein a plurality of feature scores for a test ad creative are determined based at least in part on one or more from a group consisting of: object detection algorithms, intensity filter algorithms, gradient filter algorithms, edge detection algorithms, histogram analysis, or any combination thereof. 7. The method of claim 1, wherein training the model to determine one or more objective scores based on one or more feature scores comprises:
determining weights associated with each feature score to generate an objective score by combining feature scores after application of the weights. 8. The method of claim 1, wherein the model is trained using linear regression or supervised learning. 9. The method of claim 1, wherein the request to evaluate the target ad creative includes one or more objectives for the target ad creative specified by the requesting advertiser. 10. The method of claim 9, wherein determining the objective score for one or more objectives for the target ad creative comprises:
determining an objective score for each of the one or more objectives for the target ad creative specified by the requesting advertiser by applying the trained model to the one or more feature scores of the target ad creative. 11. The method of claim 1, wherein the feedback includes an identification of an objective and information based on an objective score associated with the objective. 12. The method of claim 11, wherein the information based on the objective score associated with the objective comprises the objective score. 13. The method of claim 11, wherein the information based on the objective score comprises an identification of one or more features having at least a threshold contribution to the objective score by the trained model. 14. A method comprising:
receiving a request to evaluate an ad creative from an advertiser for presentation to one or more users of an online system, the ad creative comprising a plurality of feature scores based on received answers to questions describing corresponding features of the ad creative; determining an objective score for one or more objectives for the ad creative by applying a model to one or more feature scores of the ad creative, the model trained using feature scores and objective scores of additional ad creatives that were previously presented and each objective score providing a measure of success of the ad creative in achieving an objective; and presenting the feedback to the advertiser based at least in part on the objective scores of the ad creative. 15. The method of claim 14, wherein the request to evaluate the ad creative includes one or more objectives for the ad creative specified by the advertiser. 16. The method of claim 15, wherein determining the objective score for one or more objectives for the ad creative comprises:
determining an objective score for each of the one or more objectives for the ad creative specified by the advertiser by applying the trained model to the one or more feature scores of the ad creative. 17. The method of claim 14, wherein the feedback includes an identification of an objective and information based on an objective score associated with the objective. 18. The method of claim 14, wherein the information based on the objective score associated with the objective comprises the objective score. 19. The method of claim 14, wherein the information based on the objective score comprises an identification of one or more features having at least a threshold contribution to the objective score by the trained model. 20. The method of claim 14, wherein a feature of the ad creative is selected from a group consisting of: an indication whether the target ad creative includes one or more regions capturing a user's attention, an indication of how readily the user identifies the advertiser associated with the ad creative, a measure of how closely the content of the ad creative is consistent with the user's knowledge of the advertiser, an indication whether the ad creative includes content that the user determines to be of interest, an indication whether the ad creative elicits a positive emotional response from the user, an indication of whether an ad creative captures the user's attention when presented along with other content, an indication whether the ad creative identifies an action for the user to perform, and any combination thereof. 21. The method of claim 14, wherein an objective of the ad creative is selected from a group consisting of: increasing awareness of a brand, increasing awareness of quality of the brand, increasing awareness of an image associated with the brand, increasing awareness of a product of the brand, increasing awareness of a service of the brand, increasing awareness of quality of a product of the brand, increasing awareness of an image associated with a service of the brand, increasing awareness of cost of a product of the brand, increasing awareness of cost of a service of the brand, increasing awareness of a cost to benefits ratio of a product of the brand, increasing awareness of a cost to benefits ratio of a service of the brand, and any combination thereof. 22. The method of claim 14, wherein a plurality of feature scores for an additional test ad creative are determined based at least in part on answers to one or more questions associated with corresponding features from multiple users that were previously presented with one or more of the additional ad creatives. 23. A computer program product comprising a computer-readable storage medium having instructions encoded thereon that, when executed by a processor, cause the processor to:
receive a request to evaluate an ad creative from an advertiser for presentation to one or more users of an online system, the ad creative comprising a plurality of feature scores based on received answers to questions describing corresponding features of the ad creative; determine an objective score for one or more objectives for the ad creative by applying a model to one or more feature scores of the ad creative, the model trained using feature scores and objective scores of additional ad creatives that were previously presented and each objective score providing a measure of success of the ad creative in achieving an objective; and present the feedback to the advertiser based at least in part on the objective scores of the ad creative. | 3,600 |
13,403 | 13,403 | 13,632,491 | 3,692 | A universal substantiation system and method that can be used to allow or prevent a consumer to purchase products or services using a payment or identification device having one or more rules or conditions. | 1. A system for substantiating a payment device, comprising:
at least one computer processor configured to implement:
a payer/partner module configured to receive payer/partner identification information from a payer/partner, the payer/partner being an entity or an organization that provides one or more rules or conditions associated with the payment device;
a payer/partner account module configured to create a payer/partner substantiation account based at least in part on the payer/partner identification information, wherein the payer/partner account module is further configured to assign one of a plurality of levels to the payer/partner substantiation account, each one of the plurality of levels being based on a monetary value associated with a transaction carried out using the payment device;
a programming module configured to receive programming information to create one or more program profiles for the payer/partner substantiation account; and
a rules/conditions module configured to receive the one or more rules or conditions for the payment device associated with the one or more program profiles of the payer/partner substantiation account, wherein the one or more rules or conditions control products or services that can be purchased using the payment device. 2. The system of claim 1, wherein the payer/partner identification information comprise at least one of a name, an address, a phone number, an electronic mail address, a website address, revenue, profit, number of employees, types of payer/partner, contact person of the payer/partner. 3. The system of claim 1, wherein the payer/partner account module is further configured to assign one of the plurality of levels to the payer/partner substantiation account based at least in part on the payer/partner identification information. 4. The system of claim 1, wherein the rules/conditions module is further configured to offer rewards for an usage of the payment device. 5. The system of claim 1, wherein the one or more rules or conditions comprise a list of products or services that are included or excluded for purchasing using the payment device. 6. The system of claim 1, wherein the one or more rules or conditions comprise a category of products or services created by the payer/partner. 7. The system of claim 1, further comprising a processing module configured to determine whether the payment device with the associated one or more rules and conditions can be used to purchase products or services. 8. The system of claim 1, further comprising a payment method module configured to receive a selection of a type of the payment device. 9. The system of claim 8, wherein the type of the payment device comprises at least one of a credit card, a debit card, a stored-value card, a gift card, a voucher card, a wage card, a virtual card, an electronic-email, a membership card, an identification card, an email, a code, a pattern and a digital certificate. 10. The system of claim 1, further comprising a summary report module configured to provide a summary statement of the one or more program profiles of the payer/partner substantiation account. 11. A method for substantiating a payment device comprising:
receiving, at a processor of a payer/partner module, payer/partner identification information from a payer/partner to create a payer/partner substantiation account, the payer/partner being an entity or an organization that provides one or more rules or conditions associated with the payment device; receiving, at the processor, programming information to create one or more program profiles for the payer/partner substantiation account; receiving, at the processor, the one or more rules or conditions for the payment device associated with the one or more program profiles of the payer/partner substantiation account, wherein the one or more rules control products or services that can be purchased using the payment device; and assigning, at the processor, one of a plurality of levels to the payer/partner substantiation account, each one of the plurality of levels being based on a monetary value associated with a transaction carried out using the payment device. 12. The method of claim 11, wherein the payer/partner identification information comprise at least one of a name, an address, a phone number, an electronic mail address, a website address, revenue, profit, number of employees, types of payer/partner, contact person of the payer/partner. 13. The method of claim 11, further comprising assigning one of the plurality of levels to the payer/partner substantiation account based at least in part on the payer/partner identification information. 14. The method of claim 11, wherein the one or more rules or conditions comprise rebates for an usage of the payment device. 15. The method of claim 11, wherein the one or more rules or conditions comprise a list of products or services that are included or excluded for purchasing using the payment device. 16. The method of claim 11, wherein the one or more rules or conditions comprise a category of products or services created by the payer/partner. 17. The method of claim 11, further comprising determining whether the payment device having the one or more rules and conditions can be used to purchase products or services. 18. The method of claim 11, further comprising receiving a selection of a type of the payment device. 19. The method 18, wherein the type of the payment device comprises at least one of a credit card, a debit card, a stored-value card, a gift card, a voucher card, a wage card, a virtual card, an electronic-email, a membership card, and an identification card. 20. The method of claim 11, further comprising providing a summary statement of the one or more program profiles of the payer/partner substantiation account. | A universal substantiation system and method that can be used to allow or prevent a consumer to purchase products or services using a payment or identification device having one or more rules or conditions.1. A system for substantiating a payment device, comprising:
at least one computer processor configured to implement:
a payer/partner module configured to receive payer/partner identification information from a payer/partner, the payer/partner being an entity or an organization that provides one or more rules or conditions associated with the payment device;
a payer/partner account module configured to create a payer/partner substantiation account based at least in part on the payer/partner identification information, wherein the payer/partner account module is further configured to assign one of a plurality of levels to the payer/partner substantiation account, each one of the plurality of levels being based on a monetary value associated with a transaction carried out using the payment device;
a programming module configured to receive programming information to create one or more program profiles for the payer/partner substantiation account; and
a rules/conditions module configured to receive the one or more rules or conditions for the payment device associated with the one or more program profiles of the payer/partner substantiation account, wherein the one or more rules or conditions control products or services that can be purchased using the payment device. 2. The system of claim 1, wherein the payer/partner identification information comprise at least one of a name, an address, a phone number, an electronic mail address, a website address, revenue, profit, number of employees, types of payer/partner, contact person of the payer/partner. 3. The system of claim 1, wherein the payer/partner account module is further configured to assign one of the plurality of levels to the payer/partner substantiation account based at least in part on the payer/partner identification information. 4. The system of claim 1, wherein the rules/conditions module is further configured to offer rewards for an usage of the payment device. 5. The system of claim 1, wherein the one or more rules or conditions comprise a list of products or services that are included or excluded for purchasing using the payment device. 6. The system of claim 1, wherein the one or more rules or conditions comprise a category of products or services created by the payer/partner. 7. The system of claim 1, further comprising a processing module configured to determine whether the payment device with the associated one or more rules and conditions can be used to purchase products or services. 8. The system of claim 1, further comprising a payment method module configured to receive a selection of a type of the payment device. 9. The system of claim 8, wherein the type of the payment device comprises at least one of a credit card, a debit card, a stored-value card, a gift card, a voucher card, a wage card, a virtual card, an electronic-email, a membership card, an identification card, an email, a code, a pattern and a digital certificate. 10. The system of claim 1, further comprising a summary report module configured to provide a summary statement of the one or more program profiles of the payer/partner substantiation account. 11. A method for substantiating a payment device comprising:
receiving, at a processor of a payer/partner module, payer/partner identification information from a payer/partner to create a payer/partner substantiation account, the payer/partner being an entity or an organization that provides one or more rules or conditions associated with the payment device; receiving, at the processor, programming information to create one or more program profiles for the payer/partner substantiation account; receiving, at the processor, the one or more rules or conditions for the payment device associated with the one or more program profiles of the payer/partner substantiation account, wherein the one or more rules control products or services that can be purchased using the payment device; and assigning, at the processor, one of a plurality of levels to the payer/partner substantiation account, each one of the plurality of levels being based on a monetary value associated with a transaction carried out using the payment device. 12. The method of claim 11, wherein the payer/partner identification information comprise at least one of a name, an address, a phone number, an electronic mail address, a website address, revenue, profit, number of employees, types of payer/partner, contact person of the payer/partner. 13. The method of claim 11, further comprising assigning one of the plurality of levels to the payer/partner substantiation account based at least in part on the payer/partner identification information. 14. The method of claim 11, wherein the one or more rules or conditions comprise rebates for an usage of the payment device. 15. The method of claim 11, wherein the one or more rules or conditions comprise a list of products or services that are included or excluded for purchasing using the payment device. 16. The method of claim 11, wherein the one or more rules or conditions comprise a category of products or services created by the payer/partner. 17. The method of claim 11, further comprising determining whether the payment device having the one or more rules and conditions can be used to purchase products or services. 18. The method of claim 11, further comprising receiving a selection of a type of the payment device. 19. The method 18, wherein the type of the payment device comprises at least one of a credit card, a debit card, a stored-value card, a gift card, a voucher card, a wage card, a virtual card, an electronic-email, a membership card, and an identification card. 20. The method of claim 11, further comprising providing a summary statement of the one or more program profiles of the payer/partner substantiation account. | 3,600 |
13,404 | 13,404 | 13,282,322 | 3,681 | A commerce system has a plurality of retailers offering products for sale. Product information associated with the products is collected and stored in a central database. A consumer uses a website to create a shopping list with weighted preferences for product attributes. An individualized discount is generated by a consumer service provider for products on the shopping list directed to the consumer. The shopping list with all products aggregated for one retailer is optimized based on the product information in the database, the weighted preferences for the product attributes, and the individualized discounts. The consumer uses the optimized shopping list to assist with purchasing decisions. An incremental profit can be determined based on an aggregation of the products on the optimized shopping list. Purchasing decisions within the commerce system are controlled by enabling the consumer to select the products for purchase from the retailer. | 1. A method of controlling a commerce system including a plurality of retailers offering products for sale, comprising:
collecting product information associated with the products; storing the product information in a database; providing a website for a consumer to create a shopping list with weighted preferences for product attributes; generating an individualized discount for products on the shopping list directed to the consumer; optimizing the shopping list with all products aggregated for one retailer based on the product information in the database, the weighted preferences for the product attributes, and the individualized discounts; providing the optimized shopping list to the consumer to assist with purchasing decisions; and controlling the purchasing decisions within the commerce system by enabling the consumer to select the products for purchase from the one retailer. 2. The method of claim 1, further including setting the individualized discount to a value less than cost for some products on the optimized shopping list. 3. The method of claim 1, further including setting the individualized discount based on an aggregate value of the optimized shopping list. 4. The method of claim 1, further including providing an aggregate savings for the optimized shopping list. 5. The method of claim 4, wherein the aggregate savings is based on a save up to value. 6. The method of claim 1, further including determining an incremental profit based on an aggregation of the products on the optimized shopping list. 7. A method of controlling a commerce system including a plurality of retailers offering products for sale, comprising:
collecting product information; storing the product information in a database; generating a shopping list with weighted preferences for product attributes; generating a discount for products on the shopping list; optimizing the shopping list with all products aggregated for a predetermined number of retailers based on the product information in the database, the weighted preferences for the product attributes, and the discount; and utilizing the optimized shopping list to control purchasing decisions within the commerce system by enabling a consumer to select the products for purchase from the retailers. 8. The method of claim 7, further including providing a website for the consumer to create the shopping list with the weighted preferences for the product attributes. 9. The method of claim 7, further including:
generating a plurality of optimized shopping lists each with all products aggregated for one retailer; and selecting one of the optimized shopping lists to patronize based on consumer preference. 10. The method of claim 7, further including setting the discount based on an aggregate value of the optimized shopping list. 11. The method of claim 10, wherein the aggregate savings is based on a save up to value. 12. The method of claim 7, further including determining a net value to the consumer based on an aggregation of the products on the optimized shopping list. 13. The method of claim 7, further including determining an incremental profit based on an aggregation of the products on the optimized shopping list. 14. A method of controlling a commerce system, comprising:
generating a shopping list from product information with weighted preferences for product attributes; generating a discount for products on the shopping list; optimizing the shopping list with all products aggregated for a retailer based on the product information, the weighted preferences for the product attributes, and the discount; and controlling purchasing decisions within the commerce system by enabling a consumer to select the products for purchase based from the retailer on the optimized shopping list. 15. The method of claim 14, further including providing a website for the consumer to create the shopping list with the weighted preferences for the product attributes. 16. The method of claim 14, further including:
generating a plurality of optimized shopping lists each with all products aggregated for one retailer; and selecting one of the optimized shopping lists to patronize based on consumer preference. 17. The method of claim 14, further including setting the discount based on an aggregate value of the optimized shopping list. 18. The method of claim 14, further including determining a net value to the consumer based on an aggregation of the products on the optimized shopping list. 19. The method of claim 14, further including determining an incremental profit based on an aggregation of the products on the optimized shopping list. 20. A computer program product usable with a programmable computer processor having a computer readable program code embodied in a computer usable medium for controlling a commerce system including a plurality of retailers offering products for sale, comprising:
generating a shopping list from product information with weighted preferences for product attributes; generating a discount for products on the shopping list; optimizing the shopping list with all products aggregated for a retailer based on the product information in the database, the weighted preferences for the product attributes, and the discount; and controlling purchasing decisions within the commerce system by enabling a consumer to select the products for purchase based from the retailer on the optimized shopping list. 21. The computer program product of claim 20, further including providing a website for the consumer to create the shopping list with the weighted preferences for the product attributes. 22. The computer program product of claim 20, further including:
generating a plurality of optimized shopping lists each with all products aggregated for one retailer; and selecting one of the optimized shopping lists to patronize based on consumer preference. 23. The computer program product of claim 20, further including setting the discount based on an aggregate value of the optimized shopping list. 24. The computer program product of claim 20, further including determining a net value to the consumer based on an aggregation of the products on the optimized shopping list. 25. The computer program product of claim 20, further including determining an incremental profit based on an aggregation of the products on the optimized shopping list. 26. A method of controlling a commerce system, comprising:
providing a database containing product information; generating a shopping list for a consumer based on the product information; aggregating products on the shopping list to a retailer with a discount for a portion of the products on the shopping list; and controlling purchasing decisions within the commerce system by enabling the consumer to select the products for purchase based from the retailer on the shopping list. 27. The method of claim 26, further including providing a website for the consumer to create the shopping list with weighted preferences for product attributes. 28. The method of claim 26, further including setting the discount based on an aggregate value of the shopping list. 29. The method of claim 26, further including aggregating the products on the shopping list to a retailer based on the product information. 30. The method of claim 26, wherein the consumer determines the discount for the products on the shopping list. 31. The method of claim 26, further including clearing and settling the discount after a transaction between the consumer and retailer. | A commerce system has a plurality of retailers offering products for sale. Product information associated with the products is collected and stored in a central database. A consumer uses a website to create a shopping list with weighted preferences for product attributes. An individualized discount is generated by a consumer service provider for products on the shopping list directed to the consumer. The shopping list with all products aggregated for one retailer is optimized based on the product information in the database, the weighted preferences for the product attributes, and the individualized discounts. The consumer uses the optimized shopping list to assist with purchasing decisions. An incremental profit can be determined based on an aggregation of the products on the optimized shopping list. Purchasing decisions within the commerce system are controlled by enabling the consumer to select the products for purchase from the retailer.1. A method of controlling a commerce system including a plurality of retailers offering products for sale, comprising:
collecting product information associated with the products; storing the product information in a database; providing a website for a consumer to create a shopping list with weighted preferences for product attributes; generating an individualized discount for products on the shopping list directed to the consumer; optimizing the shopping list with all products aggregated for one retailer based on the product information in the database, the weighted preferences for the product attributes, and the individualized discounts; providing the optimized shopping list to the consumer to assist with purchasing decisions; and controlling the purchasing decisions within the commerce system by enabling the consumer to select the products for purchase from the one retailer. 2. The method of claim 1, further including setting the individualized discount to a value less than cost for some products on the optimized shopping list. 3. The method of claim 1, further including setting the individualized discount based on an aggregate value of the optimized shopping list. 4. The method of claim 1, further including providing an aggregate savings for the optimized shopping list. 5. The method of claim 4, wherein the aggregate savings is based on a save up to value. 6. The method of claim 1, further including determining an incremental profit based on an aggregation of the products on the optimized shopping list. 7. A method of controlling a commerce system including a plurality of retailers offering products for sale, comprising:
collecting product information; storing the product information in a database; generating a shopping list with weighted preferences for product attributes; generating a discount for products on the shopping list; optimizing the shopping list with all products aggregated for a predetermined number of retailers based on the product information in the database, the weighted preferences for the product attributes, and the discount; and utilizing the optimized shopping list to control purchasing decisions within the commerce system by enabling a consumer to select the products for purchase from the retailers. 8. The method of claim 7, further including providing a website for the consumer to create the shopping list with the weighted preferences for the product attributes. 9. The method of claim 7, further including:
generating a plurality of optimized shopping lists each with all products aggregated for one retailer; and selecting one of the optimized shopping lists to patronize based on consumer preference. 10. The method of claim 7, further including setting the discount based on an aggregate value of the optimized shopping list. 11. The method of claim 10, wherein the aggregate savings is based on a save up to value. 12. The method of claim 7, further including determining a net value to the consumer based on an aggregation of the products on the optimized shopping list. 13. The method of claim 7, further including determining an incremental profit based on an aggregation of the products on the optimized shopping list. 14. A method of controlling a commerce system, comprising:
generating a shopping list from product information with weighted preferences for product attributes; generating a discount for products on the shopping list; optimizing the shopping list with all products aggregated for a retailer based on the product information, the weighted preferences for the product attributes, and the discount; and controlling purchasing decisions within the commerce system by enabling a consumer to select the products for purchase based from the retailer on the optimized shopping list. 15. The method of claim 14, further including providing a website for the consumer to create the shopping list with the weighted preferences for the product attributes. 16. The method of claim 14, further including:
generating a plurality of optimized shopping lists each with all products aggregated for one retailer; and selecting one of the optimized shopping lists to patronize based on consumer preference. 17. The method of claim 14, further including setting the discount based on an aggregate value of the optimized shopping list. 18. The method of claim 14, further including determining a net value to the consumer based on an aggregation of the products on the optimized shopping list. 19. The method of claim 14, further including determining an incremental profit based on an aggregation of the products on the optimized shopping list. 20. A computer program product usable with a programmable computer processor having a computer readable program code embodied in a computer usable medium for controlling a commerce system including a plurality of retailers offering products for sale, comprising:
generating a shopping list from product information with weighted preferences for product attributes; generating a discount for products on the shopping list; optimizing the shopping list with all products aggregated for a retailer based on the product information in the database, the weighted preferences for the product attributes, and the discount; and controlling purchasing decisions within the commerce system by enabling a consumer to select the products for purchase based from the retailer on the optimized shopping list. 21. The computer program product of claim 20, further including providing a website for the consumer to create the shopping list with the weighted preferences for the product attributes. 22. The computer program product of claim 20, further including:
generating a plurality of optimized shopping lists each with all products aggregated for one retailer; and selecting one of the optimized shopping lists to patronize based on consumer preference. 23. The computer program product of claim 20, further including setting the discount based on an aggregate value of the optimized shopping list. 24. The computer program product of claim 20, further including determining a net value to the consumer based on an aggregation of the products on the optimized shopping list. 25. The computer program product of claim 20, further including determining an incremental profit based on an aggregation of the products on the optimized shopping list. 26. A method of controlling a commerce system, comprising:
providing a database containing product information; generating a shopping list for a consumer based on the product information; aggregating products on the shopping list to a retailer with a discount for a portion of the products on the shopping list; and controlling purchasing decisions within the commerce system by enabling the consumer to select the products for purchase based from the retailer on the shopping list. 27. The method of claim 26, further including providing a website for the consumer to create the shopping list with weighted preferences for product attributes. 28. The method of claim 26, further including setting the discount based on an aggregate value of the shopping list. 29. The method of claim 26, further including aggregating the products on the shopping list to a retailer based on the product information. 30. The method of claim 26, wherein the consumer determines the discount for the products on the shopping list. 31. The method of claim 26, further including clearing and settling the discount after a transaction between the consumer and retailer. | 3,600 |
13,405 | 13,405 | 15,678,630 | 3,612 | An apparatus for aiding a user in raising and lowering of a tailgate includes a handle and a connector for connecting the handle to the tailgate to allow for movement of the handle rearwardly relative to the tailgate as the tailgate is initially lowered by the user and forwardly to a position above the tailgate as the lowering of the tailgate is continued. A tailgate lift assembly includes a housing extending along a predetermined length, a spring anchored at one end at a first end of the housing, a connector having a first end affixed to the opposite end of said spring and extending through said housing, and a first fixed guide around which the connector extends. A bumper for covering a corner of a tailgate is also provided. | 1. A tailgate lift assembly, comprising:
an elongated housing; a spring anchored at one end at a first end of the housing; a connector having a first end affixed to the opposite end of said spring and extending through said housing; and first and second fixed guides for engaging the connector. 2. The assembly of claim 1, wherein the connector extends below the first fixed guide and above the second fixed guide. 3. The assembly of claim 1, further including a pair of fasteners for connecting each fixed guide to the housing. 4. The assembly of claim 1, wherein the first fixed guide is exposed to an open end of the housing through which the connector passes. 5. The assembly of claim 1, wherein the first fixed guide includes a semi-circular cross-section having a rounded face for engaging the connector. 6. The assembly of claim 1, wherein the first fixed guide comprises a groove for engaging the connector. 7. The assembly of claim 1, wherein the first fixed guide comprises inwardly sloping sides, the inwardly sloping sides configured to form a center channel to loosely guide the connector. 8. The assembly of claim 1, wherein the first fixed guide comprises a solid hourglass shape. 9. The assembly of claim 1, wherein the first fixed guide is configured to keep the connector in an aligned position in relation to the housing, and the second fixed guide is configured to allow a deviation from the aligned position. 10. A vehicle including the assembly of claim 1. 11. A tailgate lift assembly, comprising:
a housing; a spring anchored at one end at a first end of the housing; a connector having a first end affixed to the opposite end of said spring and extending through said housing; and first and second fixed guides for engaging the connector, each of the first and second fixed guides having a recess for engaging the connector. 13. The assembly of claim 12, wherein the connector extends below the first fixed guide and above the second fixed guide. 14. The assembly of claim 12, further including a pair of fasteners for connecting each fixed guide to the housing. 15. The assembly of claim 12, wherein the first fixed guide is exposed to an open end of the housing through which the connector passes. 16. The assembly of claim 12, wherein the first fixed guide includes a semi-circular cross-section having a rounded face for engaging the connector. 17. The assembly of claim 12, wherein the recess in the first fixed guide comprises a groove for engaging the connector. 18. The assembly of claim 12, wherein the first fixed guide comprises inwardly sloping sides, the inwardly sloping sides configured to form a center channel to loosely guide the connector. 19. The assembly of claim 12, wherein the first fixed guide is configured to keep the connector in an aligned position in relation to the housing, and the second fixed guide is configured to allow a deviation from the aligned position. 20. A tailgate lift assembly, comprising:
a housing; a spring anchored at one end at a first end of the housing; a connector having a first end affixed to the opposite end of said spring and extending through said housing; first and second stationary guides for engaging the connector; and at least one fastener for fixing the position of each of the first and second guides. | An apparatus for aiding a user in raising and lowering of a tailgate includes a handle and a connector for connecting the handle to the tailgate to allow for movement of the handle rearwardly relative to the tailgate as the tailgate is initially lowered by the user and forwardly to a position above the tailgate as the lowering of the tailgate is continued. A tailgate lift assembly includes a housing extending along a predetermined length, a spring anchored at one end at a first end of the housing, a connector having a first end affixed to the opposite end of said spring and extending through said housing, and a first fixed guide around which the connector extends. A bumper for covering a corner of a tailgate is also provided.1. A tailgate lift assembly, comprising:
an elongated housing; a spring anchored at one end at a first end of the housing; a connector having a first end affixed to the opposite end of said spring and extending through said housing; and first and second fixed guides for engaging the connector. 2. The assembly of claim 1, wherein the connector extends below the first fixed guide and above the second fixed guide. 3. The assembly of claim 1, further including a pair of fasteners for connecting each fixed guide to the housing. 4. The assembly of claim 1, wherein the first fixed guide is exposed to an open end of the housing through which the connector passes. 5. The assembly of claim 1, wherein the first fixed guide includes a semi-circular cross-section having a rounded face for engaging the connector. 6. The assembly of claim 1, wherein the first fixed guide comprises a groove for engaging the connector. 7. The assembly of claim 1, wherein the first fixed guide comprises inwardly sloping sides, the inwardly sloping sides configured to form a center channel to loosely guide the connector. 8. The assembly of claim 1, wherein the first fixed guide comprises a solid hourglass shape. 9. The assembly of claim 1, wherein the first fixed guide is configured to keep the connector in an aligned position in relation to the housing, and the second fixed guide is configured to allow a deviation from the aligned position. 10. A vehicle including the assembly of claim 1. 11. A tailgate lift assembly, comprising:
a housing; a spring anchored at one end at a first end of the housing; a connector having a first end affixed to the opposite end of said spring and extending through said housing; and first and second fixed guides for engaging the connector, each of the first and second fixed guides having a recess for engaging the connector. 13. The assembly of claim 12, wherein the connector extends below the first fixed guide and above the second fixed guide. 14. The assembly of claim 12, further including a pair of fasteners for connecting each fixed guide to the housing. 15. The assembly of claim 12, wherein the first fixed guide is exposed to an open end of the housing through which the connector passes. 16. The assembly of claim 12, wherein the first fixed guide includes a semi-circular cross-section having a rounded face for engaging the connector. 17. The assembly of claim 12, wherein the recess in the first fixed guide comprises a groove for engaging the connector. 18. The assembly of claim 12, wherein the first fixed guide comprises inwardly sloping sides, the inwardly sloping sides configured to form a center channel to loosely guide the connector. 19. The assembly of claim 12, wherein the first fixed guide is configured to keep the connector in an aligned position in relation to the housing, and the second fixed guide is configured to allow a deviation from the aligned position. 20. A tailgate lift assembly, comprising:
a housing; a spring anchored at one end at a first end of the housing; a connector having a first end affixed to the opposite end of said spring and extending through said housing; first and second stationary guides for engaging the connector; and at least one fastener for fixing the position of each of the first and second guides. | 3,600 |
13,406 | 13,406 | 12,210,826 | 3,692 | Methods and systems are provided that include an order and/or quote engine that automatically adjusts bid, ask, or any other type of order prices to reflect some or all of the costs associated with a trade in an underlying item between a particular party receiving the order or orders accounting for specific costs associated with the party receiving the orders and in certain instances specific costs between the party receiving the order and the party submitting the order. | 1. A system comprising a processor and memory, the memory having software associated therewith that when executed causes the processor to perform a method comprising:
receiving a request for market data on an item from a computing device associated with a first user; receiving a request for market data on the item from a computing device associated with a second user; retrieving market data for the item, the market data comprising a price associated with an order for the item; retrieving user specific cost data associated with each of the first and second users; determining a normalized price for the order for each of the first and second users based on the respective user specific cost data associated with each of the first and second users; causing an interface screen to be displayed at the first and second user computing devices, the interface screen displayed for the first user comprising the normalized price for the first user and the interface screen displayed for the second user comprising the normalized price for the second user, wherein the normalized price for the first user differs from the normalized price for the second user. 2. The system of claim 1, wherein the cost data for each of the first and second users comprises at least one commission formula. 3. The system of claim 1, wherein the cost data for at least one of the first and second users comprises a fee formula. 4. The system of claim 1, wherein the cost data comprises at least one rebate formula. 5. The system of claim 1, wherein the market data comprises a price for each of a plurality of orders for the item, the method further comprising determining a normalized price for each of the orders for each of the first and second users, and wherein the interface screen displayed for the first user comprises a listing of the orders sorted by normalized price and the interface screen displayed for the second user comprising a listing of the orders sorted by normalized price, wherein the sorting for the first user differs from the sorting for the second user. 6. The system of claim 5, the method further comprising refreshing and resorting the interface screen to reflect real time changes in the market data for the item. 7. The system of claim 5, wherein the interface screen comprises at least one element therein for a user to alternatively resort the orders based on the non-normalized price and the normalized price. 8. The system of claim 5, wherein the market data is displayed in a grid in the interface screen, the grid comprising a cell for the normalized price, the non-normalized price, and a size of each of the plurality of orders. 9. The system of claim 1, wherein the user specific cost data associated with the first user is specific to the first user and a party submitting the order. 10. A method comprising:
receiving a request for market data on an item from a computing device associated with a first user; receiving a request for market data on the item from a computing device associated with a second user; retrieving market data for the item, the market data comprising a price associated with an order for the item; retrieving user specific cost data associated with each of the first and second users; determining a normalized price for the order for each of the first and second users based on the respective user specific cost data associated with each of the first and second users; causing an interface screen to be displayed at the first and second user computing devices, the interface screen displayed for the first user comprising the normalized price for the first user and the interface screen displayed for the second user comprising the normalized price for the second user, wherein the normalized price for the first user differs from the normalized price for the second user. 11. The method of claim 10, wherein the cost data for each of the first and second users comprises at least one commission formula. 12. The method of claim 10, wherein the cost data for at least one of the first and second users comprises a fee formula. 13. The method of claim 10, wherein the cost data comprises at least one rebate formula. 14. The method of claim 10, wherein the market data comprises a price for each of a plurality of orders for the item, the method further comprising determining a normalized price for each of the orders for each of the first and second users, and wherein the interface screen displayed for the first user comprises a listing of the orders sorted by normalized price and the interface screen displayed for the second user comprising a listing of the orders sorted by normalized price, wherein the sorting for the first user differs from the sorting for the second user. 15. The method of claim 14, comprising refreshing and resorting the interface screen to reflect real time changes in the market data for the item. 16. The method of claim 14, wherein the interface screen comprises at least one element therein for a user to alternatively resort the orders based on the non-normalized price and the normalized price. 17. The method of claim 14, wherein the market data is displayed in a grid in the interface screen, the grid comprising a cell for the normalized price, the non-normalized price, and a size of each of the plurality of orders. 18. The method of claim 10, wherein the user specific cost data associated with the first user is specific to the first user and a party submitting the order. | Methods and systems are provided that include an order and/or quote engine that automatically adjusts bid, ask, or any other type of order prices to reflect some or all of the costs associated with a trade in an underlying item between a particular party receiving the order or orders accounting for specific costs associated with the party receiving the orders and in certain instances specific costs between the party receiving the order and the party submitting the order.1. A system comprising a processor and memory, the memory having software associated therewith that when executed causes the processor to perform a method comprising:
receiving a request for market data on an item from a computing device associated with a first user; receiving a request for market data on the item from a computing device associated with a second user; retrieving market data for the item, the market data comprising a price associated with an order for the item; retrieving user specific cost data associated with each of the first and second users; determining a normalized price for the order for each of the first and second users based on the respective user specific cost data associated with each of the first and second users; causing an interface screen to be displayed at the first and second user computing devices, the interface screen displayed for the first user comprising the normalized price for the first user and the interface screen displayed for the second user comprising the normalized price for the second user, wherein the normalized price for the first user differs from the normalized price for the second user. 2. The system of claim 1, wherein the cost data for each of the first and second users comprises at least one commission formula. 3. The system of claim 1, wherein the cost data for at least one of the first and second users comprises a fee formula. 4. The system of claim 1, wherein the cost data comprises at least one rebate formula. 5. The system of claim 1, wherein the market data comprises a price for each of a plurality of orders for the item, the method further comprising determining a normalized price for each of the orders for each of the first and second users, and wherein the interface screen displayed for the first user comprises a listing of the orders sorted by normalized price and the interface screen displayed for the second user comprising a listing of the orders sorted by normalized price, wherein the sorting for the first user differs from the sorting for the second user. 6. The system of claim 5, the method further comprising refreshing and resorting the interface screen to reflect real time changes in the market data for the item. 7. The system of claim 5, wherein the interface screen comprises at least one element therein for a user to alternatively resort the orders based on the non-normalized price and the normalized price. 8. The system of claim 5, wherein the market data is displayed in a grid in the interface screen, the grid comprising a cell for the normalized price, the non-normalized price, and a size of each of the plurality of orders. 9. The system of claim 1, wherein the user specific cost data associated with the first user is specific to the first user and a party submitting the order. 10. A method comprising:
receiving a request for market data on an item from a computing device associated with a first user; receiving a request for market data on the item from a computing device associated with a second user; retrieving market data for the item, the market data comprising a price associated with an order for the item; retrieving user specific cost data associated with each of the first and second users; determining a normalized price for the order for each of the first and second users based on the respective user specific cost data associated with each of the first and second users; causing an interface screen to be displayed at the first and second user computing devices, the interface screen displayed for the first user comprising the normalized price for the first user and the interface screen displayed for the second user comprising the normalized price for the second user, wherein the normalized price for the first user differs from the normalized price for the second user. 11. The method of claim 10, wherein the cost data for each of the first and second users comprises at least one commission formula. 12. The method of claim 10, wherein the cost data for at least one of the first and second users comprises a fee formula. 13. The method of claim 10, wherein the cost data comprises at least one rebate formula. 14. The method of claim 10, wherein the market data comprises a price for each of a plurality of orders for the item, the method further comprising determining a normalized price for each of the orders for each of the first and second users, and wherein the interface screen displayed for the first user comprises a listing of the orders sorted by normalized price and the interface screen displayed for the second user comprising a listing of the orders sorted by normalized price, wherein the sorting for the first user differs from the sorting for the second user. 15. The method of claim 14, comprising refreshing and resorting the interface screen to reflect real time changes in the market data for the item. 16. The method of claim 14, wherein the interface screen comprises at least one element therein for a user to alternatively resort the orders based on the non-normalized price and the normalized price. 17. The method of claim 14, wherein the market data is displayed in a grid in the interface screen, the grid comprising a cell for the normalized price, the non-normalized price, and a size of each of the plurality of orders. 18. The method of claim 10, wherein the user specific cost data associated with the first user is specific to the first user and a party submitting the order. | 3,600 |
13,407 | 13,407 | 11,495,274 | 3,622 | A first request for information that is related to a specified location is received. A first query for advertisements related to the specified location is submitted. A response to the first query that includes one or more advertisements related to the specified location is received. At least one of the one or more advertisements related to the specified location is sent to a client device. A second query for the information based on the first request is submitted. A first search result that is responsive to the second query is received. Information that is related to the location based on the first search result is sent to the client device after sending at least one of the one or more advertisements to the client device. | 1. A method, comprising:
receiving a first request for information that is related to a specified location; submitting a first query for advertisements related to the specified location; receiving a response to the first query that includes one or more advertisements related to the specified location; sending at least one of the one or more advertisements related to the specified location to a client device; submitting a second query for the information based on the first request; receiving a first search result that is responsive to the second query; and sending to the client device information that is related to the location based on the first search result after sending the at least one of the one or more advertisements to the client device. 2. The method of claim 1, further comprising:
displaying the at least one advertisement on the client device; receiving the information at the client device; and displaying the information on the client device after displaying the at least one advertisement, whereby the information replaces the advertisement on a display of the client device. 3. The method of claim 1, further comprising:
receiving a second request for information that is related to the specified location and that is related to the first search result; sending at least one of the one or more advertisements related to the specified location to a client device, whereby the at least one of the one or more advertisements may be displayed on the client device; submitting a third query for information requested in the second request; receiving a second search result that is responsive to the third query; and sending information to the client device related to the specified location based on the second search result. 4. The method of claim 1, wherein the at least one advertisement is a plurality of advertisements, the method further comprising using a selection heuristic to select at least one of the one or more advertisements related to the location to be sent to the client device. 5. The method of claim 4, wherein the selection heuristic includes at least one of a round robin selection heuristic, a random selection heuristic, a weighted round robin selection heuristic, and a modified random selection heuristic. 6. The method of claim 4, wherein distances between the specified location and locations respectively associated with the advertisements are used in the selection heuristic. 7. The method of claim 1, wherein the client device is a mobile device that wirelessly communicates with a network. 8. The method of claim 1, wherein the first request includes at least one of a category and a keyword. 9. The method of claim 1, wherein the specified location is provided by one of user input and an auto-tracking mechanism. 10. The method of claim 1, wherein the method is included in computer-executable instructions tangibly embodied on a computer-readable medium. 11. A system comprising a server that is configured to:
receive a first request for information that includes a specified location; submit a first query to an advertisement database for advertisements relating to the location, wherein the advertisement database includes a plurality of advertisements, each of the advertisements relating to one or more of the locations; receive one or more advertisements in response to the first query; send at least one of the one or more advertisements over a network; submit a second query to a content database for the information requested in the first request, wherein the a content database includes information relating to a plurality of locations; receive a first search result from the content database that is responsive to the search for the information requested in the first request; and send information related to the specified location over the network based on the first search result after sending the at least one of the one or more advertisements. 12. The system of claim 11, further comprising a client device that is configured to:
display the at least one advertisement on the client device while the second query is pending; receiving the information related to the location; and displaying the information related to the location. 13. The system of claim 11, wherein the server is further configured to:
receive a second request for information that is related to the specified location and that is related to the first search result; send at least one of the one or more advertisements related to the specified location over the network; submit a third query to the content database for information requested in the second request; receive a second search result that is responsive to the search for information requested in the second request; and send information related to the location and to the first search result that is based on the second search result over the network. 14. The system of claim 11, wherein the at least one advertisement is a plurality of advertisements, the method further comprising using a selection heuristic to select at least one of the one or more advertisements related to the location to be sent to the client device. 15. The system of claim 14, wherein the selection heuristic includes at least one of a round robin selection heuristic, a random selection heuristic, a weighted round robin selection heuristic, and a modified random selection heuristic. 16. The method of claim 14, wherein distances between the specified location and locations respectively associated with the advertisements are used in the selection heuristic. 17. The system of claim 12, wherein the client device is a mobile device that wirelessly communicates with a network. 18. The system of claim 11, wherein the first request includes at least one of a category and a keyword. 19. The system of claim 11, wherein the specified location is provided by one of user input and an auto-tracking mechanism. 20. A method, comprising:
receiving a first request for information that is related to a specified location; submitting a first query for advertisements according to the first request; receiving a response to the first query that includes one or more advertisements related to the specified location; using a selection heuristic to select at least one of the advertisements related to the specified location to be sent to a client device; sending at least one of the one or more advertisements related to the specified location to the client device; submitting a second query for the information based on the first request; receiving a first search result that is responsive to the second query; sending to the client device information that is related to the location based on the first search result after sending the at least one of the one or more advertisements related to the specified location to the client device; displaying the at least one advertisement on the client device while the second query is pending; receiving at the client device the information that is related to the location based on the first search result; and displaying on the client device the information that is related to the location based on the first search result. 21. The method of claim 20, further comprising:
receiving a second request for information that is related to the specified location and that is related to the first search result; sending at least one of the one or more advertisements related to the specified location to a client device, whereby the at least one of the one or more advertisements may be displayed on the client device; performing a search for information requested in the second request; receiving a second search result that is responsive to the search for information requested in the second request; sending information related to the location and to the first search result to the client device based on the second search result, whereby the information related to the location and to the first search result may be displayed on the client device; and displaying the information related to the location and to the first search result on the client device. 22. The method of claim 20, wherein the selection heuristic includes at least one of a round robin selection heuristic, a random selection heuristic, a weighted round robin selection heuristic, a modified random selection heuristic, and a heuristic that uses distances between the specified location and locations respectively associated with the advertisements. | A first request for information that is related to a specified location is received. A first query for advertisements related to the specified location is submitted. A response to the first query that includes one or more advertisements related to the specified location is received. At least one of the one or more advertisements related to the specified location is sent to a client device. A second query for the information based on the first request is submitted. A first search result that is responsive to the second query is received. Information that is related to the location based on the first search result is sent to the client device after sending at least one of the one or more advertisements to the client device.1. A method, comprising:
receiving a first request for information that is related to a specified location; submitting a first query for advertisements related to the specified location; receiving a response to the first query that includes one or more advertisements related to the specified location; sending at least one of the one or more advertisements related to the specified location to a client device; submitting a second query for the information based on the first request; receiving a first search result that is responsive to the second query; and sending to the client device information that is related to the location based on the first search result after sending the at least one of the one or more advertisements to the client device. 2. The method of claim 1, further comprising:
displaying the at least one advertisement on the client device; receiving the information at the client device; and displaying the information on the client device after displaying the at least one advertisement, whereby the information replaces the advertisement on a display of the client device. 3. The method of claim 1, further comprising:
receiving a second request for information that is related to the specified location and that is related to the first search result; sending at least one of the one or more advertisements related to the specified location to a client device, whereby the at least one of the one or more advertisements may be displayed on the client device; submitting a third query for information requested in the second request; receiving a second search result that is responsive to the third query; and sending information to the client device related to the specified location based on the second search result. 4. The method of claim 1, wherein the at least one advertisement is a plurality of advertisements, the method further comprising using a selection heuristic to select at least one of the one or more advertisements related to the location to be sent to the client device. 5. The method of claim 4, wherein the selection heuristic includes at least one of a round robin selection heuristic, a random selection heuristic, a weighted round robin selection heuristic, and a modified random selection heuristic. 6. The method of claim 4, wherein distances between the specified location and locations respectively associated with the advertisements are used in the selection heuristic. 7. The method of claim 1, wherein the client device is a mobile device that wirelessly communicates with a network. 8. The method of claim 1, wherein the first request includes at least one of a category and a keyword. 9. The method of claim 1, wherein the specified location is provided by one of user input and an auto-tracking mechanism. 10. The method of claim 1, wherein the method is included in computer-executable instructions tangibly embodied on a computer-readable medium. 11. A system comprising a server that is configured to:
receive a first request for information that includes a specified location; submit a first query to an advertisement database for advertisements relating to the location, wherein the advertisement database includes a plurality of advertisements, each of the advertisements relating to one or more of the locations; receive one or more advertisements in response to the first query; send at least one of the one or more advertisements over a network; submit a second query to a content database for the information requested in the first request, wherein the a content database includes information relating to a plurality of locations; receive a first search result from the content database that is responsive to the search for the information requested in the first request; and send information related to the specified location over the network based on the first search result after sending the at least one of the one or more advertisements. 12. The system of claim 11, further comprising a client device that is configured to:
display the at least one advertisement on the client device while the second query is pending; receiving the information related to the location; and displaying the information related to the location. 13. The system of claim 11, wherein the server is further configured to:
receive a second request for information that is related to the specified location and that is related to the first search result; send at least one of the one or more advertisements related to the specified location over the network; submit a third query to the content database for information requested in the second request; receive a second search result that is responsive to the search for information requested in the second request; and send information related to the location and to the first search result that is based on the second search result over the network. 14. The system of claim 11, wherein the at least one advertisement is a plurality of advertisements, the method further comprising using a selection heuristic to select at least one of the one or more advertisements related to the location to be sent to the client device. 15. The system of claim 14, wherein the selection heuristic includes at least one of a round robin selection heuristic, a random selection heuristic, a weighted round robin selection heuristic, and a modified random selection heuristic. 16. The method of claim 14, wherein distances between the specified location and locations respectively associated with the advertisements are used in the selection heuristic. 17. The system of claim 12, wherein the client device is a mobile device that wirelessly communicates with a network. 18. The system of claim 11, wherein the first request includes at least one of a category and a keyword. 19. The system of claim 11, wherein the specified location is provided by one of user input and an auto-tracking mechanism. 20. A method, comprising:
receiving a first request for information that is related to a specified location; submitting a first query for advertisements according to the first request; receiving a response to the first query that includes one or more advertisements related to the specified location; using a selection heuristic to select at least one of the advertisements related to the specified location to be sent to a client device; sending at least one of the one or more advertisements related to the specified location to the client device; submitting a second query for the information based on the first request; receiving a first search result that is responsive to the second query; sending to the client device information that is related to the location based on the first search result after sending the at least one of the one or more advertisements related to the specified location to the client device; displaying the at least one advertisement on the client device while the second query is pending; receiving at the client device the information that is related to the location based on the first search result; and displaying on the client device the information that is related to the location based on the first search result. 21. The method of claim 20, further comprising:
receiving a second request for information that is related to the specified location and that is related to the first search result; sending at least one of the one or more advertisements related to the specified location to a client device, whereby the at least one of the one or more advertisements may be displayed on the client device; performing a search for information requested in the second request; receiving a second search result that is responsive to the search for information requested in the second request; sending information related to the location and to the first search result to the client device based on the second search result, whereby the information related to the location and to the first search result may be displayed on the client device; and displaying the information related to the location and to the first search result on the client device. 22. The method of claim 20, wherein the selection heuristic includes at least one of a round robin selection heuristic, a random selection heuristic, a weighted round robin selection heuristic, a modified random selection heuristic, and a heuristic that uses distances between the specified location and locations respectively associated with the advertisements. | 3,600 |
13,408 | 13,408 | 14,140,734 | 3,685 | A method for ensuring integrity of data includes receiving data from a clinical source, assembling the data into a first data stream, generating a first hash number by applying a hashing algorithm to the first data stream, transmitting the first data stream to a data provider, and transmitting the first hash number to a data checker. The data provider provides to the data checker a second data stream and the data checker generates a second hash number based on the second data stream and compares the first hash number to the second hash number. A system for ensuring integrity of data is also described and claimed. | 1. A computer-implemented method for ensuring integrity of data, comprising:
receiving, by a computer processor, audits from a clinical source, wherein the audits are generated as a result of transactions occurring at the clinical source; assembling, using the computer processor, the audits into a data stream and a first audit stream; generating, using the computer processor, a first hash number by applying a hashing algorithm to the first audit stream; transmitting, using the computer processor, the data stream and first audit stream to a data provider; and transmitting, using the computer processor, the first hash number to a data checker,
the data provider using a second computer processor to provide to the data checker a second audit stream based on the first audit stream; and
the data checker using a third computer processor to generate a second hash number based on the second audit stream and comparing the first hash number to the second hash number. 2. The method of claim 1, wherein the data provider is a sponsor of a clinical study. 3. The method of claim 1, wherein the data checker is a regulatory agency. 4. The method of claim 1, wherein the data provider is a contract research organization and the data checker is a sponsor of a clinical study. 5. (canceled) 6. (canceled) 7. The method of claim 1, wherein the audits come from an electronic data capture system. 8. (canceled) 9. The method of claim 1, wherein the audits come from an electronic medical records or electronic health records system. 10. (canceled) 11. The system of claim 22, the first audit stream being cumulative of audits from the whole clinical study. 12. The system of claim 22, the first audit stream comprising audits from part of a clinical study. 13. The system of claim 12, wherein the first hash number is updated at consistent intervals during the course of the clinical study. 14. The system of claim 12, wherein the first hash number is periodically updated during the course of the clinical study. 15. (canceled) 16. (canceled) 17. The system of claim 22, wherein the audits come from at least one eClinical system. 18. The system of claim 17, wherein the eClinical system is an electronic data capture system. 19. The system of claim 17, wherein the eClinical system is an electronic medical records or electronic health records system. 20. A computer-implemented method for ensuring integrity of data from a clinical study, comprising:
receiving, by a computer processor, audits from at least one clinical source, the audits comprising clinical data and operational data and are generated as a result of transactions occurring at the clinical source; assembling, using the computer processor, the audits into a data stream and a first audit stream; computing, using the computer processor, a first hash number based on the first audit stream; transmitting, using the computer processor, the first audit stream and the data stream to a sponsor of the clinical study; and transmitting, using the computer processor, the first hash number to a regulatory agency,
the sponsor using a second computer processor to provide to the regulatory agency a second audit stream based on the first audit stream; and
the regulatory agency using a third computer processor to compute a second hash number based on the second audit stream and comparing the first hash number to the second hash number. 21. The method of claim 20, the first audit stream being cumulative of audits from the whole clinical study. 22. A system for ensuring clinical study data integrity, comprising:
an audit system, including a processor and a memory for storing instructions executed by the processor, that when executed cause the processor to receive audits from at least one clinical source, assemble the audits into a data stream and a first audit stream, and transmit the data stream and first audit stream to a sponsor of the clinical study, wherein the audits are generated as a result of transactions occurring at the clinical source; and a hash number generator that uses the processor and the memory for storing instructions executed by the processor that when executed cause the processor to compute a first hash number of the first audit stream and transmit the first hash number to a regulatory agency for comparison with a second hash number used to ensure clinical study data integrity. 23. The system of claim 22, the second hash number being computed based on a second audit stream received from the sponsor, the second audit stream based on the first audit stream. 24. A computer-implemented method for ensuring integrity of data, comprising:
receiving, by a first computer processor, audits from a clinical source, the clinical source receiving data from a data source; assembling, using the first computer processor, the audits into a first audit stream; generating, using the first computer processor, a first hash number by applying a hashing algorithm to the first audit stream; transmitting a second audit stream to a data provider; and transmitting, using the first computer processor, the first hash number to a data checker,
the data provider providing to the data checker a third audit stream based on the second audit stream;
the data checker using a second computer processor to generate a second hash number based on the third audit stream;
the data source using a third computer processor to generate a third hash number based on a fourth audit stream; and
the data checker comparing the three hash numbers to each other. 25. The method of claim 24, wherein the data provider is a sponsor of a clinical study. 26. The method of claim 24, wherein the data checker is a regulatory agency. 27. The method of claim 24, wherein the data provider is a contract research organization and the data checker is a sponsor of a clinical study. 28. The method of claim 24, wherein the data source is a clinical trial site. | A method for ensuring integrity of data includes receiving data from a clinical source, assembling the data into a first data stream, generating a first hash number by applying a hashing algorithm to the first data stream, transmitting the first data stream to a data provider, and transmitting the first hash number to a data checker. The data provider provides to the data checker a second data stream and the data checker generates a second hash number based on the second data stream and compares the first hash number to the second hash number. A system for ensuring integrity of data is also described and claimed.1. A computer-implemented method for ensuring integrity of data, comprising:
receiving, by a computer processor, audits from a clinical source, wherein the audits are generated as a result of transactions occurring at the clinical source; assembling, using the computer processor, the audits into a data stream and a first audit stream; generating, using the computer processor, a first hash number by applying a hashing algorithm to the first audit stream; transmitting, using the computer processor, the data stream and first audit stream to a data provider; and transmitting, using the computer processor, the first hash number to a data checker,
the data provider using a second computer processor to provide to the data checker a second audit stream based on the first audit stream; and
the data checker using a third computer processor to generate a second hash number based on the second audit stream and comparing the first hash number to the second hash number. 2. The method of claim 1, wherein the data provider is a sponsor of a clinical study. 3. The method of claim 1, wherein the data checker is a regulatory agency. 4. The method of claim 1, wherein the data provider is a contract research organization and the data checker is a sponsor of a clinical study. 5. (canceled) 6. (canceled) 7. The method of claim 1, wherein the audits come from an electronic data capture system. 8. (canceled) 9. The method of claim 1, wherein the audits come from an electronic medical records or electronic health records system. 10. (canceled) 11. The system of claim 22, the first audit stream being cumulative of audits from the whole clinical study. 12. The system of claim 22, the first audit stream comprising audits from part of a clinical study. 13. The system of claim 12, wherein the first hash number is updated at consistent intervals during the course of the clinical study. 14. The system of claim 12, wherein the first hash number is periodically updated during the course of the clinical study. 15. (canceled) 16. (canceled) 17. The system of claim 22, wherein the audits come from at least one eClinical system. 18. The system of claim 17, wherein the eClinical system is an electronic data capture system. 19. The system of claim 17, wherein the eClinical system is an electronic medical records or electronic health records system. 20. A computer-implemented method for ensuring integrity of data from a clinical study, comprising:
receiving, by a computer processor, audits from at least one clinical source, the audits comprising clinical data and operational data and are generated as a result of transactions occurring at the clinical source; assembling, using the computer processor, the audits into a data stream and a first audit stream; computing, using the computer processor, a first hash number based on the first audit stream; transmitting, using the computer processor, the first audit stream and the data stream to a sponsor of the clinical study; and transmitting, using the computer processor, the first hash number to a regulatory agency,
the sponsor using a second computer processor to provide to the regulatory agency a second audit stream based on the first audit stream; and
the regulatory agency using a third computer processor to compute a second hash number based on the second audit stream and comparing the first hash number to the second hash number. 21. The method of claim 20, the first audit stream being cumulative of audits from the whole clinical study. 22. A system for ensuring clinical study data integrity, comprising:
an audit system, including a processor and a memory for storing instructions executed by the processor, that when executed cause the processor to receive audits from at least one clinical source, assemble the audits into a data stream and a first audit stream, and transmit the data stream and first audit stream to a sponsor of the clinical study, wherein the audits are generated as a result of transactions occurring at the clinical source; and a hash number generator that uses the processor and the memory for storing instructions executed by the processor that when executed cause the processor to compute a first hash number of the first audit stream and transmit the first hash number to a regulatory agency for comparison with a second hash number used to ensure clinical study data integrity. 23. The system of claim 22, the second hash number being computed based on a second audit stream received from the sponsor, the second audit stream based on the first audit stream. 24. A computer-implemented method for ensuring integrity of data, comprising:
receiving, by a first computer processor, audits from a clinical source, the clinical source receiving data from a data source; assembling, using the first computer processor, the audits into a first audit stream; generating, using the first computer processor, a first hash number by applying a hashing algorithm to the first audit stream; transmitting a second audit stream to a data provider; and transmitting, using the first computer processor, the first hash number to a data checker,
the data provider providing to the data checker a third audit stream based on the second audit stream;
the data checker using a second computer processor to generate a second hash number based on the third audit stream;
the data source using a third computer processor to generate a third hash number based on a fourth audit stream; and
the data checker comparing the three hash numbers to each other. 25. The method of claim 24, wherein the data provider is a sponsor of a clinical study. 26. The method of claim 24, wherein the data checker is a regulatory agency. 27. The method of claim 24, wherein the data provider is a contract research organization and the data checker is a sponsor of a clinical study. 28. The method of claim 24, wherein the data source is a clinical trial site. | 3,600 |
13,409 | 13,409 | 14,098,191 | 3,623 | An aspect provides a method, including: accessing, using a processor, an event list for a user during a particular upcoming time period; predicting, using the processor, a disruption to the event list for the user; accessing, using the processor, a rule set relating to permitted modifications to the event list; determining, using the processor, a proposed modification to the event list based on the rule set; and implementing, using the processor, the proposed modification to the event list. Other aspects are described and claimed. | 1. A method, comprising:
accessing, using a processor, an event list for a user during a particular upcoming time period; predicting, using the processor, a disruption to the event list for the user; accessing, using the processor, a rule set relating to permitted modifications to the event list; determining, using the processor, a proposed modification to the event list based on the rule set; and implementing, using the processor, the proposed modification to the event list. 2. The method of claim 1, wherein the predicting comprises accessing event data derived from a source of event data selected from the group of sources consisting of user device event data and third party service event data. 3. The method of claim 2, wherein the user device event data includes user device current location data. 4. The method of claim 2, wherein the third party service event data includes one or more of weather event data and traffic event data. 5. The method of claim 1, wherein the rule set is derived at least in part from a user profile. 6. The method of claim 1, wherein the rule set is derived at least in part from user input. 7. The method of claim 1, further comprising presenting the proposed modification to the user. 8. The method of claim 7, wherein the implementing of the proposed modification proceeds after approval by the user. 9. The method of claim 1, wherein the proposed modification comprises a modification selected from the group of modifications consisting of a rescheduling of an event, a communication to a device contact associated with a scheduled event, a reorganization of two or more events, and a modification to a scheduled event. 10. The method of claim 1, wherein the proposed modification to the events planned for the user includes a modification to a non-calendar event. 11. An information handling device, comprising:
a processor; a memory device that stores instructions accessible to the processor, the instructions being executable by the processor to: access an event list for a user during a particular upcoming time period; predict a disruption to the event list for the user; access a rule set relating to permitted modifications to the event list; determine a proposed modification to the event list based on the rule set; and implement the proposed modification to the event list. 12. The information handling device of claim 11, wherein to predict comprises accessing event data derived from a source of event data selected from the group of sources consisting of user device event data and third party service event data. 13. The information handling device of claim 12, wherein the user device event data includes user device current location data. 14. The information handling device of claim 12, wherein the third party service event data includes one or more of weather event data and traffic event data. 15. The information handling device of claim 11, wherein the rule set is derived at least in part from a user profile. 16. The information handling device of claim 11, wherein the rule set is derived at least in part from user input. 17. The information handling device of claim 11, wherein the instructions are further executable by the processor to present the proposed modification to the user. 18. The information handling device of claim 17, wherein to implement of the proposed modification proceeds after approval by the user. 19. The information handling device of claim 1, wherein the proposed modification comprises a modification selected from the group of modifications consisting of a rescheduling of an event, a communication to a device contact associated with a scheduled event, a reorganization of two or more events, and a modification to a scheduled event. 20. A product, comprising:
a storage device having code stored therewith, the code comprising: code that accesses, using a processor, an event list for a user during a particular upcoming time period; code that predicts, using the processor, a disruption to the event list for the user; code that accesses, using the processor, a rule set relating to permitted modifications to the event list; code that determines, using the processor, a proposed modification to the event list based on the rule set; and code that implements, using the processor, the proposed modification to the event list. | An aspect provides a method, including: accessing, using a processor, an event list for a user during a particular upcoming time period; predicting, using the processor, a disruption to the event list for the user; accessing, using the processor, a rule set relating to permitted modifications to the event list; determining, using the processor, a proposed modification to the event list based on the rule set; and implementing, using the processor, the proposed modification to the event list. Other aspects are described and claimed.1. A method, comprising:
accessing, using a processor, an event list for a user during a particular upcoming time period; predicting, using the processor, a disruption to the event list for the user; accessing, using the processor, a rule set relating to permitted modifications to the event list; determining, using the processor, a proposed modification to the event list based on the rule set; and implementing, using the processor, the proposed modification to the event list. 2. The method of claim 1, wherein the predicting comprises accessing event data derived from a source of event data selected from the group of sources consisting of user device event data and third party service event data. 3. The method of claim 2, wherein the user device event data includes user device current location data. 4. The method of claim 2, wherein the third party service event data includes one or more of weather event data and traffic event data. 5. The method of claim 1, wherein the rule set is derived at least in part from a user profile. 6. The method of claim 1, wherein the rule set is derived at least in part from user input. 7. The method of claim 1, further comprising presenting the proposed modification to the user. 8. The method of claim 7, wherein the implementing of the proposed modification proceeds after approval by the user. 9. The method of claim 1, wherein the proposed modification comprises a modification selected from the group of modifications consisting of a rescheduling of an event, a communication to a device contact associated with a scheduled event, a reorganization of two or more events, and a modification to a scheduled event. 10. The method of claim 1, wherein the proposed modification to the events planned for the user includes a modification to a non-calendar event. 11. An information handling device, comprising:
a processor; a memory device that stores instructions accessible to the processor, the instructions being executable by the processor to: access an event list for a user during a particular upcoming time period; predict a disruption to the event list for the user; access a rule set relating to permitted modifications to the event list; determine a proposed modification to the event list based on the rule set; and implement the proposed modification to the event list. 12. The information handling device of claim 11, wherein to predict comprises accessing event data derived from a source of event data selected from the group of sources consisting of user device event data and third party service event data. 13. The information handling device of claim 12, wherein the user device event data includes user device current location data. 14. The information handling device of claim 12, wherein the third party service event data includes one or more of weather event data and traffic event data. 15. The information handling device of claim 11, wherein the rule set is derived at least in part from a user profile. 16. The information handling device of claim 11, wherein the rule set is derived at least in part from user input. 17. The information handling device of claim 11, wherein the instructions are further executable by the processor to present the proposed modification to the user. 18. The information handling device of claim 17, wherein to implement of the proposed modification proceeds after approval by the user. 19. The information handling device of claim 1, wherein the proposed modification comprises a modification selected from the group of modifications consisting of a rescheduling of an event, a communication to a device contact associated with a scheduled event, a reorganization of two or more events, and a modification to a scheduled event. 20. A product, comprising:
a storage device having code stored therewith, the code comprising: code that accesses, using a processor, an event list for a user during a particular upcoming time period; code that predicts, using the processor, a disruption to the event list for the user; code that accesses, using the processor, a rule set relating to permitted modifications to the event list; code that determines, using the processor, a proposed modification to the event list based on the rule set; and code that implements, using the processor, the proposed modification to the event list. | 3,600 |
13,410 | 13,410 | 12,491,635 | 3,689 | Embodiments for generating and implementing collaborative plans that achieve goals for sets of individual agents based on a consideration of individual and group preferences are disclosed. In accordance with at least one embodiment, a collaborative mechanism includes receiving individual plan preferences of agents via one or more client devices and modeling agent costs based on the received individual plan preferences. One or more collaborative plans are then be generated based on the modeled agent costs and one or more agents may be grouped into each collaborative plan. The one or more generated collaborative plans are provided to the agents via the one or more client devices for implementation. Finally, payments are distributed among the agents to compensate at least one agent for participation in one of the generated collaborative plans. | 1. A rideshare system, comprising:
an input component to receive commute plan preferences of agents via one or more client devices; a modeling component to model agent costs based on the received commute plan preferences; an optimizer component to generate one or more rideshare plans based on the modeled agent costs and group one or more agents into each rideshare plan; an output component to provide the one or more generated rideshare plans to the agents via the one or more client devices for implementation; and a Vickrey-Clarke-Groves (VCG)-based payment component to distribute payments among the agents to compensate at least one driver agent for participation in one of the generated rideshare plans. 2. The system of claim 1, wherein the VCG-based payment component is to distribute payments among the agents by collecting payment from at least one passenger agent. 3. The system of claim 1, wherein the modeling component includes a probabilistic time-cost model to account for a time cost of each agent. 4. The system of claim 1, wherein the modeling component includes a probabilistic time-cost model that uses time of day, day of week, and appointments of agents to account for a time cost of each agent. 5. The system of claim 1, wherein the modeling component is to model agent costs based on agent-specific costs for at least one of cost of driving, cost of delaying a trip, cost of driving, cost of diverting from an ideal route pick up or drop one or more agents, or cost of changing stop points for one or more agents. 6. The system of claim 1, wherein the optimizer component further includes:
a rideshare plan optimizer to generate the one or more rideshare plans based on the model agent costs to maximize the overall value of the rideshare system to the agents; and a rideshare group optimizer to assign rideshare group of agents based on the rideshare plans to produce the highest cumulative value for the rideshare system. 7. The system of claim 1, wherein the optimizer component further includes a rideshare plan optimizer component that uses traffic predictions and daily contexts to estimate inconvenience cost for each of the agents, and perform a geospatial search over the paths of the rideshare plans to minimize inconvenience cost to each of the agents. 8. The system of claim 1, wherein the optimizer component further includes a rideshare group optimizer that uses an approximate, greedy-set algorithm to ensure that the one or more agents grouped into each rideshare plan does not experience negative utility due to participation in the rideshare system. 9. The system of claim 1, wherein the VCG-based payment component includes a threshold-based mechanism to ensure that no deficits are incurred by the rideshare system. 10. The system of claim 1, wherein the commute plan preferences of each agent includes one or more of agent identification, origin location, destination location, time of trip, and return trip preference. 11. The system of claim 1, wherein each of the provided rideshare plans includes at least one of a carpool pick location, carpool date and time, description of carpool vehicle for each of the one or more agents. 12. A method, comprising:
receiving commute plan preferences of agents at a computing device from one or more client devices; modeling agent costs based on the received commute plan preferences and agent-specific costs of each agent at the computing device; generating one or more rideshare plans at the computing device based on the modeled agent costs and group one or more agents into each rideshare plan; providing the one or more generated rideshare plans from the computing device to the agents via the one or more client devices for implementation; computing Vickrey-Clarke-Groves (VCG)-based payments to compensate at least one driver agent for participation in one of the generated rideshare plans at the computing device; and collecting VCG payments from at least one passenger agent at the computing device for benefit derived from participation in one of the generated rideshare plans. 13. The method of claim 12, wherein the modeling includes a probabilistic time-cost model that use time of day, day of week, and appointments of agents to account for a time cost of each agent. 14. The method of claim 12, wherein the agent-specific costs for each agent includes least one of cost of driving, cost of delaying a trip, cost of driving, cost of diverting from an ideal route pick up or drop one or more agents, cost of changing stop points for one or more agents, or psychosocial cost of traveling with the one or more agents, the psychosocial cost being based at least on established reputations of the one or more agents, social relationships with the one or more agents, or organizational relationships with the one or more agents. 15. The method of claim 12, wherein the generating includes:
generating the one or more rideshare plans based on the model agent costs to maximize the overall value of a rideshare system to the agents; and assigning rideshare group of agents based on the rideshare plans to produce the highest cumulative value for the rideshare system. 16. The method of claim 12, wherein the generating includes using traffic predictions and daily contexts to estimate inconvenience cost for each of the agents, and perform a geospatial search over the paths of the rideshare plans to minimize inconvenience cost to each of the agents. 17. The method of claim 12, wherein the generating includes using an approximate, greedy-set algorithm to ensure that the one or more agents grouped into each rideshare plan does not experience negative utility due to participation in the rideshare system. 18. The method of claim 12, wherein the receiving includes receiving commute plan preferences of each agent that includes one or more of agent identification, origin location, destination location, time of trip, and return trip preference. 19. The method of claim 12, wherein the providing includes providing at least one of a carpool pick location, carpool date and time, description of carpool vehicle for each of the one or more agents. 20. A computer readable medium storing computer-executable instructions that, when executed, cause one or more processors to perform acts comprising:
receiving individual plan preferences of agents into a computing device of a collaboration system from one or more client devices; modeling agent costs based on the received individual plan preferences and agent-specific costs of each agent at the computing device; generating one or more collaborative plans based on the modeled agent costs to maximize the overall value of the collaboration system to the agents at the computing device; assigning agents to collaborative groups based on the collaborative plans to produce the highest cumulative value for the collaboration system at the computing device; providing the one or more generated collaborative plans from the computing device to the agents via the one or more client devices for implementation; computing Vickrey-Clarke-Groves (VCG)-based payments to compensate at least one agent for participation in one of the generated collaborative plans at the computing device; and distributing VCG payments among the agents to compensate at least one agent for participation in one of the generated collaborative plans. 21. The computer readable medium of claim 20, wherein the generating includes using an approximate, greedy-set algorithm to ensure that the one or more agents grouped into each collaborative plan does not experience negative utility due to participation in the collaborative system. 22. The computer readable medium of claim 20, wherein the distributing includes distributing VCG payments among the agents by collecting payment from at least one first agent that receives a benefit via participation in the collaboration plan and distributing the payment to at least one second agent that incurs a loss via participation in the collaboration plan. | Embodiments for generating and implementing collaborative plans that achieve goals for sets of individual agents based on a consideration of individual and group preferences are disclosed. In accordance with at least one embodiment, a collaborative mechanism includes receiving individual plan preferences of agents via one or more client devices and modeling agent costs based on the received individual plan preferences. One or more collaborative plans are then be generated based on the modeled agent costs and one or more agents may be grouped into each collaborative plan. The one or more generated collaborative plans are provided to the agents via the one or more client devices for implementation. Finally, payments are distributed among the agents to compensate at least one agent for participation in one of the generated collaborative plans.1. A rideshare system, comprising:
an input component to receive commute plan preferences of agents via one or more client devices; a modeling component to model agent costs based on the received commute plan preferences; an optimizer component to generate one or more rideshare plans based on the modeled agent costs and group one or more agents into each rideshare plan; an output component to provide the one or more generated rideshare plans to the agents via the one or more client devices for implementation; and a Vickrey-Clarke-Groves (VCG)-based payment component to distribute payments among the agents to compensate at least one driver agent for participation in one of the generated rideshare plans. 2. The system of claim 1, wherein the VCG-based payment component is to distribute payments among the agents by collecting payment from at least one passenger agent. 3. The system of claim 1, wherein the modeling component includes a probabilistic time-cost model to account for a time cost of each agent. 4. The system of claim 1, wherein the modeling component includes a probabilistic time-cost model that uses time of day, day of week, and appointments of agents to account for a time cost of each agent. 5. The system of claim 1, wherein the modeling component is to model agent costs based on agent-specific costs for at least one of cost of driving, cost of delaying a trip, cost of driving, cost of diverting from an ideal route pick up or drop one or more agents, or cost of changing stop points for one or more agents. 6. The system of claim 1, wherein the optimizer component further includes:
a rideshare plan optimizer to generate the one or more rideshare plans based on the model agent costs to maximize the overall value of the rideshare system to the agents; and a rideshare group optimizer to assign rideshare group of agents based on the rideshare plans to produce the highest cumulative value for the rideshare system. 7. The system of claim 1, wherein the optimizer component further includes a rideshare plan optimizer component that uses traffic predictions and daily contexts to estimate inconvenience cost for each of the agents, and perform a geospatial search over the paths of the rideshare plans to minimize inconvenience cost to each of the agents. 8. The system of claim 1, wherein the optimizer component further includes a rideshare group optimizer that uses an approximate, greedy-set algorithm to ensure that the one or more agents grouped into each rideshare plan does not experience negative utility due to participation in the rideshare system. 9. The system of claim 1, wherein the VCG-based payment component includes a threshold-based mechanism to ensure that no deficits are incurred by the rideshare system. 10. The system of claim 1, wherein the commute plan preferences of each agent includes one or more of agent identification, origin location, destination location, time of trip, and return trip preference. 11. The system of claim 1, wherein each of the provided rideshare plans includes at least one of a carpool pick location, carpool date and time, description of carpool vehicle for each of the one or more agents. 12. A method, comprising:
receiving commute plan preferences of agents at a computing device from one or more client devices; modeling agent costs based on the received commute plan preferences and agent-specific costs of each agent at the computing device; generating one or more rideshare plans at the computing device based on the modeled agent costs and group one or more agents into each rideshare plan; providing the one or more generated rideshare plans from the computing device to the agents via the one or more client devices for implementation; computing Vickrey-Clarke-Groves (VCG)-based payments to compensate at least one driver agent for participation in one of the generated rideshare plans at the computing device; and collecting VCG payments from at least one passenger agent at the computing device for benefit derived from participation in one of the generated rideshare plans. 13. The method of claim 12, wherein the modeling includes a probabilistic time-cost model that use time of day, day of week, and appointments of agents to account for a time cost of each agent. 14. The method of claim 12, wherein the agent-specific costs for each agent includes least one of cost of driving, cost of delaying a trip, cost of driving, cost of diverting from an ideal route pick up or drop one or more agents, cost of changing stop points for one or more agents, or psychosocial cost of traveling with the one or more agents, the psychosocial cost being based at least on established reputations of the one or more agents, social relationships with the one or more agents, or organizational relationships with the one or more agents. 15. The method of claim 12, wherein the generating includes:
generating the one or more rideshare plans based on the model agent costs to maximize the overall value of a rideshare system to the agents; and assigning rideshare group of agents based on the rideshare plans to produce the highest cumulative value for the rideshare system. 16. The method of claim 12, wherein the generating includes using traffic predictions and daily contexts to estimate inconvenience cost for each of the agents, and perform a geospatial search over the paths of the rideshare plans to minimize inconvenience cost to each of the agents. 17. The method of claim 12, wherein the generating includes using an approximate, greedy-set algorithm to ensure that the one or more agents grouped into each rideshare plan does not experience negative utility due to participation in the rideshare system. 18. The method of claim 12, wherein the receiving includes receiving commute plan preferences of each agent that includes one or more of agent identification, origin location, destination location, time of trip, and return trip preference. 19. The method of claim 12, wherein the providing includes providing at least one of a carpool pick location, carpool date and time, description of carpool vehicle for each of the one or more agents. 20. A computer readable medium storing computer-executable instructions that, when executed, cause one or more processors to perform acts comprising:
receiving individual plan preferences of agents into a computing device of a collaboration system from one or more client devices; modeling agent costs based on the received individual plan preferences and agent-specific costs of each agent at the computing device; generating one or more collaborative plans based on the modeled agent costs to maximize the overall value of the collaboration system to the agents at the computing device; assigning agents to collaborative groups based on the collaborative plans to produce the highest cumulative value for the collaboration system at the computing device; providing the one or more generated collaborative plans from the computing device to the agents via the one or more client devices for implementation; computing Vickrey-Clarke-Groves (VCG)-based payments to compensate at least one agent for participation in one of the generated collaborative plans at the computing device; and distributing VCG payments among the agents to compensate at least one agent for participation in one of the generated collaborative plans. 21. The computer readable medium of claim 20, wherein the generating includes using an approximate, greedy-set algorithm to ensure that the one or more agents grouped into each collaborative plan does not experience negative utility due to participation in the collaborative system. 22. The computer readable medium of claim 20, wherein the distributing includes distributing VCG payments among the agents by collecting payment from at least one first agent that receives a benefit via participation in the collaboration plan and distributing the payment to at least one second agent that incurs a loss via participation in the collaboration plan. | 3,600 |
13,411 | 13,411 | 14,553,911 | 3,694 | Techniques for multi-channel marketing campaigns are described herein. The techniques enable marketers to determine sequences of chronologically ordered communication channels by which to perform a multi-channel marketing campaign. In some cases, the techniques determine a sequence likely to have a positive result based on historic marketing sequence data and a desired category of the marketer's campaign. The techniques may also determine some number of trial sequences for a trial marketing campaign and then determine a best sequence for a full-scale marketing campaign based on the success of the trial sequences during the trial marketing campaign. | 1. In a digital media environment for determining a sequence of digital or mixed digital and non-digital communication channels for use in a digital or mixed multi-channel marketing campaign based on digital information concerning the digital and non-digital communication channels, a method comprising:
receiving historic marketing sequence data for multiple sequences, each sequence indicating communication channels included in the sequence, an order for those communication channels in the sequence, a category of the sequence, and a success of the sequence; receiving a desired category for a desired multi-channel marketing campaign; correlating the desired category to one or more categories of the sequences of the historic marketing sequence data; and determining a sequence for the desired category for the desired multi-channel marketing campaign, the determining based on the correlation between the desired category and the success of the one or more categories of the sequences of the historic marketing sequence data, the sequence for the desired category including multiple determined communication channels and a determined order for the multiple determined communication channels. 2. The method as described in claim 1, wherein the desired category indicates a type of product, relationship, interaction, or service. 3. The method as described in claim 1, wherein the success of the multiple sequences of the historic marketing sequence data is a sale or failure to sell a product. 4. The method as described in claim 1, wherein the success of the multiple sequences of the historic marketing sequence data is a continuation or cessation of a relationship. 5. The method as described in claim 1, wherein the desired communication channels are automated or digital. 6. The method as described in claim 1, wherein determining the sequence is further based on a desired demographic of persons for the desired multi-channel marketing campaign and demographics data of the historic marketing sequence data. 7. The method as described in claim 1, wherein determining the sequence for the desired category for the desired multi-channel marketing campaign determines a dynamic sequence, the dynamic sequence having one or more alternative options by which to adjust the communication channels based on an interaction or lack thereof by a user of the dynamic sequence during the desired multi-channel marketing campaign. 8. The method as described in claim 7, wherein determining the dynamic sequence aggregates multiple sequences sharing a common communication channel. 9. In a digital media environment for determining a best sequence of digital or mixed digital and non-digital communication channels for use in a digital or mixed multi-channel marketing campaign based on digital information concerning the digital and non-digital communication channels and success of multiple trial marketing sequences, the method comprising:
determining multiple trial marketing sequences, each of the trial marketing sequences having a same desired category and different communication channels or orders for communication channels; performing, in a digital media environment, a trial multi-channel marketing campaign with the multiple trial marketing sequences, the performing including:
recording success for each of the trial marketing sequences; and
determining a best sequence based on the recorded success for each of the trial marketing sequences; or
determining a subset of the trial marketing sequences based on having a higher success relative to trial marketing sequences not of the subset;
performing a second trial multi-channel marketing campaign in the digital media environment with the subset of the multiple trial marketing sequences, the performing of the second trial including recording success for each of the subset of the trial marketing sequences; and
determining, based on the recorded success for each of the subset of the trial marketing sequences, a best sequence of the subset of the trial marketing sequences. 10. The method as described in claim 9, wherein determining the multiple trial marketing sequences is based on historic marketing sequence data for multiple historic sequences, the historic marketing sequence data indicating communication channels, order for the communication channels, categories, and successes. 11. The method as described in claim 9, wherein performing the trial multi-channel marketing campaign with the multiple trial marketing sequences is performed multiple times, each time with a different demographic of persons, and wherein determining the best sequence is specific to one of the different demographics. 12. The method as described in claim 9, wherein determining the best sequence based on the recorded success for each of the trial marketing sequences or based on the recorded success for each of the subset of the trial marketing sequences comprises determining a dynamic sequence, the dynamic sequence having one or more alternative options by which to adjust the communication channels based on an interaction or lack thereof by a user of the dynamic sequence. 13. The method as described in claim 12, wherein determining the dynamic sequence aggregates multiple sequences sharing a common communication channel. 14. In a digital media environment for determining a best sequence of digital or mixed digital and non-digital communication channels for use in a digital or mixed multi-channel marketing campaign based on digital information concerning the digital and non-digital communication channels and success of multiple trial marketing sequences, the method comprising:
receiving selection of a desired category for a desired multi-channel marketing campaign; determining trial marketing sequences for the desired category based on a statistical measure of confidence for the trial marketing sequences, the statistical measure of confidence based on historic marketing sequence data for multiple sequences and the desired category, the trial marketing sequences having different communication channels or orders for communication channels; performing, in a digital media environment, a trial multi-channel marketing campaign with the trial marketing sequences, the performing including recording success for each of the trial marketing sequences, the recording performed both digitally and without user interaction; and determining, responsive to a statistically relevant quantity of successes being recorded for the trial marketing sequences during the trial multi-channel marketing campaign, a best sequence of the trial marketing sequences based on the statistically relevant quantity of recorded successes. 15. The method as described in claim 14, further comprising presenting, in a user interface and prior to receiving selection, multiple, selectable categories for the desired multi-channel marketing campaign and wherein receiving selection of the desired category is received through the user interface. 16. The method as described in claim 14, wherein determining the trial marketing sequences comprises correlating the desired category to a same category of sequences of the historic marketing data for multiple sequences. 17. The method as described in claim 14, wherein determining the trial marketing sequences comprises correlating the desired category to multiple similar categories of sequences of the historic marketing data for multiple sequences. 18. The method as described in claim 14, wherein the trial marketing sequences include four or more communication channels having different orders. 19. The method as described in claim 14, wherein the desired category indicates a type or class of product, relationship, interaction, or service. 20. The method as described in claim 14, wherein determining the best sequence determines, by aggregating multiple sequences sharing a common communication channel, a dynamic sequences having one or more alternative options by which to adjust the communication channels based on an interaction or lack thereof by a user of the dynamic sequence. | Techniques for multi-channel marketing campaigns are described herein. The techniques enable marketers to determine sequences of chronologically ordered communication channels by which to perform a multi-channel marketing campaign. In some cases, the techniques determine a sequence likely to have a positive result based on historic marketing sequence data and a desired category of the marketer's campaign. The techniques may also determine some number of trial sequences for a trial marketing campaign and then determine a best sequence for a full-scale marketing campaign based on the success of the trial sequences during the trial marketing campaign.1. In a digital media environment for determining a sequence of digital or mixed digital and non-digital communication channels for use in a digital or mixed multi-channel marketing campaign based on digital information concerning the digital and non-digital communication channels, a method comprising:
receiving historic marketing sequence data for multiple sequences, each sequence indicating communication channels included in the sequence, an order for those communication channels in the sequence, a category of the sequence, and a success of the sequence; receiving a desired category for a desired multi-channel marketing campaign; correlating the desired category to one or more categories of the sequences of the historic marketing sequence data; and determining a sequence for the desired category for the desired multi-channel marketing campaign, the determining based on the correlation between the desired category and the success of the one or more categories of the sequences of the historic marketing sequence data, the sequence for the desired category including multiple determined communication channels and a determined order for the multiple determined communication channels. 2. The method as described in claim 1, wherein the desired category indicates a type of product, relationship, interaction, or service. 3. The method as described in claim 1, wherein the success of the multiple sequences of the historic marketing sequence data is a sale or failure to sell a product. 4. The method as described in claim 1, wherein the success of the multiple sequences of the historic marketing sequence data is a continuation or cessation of a relationship. 5. The method as described in claim 1, wherein the desired communication channels are automated or digital. 6. The method as described in claim 1, wherein determining the sequence is further based on a desired demographic of persons for the desired multi-channel marketing campaign and demographics data of the historic marketing sequence data. 7. The method as described in claim 1, wherein determining the sequence for the desired category for the desired multi-channel marketing campaign determines a dynamic sequence, the dynamic sequence having one or more alternative options by which to adjust the communication channels based on an interaction or lack thereof by a user of the dynamic sequence during the desired multi-channel marketing campaign. 8. The method as described in claim 7, wherein determining the dynamic sequence aggregates multiple sequences sharing a common communication channel. 9. In a digital media environment for determining a best sequence of digital or mixed digital and non-digital communication channels for use in a digital or mixed multi-channel marketing campaign based on digital information concerning the digital and non-digital communication channels and success of multiple trial marketing sequences, the method comprising:
determining multiple trial marketing sequences, each of the trial marketing sequences having a same desired category and different communication channels or orders for communication channels; performing, in a digital media environment, a trial multi-channel marketing campaign with the multiple trial marketing sequences, the performing including:
recording success for each of the trial marketing sequences; and
determining a best sequence based on the recorded success for each of the trial marketing sequences; or
determining a subset of the trial marketing sequences based on having a higher success relative to trial marketing sequences not of the subset;
performing a second trial multi-channel marketing campaign in the digital media environment with the subset of the multiple trial marketing sequences, the performing of the second trial including recording success for each of the subset of the trial marketing sequences; and
determining, based on the recorded success for each of the subset of the trial marketing sequences, a best sequence of the subset of the trial marketing sequences. 10. The method as described in claim 9, wherein determining the multiple trial marketing sequences is based on historic marketing sequence data for multiple historic sequences, the historic marketing sequence data indicating communication channels, order for the communication channels, categories, and successes. 11. The method as described in claim 9, wherein performing the trial multi-channel marketing campaign with the multiple trial marketing sequences is performed multiple times, each time with a different demographic of persons, and wherein determining the best sequence is specific to one of the different demographics. 12. The method as described in claim 9, wherein determining the best sequence based on the recorded success for each of the trial marketing sequences or based on the recorded success for each of the subset of the trial marketing sequences comprises determining a dynamic sequence, the dynamic sequence having one or more alternative options by which to adjust the communication channels based on an interaction or lack thereof by a user of the dynamic sequence. 13. The method as described in claim 12, wherein determining the dynamic sequence aggregates multiple sequences sharing a common communication channel. 14. In a digital media environment for determining a best sequence of digital or mixed digital and non-digital communication channels for use in a digital or mixed multi-channel marketing campaign based on digital information concerning the digital and non-digital communication channels and success of multiple trial marketing sequences, the method comprising:
receiving selection of a desired category for a desired multi-channel marketing campaign; determining trial marketing sequences for the desired category based on a statistical measure of confidence for the trial marketing sequences, the statistical measure of confidence based on historic marketing sequence data for multiple sequences and the desired category, the trial marketing sequences having different communication channels or orders for communication channels; performing, in a digital media environment, a trial multi-channel marketing campaign with the trial marketing sequences, the performing including recording success for each of the trial marketing sequences, the recording performed both digitally and without user interaction; and determining, responsive to a statistically relevant quantity of successes being recorded for the trial marketing sequences during the trial multi-channel marketing campaign, a best sequence of the trial marketing sequences based on the statistically relevant quantity of recorded successes. 15. The method as described in claim 14, further comprising presenting, in a user interface and prior to receiving selection, multiple, selectable categories for the desired multi-channel marketing campaign and wherein receiving selection of the desired category is received through the user interface. 16. The method as described in claim 14, wherein determining the trial marketing sequences comprises correlating the desired category to a same category of sequences of the historic marketing data for multiple sequences. 17. The method as described in claim 14, wherein determining the trial marketing sequences comprises correlating the desired category to multiple similar categories of sequences of the historic marketing data for multiple sequences. 18. The method as described in claim 14, wherein the trial marketing sequences include four or more communication channels having different orders. 19. The method as described in claim 14, wherein the desired category indicates a type or class of product, relationship, interaction, or service. 20. The method as described in claim 14, wherein determining the best sequence determines, by aggregating multiple sequences sharing a common communication channel, a dynamic sequences having one or more alternative options by which to adjust the communication channels based on an interaction or lack thereof by a user of the dynamic sequence. | 3,600 |
13,412 | 13,412 | 14,628,754 | 3,662 | A hybrid vehicle includes a fraction battery, a powertrain coupled to the battery, and a controller or a battery management system having a controller. The controller is programmed to set a state of charge (SOC) target for the battery according to losses associated with the powertrain and an angle of inclination of the vehicle. The controller is programmed to respond to a SOC of the battery and a speed of the vehicle. When the SOC is greater than the target and the speed is greater than a threshold the controller is programmed to discharge the battery to achieve the target. | 1. A battery management system for a vehicle comprising:
a battery; and a controller programmed to set a state of charge (SOC) target for the battery according to an angle of inclination and speed of the vehicle, and in response to a SOC of the battery being greater than the target and the speed being greater than a threshold, discharge the battery to achieve the target. 2. The system of claim 1, wherein the controller is further programmed to set an engine shut-off threshold SOC based on a difference between a maximum operational SOC and an expected change in the SOC resulting from the angle of inclination and speed of the vehicle. 3. The system of claim 1 further comprising a powertrain, wherein the controller is further programmed to alter the target based on losses associated with the powertrain. 4. The system of claim 3, wherein the losses are based on an operation time of the vehicle and an ambient temperature. 5. The system of claim 3, wherein the losses are based on historical drive cycle data. 6. The system of claim 5, wherein the historical drive cycle data includes road grade, vehicle kinetic energy and battery power. 7. The system of claim 5, wherein the historical drive cycle data further includes historical deceleration rates associated with a driver. 8. The system of claim 5, wherein the historical drive cycle data further includes at least one current flow profile associated with at least one auxiliary electrical load in the vehicle. 9. The system of claim 5, wherein the historical drive cycle data further includes vehicle route information. 10. The system of claim 5, wherein the historical drive cycle data further includes a battery power limit based on an ambient temperature and a battery life. 11. The system of claim 1, wherein the angle of inclination of the vehicle is based on wheel speed sensor output indicative of acceleration along a longitudinal plane of the vehicle and longitudinal accelerometer output indicative of acceleration along a horizontal plane. 12. A method of operating a hybrid vehicle having a traction battery comprising:
setting by a controller a state of charge (SOC) target for the battery according to an angle of inclination and a speed of the vehicle; and discharging the battery by the controller in response to a SOC of the battery being greater than the target and the speed being greater than a threshold. 13. The method of claim 12, wherein the discharging includes turning off an engine and operating the vehicle by electricity. 14. The method of claim 13, wherein the angle of inclination of the vehicle is based on wheel speed sensor output indicative of acceleration along a longitudinal plane of the vehicle and longitudinal accelerometer output indicative of acceleration along the longitudinal plane. 15. The method of claim 14 further including setting an engine shut-off threshold SOC based on a difference between a maximum operational SOC of the battery and a change in the SOC resulting from the speed and angle of inclination of the vehicle. 16. The method of claim 14, wherein the discharging includes activating at least one auxiliary load expected to be operated during a drive cycle. 17. The method of claim 16, wherein the at least one auxiliary load is a battery cooling fan, an electric air conditioning unit, a battery chiller, an electric heater, a cooling pump, or a cooling fan. 18. A hybrid vehicle comprising:
a traction battery; a powertrain coupled to the battery; and a controller programmed to set a state of charge (SOC) target for the battery according to losses associated with the powertrain and an angle of inclination of the vehicle, and in response to a SOC of the battery being greater than the target and a speed of the vehicle being greater than a threshold, discharge the battery to achieve the target. 19. The vehicle of claim 18, wherein the angle of inclination of the vehicle is based on wheel speed sensor output indicative of vehicle acceleration along a longitudinal plane of the vehicle and longitudinal accelerometer output indicative of an acceleration along a horizontal plane. 20. The vehicle of claim 18, wherein the losses are based on an operation time of the vehicle and an ambient temperature. | A hybrid vehicle includes a fraction battery, a powertrain coupled to the battery, and a controller or a battery management system having a controller. The controller is programmed to set a state of charge (SOC) target for the battery according to losses associated with the powertrain and an angle of inclination of the vehicle. The controller is programmed to respond to a SOC of the battery and a speed of the vehicle. When the SOC is greater than the target and the speed is greater than a threshold the controller is programmed to discharge the battery to achieve the target.1. A battery management system for a vehicle comprising:
a battery; and a controller programmed to set a state of charge (SOC) target for the battery according to an angle of inclination and speed of the vehicle, and in response to a SOC of the battery being greater than the target and the speed being greater than a threshold, discharge the battery to achieve the target. 2. The system of claim 1, wherein the controller is further programmed to set an engine shut-off threshold SOC based on a difference between a maximum operational SOC and an expected change in the SOC resulting from the angle of inclination and speed of the vehicle. 3. The system of claim 1 further comprising a powertrain, wherein the controller is further programmed to alter the target based on losses associated with the powertrain. 4. The system of claim 3, wherein the losses are based on an operation time of the vehicle and an ambient temperature. 5. The system of claim 3, wherein the losses are based on historical drive cycle data. 6. The system of claim 5, wherein the historical drive cycle data includes road grade, vehicle kinetic energy and battery power. 7. The system of claim 5, wherein the historical drive cycle data further includes historical deceleration rates associated with a driver. 8. The system of claim 5, wherein the historical drive cycle data further includes at least one current flow profile associated with at least one auxiliary electrical load in the vehicle. 9. The system of claim 5, wherein the historical drive cycle data further includes vehicle route information. 10. The system of claim 5, wherein the historical drive cycle data further includes a battery power limit based on an ambient temperature and a battery life. 11. The system of claim 1, wherein the angle of inclination of the vehicle is based on wheel speed sensor output indicative of acceleration along a longitudinal plane of the vehicle and longitudinal accelerometer output indicative of acceleration along a horizontal plane. 12. A method of operating a hybrid vehicle having a traction battery comprising:
setting by a controller a state of charge (SOC) target for the battery according to an angle of inclination and a speed of the vehicle; and discharging the battery by the controller in response to a SOC of the battery being greater than the target and the speed being greater than a threshold. 13. The method of claim 12, wherein the discharging includes turning off an engine and operating the vehicle by electricity. 14. The method of claim 13, wherein the angle of inclination of the vehicle is based on wheel speed sensor output indicative of acceleration along a longitudinal plane of the vehicle and longitudinal accelerometer output indicative of acceleration along the longitudinal plane. 15. The method of claim 14 further including setting an engine shut-off threshold SOC based on a difference between a maximum operational SOC of the battery and a change in the SOC resulting from the speed and angle of inclination of the vehicle. 16. The method of claim 14, wherein the discharging includes activating at least one auxiliary load expected to be operated during a drive cycle. 17. The method of claim 16, wherein the at least one auxiliary load is a battery cooling fan, an electric air conditioning unit, a battery chiller, an electric heater, a cooling pump, or a cooling fan. 18. A hybrid vehicle comprising:
a traction battery; a powertrain coupled to the battery; and a controller programmed to set a state of charge (SOC) target for the battery according to losses associated with the powertrain and an angle of inclination of the vehicle, and in response to a SOC of the battery being greater than the target and a speed of the vehicle being greater than a threshold, discharge the battery to achieve the target. 19. The vehicle of claim 18, wherein the angle of inclination of the vehicle is based on wheel speed sensor output indicative of vehicle acceleration along a longitudinal plane of the vehicle and longitudinal accelerometer output indicative of an acceleration along a horizontal plane. 20. The vehicle of claim 18, wherein the losses are based on an operation time of the vehicle and an ambient temperature. | 3,600 |
13,413 | 13,413 | 15,449,350 | 3,679 | A threaded tubular connection includes a pin having external threads, a pin seal surface, and a pin torque shoulder at a free end and a box for receiving the pin, a box seal surface for contacting the pin seal surface and a box torque shoulder for contacting the pin torque shoulder. The pin torque shoulder has a curved pin shoulder surface. The box torque shoulder has a curved box shoulder surface. | 1-15. (canceled) 16. A threaded tubular connection comprising:
a pin, the pin having external threads, a concave pin seal surface, and a pin torque shoulder at a free end; and a box for receiving the pin, the box having internal threads for interacting with the external threads, a convex box seal surface for contacting the concave pin seal surface and a box torque shoulder for contacting the pin torque shoulder, the pin and box defining a longitudinal axis, the pin torque shoulder having at least one pin shoulder surface having a pin radius, the at least one pin shoulder surface being curved with respect to the longitudinal axis, the box torque shoulder having at least one box shoulder surface having a box radius, the at least one box shoulder surface being curved with respect to the longitudinal axis. 17. The threaded tubular connection as recited in claim 16, wherein the pin radius is complementary to the box radius. 18. The threaded tubular connection as recited in claim 16, wherein the pin torque shoulder or box torque shoulder have a bullet, fishtail or bull nose shape. 19. The threaded tubular connection as recited in claim 16, wherein the at least one pin shoulder surface includes a plurality of pin shoulder surfaces, each pin shoulder surface having a corresponding pin radius. 20. The threaded tubular connection as recited in claim 19, wherein the corresponding pin radii are different. 21. The threaded tubular connection as recited in claim 19, wherein the corresponding pin radii are the same. 22. The threaded tubular connection as recited in claim 16, wherein the at least one box shoulder includes a plurality of box shoulder surfaces, each box shoulder surface having a corresponding box radius. 23. The threaded tubular connection as recited in claim 22, wherein the corresponding box radii are different. 24. The threaded tubular connection as recited in claim 22, wherein the corresponding box radii are the same. 25-28. (canceled) | A threaded tubular connection includes a pin having external threads, a pin seal surface, and a pin torque shoulder at a free end and a box for receiving the pin, a box seal surface for contacting the pin seal surface and a box torque shoulder for contacting the pin torque shoulder. The pin torque shoulder has a curved pin shoulder surface. The box torque shoulder has a curved box shoulder surface.1-15. (canceled) 16. A threaded tubular connection comprising:
a pin, the pin having external threads, a concave pin seal surface, and a pin torque shoulder at a free end; and a box for receiving the pin, the box having internal threads for interacting with the external threads, a convex box seal surface for contacting the concave pin seal surface and a box torque shoulder for contacting the pin torque shoulder, the pin and box defining a longitudinal axis, the pin torque shoulder having at least one pin shoulder surface having a pin radius, the at least one pin shoulder surface being curved with respect to the longitudinal axis, the box torque shoulder having at least one box shoulder surface having a box radius, the at least one box shoulder surface being curved with respect to the longitudinal axis. 17. The threaded tubular connection as recited in claim 16, wherein the pin radius is complementary to the box radius. 18. The threaded tubular connection as recited in claim 16, wherein the pin torque shoulder or box torque shoulder have a bullet, fishtail or bull nose shape. 19. The threaded tubular connection as recited in claim 16, wherein the at least one pin shoulder surface includes a plurality of pin shoulder surfaces, each pin shoulder surface having a corresponding pin radius. 20. The threaded tubular connection as recited in claim 19, wherein the corresponding pin radii are different. 21. The threaded tubular connection as recited in claim 19, wherein the corresponding pin radii are the same. 22. The threaded tubular connection as recited in claim 16, wherein the at least one box shoulder includes a plurality of box shoulder surfaces, each box shoulder surface having a corresponding box radius. 23. The threaded tubular connection as recited in claim 22, wherein the corresponding box radii are different. 24. The threaded tubular connection as recited in claim 22, wherein the corresponding box radii are the same. 25-28. (canceled) | 3,600 |
13,414 | 13,414 | 15,339,532 | 3,689 | A method includes receiving, at a portable device, information associated with a traveler. The information includes information from a passport of the traveler, a photograph of the traveler, and travel-related information associated with the traveler. The method also includes wirelessly transmitting at least a portion of the information to an external system and receiving a disposition code from the external system. The disposition code indicates whether the traveler is allowed to pass a customs/border enforcement area or is required to enter the customs/border enforcement area for additional processing. The method further includes presenting the disposition code or information associated with the disposition code on a display of the portable device. | 1. A method comprising:
receiving, at a portable device, information associated with a traveler, wherein the information comprises information from a passport of the traveler, a photograph of the traveler, and travel-related information associated with the traveler; wirelessly transmitting at least a portion of the information to an external system; receiving a disposition code from the external system, wherein the disposition code indicates whether the traveler is allowed to pass a customs/border enforcement area or is required to enter the customs/border enforcement area for additional processing; and presenting the disposition code or information associated with the disposition code on a display of the portable device. 2. The method of claim 1, wherein the presented disposition code or the presented information associated with the disposition code is machine-readable at a kiosk or egress point of the customs/border enforcement area. 3. The method of claim 1, wherein the presented disposition code or the presented information associated with the disposition code comprises a QR code. 4. The method of claim 1, wherein receiving the information associated with the traveler comprises:
presenting one or more declaration questions to the traveler; and receiving one or more answers for the one or more declaration questions. 5. The method of claim 1, wherein receiving the information associated with the traveler comprises:
capturing, by a camera of the portable device, at least one of: the information from the passport of the traveler or the photograph of the traveler. 6. The method of claim 1, wherein receiving the information associated with the traveler comprises:
presenting one or more prompts to input the travel-related information, wherein the travel-related information comprises a departure location for the traveler, an arrival location for the traveler, and flight information associated with the traveler. 7. The method of claim 1, further comprising:
upon a determination that the traveler is allowed to pass a customs/border enforcement area, providing a document to the traveler for entry into a prioritized security screening area at a security checkpoint. 8. An apparatus comprising:
at least one processor configured to receive information associated with a traveler, wherein the information comprises information from a passport of the traveler, a photograph of the traveler, and travel-related information associated with the traveler; a transceiver configured to wirelessly transmit at least a portion of the information to an external system and receive a disposition code from the external system, wherein the disposition code indicates whether the traveler is allowed to pass a customs/border enforcement area or is required to enter the customs/border enforcement area for additional processing; and a display configured to present the disposition code or information associated with the disposition code. 9. The apparatus of claim 8, wherein the presented disposition code or the presented information associated with the disposition code is machine-readable at a kiosk or egress point of the customs/border enforcement area. 10. The apparatus of claim 8, wherein the presented disposition code or the presented information associated with the disposition code comprises a QR code. 11. The apparatus of claim 8, wherein:
the display is configured to present one or more declaration questions to the traveler; and the at least one processor is configured to receive one or more answers for the one or more declaration questions. 12. The apparatus of claim 8, further comprising:
a camera configured to capture at least one of: the information from the passport of the traveler or the photograph of the traveler. 13. The apparatus of claim 8, wherein:
the display is configured to present one or more prompts to input the travel-related information; and the travel-related information comprises a departure location for the traveler, an arrival location for the traveler, and flight information associated with the traveler. 14. The apparatus of claim 8, further comprising:
a printer configured to, upon a determination that the traveler is allowed to pass a customs/border enforcement area, generate a document for the traveler for entry into a prioritized security screening area at a security checkpoint. 15. A non-transitory computer readable medium containing instructions that, when executed by at least one processor of a portable device, cause the at least one processor to:
receive information associated with a traveler at the portable device, wherein the information comprises information from a passport of the traveler, a photograph of the traveler, and travel-related information associated with the traveler; initiate wireless transmission of at least a portion of the information to an external system; receive a disposition code from the external system, wherein the disposition code indicates whether the traveler is allowed to pass a customs/border enforcement area or is required to enter the customs/border enforcement area for additional processing; and present the disposition code or information associated with the disposition code on a display of the portable device. 16. The non-transitory computer readable medium of claim 15, wherein the presented disposition code or the presented information associated with the disposition code is machine-readable at a kiosk or egress point of the customs/border enforcement area. 17. The non-transitory computer readable medium of claim 15, wherein the presented disposition code or the presented information associated with the disposition code comprises a QR code. 18. The non-transitory computer readable medium of claim 15, further containing instructions that, when executed by the at least one processor, cause the at least one processor to:
present one or more declaration questions to the traveler; and receive one or more answers for the one or more declaration questions. 19. The non-transitory computer readable medium of claim 15, wherein the instructions that when executed cause the at least one processor to receive the information associated with the traveler comprise:
instructions that when executed cause the at least one processor to control a camera of the portable device to capture at least one of: the information from the passport of the traveler or the photograph of the traveler. 20. The non-transitory computer readable medium of claim 15, wherein the instructions that when executed cause the at least one processor to receive the information associated with the traveler comprise:
instructions that when executed cause the at least one processor to present one or more prompts to input the travel-related information; wherein the travel-related information comprises a departure location for the traveler, an arrival location for the traveler, and flight information associated with the traveler. 21. The non-transitory computer readable medium of claim 15, further containing instructions that, when executed by the at least one processor, cause the at least one processor to:
upon a determination that the traveler is allowed to pass a customs/border enforcement area, control generation of a document for the traveler for entry into a prioritized security screening area at a security checkpoint. 22. A method comprising:
receiving, from a portable device of a traveler, information associated with the traveler, wherein the information comprises information from a passport of the traveler, a photograph of the traveler, and travel-related information associated with the traveler; providing at least a portion of the information to an external system; receiving a disposition code from the external system, wherein the disposition code indicates whether the traveler is allowed to pass a customs/border enforcement area or is required to enter the customs/border enforcement area for additional processing; and providing the disposition code or information associated with the disposition code to the portable device for presentation on a display of the portable device. 23. The method of claim 22, further comprising:
detecting the disposition code or the information associated with the disposition code on the display of the portable device upon a scan of the display; and opening an egress point of the customs/border enforcement area for the traveler in response to determining that the disposition code or the information associated with the disposition code indicates that the traveler is allowed to pass the customs/border enforcement area. 24. The method of claim 22, further comprising:
when the disposition code or the information associated with the disposition code indicates that the traveler is required to enter the customs/border enforcement area for additional processing, receiving second information associated with the traveler at a kiosk; and in response to receiving the second information, providing a second disposition code or information associated with the second disposition code to the portable device for presentation on the display of the portable device, the second disposition code or the information associated with the second disposition code indicating that the traveler is allowed to exit the customs/border enforcement area. 25. A system comprising:
at least one computing device configured to:
receive, from a portable device of a traveler, information associated with the traveler, wherein the information comprises information from a passport of the traveler, a photograph of the traveler, and travel-related information associated with the traveler;
provide at least a portion of the information to an external system;
receive a disposition code from the external system, wherein the disposition code indicates whether the traveler is allowed to pass a customs/border enforcement area or is required to enter the customs/border enforcement area for additional processing; and
provide the disposition code or information associated with the disposition code to the portable device for presentation on a display of the portable device. 26. The system of claim 25, further comprising:
a scanner configured to scan the disposition code or the information associated with the disposition code on the display of the portable device upon a scan of the display; wherein the at least one computing device is further configured to:
determine that the disposition code or the information associated with the disposition code indicates that the traveler is allowed to pass the customs/border enforcement area; and
control an egress point of the customs/border enforcement area to open for the traveler in response to the determination. 27. The system of claim 25, further comprising:
a kiosk configured to receive second information associated with the traveler when the disposition code or the information associated with the disposition code indicates that the traveler is required to enter the customs/border enforcement area for additional processing; wherein the at least one computing device is further configured, in response to receiving the second information, to provide a second disposition code or information associated with the second disposition code to the portable device for presentation on the display of the portable device, the second disposition code or the information associated with the second disposition code indicating that the traveler is allowed to exit the customs/border enforcement area. 28. A non-transitory computer readable medium containing instructions that, when executed by at least one processor, cause the at least one processor to:
receive, from a portable device of a traveler, information associated with the traveler, wherein the information comprises information from a passport of the traveler, a photograph of the traveler, and travel-related information associated with the traveler; provide at least a portion of the information to an external system; receive a disposition code from the external system, wherein the disposition code indicates whether the traveler is allowed to pass a customs/border enforcement area or is required to enter the customs/border enforcement area for additional processing; and provide the disposition code or information associated with the disposition code to the portable device for presentation on a display of the portable device. 29. The non-transitory computer readable medium of claim 28, further containing instructions that, when executed by the at least one processor, cause the at least one processor to:
detect the disposition code or the information associated with the disposition code on the display of the portable device upon a scan of the display; and open an egress point of the customs/border enforcement area for the traveler in response to determining that the disposition code or the information associated with the disposition code indicates that the traveler is allowed to pass the customs/border enforcement area. 30. The non-transitory computer readable medium of claim 28, further containing instructions that, when executed by the at least one processor, cause the at least one processor to:
when the disposition code or the information associated with the disposition code indicates that the traveler is required to enter the customs/border enforcement area for additional processing, receive second information associated with the traveler at a kiosk; and in response to receiving the second information, provide a second disposition code or information associated with the second disposition code to the portable device for presentation on the display of the portable device, the second disposition code or the information associated with the second disposition code indicating that the traveler is allowed to exit the customs/border enforcement area. | A method includes receiving, at a portable device, information associated with a traveler. The information includes information from a passport of the traveler, a photograph of the traveler, and travel-related information associated with the traveler. The method also includes wirelessly transmitting at least a portion of the information to an external system and receiving a disposition code from the external system. The disposition code indicates whether the traveler is allowed to pass a customs/border enforcement area or is required to enter the customs/border enforcement area for additional processing. The method further includes presenting the disposition code or information associated with the disposition code on a display of the portable device.1. A method comprising:
receiving, at a portable device, information associated with a traveler, wherein the information comprises information from a passport of the traveler, a photograph of the traveler, and travel-related information associated with the traveler; wirelessly transmitting at least a portion of the information to an external system; receiving a disposition code from the external system, wherein the disposition code indicates whether the traveler is allowed to pass a customs/border enforcement area or is required to enter the customs/border enforcement area for additional processing; and presenting the disposition code or information associated with the disposition code on a display of the portable device. 2. The method of claim 1, wherein the presented disposition code or the presented information associated with the disposition code is machine-readable at a kiosk or egress point of the customs/border enforcement area. 3. The method of claim 1, wherein the presented disposition code or the presented information associated with the disposition code comprises a QR code. 4. The method of claim 1, wherein receiving the information associated with the traveler comprises:
presenting one or more declaration questions to the traveler; and receiving one or more answers for the one or more declaration questions. 5. The method of claim 1, wherein receiving the information associated with the traveler comprises:
capturing, by a camera of the portable device, at least one of: the information from the passport of the traveler or the photograph of the traveler. 6. The method of claim 1, wherein receiving the information associated with the traveler comprises:
presenting one or more prompts to input the travel-related information, wherein the travel-related information comprises a departure location for the traveler, an arrival location for the traveler, and flight information associated with the traveler. 7. The method of claim 1, further comprising:
upon a determination that the traveler is allowed to pass a customs/border enforcement area, providing a document to the traveler for entry into a prioritized security screening area at a security checkpoint. 8. An apparatus comprising:
at least one processor configured to receive information associated with a traveler, wherein the information comprises information from a passport of the traveler, a photograph of the traveler, and travel-related information associated with the traveler; a transceiver configured to wirelessly transmit at least a portion of the information to an external system and receive a disposition code from the external system, wherein the disposition code indicates whether the traveler is allowed to pass a customs/border enforcement area or is required to enter the customs/border enforcement area for additional processing; and a display configured to present the disposition code or information associated with the disposition code. 9. The apparatus of claim 8, wherein the presented disposition code or the presented information associated with the disposition code is machine-readable at a kiosk or egress point of the customs/border enforcement area. 10. The apparatus of claim 8, wherein the presented disposition code or the presented information associated with the disposition code comprises a QR code. 11. The apparatus of claim 8, wherein:
the display is configured to present one or more declaration questions to the traveler; and the at least one processor is configured to receive one or more answers for the one or more declaration questions. 12. The apparatus of claim 8, further comprising:
a camera configured to capture at least one of: the information from the passport of the traveler or the photograph of the traveler. 13. The apparatus of claim 8, wherein:
the display is configured to present one or more prompts to input the travel-related information; and the travel-related information comprises a departure location for the traveler, an arrival location for the traveler, and flight information associated with the traveler. 14. The apparatus of claim 8, further comprising:
a printer configured to, upon a determination that the traveler is allowed to pass a customs/border enforcement area, generate a document for the traveler for entry into a prioritized security screening area at a security checkpoint. 15. A non-transitory computer readable medium containing instructions that, when executed by at least one processor of a portable device, cause the at least one processor to:
receive information associated with a traveler at the portable device, wherein the information comprises information from a passport of the traveler, a photograph of the traveler, and travel-related information associated with the traveler; initiate wireless transmission of at least a portion of the information to an external system; receive a disposition code from the external system, wherein the disposition code indicates whether the traveler is allowed to pass a customs/border enforcement area or is required to enter the customs/border enforcement area for additional processing; and present the disposition code or information associated with the disposition code on a display of the portable device. 16. The non-transitory computer readable medium of claim 15, wherein the presented disposition code or the presented information associated with the disposition code is machine-readable at a kiosk or egress point of the customs/border enforcement area. 17. The non-transitory computer readable medium of claim 15, wherein the presented disposition code or the presented information associated with the disposition code comprises a QR code. 18. The non-transitory computer readable medium of claim 15, further containing instructions that, when executed by the at least one processor, cause the at least one processor to:
present one or more declaration questions to the traveler; and receive one or more answers for the one or more declaration questions. 19. The non-transitory computer readable medium of claim 15, wherein the instructions that when executed cause the at least one processor to receive the information associated with the traveler comprise:
instructions that when executed cause the at least one processor to control a camera of the portable device to capture at least one of: the information from the passport of the traveler or the photograph of the traveler. 20. The non-transitory computer readable medium of claim 15, wherein the instructions that when executed cause the at least one processor to receive the information associated with the traveler comprise:
instructions that when executed cause the at least one processor to present one or more prompts to input the travel-related information; wherein the travel-related information comprises a departure location for the traveler, an arrival location for the traveler, and flight information associated with the traveler. 21. The non-transitory computer readable medium of claim 15, further containing instructions that, when executed by the at least one processor, cause the at least one processor to:
upon a determination that the traveler is allowed to pass a customs/border enforcement area, control generation of a document for the traveler for entry into a prioritized security screening area at a security checkpoint. 22. A method comprising:
receiving, from a portable device of a traveler, information associated with the traveler, wherein the information comprises information from a passport of the traveler, a photograph of the traveler, and travel-related information associated with the traveler; providing at least a portion of the information to an external system; receiving a disposition code from the external system, wherein the disposition code indicates whether the traveler is allowed to pass a customs/border enforcement area or is required to enter the customs/border enforcement area for additional processing; and providing the disposition code or information associated with the disposition code to the portable device for presentation on a display of the portable device. 23. The method of claim 22, further comprising:
detecting the disposition code or the information associated with the disposition code on the display of the portable device upon a scan of the display; and opening an egress point of the customs/border enforcement area for the traveler in response to determining that the disposition code or the information associated with the disposition code indicates that the traveler is allowed to pass the customs/border enforcement area. 24. The method of claim 22, further comprising:
when the disposition code or the information associated with the disposition code indicates that the traveler is required to enter the customs/border enforcement area for additional processing, receiving second information associated with the traveler at a kiosk; and in response to receiving the second information, providing a second disposition code or information associated with the second disposition code to the portable device for presentation on the display of the portable device, the second disposition code or the information associated with the second disposition code indicating that the traveler is allowed to exit the customs/border enforcement area. 25. A system comprising:
at least one computing device configured to:
receive, from a portable device of a traveler, information associated with the traveler, wherein the information comprises information from a passport of the traveler, a photograph of the traveler, and travel-related information associated with the traveler;
provide at least a portion of the information to an external system;
receive a disposition code from the external system, wherein the disposition code indicates whether the traveler is allowed to pass a customs/border enforcement area or is required to enter the customs/border enforcement area for additional processing; and
provide the disposition code or information associated with the disposition code to the portable device for presentation on a display of the portable device. 26. The system of claim 25, further comprising:
a scanner configured to scan the disposition code or the information associated with the disposition code on the display of the portable device upon a scan of the display; wherein the at least one computing device is further configured to:
determine that the disposition code or the information associated with the disposition code indicates that the traveler is allowed to pass the customs/border enforcement area; and
control an egress point of the customs/border enforcement area to open for the traveler in response to the determination. 27. The system of claim 25, further comprising:
a kiosk configured to receive second information associated with the traveler when the disposition code or the information associated with the disposition code indicates that the traveler is required to enter the customs/border enforcement area for additional processing; wherein the at least one computing device is further configured, in response to receiving the second information, to provide a second disposition code or information associated with the second disposition code to the portable device for presentation on the display of the portable device, the second disposition code or the information associated with the second disposition code indicating that the traveler is allowed to exit the customs/border enforcement area. 28. A non-transitory computer readable medium containing instructions that, when executed by at least one processor, cause the at least one processor to:
receive, from a portable device of a traveler, information associated with the traveler, wherein the information comprises information from a passport of the traveler, a photograph of the traveler, and travel-related information associated with the traveler; provide at least a portion of the information to an external system; receive a disposition code from the external system, wherein the disposition code indicates whether the traveler is allowed to pass a customs/border enforcement area or is required to enter the customs/border enforcement area for additional processing; and provide the disposition code or information associated with the disposition code to the portable device for presentation on a display of the portable device. 29. The non-transitory computer readable medium of claim 28, further containing instructions that, when executed by the at least one processor, cause the at least one processor to:
detect the disposition code or the information associated with the disposition code on the display of the portable device upon a scan of the display; and open an egress point of the customs/border enforcement area for the traveler in response to determining that the disposition code or the information associated with the disposition code indicates that the traveler is allowed to pass the customs/border enforcement area. 30. The non-transitory computer readable medium of claim 28, further containing instructions that, when executed by the at least one processor, cause the at least one processor to:
when the disposition code or the information associated with the disposition code indicates that the traveler is required to enter the customs/border enforcement area for additional processing, receive second information associated with the traveler at a kiosk; and in response to receiving the second information, provide a second disposition code or information associated with the second disposition code to the portable device for presentation on the display of the portable device, the second disposition code or the information associated with the second disposition code indicating that the traveler is allowed to exit the customs/border enforcement area. | 3,600 |
13,415 | 13,415 | 14,168,779 | 3,622 | A system and method for performing demographic verification of an advertising campaign are provided. The method comprises generating a demographic profile for each user in a group of users; analyzing demographic profiles of viewers of the advertising campaign to determine at least a campaign reach of the advertising campaign, wherein the viewers of the advertising campaign are a subset of the users in the group of users; comparing the determined demographic campaign reach to at least one target audience attribute defined in a media plan of the advertising campaign; and verifying at least a demographic campaign reach based on the comparison. | 1. A method for performing demographic verification of an advertising campaign, comprising:
generating a demographic profile for each user in a group of users; analyzing demographic profiles of viewers of the advertising campaign to determine at least a campaign reach of the advertising campaign, wherein the viewers of the advertising campaign are a subset of the users in the group of users; comparing the determined demographic campaign reach to at least one target audience attribute defined in a media plan of the advertising campaign; and verifying at least a demographic campaign reach based on the comparison. 2. The method of claim 1, further comprising:
storing the demographic profiles in a database; and reporting at least results of the comparison. 3. The method of claim 1, wherein the demographic profile of a user is generated based on campaign data collected across a plurality of advertising campaigns that the user viewed, wherein the campaign data includes at least URLs previously visited by the user. 4. The method of claim 1, further comprising:
analyzing the demographic profiles of the users when a number of users in the group of users is above a predefined threshold. 5. The method of claim 3, wherein the demographic profile includes at least one demographic parameter, wherein the at least one demographic parameter is any one of: age, gender, hobby, income, residence address, country, state, city, education, skills, occupation, health, trade, race, disability, home ownership or lack thereof, employment status, marital status, number of children, and cultural background. 6. The method of claim 5, wherein the demographic campaign reach is computed as a percentage of users who viewed the advertising campaign respective to each of the at least one demographic parameter. 7. The method of claim 5, wherein the demographic campaign's reach is computed by correlating at least one demographic parameter exceeding a predefined threshold. 8. The method of claim 3, further comprising:
collecting at least campaign data, wherein the campaign data includes at least one of: uniform resource locators (URLs), a campaign identification (ID), advertisement identifications, time of access of the URLs, date of access of the URLs, geographical locations of viewers, and cookies. 9. The method of claim 8, wherein analyzing the at least one demographic profile to determine the campaign reach begins upon occurrence of any one of: collection of a predetermined amount of campaign data, conclusion of the campaign, and receipt of a request to obtain demographic verification. 10. The method of claim 3, wherein generating the demographic profile for the user further comprising:
identifying all URLs that the user visited during the plurality of advertising campaigns; for each URL visited by the user, determining at least one content attribute of a webpage referred to by the URL; determining at least one demographic parameter based on at least one content attribute of the web page; and producing the demographic profile of the user by processing demographic parameters determined by all the web pages visited by the user. 11. The method of claim 10, wherein the determination of the at least one demographic parameter is provided based, in part, on a plurality of heuristics applied to content attributes of visited webpages. 12. The method of claim 1, wherein the advertising campaign verification further comprises a geographical verification and content verification. 13. A non-transitory computer readable medium having stored thereon instructions for causing one or more processing units to execute the method according to claim 1. 14. A system for performing verification of an advertising campaign, comprising:
a network interface communicatively connected to a network; a processor; and a memory coupled to the processor, containing a plurality of instructions that when executed by the processor configure the system to: generate a demographic profile for each user in a group of users; analyze demographic profiles of viewers of the advertising campaign to determine at least the campaign reach of the advertising campaign, wherein the viewers of the advertising campaign are a subset of the users in the group of users; compare the determined demographic campaign reach to at least one target audience attribute defined in a media plan of the advertising campaign; and verify at least a demographic campaign reach based on the comparison. 15. The system of claim 14, further comprising:
a database for storing the demographic profiles. 16. The system of claim 14, wherein the demographic profile of a user is generated based on campaign data collected across a plurality of advertising campaigns that the user viewed, wherein the campaign data includes at least URLs previously visited by the user. 17. The system of claim 14, wherein the system is further configured to:
analyze the demographic profiles of the users when a number of users in the group of users is above a predefined threshold. 18. The system of claim 16, wherein the demographic profile includes at least one demographic parameter, wherein the at least one demographic parameter is any one of: age, gender, hobby, income, residence address, country, state, city, education, skills, occupation, health, trade, race, disability, home ownership or lack thereof, employment status, marital status, number of children, and cultural background. 19. The system of claim 18, wherein the demographic campaign reach is computed as a percentage of users who viewed the advertising campaign respective to each of the at least one demographic parameter. 20. The system of claim 18, wherein the demographic campaign reach is computed by correlating at least one demographic parameter exceeding a predefined threshold. 21. The system of claim 16, wherein the system is further configured to:
collect at least campaign data, wherein the campaign data includes at least one of: uniform resource locators (URLs), a campaign identification (ID), advertisement identifications, time of access of the URLs, date of access of the URLs, geographical locations of viewers, and cookies. 22. The system of claim 21, wherein analyzing the demographic profiles to determine the campaign reach begins upon occurrence of any one of: collection of a predetermined amount of campaign data, conclusion of the campaign, and receipt of a request to obtain demographic verification. 23. The system of claim 16, wherein the system is further configured to:
identify all URLs that the user visited during the plurality of advertising campaigns; for each URL visited by the user, determine at least one content attribute of a webpage referred to by the URL; determine at least one demographic parameter based on at least one content attribute of the web page; and produce the demographic profile of the user by processing demographic parameters determined by all the web pages visited by the user. 24. The system of claim 22, wherein the determination of the at least one demographic parameter is provided based, in part, on a plurality of heuristics applied to content attributes of visited webpages. 25. The system of claim 14, wherein the advertising campaign verification further comprises a geographical verification and content verification. | A system and method for performing demographic verification of an advertising campaign are provided. The method comprises generating a demographic profile for each user in a group of users; analyzing demographic profiles of viewers of the advertising campaign to determine at least a campaign reach of the advertising campaign, wherein the viewers of the advertising campaign are a subset of the users in the group of users; comparing the determined demographic campaign reach to at least one target audience attribute defined in a media plan of the advertising campaign; and verifying at least a demographic campaign reach based on the comparison.1. A method for performing demographic verification of an advertising campaign, comprising:
generating a demographic profile for each user in a group of users; analyzing demographic profiles of viewers of the advertising campaign to determine at least a campaign reach of the advertising campaign, wherein the viewers of the advertising campaign are a subset of the users in the group of users; comparing the determined demographic campaign reach to at least one target audience attribute defined in a media plan of the advertising campaign; and verifying at least a demographic campaign reach based on the comparison. 2. The method of claim 1, further comprising:
storing the demographic profiles in a database; and reporting at least results of the comparison. 3. The method of claim 1, wherein the demographic profile of a user is generated based on campaign data collected across a plurality of advertising campaigns that the user viewed, wherein the campaign data includes at least URLs previously visited by the user. 4. The method of claim 1, further comprising:
analyzing the demographic profiles of the users when a number of users in the group of users is above a predefined threshold. 5. The method of claim 3, wherein the demographic profile includes at least one demographic parameter, wherein the at least one demographic parameter is any one of: age, gender, hobby, income, residence address, country, state, city, education, skills, occupation, health, trade, race, disability, home ownership or lack thereof, employment status, marital status, number of children, and cultural background. 6. The method of claim 5, wherein the demographic campaign reach is computed as a percentage of users who viewed the advertising campaign respective to each of the at least one demographic parameter. 7. The method of claim 5, wherein the demographic campaign's reach is computed by correlating at least one demographic parameter exceeding a predefined threshold. 8. The method of claim 3, further comprising:
collecting at least campaign data, wherein the campaign data includes at least one of: uniform resource locators (URLs), a campaign identification (ID), advertisement identifications, time of access of the URLs, date of access of the URLs, geographical locations of viewers, and cookies. 9. The method of claim 8, wherein analyzing the at least one demographic profile to determine the campaign reach begins upon occurrence of any one of: collection of a predetermined amount of campaign data, conclusion of the campaign, and receipt of a request to obtain demographic verification. 10. The method of claim 3, wherein generating the demographic profile for the user further comprising:
identifying all URLs that the user visited during the plurality of advertising campaigns; for each URL visited by the user, determining at least one content attribute of a webpage referred to by the URL; determining at least one demographic parameter based on at least one content attribute of the web page; and producing the demographic profile of the user by processing demographic parameters determined by all the web pages visited by the user. 11. The method of claim 10, wherein the determination of the at least one demographic parameter is provided based, in part, on a plurality of heuristics applied to content attributes of visited webpages. 12. The method of claim 1, wherein the advertising campaign verification further comprises a geographical verification and content verification. 13. A non-transitory computer readable medium having stored thereon instructions for causing one or more processing units to execute the method according to claim 1. 14. A system for performing verification of an advertising campaign, comprising:
a network interface communicatively connected to a network; a processor; and a memory coupled to the processor, containing a plurality of instructions that when executed by the processor configure the system to: generate a demographic profile for each user in a group of users; analyze demographic profiles of viewers of the advertising campaign to determine at least the campaign reach of the advertising campaign, wherein the viewers of the advertising campaign are a subset of the users in the group of users; compare the determined demographic campaign reach to at least one target audience attribute defined in a media plan of the advertising campaign; and verify at least a demographic campaign reach based on the comparison. 15. The system of claim 14, further comprising:
a database for storing the demographic profiles. 16. The system of claim 14, wherein the demographic profile of a user is generated based on campaign data collected across a plurality of advertising campaigns that the user viewed, wherein the campaign data includes at least URLs previously visited by the user. 17. The system of claim 14, wherein the system is further configured to:
analyze the demographic profiles of the users when a number of users in the group of users is above a predefined threshold. 18. The system of claim 16, wherein the demographic profile includes at least one demographic parameter, wherein the at least one demographic parameter is any one of: age, gender, hobby, income, residence address, country, state, city, education, skills, occupation, health, trade, race, disability, home ownership or lack thereof, employment status, marital status, number of children, and cultural background. 19. The system of claim 18, wherein the demographic campaign reach is computed as a percentage of users who viewed the advertising campaign respective to each of the at least one demographic parameter. 20. The system of claim 18, wherein the demographic campaign reach is computed by correlating at least one demographic parameter exceeding a predefined threshold. 21. The system of claim 16, wherein the system is further configured to:
collect at least campaign data, wherein the campaign data includes at least one of: uniform resource locators (URLs), a campaign identification (ID), advertisement identifications, time of access of the URLs, date of access of the URLs, geographical locations of viewers, and cookies. 22. The system of claim 21, wherein analyzing the demographic profiles to determine the campaign reach begins upon occurrence of any one of: collection of a predetermined amount of campaign data, conclusion of the campaign, and receipt of a request to obtain demographic verification. 23. The system of claim 16, wherein the system is further configured to:
identify all URLs that the user visited during the plurality of advertising campaigns; for each URL visited by the user, determine at least one content attribute of a webpage referred to by the URL; determine at least one demographic parameter based on at least one content attribute of the web page; and produce the demographic profile of the user by processing demographic parameters determined by all the web pages visited by the user. 24. The system of claim 22, wherein the determination of the at least one demographic parameter is provided based, in part, on a plurality of heuristics applied to content attributes of visited webpages. 25. The system of claim 14, wherein the advertising campaign verification further comprises a geographical verification and content verification. | 3,600 |
13,416 | 13,416 | 14,595,269 | 3,665 | A vehicle includes a ferromagnetic core having a winding, defining a gap, and configured to concentrate a net field in the gap. The vehicle also includes a controller programmed to flow a current in the winding such that an angle of the net field relative to a unipolar sensor in the gap is approximately zero and an intensity of the net field is at least twice that of a bi-directional field in the gap radiated from a conductor. | 1. A vehicle comprising:
a ferromagnetic core assembly defining a gap and having a winding configured to create a base magnetic field in the gap; a conductor coupling a traction battery with an electric machine configured to radiate a bi-directional magnetic field in the gap; a unipolar sensor, having a sensitivity range, located within the gap and configured to measure an intensity of a net magnetic field in the gap; and a controller programmed to flow a current in the winding to drive an angle of the net magnetic field towards zero such that an intensity of the net magnetic field falls within the sensitivity range, wherein a magnitude of the current is proportional to a torque of the electric machine and a polarity of the current is indicative of a direction of traction battery current flow. 2. The vehicle of claim 1, wherein the unipolar sensor is a giant magnetoresistance (GMR) sensor. 3. The vehicle of claim 1, wherein the net magnetic field in the gap is formed by the bi-directional magnetic field and the base magnetic field. 4. The vehicle of claim 1, wherein the bi-directional magnetic field is induced by a bi-directional current in the conductor. 5. The vehicle of claim 1 further comprising a temperature sensor coupled to the unipolar sensor, wherein the controller is further programmed to monitor a temperature of the sensor and adapt the current flowing in the winding based on the temperature and a temperature drift of the unipolar sensor. 6. The vehicle of claim 1 further comprising a second ferromagnetic core assembly, having a second gap, and a second unipolar sensor located within the second gap configured to measure an ambient magnetic field generated by an electric system in the vehicle. 7. The vehicle of claim 6, wherein the controller is further programmed to drive a current in the winding to compensate for the ambient magnetic field. 8. The vehicle of claim 1, wherein the ferromagnetic core assembly includes a toroid and the conductor passes through an axis of the toroid. 9. A method of controlling a traction battery comprising:
outputting a current to a winding to induce a base magnetic field in a ferromagnetic core having a conductor passing through a center thereof; adjusting, via closed loop feedback, the current such that a net magnetic field is generally maintained within a sensitivity range of a unipolar sensor operatively arranged with the ferromagnetic core, wherein a lower threshold of the sensitivity range is greater than twice a maximum absolute value of a magnitude of an induced field from a bi-directional current expected to flow through the conductor; and operating the traction battery based on the current. 10. The method of claim 9, wherein the unipolar sensor is a giant magnetoresistance (GMR) sensor. 11. The method of claim 9 further comprising monitoring a temperature of the sensor and adapting the current based on the temperature and a temperature drift of the unipolar sensor. 12. The method of claim 9 further comprising measuring an ambient magnetic field generated by a vehicle electric system including the traction battery and further adjusting the current in the winding to compensate for the ambient magnetic field. 13. A vehicle comprising:
a ferromagnetic core having a winding, defining a gap, and configured to concentrate a net field in the gap; and a controller programmed to flow a current in the winding such that an angle of the net field relative to a unipolar sensor in the gap is approximately zero and an intensity of the net field is at least twice that of a bi-directional field in the gap radiated from a conductor. 14. The vehicle of claim 13, wherein the net field in the gap is formed by the bi-directional field and a base field induced by the current in the winding. 15. The vehicle of claim 13, wherein the unipolar sensor is a giant magnetoresistance (GMR) sensor. 16. The vehicle of claim 13 further comprising a temperature sensor coupled to the unipolar sensor, wherein the controller is further programmed to monitor a temperature of the sensor and adapt the current flowing in the winding based on the temperature and a temperature drift of the unipolar sensor. 17. The vehicle of claim 13 further comprising a second ferromagnetic core assembly having a second gap, and a second unipolar sensor located within the second gap configured to measure an ambient field generated by an electric system in the vehicle. 18. The vehicle of claim 17, wherein the controller is further programmed to drive a current in the winding to compensate for the ambient field. | A vehicle includes a ferromagnetic core having a winding, defining a gap, and configured to concentrate a net field in the gap. The vehicle also includes a controller programmed to flow a current in the winding such that an angle of the net field relative to a unipolar sensor in the gap is approximately zero and an intensity of the net field is at least twice that of a bi-directional field in the gap radiated from a conductor.1. A vehicle comprising:
a ferromagnetic core assembly defining a gap and having a winding configured to create a base magnetic field in the gap; a conductor coupling a traction battery with an electric machine configured to radiate a bi-directional magnetic field in the gap; a unipolar sensor, having a sensitivity range, located within the gap and configured to measure an intensity of a net magnetic field in the gap; and a controller programmed to flow a current in the winding to drive an angle of the net magnetic field towards zero such that an intensity of the net magnetic field falls within the sensitivity range, wherein a magnitude of the current is proportional to a torque of the electric machine and a polarity of the current is indicative of a direction of traction battery current flow. 2. The vehicle of claim 1, wherein the unipolar sensor is a giant magnetoresistance (GMR) sensor. 3. The vehicle of claim 1, wherein the net magnetic field in the gap is formed by the bi-directional magnetic field and the base magnetic field. 4. The vehicle of claim 1, wherein the bi-directional magnetic field is induced by a bi-directional current in the conductor. 5. The vehicle of claim 1 further comprising a temperature sensor coupled to the unipolar sensor, wherein the controller is further programmed to monitor a temperature of the sensor and adapt the current flowing in the winding based on the temperature and a temperature drift of the unipolar sensor. 6. The vehicle of claim 1 further comprising a second ferromagnetic core assembly, having a second gap, and a second unipolar sensor located within the second gap configured to measure an ambient magnetic field generated by an electric system in the vehicle. 7. The vehicle of claim 6, wherein the controller is further programmed to drive a current in the winding to compensate for the ambient magnetic field. 8. The vehicle of claim 1, wherein the ferromagnetic core assembly includes a toroid and the conductor passes through an axis of the toroid. 9. A method of controlling a traction battery comprising:
outputting a current to a winding to induce a base magnetic field in a ferromagnetic core having a conductor passing through a center thereof; adjusting, via closed loop feedback, the current such that a net magnetic field is generally maintained within a sensitivity range of a unipolar sensor operatively arranged with the ferromagnetic core, wherein a lower threshold of the sensitivity range is greater than twice a maximum absolute value of a magnitude of an induced field from a bi-directional current expected to flow through the conductor; and operating the traction battery based on the current. 10. The method of claim 9, wherein the unipolar sensor is a giant magnetoresistance (GMR) sensor. 11. The method of claim 9 further comprising monitoring a temperature of the sensor and adapting the current based on the temperature and a temperature drift of the unipolar sensor. 12. The method of claim 9 further comprising measuring an ambient magnetic field generated by a vehicle electric system including the traction battery and further adjusting the current in the winding to compensate for the ambient magnetic field. 13. A vehicle comprising:
a ferromagnetic core having a winding, defining a gap, and configured to concentrate a net field in the gap; and a controller programmed to flow a current in the winding such that an angle of the net field relative to a unipolar sensor in the gap is approximately zero and an intensity of the net field is at least twice that of a bi-directional field in the gap radiated from a conductor. 14. The vehicle of claim 13, wherein the net field in the gap is formed by the bi-directional field and a base field induced by the current in the winding. 15. The vehicle of claim 13, wherein the unipolar sensor is a giant magnetoresistance (GMR) sensor. 16. The vehicle of claim 13 further comprising a temperature sensor coupled to the unipolar sensor, wherein the controller is further programmed to monitor a temperature of the sensor and adapt the current flowing in the winding based on the temperature and a temperature drift of the unipolar sensor. 17. The vehicle of claim 13 further comprising a second ferromagnetic core assembly having a second gap, and a second unipolar sensor located within the second gap configured to measure an ambient field generated by an electric system in the vehicle. 18. The vehicle of claim 17, wherein the controller is further programmed to drive a current in the winding to compensate for the ambient field. | 3,600 |
13,417 | 13,417 | 14,368,368 | 3,686 | The exemplary embodiments are related to systems and methods for reducing early readmission according to an exemplary embodiment described herein. One embodiment relates to a method comprising receiving patient data for a patient; creating a personalized risk model for the patient based on the patient data, the personalized risk model including an overall risk level based on a plurality of risk factors; selecting one of the risk factors; administering treatment relating to the selected risk factor; updating the personalized risk model after administering treatment, the updating including determining an updated risk level; determining whether the updated risk level is above a threshold level; and repeating the selecting, administering, updating and determining steps if the risk level is above the threshold level. | 1. A method, comprising:
receiving patient data for a patient; creating a personalized risk model for the patient based on the patient data, the personalized risk model including an overall risk level based on a plurality of risk factors; selecting one of the risk factors; administering treatment relating to the selected risk factor; updating the personalized risk model after administering treatment, the updating including determining an updated risk level; determining whether the updated risk level is above a threshold level; and repeating the selecting, administering, updating and determining steps if the risk level is above the threshold level. 2. The method of claim 1, wherein selecting one of the risk factors comprises selecting a most influencing one of the risk factors. 3. The method of claim 1, wherein creating the personalized risk model comprises:
selecting a validated risk model; applying the validated risk model to the patient data to determine the plurality of risk factors; determining the overall risk level based on the validated risk model and the plurality of risk factors; assessing a significance of each of the risk factors; and assessing an expected likelihood of intervention of each of the risk factors, wherein the personalized risk model includes the plurality of risk factors, the overall risk level, the significance of each of the risk factors, and the expected likelihood of intervention of each of the risk factors. 4. The method of claim 3, wherein the validated risk model is one of a Krumholz risk model and a Philbin risk model. 5. The method of claim 3, wherein the expected likelihood of success of each of the risk factors is determined based on results of a questionnaire relating to each of the risk factors given to the patient. 6. The method of claim 3, wherein the significance of each of the risk factors is based on the validated risk model. 7. The method of claim 3, wherein creating the personalized risk model further comprises:
classifying each of the risk factors as one of a medical risk factor, an unmodifiable psychosocial risk factor, and a modifiable psychosocial risk factor; removing each of the risk factors that has been classified as a medical risk factor from the plurality of risk factors; determining one or more modifiable psychosocial risk factors relating to each of the unmodifiable psychosocial risk factors; and replacing each of the unmodifiable psychosocial risk factors with the one or more related modifiable psychosocial risk factors. 8. The method of claim 1, wherein the treatment relates to a patient maintenance behavior relating to the selected risk factor. 9. A system, comprising:
a memory storing a plurality of validated risk models; and a processor receiving patient data for a patient, creating a personalized risk model for the patient based on the patient data, the personalized risk model including an overall risk level based on a plurality of risk factors, selecting one of the risk factors for treatment; receiving a result of treatment relating to the selected risk factor, updating the personalized risk model based on the result of treatment, the updating including determining an updated risk level, determining whether the updated risk level is above a threshold level, and selecting a further one of the risk factors for treatment if the risk level is above the threshold level. 10. The system of claim 9, the selected one of the risk factors is a most influencing one of the risk factors. 11. The system of claim 9, wherein, when creating the personalized risk model, the processor selects one of the validated risk models, applies the selected validated risk model to the patient data to determine the plurality of risk factors, determines the overall risk level based on the selected validated risk model and the plurality of risk factors, assesses a significance of each of the risk factors, and assesses an expected likelihood of intervention of each of the risk factors, wherein the personalized risk model includes the plurality of risk factors, the overall risk level, the significance of each of the risk factors, and the expected likelihood of intervention of each of the risk factors. 12. The system of claim 11, wherein the selected validated risk model is one of a Krumholz risk model and a Philbin risk model. 13. (canceled) 14. The system of claim 11, wherein the significance of each of the risk factors is based on the selected validated risk model. 15. The system of claim 11, wherein, when creating the validated risk model, the processor further classifies each of the risk factors as one of a medical risk factor, an unmodifiable psychosocial risk factor, and a modifiable psychosocial risk factor, removes each of the risk factors that has been classified as a medical risk factor from the plurality of risk factors, determines one or more modifiable psychosocial risk factors relating to each of the unmodifiable psychosocial risk factors, and replaces each of the unmodifiable psychosocial risk factors with the one or more related modifiable psychosocial risk factors. 16. (canceled) 17. A non-transitory computer-readable storage medium storing a set of instructions executable by a processor, the set of instructions being operable to:
receive patient data relating to a patient; create a personalized risk model for the patient based on the patient data, the personalized risk model including an overall risk level based on a plurality of risk factors; select one of the risk factors for a treatment; receive a result of the treatment; update the personalized risk model based on the result of the treatment, the updating including determining an updated risk level; determine whether the updated risk level is above a threshold level; and repeat the selecting, receiving, updating and determining steps if the risk level is above the threshold level. 18. (canceled) 19. (canceled) 20. (canceled) | The exemplary embodiments are related to systems and methods for reducing early readmission according to an exemplary embodiment described herein. One embodiment relates to a method comprising receiving patient data for a patient; creating a personalized risk model for the patient based on the patient data, the personalized risk model including an overall risk level based on a plurality of risk factors; selecting one of the risk factors; administering treatment relating to the selected risk factor; updating the personalized risk model after administering treatment, the updating including determining an updated risk level; determining whether the updated risk level is above a threshold level; and repeating the selecting, administering, updating and determining steps if the risk level is above the threshold level.1. A method, comprising:
receiving patient data for a patient; creating a personalized risk model for the patient based on the patient data, the personalized risk model including an overall risk level based on a plurality of risk factors; selecting one of the risk factors; administering treatment relating to the selected risk factor; updating the personalized risk model after administering treatment, the updating including determining an updated risk level; determining whether the updated risk level is above a threshold level; and repeating the selecting, administering, updating and determining steps if the risk level is above the threshold level. 2. The method of claim 1, wherein selecting one of the risk factors comprises selecting a most influencing one of the risk factors. 3. The method of claim 1, wherein creating the personalized risk model comprises:
selecting a validated risk model; applying the validated risk model to the patient data to determine the plurality of risk factors; determining the overall risk level based on the validated risk model and the plurality of risk factors; assessing a significance of each of the risk factors; and assessing an expected likelihood of intervention of each of the risk factors, wherein the personalized risk model includes the plurality of risk factors, the overall risk level, the significance of each of the risk factors, and the expected likelihood of intervention of each of the risk factors. 4. The method of claim 3, wherein the validated risk model is one of a Krumholz risk model and a Philbin risk model. 5. The method of claim 3, wherein the expected likelihood of success of each of the risk factors is determined based on results of a questionnaire relating to each of the risk factors given to the patient. 6. The method of claim 3, wherein the significance of each of the risk factors is based on the validated risk model. 7. The method of claim 3, wherein creating the personalized risk model further comprises:
classifying each of the risk factors as one of a medical risk factor, an unmodifiable psychosocial risk factor, and a modifiable psychosocial risk factor; removing each of the risk factors that has been classified as a medical risk factor from the plurality of risk factors; determining one or more modifiable psychosocial risk factors relating to each of the unmodifiable psychosocial risk factors; and replacing each of the unmodifiable psychosocial risk factors with the one or more related modifiable psychosocial risk factors. 8. The method of claim 1, wherein the treatment relates to a patient maintenance behavior relating to the selected risk factor. 9. A system, comprising:
a memory storing a plurality of validated risk models; and a processor receiving patient data for a patient, creating a personalized risk model for the patient based on the patient data, the personalized risk model including an overall risk level based on a plurality of risk factors, selecting one of the risk factors for treatment; receiving a result of treatment relating to the selected risk factor, updating the personalized risk model based on the result of treatment, the updating including determining an updated risk level, determining whether the updated risk level is above a threshold level, and selecting a further one of the risk factors for treatment if the risk level is above the threshold level. 10. The system of claim 9, the selected one of the risk factors is a most influencing one of the risk factors. 11. The system of claim 9, wherein, when creating the personalized risk model, the processor selects one of the validated risk models, applies the selected validated risk model to the patient data to determine the plurality of risk factors, determines the overall risk level based on the selected validated risk model and the plurality of risk factors, assesses a significance of each of the risk factors, and assesses an expected likelihood of intervention of each of the risk factors, wherein the personalized risk model includes the plurality of risk factors, the overall risk level, the significance of each of the risk factors, and the expected likelihood of intervention of each of the risk factors. 12. The system of claim 11, wherein the selected validated risk model is one of a Krumholz risk model and a Philbin risk model. 13. (canceled) 14. The system of claim 11, wherein the significance of each of the risk factors is based on the selected validated risk model. 15. The system of claim 11, wherein, when creating the validated risk model, the processor further classifies each of the risk factors as one of a medical risk factor, an unmodifiable psychosocial risk factor, and a modifiable psychosocial risk factor, removes each of the risk factors that has been classified as a medical risk factor from the plurality of risk factors, determines one or more modifiable psychosocial risk factors relating to each of the unmodifiable psychosocial risk factors, and replaces each of the unmodifiable psychosocial risk factors with the one or more related modifiable psychosocial risk factors. 16. (canceled) 17. A non-transitory computer-readable storage medium storing a set of instructions executable by a processor, the set of instructions being operable to:
receive patient data relating to a patient; create a personalized risk model for the patient based on the patient data, the personalized risk model including an overall risk level based on a plurality of risk factors; select one of the risk factors for a treatment; receive a result of the treatment; update the personalized risk model based on the result of the treatment, the updating including determining an updated risk level; determine whether the updated risk level is above a threshold level; and repeat the selecting, receiving, updating and determining steps if the risk level is above the threshold level. 18. (canceled) 19. (canceled) 20. (canceled) | 3,600 |
13,418 | 13,418 | 15,409,576 | 3,627 | The invention discloses a waitressing drone that brings drinks to people at the restaurant, and the orders are identified from the Facebook photo of the user, that the drone displays when making the delivery. The invention facilitates the interaction with humans and drones via the social network. With the invention, the order input time is greatly reduced for the consumer, and the consumer may move about while waiting for the order as the drone finds the consumer. Also importantly, the social nature of the drone allows for the sharing of drones among multiple human users. Further, the interfacing of the social human profile with non-human drone profiles allows for the continuous retraining and reprogramming of drones to meet more specific and individualistic user tasks, thereby liberating people from mundane manual labour. | 1. (canceled) 2. (canceled) 3. (canceled) 4. (canceled) 5. (canceled) 6. A computer software program product stored in a memory medium, operable with at least one mobile subscriber terminal, at least one drone and/or at least one server computer, and a communication network, characterised in that,
The mobile subscriber terminal is configured to have an application installed that allows the user to select a product or service, The application is configured to receive the user choice and transmit the choice and/or social network profile or personal data of the user to the drone directly and/or via the cloud server computer with the location of the mobile subscriber that made the selection, the location of the mobile subscriber terminal is sent automatically and multiple times to the drone, at least one drone is configured to retrieve the product and/or prepare for delivery of service and approach the moving mobile subscriber location that is sent multiple times to the drone as the location changes until the product or service is delivered to the mobile subscriber terminal location of the mobile consumer. 7. A software program as claimed in claim 6, wherein the drone is a waitressing drone that is configured to fly or drive to deliver food and beverage orders to customers. 8. A software program as claimed in claim 6, wherein the drone is configured to collect payment. 9. A software program as claimed in claim 6, wherein the drone is configured to display social network data, such as the user picture, to help identify which drone is servicing which user. 10. A software program as claimed in claim 6, wherein the server computer is configured to receive said user orders and be in connection with a fleet of a plurality of drones, and is configured to select, optionally queue, and dispatch the orders to individual drones. 11. A method for delivering products and/or services, comprising at least one mobile subscriber terminal, at least one drone and/or at least one server computer, and a communication network, characterised in that,
the mobile subscriber terminal application allows the user to select a product or service, the application receives the user choice and transmits the choice and/or social network profile or personal data of the user to the drone directly and/or via the cloud server computer with the location of the mobile subscriber that made the selection, the location of the mobile subscriber terminal is sent automatically and multiple times to the drone, at least one drone retrieves the product and/or prepares for delivery of service and approaches the moving mobile subscriber location that is sent multiple times to the drone as the location changes until the product or service is delivered to the mobile subscriber terminal location of the mobile consumer. 12. A method as claimed in claim 11, wherein the drone is a waitressing drone that flies or drives to deliver food or beverage orders to customers. 13. A method as claimed in claim 11, wherein the drone collects payment. 14. A method as claimed in claim 11, wherein the drone displays social network data, such as the user picture, to help identify which drone is servicing which user. 15. A method as claimed in claim 11, wherein the server computer receives said user orders and is in connection with a fleet of a plurality of drones, and selects, queues, and dispatches the orders to individual drones. 16. A computer software program product stored in a memory medium, characterised in that, at least one drone is configured to have a non-human social network profile and is configured to be controlled from at least two mobile applications on different user mobile subscriber terminals, and
the mobile subscriber terminal application allows the user to select a product or service, the application receives the user choice and transmits the choice and/or social network profile or personal data of the user to the drone directly and/or via the cloud server computer with the location of the mobile subscriber that made the selection, the location of the mobile subscriber terminal is sent automatically and multiple times to the drone, the drone retrieves the product and/or prepares for delivery of service and approaches the moving mobile subscriber location that is sent multiple times to the drone as the location changes until the product or service is delivered to the mobile subscriber terminal location of the mobile consumer. 17. A software program as claimed in claim 16, wherein said non-human social network profile is configured to interface and receive instructions from at least one human social network profile. 18. A software program as claimed in claim 16, wherein said non-human social network profile is configured to list capabilities and attributes that the drone has, which may include but are not limited to payload, speed, response time, cost and/or cost per unit of time for use and/or the non-human social network profile also typically lists activities that the drone is capable of performing, which may include but are not limited to transport of people and/or goods, shopping, waitressing, garbage collection, laundry processing, vacuum cleaning, cleaning, mopping, lawn mowing, tree and/or bush cutting. 19. A software program as claimed in claim 16, wherein the mobile application is an iOS, Android and/or Windows phone application, and/or an application programmed to interface with social network and/or search engine APIs (Application Programmer Interface), and/or the mobile application is configured to be able to interact with a social network and/or a search engine. 20. A software program as claimed in claim 16, wherein the delivery of a product and/or a service by at least one said drone is configured to another drone configured to receive said product and/or service. 21. A software program as claimed in claim 16, wherein the said at least two mobile applications belong to two different users and access the drone via a cloud server network. 22. (canceled) 23. (canceled) 24. (canceled) 25. (canceled) 26. (canceled) 27. (canceled) 28. (canceled) 29. (canceled) 30. (canceled) 31. (canceled) 32. (canceled) 33. (canceled) 34. A drone delivery system, operable with at least one mobile subscriber terminal, at least one drone and/or at least one server computer, and a communication network, characterised in that,
The mobile subscriber terminal is configured to have an application installed that allows the user to select a product or service, The application is configured to receive the user choice and transmit the choice and/or social network profile or personal data of the user to the drone directly and/or via the cloud server computer with the location of the mobile subscriber that made the selection, the location of the mobile subscriber terminal is sent automatically and multiple times to the drone, at least one drone is configured to retrieve the product and/or prepare for delivery of service and approach the moving mobile subscriber location that is sent multiple times to the drone as the location changes until the product or service is delivered to the mobile subscriber terminal location of the mobile consumer. 35. A drone delivery system as claimed in claim 34, wherein the drone is a waitressing drone that is configured to fly or drive to deliver food and beverage orders to customers. 36. A drone delivery system as claimed in claim 34, wherein the drone is configured to collect payment. 37. A drone delivery system as claimed in claim 34, wherein the drone is configured to display social network data, such as the user picture, to help identify which drone is servicing which user. 38. A drone delivery system as claimed in claim 34, wherein the server computer is configured to receive said user orders and be in connection with a fleet of a plurality of drones, and is configured to select, optionally queue, and dispatch the orders to individual drones. | The invention discloses a waitressing drone that brings drinks to people at the restaurant, and the orders are identified from the Facebook photo of the user, that the drone displays when making the delivery. The invention facilitates the interaction with humans and drones via the social network. With the invention, the order input time is greatly reduced for the consumer, and the consumer may move about while waiting for the order as the drone finds the consumer. Also importantly, the social nature of the drone allows for the sharing of drones among multiple human users. Further, the interfacing of the social human profile with non-human drone profiles allows for the continuous retraining and reprogramming of drones to meet more specific and individualistic user tasks, thereby liberating people from mundane manual labour.1. (canceled) 2. (canceled) 3. (canceled) 4. (canceled) 5. (canceled) 6. A computer software program product stored in a memory medium, operable with at least one mobile subscriber terminal, at least one drone and/or at least one server computer, and a communication network, characterised in that,
The mobile subscriber terminal is configured to have an application installed that allows the user to select a product or service, The application is configured to receive the user choice and transmit the choice and/or social network profile or personal data of the user to the drone directly and/or via the cloud server computer with the location of the mobile subscriber that made the selection, the location of the mobile subscriber terminal is sent automatically and multiple times to the drone, at least one drone is configured to retrieve the product and/or prepare for delivery of service and approach the moving mobile subscriber location that is sent multiple times to the drone as the location changes until the product or service is delivered to the mobile subscriber terminal location of the mobile consumer. 7. A software program as claimed in claim 6, wherein the drone is a waitressing drone that is configured to fly or drive to deliver food and beverage orders to customers. 8. A software program as claimed in claim 6, wherein the drone is configured to collect payment. 9. A software program as claimed in claim 6, wherein the drone is configured to display social network data, such as the user picture, to help identify which drone is servicing which user. 10. A software program as claimed in claim 6, wherein the server computer is configured to receive said user orders and be in connection with a fleet of a plurality of drones, and is configured to select, optionally queue, and dispatch the orders to individual drones. 11. A method for delivering products and/or services, comprising at least one mobile subscriber terminal, at least one drone and/or at least one server computer, and a communication network, characterised in that,
the mobile subscriber terminal application allows the user to select a product or service, the application receives the user choice and transmits the choice and/or social network profile or personal data of the user to the drone directly and/or via the cloud server computer with the location of the mobile subscriber that made the selection, the location of the mobile subscriber terminal is sent automatically and multiple times to the drone, at least one drone retrieves the product and/or prepares for delivery of service and approaches the moving mobile subscriber location that is sent multiple times to the drone as the location changes until the product or service is delivered to the mobile subscriber terminal location of the mobile consumer. 12. A method as claimed in claim 11, wherein the drone is a waitressing drone that flies or drives to deliver food or beverage orders to customers. 13. A method as claimed in claim 11, wherein the drone collects payment. 14. A method as claimed in claim 11, wherein the drone displays social network data, such as the user picture, to help identify which drone is servicing which user. 15. A method as claimed in claim 11, wherein the server computer receives said user orders and is in connection with a fleet of a plurality of drones, and selects, queues, and dispatches the orders to individual drones. 16. A computer software program product stored in a memory medium, characterised in that, at least one drone is configured to have a non-human social network profile and is configured to be controlled from at least two mobile applications on different user mobile subscriber terminals, and
the mobile subscriber terminal application allows the user to select a product or service, the application receives the user choice and transmits the choice and/or social network profile or personal data of the user to the drone directly and/or via the cloud server computer with the location of the mobile subscriber that made the selection, the location of the mobile subscriber terminal is sent automatically and multiple times to the drone, the drone retrieves the product and/or prepares for delivery of service and approaches the moving mobile subscriber location that is sent multiple times to the drone as the location changes until the product or service is delivered to the mobile subscriber terminal location of the mobile consumer. 17. A software program as claimed in claim 16, wherein said non-human social network profile is configured to interface and receive instructions from at least one human social network profile. 18. A software program as claimed in claim 16, wherein said non-human social network profile is configured to list capabilities and attributes that the drone has, which may include but are not limited to payload, speed, response time, cost and/or cost per unit of time for use and/or the non-human social network profile also typically lists activities that the drone is capable of performing, which may include but are not limited to transport of people and/or goods, shopping, waitressing, garbage collection, laundry processing, vacuum cleaning, cleaning, mopping, lawn mowing, tree and/or bush cutting. 19. A software program as claimed in claim 16, wherein the mobile application is an iOS, Android and/or Windows phone application, and/or an application programmed to interface with social network and/or search engine APIs (Application Programmer Interface), and/or the mobile application is configured to be able to interact with a social network and/or a search engine. 20. A software program as claimed in claim 16, wherein the delivery of a product and/or a service by at least one said drone is configured to another drone configured to receive said product and/or service. 21. A software program as claimed in claim 16, wherein the said at least two mobile applications belong to two different users and access the drone via a cloud server network. 22. (canceled) 23. (canceled) 24. (canceled) 25. (canceled) 26. (canceled) 27. (canceled) 28. (canceled) 29. (canceled) 30. (canceled) 31. (canceled) 32. (canceled) 33. (canceled) 34. A drone delivery system, operable with at least one mobile subscriber terminal, at least one drone and/or at least one server computer, and a communication network, characterised in that,
The mobile subscriber terminal is configured to have an application installed that allows the user to select a product or service, The application is configured to receive the user choice and transmit the choice and/or social network profile or personal data of the user to the drone directly and/or via the cloud server computer with the location of the mobile subscriber that made the selection, the location of the mobile subscriber terminal is sent automatically and multiple times to the drone, at least one drone is configured to retrieve the product and/or prepare for delivery of service and approach the moving mobile subscriber location that is sent multiple times to the drone as the location changes until the product or service is delivered to the mobile subscriber terminal location of the mobile consumer. 35. A drone delivery system as claimed in claim 34, wherein the drone is a waitressing drone that is configured to fly or drive to deliver food and beverage orders to customers. 36. A drone delivery system as claimed in claim 34, wherein the drone is configured to collect payment. 37. A drone delivery system as claimed in claim 34, wherein the drone is configured to display social network data, such as the user picture, to help identify which drone is servicing which user. 38. A drone delivery system as claimed in claim 34, wherein the server computer is configured to receive said user orders and be in connection with a fleet of a plurality of drones, and is configured to select, optionally queue, and dispatch the orders to individual drones. | 3,600 |
13,419 | 13,419 | 14,511,868 | 3,627 | An Expense Verification System (EVS) checks for fraud/errors in reimbursement requests. The EVS stores rules for reimbursement in accordance with company policies. The EVS receives travel reservation records for auditing, parses the records to identify a reference number, and then obtains from a trusted source travel record data for a corresponding reference number. Trusted data is compared to company policy-specific rules to determine compliance. In one embodiment, an extracted fare basis identifier is compared to lists of permitted and/or prohibited fare basis codes in the rules to determine compliance. In another embodiment, data is extracted from acknowledgment receipt records from a trusted data source and extracted booking and travel dates are compared to the rules to determine compliance. The EVS issues an alert in the event of non-compliance. | 1. A computer-implemented method for ensuring accurate reimbursement of travel expenses by a computerized expense verification system comprising at least a processor and a memory operatively connected to the processor, the method comprising the computerized expense verification system operating the processor under control of processor-executable instructions stored in the memory to:
store in the memory a plurality of rules for reimbursement of travel expenses consistent with a company's travel policy; receive, via a communications network, travel reservation record data comprising a reference code; process the travel reservation record data to identify the reference code; query, via a communications network, a company-independent system to retrieve passenger name record data corresponding to the parsed reference code; process the passenger name record data received via the communications network to identify a ticket issue date for an associated travel ticket; process the passenger name record to identify a first travel date for the associated travel ticket; determine whether a difference between the first travel date and the ticket issue date reflects compliance with company policy as determined at least one of the plurality of stored rules; and issue an exception alert identifying non-compliance with the company's travel policy if the difference does not reflect compliance. 2. The method of claim 1, wherein determining whether a difference between the first travel date and the ticket issue date reflects compliance with company policy comprises:
comparing the ticket issue date to the first travel date to determine an advance booking period; and comparing the advance booking period to a minimum advance booking period defined by an applicable rule. 3. A computer-implemented method for ensuring accurate reimbursement of travel expenses by a computerized expense verification system comprising at least a processor and a memory operatively connected to the processor, the method comprising the computerized expense verification system operating the processor under control of processor-executable instructions stored in the memory to:
store in the memory a plurality of rules for reimbursement of travel expenses consistent with a company's travel policy; receive, via a communications network, travel reservation record data comprising a reference code; process the travel reservation record data to identify the reference code; query, via a communications network, a company-independent system to retrieve passenger name record data corresponding to the parsed reference code; process the passenger name record data received via the communications network to identify an agency identifier uniquely identifying a travel agent; determine whether the agency identifier reflects compliance with company policy as determined at least one of the plurality of stored rules; and issue an exception alert identifying non-compliance with the company's travel policy if the difference does not reflect compliance. 4. The method of claim 3, wherein at least one rule identifies a certain travel agent identifier code as approved, and wherein determining whether the agency identifier reflects compliance with company policy as determined at least one of the plurality of stored rules comprises:
comparing the agency identifier extracted from the passenger name record to the certain travel agent identifier code stored in the rule; and determining the agency identifier to be compliant with company policy only if the extracted agency identifier matches travel agent identifier code stored in the rule. 5. A computer-implemented method for ensuring accurate reimbursement of travel expenses by a computerized expense verification system comprising at least a processor and a memory operatively connected to the processor, the method comprising the computerized expense verification system operating the processor under control of processor-executable instructions stored in the memory to:
store in the memory a plurality of rules for reimbursement of travel expenses consistent with a company's travel policy; receive, via a communications network, travel reservation record data comprising a reference code; process the travel reservation record data to identify the reference code; query, via a communications network, a company-independent system to retrieve passenger name record data corresponding to the parsed reference code; process the passenger name record data to identify an approval code; process the approval code to identify at least one of an approved destination and an approved cost; process the passenger name record to identify a ticketed destination indicating a destination for which a ticket associated with the passenger name record was issued; process the passenger name record to identify a ticketed cost indicating a cost for which the ticket associated with the passenger name record was issued; determine whether the at least one of an approved destination and an approved cost reflects compliance with company policy as determined at least one of the plurality of stored rules; and issue an exception alert identifying non-compliance with the company's travel policy if the at least one of an approved destination and an approved cost does not reflect compliance. 6. The method of claim 5, wherein determining whether the at least one of an approved destination and an approved cost reflects compliance with company policy comprises:
comparing at least one of the approved destination and the approved cost to at least one of the ticketed destination and the ticketed cost, respectively; and determining the at least one of the approved destination and the approved cost to be compliant with company policy only if the at least one of the approved destination and the approved cost matches at least one of the ticketed destination and the ticketed cost, respectively. 7. An expense verification system for ensuring accurate reimbursement of travel expenses, the system comprising:
a processor; a memory operatively connected to the processor for communication therewith; and processor-executable instructions stored in the memory to cause the expense verification system to carry out the method of claim 1. 8. An expense verification system for ensuring accurate reimbursement of travel expenses, the system comprising:
a processor; a memory operatively connected to the processor for communication therewith; and processor-executable instructions stored in the memory to cause the expense verification system to carry out the method of claim 3. 9. An expense verification system for ensuring accurate reimbursement of travel expenses, the system comprising:
a processor, a memory operatively connected to the processor for communication therewith; and processor-executable instructions stored in the memory to cause the expense verification system to carry out the method of claim 5. | An Expense Verification System (EVS) checks for fraud/errors in reimbursement requests. The EVS stores rules for reimbursement in accordance with company policies. The EVS receives travel reservation records for auditing, parses the records to identify a reference number, and then obtains from a trusted source travel record data for a corresponding reference number. Trusted data is compared to company policy-specific rules to determine compliance. In one embodiment, an extracted fare basis identifier is compared to lists of permitted and/or prohibited fare basis codes in the rules to determine compliance. In another embodiment, data is extracted from acknowledgment receipt records from a trusted data source and extracted booking and travel dates are compared to the rules to determine compliance. The EVS issues an alert in the event of non-compliance.1. A computer-implemented method for ensuring accurate reimbursement of travel expenses by a computerized expense verification system comprising at least a processor and a memory operatively connected to the processor, the method comprising the computerized expense verification system operating the processor under control of processor-executable instructions stored in the memory to:
store in the memory a plurality of rules for reimbursement of travel expenses consistent with a company's travel policy; receive, via a communications network, travel reservation record data comprising a reference code; process the travel reservation record data to identify the reference code; query, via a communications network, a company-independent system to retrieve passenger name record data corresponding to the parsed reference code; process the passenger name record data received via the communications network to identify a ticket issue date for an associated travel ticket; process the passenger name record to identify a first travel date for the associated travel ticket; determine whether a difference between the first travel date and the ticket issue date reflects compliance with company policy as determined at least one of the plurality of stored rules; and issue an exception alert identifying non-compliance with the company's travel policy if the difference does not reflect compliance. 2. The method of claim 1, wherein determining whether a difference between the first travel date and the ticket issue date reflects compliance with company policy comprises:
comparing the ticket issue date to the first travel date to determine an advance booking period; and comparing the advance booking period to a minimum advance booking period defined by an applicable rule. 3. A computer-implemented method for ensuring accurate reimbursement of travel expenses by a computerized expense verification system comprising at least a processor and a memory operatively connected to the processor, the method comprising the computerized expense verification system operating the processor under control of processor-executable instructions stored in the memory to:
store in the memory a plurality of rules for reimbursement of travel expenses consistent with a company's travel policy; receive, via a communications network, travel reservation record data comprising a reference code; process the travel reservation record data to identify the reference code; query, via a communications network, a company-independent system to retrieve passenger name record data corresponding to the parsed reference code; process the passenger name record data received via the communications network to identify an agency identifier uniquely identifying a travel agent; determine whether the agency identifier reflects compliance with company policy as determined at least one of the plurality of stored rules; and issue an exception alert identifying non-compliance with the company's travel policy if the difference does not reflect compliance. 4. The method of claim 3, wherein at least one rule identifies a certain travel agent identifier code as approved, and wherein determining whether the agency identifier reflects compliance with company policy as determined at least one of the plurality of stored rules comprises:
comparing the agency identifier extracted from the passenger name record to the certain travel agent identifier code stored in the rule; and determining the agency identifier to be compliant with company policy only if the extracted agency identifier matches travel agent identifier code stored in the rule. 5. A computer-implemented method for ensuring accurate reimbursement of travel expenses by a computerized expense verification system comprising at least a processor and a memory operatively connected to the processor, the method comprising the computerized expense verification system operating the processor under control of processor-executable instructions stored in the memory to:
store in the memory a plurality of rules for reimbursement of travel expenses consistent with a company's travel policy; receive, via a communications network, travel reservation record data comprising a reference code; process the travel reservation record data to identify the reference code; query, via a communications network, a company-independent system to retrieve passenger name record data corresponding to the parsed reference code; process the passenger name record data to identify an approval code; process the approval code to identify at least one of an approved destination and an approved cost; process the passenger name record to identify a ticketed destination indicating a destination for which a ticket associated with the passenger name record was issued; process the passenger name record to identify a ticketed cost indicating a cost for which the ticket associated with the passenger name record was issued; determine whether the at least one of an approved destination and an approved cost reflects compliance with company policy as determined at least one of the plurality of stored rules; and issue an exception alert identifying non-compliance with the company's travel policy if the at least one of an approved destination and an approved cost does not reflect compliance. 6. The method of claim 5, wherein determining whether the at least one of an approved destination and an approved cost reflects compliance with company policy comprises:
comparing at least one of the approved destination and the approved cost to at least one of the ticketed destination and the ticketed cost, respectively; and determining the at least one of the approved destination and the approved cost to be compliant with company policy only if the at least one of the approved destination and the approved cost matches at least one of the ticketed destination and the ticketed cost, respectively. 7. An expense verification system for ensuring accurate reimbursement of travel expenses, the system comprising:
a processor; a memory operatively connected to the processor for communication therewith; and processor-executable instructions stored in the memory to cause the expense verification system to carry out the method of claim 1. 8. An expense verification system for ensuring accurate reimbursement of travel expenses, the system comprising:
a processor; a memory operatively connected to the processor for communication therewith; and processor-executable instructions stored in the memory to cause the expense verification system to carry out the method of claim 3. 9. An expense verification system for ensuring accurate reimbursement of travel expenses, the system comprising:
a processor, a memory operatively connected to the processor for communication therewith; and processor-executable instructions stored in the memory to cause the expense verification system to carry out the method of claim 5. | 3,600 |
13,420 | 13,420 | 14,169,024 | 3,696 | Disclosed herein are systems, methods, and non-transitory computer-readable storage media for creating sharable tokens that point to financial information stored in a secure online platform and that can be used in financial transactions. | 1. A computer-implemented method comprising:
storing, in a computer storage location, an authorization for a financial transaction type to be completed using a user's financial account; encoding a token that, when decoded, points to the authorization in the computer storage location; making the token available to a party designated by the user; receiving, from a merchant, a request to complete a specific transaction using a decoded token; verifying that the decoded token matches the token that points to the authorization stored in the computer storage location and that the specific transaction corresponds with the financial transaction type described in the authorization; and notifying the merchant that the transaction is authorized to be completed using the user's financial account. 2. The computer-implemented method of claim 1, wherein the party designated by the user is selected from among the user and one or more delegates specified by the user. 3. The computer-implemented method of claim 1, further comprising:
receiving, from the user, a request to pre-authorize user's financial account for the financial transaction type; and receiving the authorization in the form of an approval to pre-authorize the user's financial account for the financial transaction type. 4. The computer-implemented method of claim 3, further comprising:
requesting an external acquiring institution pre-authorize the user's financial account for the financial transaction type; and receiving the approval from the external acquiring institution. 5. The computer-implemented method of claim 4, further comprising:
requesting that the external acquiring institution verify that the specific transaction corresponds with the financial transaction type described in the authorization; and receiving confirmation from the external acquiring institution that the specific transaction is authorized. 6. The computer-implemented method of claim 1, further comprising:
receiving, from the user, a request that an additional requirement be imposed for using the token to complete a transaction, wherein encoding the digital token further comprises encoding the additional requirement into the token. 7. The computer-implemented method of claim 6, further comprising:
receiving, from a merchant, verification that the request to complete a specific transaction using the decoded token is made by a party that fulfills the additional requirement. 8. The computer-implemented method of claim 6, wherein the additional requirement comprises a requirement that the request to complete a specific transaction using the decoded token must be made by a party having specified credentials. 9. The computer-implemented method of claim 6, wherein the additional requirement comprises a limit on the number of times a token can be transferred. 10. The computer-implemented method of claim 1, further comprising:
receiving, from the merchant, confirmation that the transaction is completed using the user's financial account; and notifying the user that the transaction was completed using the user's financial account. 11. The computer-implemented method of claim 1, wherein encoding a token further comprises:
creating a scanable code that represents the token; and sending an instruction to an electronic device associated with the user, the instruction causing the electronic device to display a graphical element containing the scanable code. 12. A computer-implemented method of comprising:
authenticating a cardholder in an online platform; receiving a request from the cardholder for a tokenized pre-authorization for an amount of financial resources from a financial account of the cardholder; requesting a pre-authorization from an acquiring institution, the pre-authorization including the amount of financial resources from a financial account of the cardholder; receiving the pre-authorization from an acquiring institution; storing the pre-authorization in a computer storage location in the online platform; creating a transferable digital token that points to the pre-authorization in the computer storage location and that can be scanned to complete a financial transaction for up to the amount of financial resources; receiving, from a merchant, a request to use the token in a financial transaction at a point-of-sale terminal; requesting, from the acquiring institution, confirmation that the financial account of the cardholder is still able to perform the financial transaction; receiving confirmation from the acquiring institution that the transaction is authorized; and notifying the merchant at the point-of-sale terminal that the transaction is authorized. 13. The computer-implemented method of claim 12, wherein creating a transferable digital token further comprises:
creating a scanable code that represents the token; and sending an instruction to an electronic device associated with the cardholder, the instruction causing the electronic device to display a graphical element containing the scanable code. 14. The computer-implemented method of claim 12, further comprising:
receiving, from the cardholder, an additional security requirement for using the transferable digital token, and wherein creating a transferable digital token further comprises encoding information relating to the additional security requirement into the transferable digital token. 15. The computer-implemented method of claim 14, further comprising:
upon receiving a request to use the token in a financial transaction from a merchant; requesting confirmation from the merchant that the additional security requirement is satisfied; and receiving confirmation from the merchant that the additional security requirement is satisfied. 16. The computer-implemented method of claim 14, wherein the additional security requirement comprises a requirement that the merchant confirm that the request to use the token in a financial transaction at a point-of-sale terminal is made by a party having specified credentials. 17. The computer-implemented method of claim 14, wherein the additional security requirement comprises a limit on the number of times a token can be transferred. 18. A non-transitory computer-readable storage medium comprising:
a medium configured to store computer-readable instructions thereon; and the computer-readable instructions that, when executed by a processing device cause the processing device to perform a method, comprising:
authenticating a cardholder in an online platform;
receiving a request from the cardholder for a tokenized pre-authorization for an amount of financial resources from a financial account of the cardholder;
requesting a pre-authorization from an acquiring institution, the pre-authorization including the amount of financial resources from a financial account of the cardholder;
receiving the pre-authorization from an acquiring institution;
storing the pre-authorization in a computer storage location in the online platform;
creating a transferable digital token that points to the pre-authorization in the computer storage location and that can be scanned to complete a financial transaction for up to the amount of financial resources;
receiving, from a merchant, a request to use the token in a financial transaction at a point-of-sale terminal;
requesting, from the acquiring institution, confirmation that the financial account of the cardholder is able to perform the financial transaction;
receiving confirmation from the acquiring institution that the transaction is authorized; and
notifying the merchant at the point-of-sale terminal that the transaction is authorized. 19. The non-transitory computer-readable storage medium of claim 18, wherein creating a transferable digital token further comprises:
creating a scanable code that represents the token; and sending an instruction to an electronic device associated with the cardholder, the instruction causing the electronic device to display a graphical element containing the scanable code. 20. The non-transitory computer-readable storage medium of claim 18, and the instructions further causing the processing device to perform the steps of:
receiving, from the cardholder, an additional security requirement for using the transferable digital token, and wherein creating a transferable digital token further comprises encoding information relating to the additional security requirement into the transferable digital token. 21. The non-transitory computer-readable storage medium of claim 20, and the instructions further causing the processing device to perform the steps of:
upon receiving a request to use the token in a financial transaction from a merchant; requesting confirmation from the merchant that the additional security requirement is satisfied; and receiving confirmation from the merchant that the additional security requirement is satisfied. 22. The non-transitory computer-readable storage medium of claim 20, wherein the additional security requirement comprises a requirement that the merchant confirm that the request to use the token in a financial transaction at a point-of-sale terminal is made by a party having specified credentials. 23. The non-transitory computer-readable storage medium of claim 20, wherein the additional security requirement comprises a limit on the number of times a token can be transferred. 24. A system comprising:
a network interface configured to receive an authorization for a financial transaction type to be completed using a user's financial account from an external acquiring institution; a memory storage location configured to store the authorization for a financial transaction type to be completed using a user's financial account;
a processor;
a processor configured to encode a token that, when decoded, points to the authorization in the computer storage location;
the network interface is further configured to:
make the token available to a party designated by the user; and
receive, from a merchant, a request to complete a specific transaction using a decoded token;
the processor further configured to:
verify that the decoded token matches the token that points to the authorization stored in the computer storage location; and
verify that the specific transaction corresponds with the financial transaction type described in the authorization; and
the network interface further configured to notify the merchant that the transaction is authorized to be completed using the user's financial account. 25. The system of claim 24, wherein the party designated by the user is selected from among the user and one or more delegates specified by the user. 26. The system of claim 24, wherein the network interface is further configured to:
receive, from the user, a request to pre-authorize user's financial account for the financial transaction type; and receiving the authorization in the form of an approval to pre-authorize the user's financial account for the financial transaction type. 27. The system of claim 24, wherein the network interface is further configured to:
request that the external acquiring institution verify that the specific transaction corresponds with the financial transaction type described in the authorization; and receive confirmation from the external acquiring institution that the specific transaction is authorized. 28. The system of claim 24, wherein the network interface is further configured to:
receive, from the user, a request that an additional requirement be imposed for using the token to complete a transaction, wherein the processor is further configured to encode the additional requirement into the token. 29. The system of claim 28, wherein the network interface is further configured to:
receive, from a merchant, verification that the request to complete a specific transaction using the decoded token is made by a party that fulfills the additional requirement. 30. The system of claim 28, wherein the additional requirement comprises a requirement that the request to complete a specific transaction using the decoded token must be made by a party having specified credentials. 31. The system of claim 28, wherein the additional requirement comprises a limit on the number of times a token can be transferred. 32. The system of claim 24, wherein the network interface is further configured to:
receive, from the merchant, confirmation that the transaction is completed using the user's financial account; and notify the user that the transaction was completed using the user's financial account. 33. The system of claim 24, wherein the processor is further configured to create a scanable code that represents the token, and wherein the network interface is further configured to send an instruction to an electronic device associated with the user, the instruction causing the electronic device to display a graphical element containing the scanable code. 34. A method comprising:
authenticating a cardholder in an online platform; pre-authorizing a purchase amount on the cardholder's credit card account; creating a token that points to the pre-authorized purchase amount and that can be used by a delegate to complete a purchase for up to the pre-authorized purchase amount. 35. The method of claim 34, further comprising receiving, from a merchant, a request to complete a transaction using the token. 36. The method of claim 35, wherein the token to naturally expire at a predetermined time, the method further comprising:
examining the token to determine that the token has expired; and notifying the merchant that the token is not valid. 37. The method of claim 36 further comprising:
examining the token to determine that the token has been cancelled by the cardholder; and
notifying the merchant that the token is not valid. 38. The method of claim 36, further comprising
examining the token to determine that the token has been modified by the cardholder to require additional credentials; and notifying the merchant that additional credentials are required to use the token. | Disclosed herein are systems, methods, and non-transitory computer-readable storage media for creating sharable tokens that point to financial information stored in a secure online platform and that can be used in financial transactions.1. A computer-implemented method comprising:
storing, in a computer storage location, an authorization for a financial transaction type to be completed using a user's financial account; encoding a token that, when decoded, points to the authorization in the computer storage location; making the token available to a party designated by the user; receiving, from a merchant, a request to complete a specific transaction using a decoded token; verifying that the decoded token matches the token that points to the authorization stored in the computer storage location and that the specific transaction corresponds with the financial transaction type described in the authorization; and notifying the merchant that the transaction is authorized to be completed using the user's financial account. 2. The computer-implemented method of claim 1, wherein the party designated by the user is selected from among the user and one or more delegates specified by the user. 3. The computer-implemented method of claim 1, further comprising:
receiving, from the user, a request to pre-authorize user's financial account for the financial transaction type; and receiving the authorization in the form of an approval to pre-authorize the user's financial account for the financial transaction type. 4. The computer-implemented method of claim 3, further comprising:
requesting an external acquiring institution pre-authorize the user's financial account for the financial transaction type; and receiving the approval from the external acquiring institution. 5. The computer-implemented method of claim 4, further comprising:
requesting that the external acquiring institution verify that the specific transaction corresponds with the financial transaction type described in the authorization; and receiving confirmation from the external acquiring institution that the specific transaction is authorized. 6. The computer-implemented method of claim 1, further comprising:
receiving, from the user, a request that an additional requirement be imposed for using the token to complete a transaction, wherein encoding the digital token further comprises encoding the additional requirement into the token. 7. The computer-implemented method of claim 6, further comprising:
receiving, from a merchant, verification that the request to complete a specific transaction using the decoded token is made by a party that fulfills the additional requirement. 8. The computer-implemented method of claim 6, wherein the additional requirement comprises a requirement that the request to complete a specific transaction using the decoded token must be made by a party having specified credentials. 9. The computer-implemented method of claim 6, wherein the additional requirement comprises a limit on the number of times a token can be transferred. 10. The computer-implemented method of claim 1, further comprising:
receiving, from the merchant, confirmation that the transaction is completed using the user's financial account; and notifying the user that the transaction was completed using the user's financial account. 11. The computer-implemented method of claim 1, wherein encoding a token further comprises:
creating a scanable code that represents the token; and sending an instruction to an electronic device associated with the user, the instruction causing the electronic device to display a graphical element containing the scanable code. 12. A computer-implemented method of comprising:
authenticating a cardholder in an online platform; receiving a request from the cardholder for a tokenized pre-authorization for an amount of financial resources from a financial account of the cardholder; requesting a pre-authorization from an acquiring institution, the pre-authorization including the amount of financial resources from a financial account of the cardholder; receiving the pre-authorization from an acquiring institution; storing the pre-authorization in a computer storage location in the online platform; creating a transferable digital token that points to the pre-authorization in the computer storage location and that can be scanned to complete a financial transaction for up to the amount of financial resources; receiving, from a merchant, a request to use the token in a financial transaction at a point-of-sale terminal; requesting, from the acquiring institution, confirmation that the financial account of the cardholder is still able to perform the financial transaction; receiving confirmation from the acquiring institution that the transaction is authorized; and notifying the merchant at the point-of-sale terminal that the transaction is authorized. 13. The computer-implemented method of claim 12, wherein creating a transferable digital token further comprises:
creating a scanable code that represents the token; and sending an instruction to an electronic device associated with the cardholder, the instruction causing the electronic device to display a graphical element containing the scanable code. 14. The computer-implemented method of claim 12, further comprising:
receiving, from the cardholder, an additional security requirement for using the transferable digital token, and wherein creating a transferable digital token further comprises encoding information relating to the additional security requirement into the transferable digital token. 15. The computer-implemented method of claim 14, further comprising:
upon receiving a request to use the token in a financial transaction from a merchant; requesting confirmation from the merchant that the additional security requirement is satisfied; and receiving confirmation from the merchant that the additional security requirement is satisfied. 16. The computer-implemented method of claim 14, wherein the additional security requirement comprises a requirement that the merchant confirm that the request to use the token in a financial transaction at a point-of-sale terminal is made by a party having specified credentials. 17. The computer-implemented method of claim 14, wherein the additional security requirement comprises a limit on the number of times a token can be transferred. 18. A non-transitory computer-readable storage medium comprising:
a medium configured to store computer-readable instructions thereon; and the computer-readable instructions that, when executed by a processing device cause the processing device to perform a method, comprising:
authenticating a cardholder in an online platform;
receiving a request from the cardholder for a tokenized pre-authorization for an amount of financial resources from a financial account of the cardholder;
requesting a pre-authorization from an acquiring institution, the pre-authorization including the amount of financial resources from a financial account of the cardholder;
receiving the pre-authorization from an acquiring institution;
storing the pre-authorization in a computer storage location in the online platform;
creating a transferable digital token that points to the pre-authorization in the computer storage location and that can be scanned to complete a financial transaction for up to the amount of financial resources;
receiving, from a merchant, a request to use the token in a financial transaction at a point-of-sale terminal;
requesting, from the acquiring institution, confirmation that the financial account of the cardholder is able to perform the financial transaction;
receiving confirmation from the acquiring institution that the transaction is authorized; and
notifying the merchant at the point-of-sale terminal that the transaction is authorized. 19. The non-transitory computer-readable storage medium of claim 18, wherein creating a transferable digital token further comprises:
creating a scanable code that represents the token; and sending an instruction to an electronic device associated with the cardholder, the instruction causing the electronic device to display a graphical element containing the scanable code. 20. The non-transitory computer-readable storage medium of claim 18, and the instructions further causing the processing device to perform the steps of:
receiving, from the cardholder, an additional security requirement for using the transferable digital token, and wherein creating a transferable digital token further comprises encoding information relating to the additional security requirement into the transferable digital token. 21. The non-transitory computer-readable storage medium of claim 20, and the instructions further causing the processing device to perform the steps of:
upon receiving a request to use the token in a financial transaction from a merchant; requesting confirmation from the merchant that the additional security requirement is satisfied; and receiving confirmation from the merchant that the additional security requirement is satisfied. 22. The non-transitory computer-readable storage medium of claim 20, wherein the additional security requirement comprises a requirement that the merchant confirm that the request to use the token in a financial transaction at a point-of-sale terminal is made by a party having specified credentials. 23. The non-transitory computer-readable storage medium of claim 20, wherein the additional security requirement comprises a limit on the number of times a token can be transferred. 24. A system comprising:
a network interface configured to receive an authorization for a financial transaction type to be completed using a user's financial account from an external acquiring institution; a memory storage location configured to store the authorization for a financial transaction type to be completed using a user's financial account;
a processor;
a processor configured to encode a token that, when decoded, points to the authorization in the computer storage location;
the network interface is further configured to:
make the token available to a party designated by the user; and
receive, from a merchant, a request to complete a specific transaction using a decoded token;
the processor further configured to:
verify that the decoded token matches the token that points to the authorization stored in the computer storage location; and
verify that the specific transaction corresponds with the financial transaction type described in the authorization; and
the network interface further configured to notify the merchant that the transaction is authorized to be completed using the user's financial account. 25. The system of claim 24, wherein the party designated by the user is selected from among the user and one or more delegates specified by the user. 26. The system of claim 24, wherein the network interface is further configured to:
receive, from the user, a request to pre-authorize user's financial account for the financial transaction type; and receiving the authorization in the form of an approval to pre-authorize the user's financial account for the financial transaction type. 27. The system of claim 24, wherein the network interface is further configured to:
request that the external acquiring institution verify that the specific transaction corresponds with the financial transaction type described in the authorization; and receive confirmation from the external acquiring institution that the specific transaction is authorized. 28. The system of claim 24, wherein the network interface is further configured to:
receive, from the user, a request that an additional requirement be imposed for using the token to complete a transaction, wherein the processor is further configured to encode the additional requirement into the token. 29. The system of claim 28, wherein the network interface is further configured to:
receive, from a merchant, verification that the request to complete a specific transaction using the decoded token is made by a party that fulfills the additional requirement. 30. The system of claim 28, wherein the additional requirement comprises a requirement that the request to complete a specific transaction using the decoded token must be made by a party having specified credentials. 31. The system of claim 28, wherein the additional requirement comprises a limit on the number of times a token can be transferred. 32. The system of claim 24, wherein the network interface is further configured to:
receive, from the merchant, confirmation that the transaction is completed using the user's financial account; and notify the user that the transaction was completed using the user's financial account. 33. The system of claim 24, wherein the processor is further configured to create a scanable code that represents the token, and wherein the network interface is further configured to send an instruction to an electronic device associated with the user, the instruction causing the electronic device to display a graphical element containing the scanable code. 34. A method comprising:
authenticating a cardholder in an online platform; pre-authorizing a purchase amount on the cardholder's credit card account; creating a token that points to the pre-authorized purchase amount and that can be used by a delegate to complete a purchase for up to the pre-authorized purchase amount. 35. The method of claim 34, further comprising receiving, from a merchant, a request to complete a transaction using the token. 36. The method of claim 35, wherein the token to naturally expire at a predetermined time, the method further comprising:
examining the token to determine that the token has expired; and notifying the merchant that the token is not valid. 37. The method of claim 36 further comprising:
examining the token to determine that the token has been cancelled by the cardholder; and
notifying the merchant that the token is not valid. 38. The method of claim 36, further comprising
examining the token to determine that the token has been modified by the cardholder to require additional credentials; and notifying the merchant that additional credentials are required to use the token. | 3,600 |
13,421 | 13,421 | 13,598,987 | 3,623 | Methods and arrangements for deriving market intelligence. Guidelines for deriving mercantile intelligence are input, and social content data is mined. A map is generated which reconciles the social content data with the guidelines, and elements related to mercantile intelligence are extracted from the map. A mercantile intelligence report is output. | 1. A method comprising:
utilizing at least one processor to execute computer code configured to perform the steps of: inputting guidelines for deriving mercantile intelligence with relation to a product; mining social content data with relation to the product, the social content data comprising user-generated content with relation to the product; generating a map which reconciles the social content data with the guidelines; extracting from the map elements related to mercantile intelligence; and outputting a mercantile intelligence report with relation to the product. 2. The method according to claim 1, wherein the mercantile intelligence comprises at least one taken from the group consisting of: business intelligence, market intelligence. 3. The method according to claim 1, wherein said inputting comprises:
inputting a mercantile intelligence specification; and deriving therefrom formal rules for expressing mercantile intelligence. 4. The method according to claim 1, wherein the extracted elements include product-related features. 5. The method according to claim 4, wherein the product-related features include at least one taken from the group consisting of: at least one product specification, at least one dynamically derived product attribute. 6. The method according to claim 4, further comprising measuring features quantitatively via statistical analysis. 7. The method according to claim 4, wherein the product-related features include product utility value. 8. The method according to claim 7, further comprising ascertaining product utility value as a weighted sum of expected attribute utility values. 9. The method according to claim 8, wherein:
said ascertaining comprises modeling product value decay over time; and said mining comprises mining social content data with relation to the product over time. 10. The method according to claim 1, wherein the extracted elements include consumer sentiments relating to a product. 11. The method according to claim 10, further comprising mapping consumer sentiments to assessment values. 12. The method according to claim 11, wherein the social content data includes user reviews of a product. | Methods and arrangements for deriving market intelligence. Guidelines for deriving mercantile intelligence are input, and social content data is mined. A map is generated which reconciles the social content data with the guidelines, and elements related to mercantile intelligence are extracted from the map. A mercantile intelligence report is output.1. A method comprising:
utilizing at least one processor to execute computer code configured to perform the steps of: inputting guidelines for deriving mercantile intelligence with relation to a product; mining social content data with relation to the product, the social content data comprising user-generated content with relation to the product; generating a map which reconciles the social content data with the guidelines; extracting from the map elements related to mercantile intelligence; and outputting a mercantile intelligence report with relation to the product. 2. The method according to claim 1, wherein the mercantile intelligence comprises at least one taken from the group consisting of: business intelligence, market intelligence. 3. The method according to claim 1, wherein said inputting comprises:
inputting a mercantile intelligence specification; and deriving therefrom formal rules for expressing mercantile intelligence. 4. The method according to claim 1, wherein the extracted elements include product-related features. 5. The method according to claim 4, wherein the product-related features include at least one taken from the group consisting of: at least one product specification, at least one dynamically derived product attribute. 6. The method according to claim 4, further comprising measuring features quantitatively via statistical analysis. 7. The method according to claim 4, wherein the product-related features include product utility value. 8. The method according to claim 7, further comprising ascertaining product utility value as a weighted sum of expected attribute utility values. 9. The method according to claim 8, wherein:
said ascertaining comprises modeling product value decay over time; and said mining comprises mining social content data with relation to the product over time. 10. The method according to claim 1, wherein the extracted elements include consumer sentiments relating to a product. 11. The method according to claim 10, further comprising mapping consumer sentiments to assessment values. 12. The method according to claim 11, wherein the social content data includes user reviews of a product. | 3,600 |
13,422 | 13,422 | 13,316,950 | 3,623 | Methods and arrangements for deriving market intelligence. Guidelines for deriving mercantile intelligence are input, and social content data is mined. A map is generated which reconciles the social content data with the guidelines, and elements related to mercantile intelligence are extracted from the map. A mercantile intelligence report is output. | 1.-12. (canceled) 13. An apparatus comprising:
at least one processor; and a computer readable storage medium having computer readable program code embodied therewith and executable by the at least one processor, the computer readable program code comprising: computer readable program code configured to input guidelines for deriving mercantile intelligence with relation to a product; computer readable program code configured to mine social content data with relation to the product, the social content data comprising user-generated content with relation to the product; computer readable program code configured to generate a map which reconciles the social content data with the guidelines; computer readable program code configured to extract from the map elements related to mercantile intelligence; and computer readable program code configured to output a mercantile intelligence report with relation to the product. 14. A computer program product comprising:
a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising: computer readable program code configured to input guidelines for deriving mercantile intelligence with relation to a product; computer readable program code configured to mine social content data with relation to the product, the social content data comprising user-generated content with relation to the product; computer readable program code configured to generate a map which reconciles the social content data with the guidelines; computer readable program code configured to extract from the map elements related to mercantile intelligence; and computer readable program code configured to output a mercantile intelligence report with relation to the product. 15. The computer program product according to claim 14, wherein the mercantile intelligence comprises at least one taken from the group consisting of: business intelligence, market intelligence. 16. The computer program product according to claim 14, wherein said computer readable program code is configured to:
input a mercantile intelligence specification; and derive therefrom formal rules for expressing mercantile intelligence. 17. The computer program product according to claim 14, wherein the extracted elements include product-related features. 18. The computer program product according to claim 17, wherein the product-related features include at least one taken from the group consisting of: at least one product specification, at least one dynamically derived product attribute. 19. The computer program product according to claim 17, said computer readable program code is further configured to measure features quantitatively via statistical analysis. 20. The computer program product according to claim 17, wherein the product-related features include product utility value. 21. The computer program product according to claim 20, said computer readable program code is further configured to ascertain product utility value as a weighted sum of expected attribute utility values. 22. The computer program product according to claim 21, wherein said computer readable program code is configured to model product value decay over time and mine social content data with relation to the product over time. 23. The computer program product according to claim 14, wherein the extracted elements include consumer sentiments relating to a product. 24. The computer program product according to claim 23, said computer readable program code is further configured to map consumer sentiments to assessment values. 25. The computer program product according to claim 24, wherein the social content data includes user reviews of a product. | Methods and arrangements for deriving market intelligence. Guidelines for deriving mercantile intelligence are input, and social content data is mined. A map is generated which reconciles the social content data with the guidelines, and elements related to mercantile intelligence are extracted from the map. A mercantile intelligence report is output.1.-12. (canceled) 13. An apparatus comprising:
at least one processor; and a computer readable storage medium having computer readable program code embodied therewith and executable by the at least one processor, the computer readable program code comprising: computer readable program code configured to input guidelines for deriving mercantile intelligence with relation to a product; computer readable program code configured to mine social content data with relation to the product, the social content data comprising user-generated content with relation to the product; computer readable program code configured to generate a map which reconciles the social content data with the guidelines; computer readable program code configured to extract from the map elements related to mercantile intelligence; and computer readable program code configured to output a mercantile intelligence report with relation to the product. 14. A computer program product comprising:
a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising: computer readable program code configured to input guidelines for deriving mercantile intelligence with relation to a product; computer readable program code configured to mine social content data with relation to the product, the social content data comprising user-generated content with relation to the product; computer readable program code configured to generate a map which reconciles the social content data with the guidelines; computer readable program code configured to extract from the map elements related to mercantile intelligence; and computer readable program code configured to output a mercantile intelligence report with relation to the product. 15. The computer program product according to claim 14, wherein the mercantile intelligence comprises at least one taken from the group consisting of: business intelligence, market intelligence. 16. The computer program product according to claim 14, wherein said computer readable program code is configured to:
input a mercantile intelligence specification; and derive therefrom formal rules for expressing mercantile intelligence. 17. The computer program product according to claim 14, wherein the extracted elements include product-related features. 18. The computer program product according to claim 17, wherein the product-related features include at least one taken from the group consisting of: at least one product specification, at least one dynamically derived product attribute. 19. The computer program product according to claim 17, said computer readable program code is further configured to measure features quantitatively via statistical analysis. 20. The computer program product according to claim 17, wherein the product-related features include product utility value. 21. The computer program product according to claim 20, said computer readable program code is further configured to ascertain product utility value as a weighted sum of expected attribute utility values. 22. The computer program product according to claim 21, wherein said computer readable program code is configured to model product value decay over time and mine social content data with relation to the product over time. 23. The computer program product according to claim 14, wherein the extracted elements include consumer sentiments relating to a product. 24. The computer program product according to claim 23, said computer readable program code is further configured to map consumer sentiments to assessment values. 25. The computer program product according to claim 24, wherein the social content data includes user reviews of a product. | 3,600 |
13,423 | 13,423 | 14,867,328 | 3,693 | A method and system for sending an artifact to a mobile communication device of a user. In one implementation, the method includes receiving a request from an application to send an artifact to a mobile communication device of a user; retrieving personal information from a user profile of the user; retrieving a transaction history of the user, the transaction history including a history of transactions made by the user through the mobile communication device; selecting an artifact to send to the mobile communication device based on the user profile and the transaction history of the user; and sending the selected artifact to the mobile communication device. | 1. A method, comprising:
receiving at a management server a request for a digital artifact from a mobile application, wherein the request is automatically triggered when a user browses a specific mobile application generated screen, the mobile application is not browser based and is a preinstalled or downloaded and installed on the mobile device, the mobile device comprising a mobile device display, a mobile device processor, a mobile device radio interface, and a mobile device wireless fidelity (Wi-Fi) interface, the specific mobile application generated screen corresponds to a specific screen, scene, or area of the mobile application; selecting the digital artifact at the management server based on one or more targeting parameters stored at the management server, and sending the digital artifact from the management server to the mobile application for display within the specific mobile application generated screen. 2. The method of claim 1, wherein the digital artifact is an advertisement, receipt, ticket, coupon, media, or content received at the mobile application. 3. The method of claim 1, wherein the request for the digital artifact is triggered by contactless services. 4. The method of claim 1, wherein the request for the digital artifact is triggered by a geographical location of the mobile device. 5. The method of claim 1, wherein the request for the digital artifact is automatically generated through a proximity-based interaction with a smart poster, a kiosk, or a point-of-sale device. 6. The method of claim 1, wherein the management server updates targeting parameters based on continuous updates of at least one of personal information or transactions stored at the management. 7. The method of claim 1, wherein targeting parameters comprises personal information and/or transactions. 8. The method of claim 6, 7, wherein personal information comprises location, gender, age, interest, affiliation ,userid, pageid, zip code, area code, and occupation. 9. The method of claim 6, 7, wherein transactions comprises historical payment transactions, real-time payment transactions, contactless transactions made using the mobile device, internet commerce, bill pay, top spend categories, merchants, storage of banking information, account balance, payment history, funds transfer , tickets, receipts, coupons, and transactions made by the user but not through the mobile device, and raw data downloaded from banks. 10. A management server, comprising:
a management server transceiver that receives a request for a digital artifact from a mobile application, wherein the request is automatically triggered when a user browses a specific mobile application generated screen, the mobile application is not browser based and is preinstalled or downloaded and installed on the mobile device, the mobile device comprising a mobile device display, a mobile device processor, a mobile device radio interface, and a mobile device wireless fidelity (Wi-Fi) interface, the specific mobile application generated screen corresponds to a specific screen, scene, or area of the mobile application; a management server processor that selects the digital artifact based on one or more targeting parameters; and a management server transceiver that sends the digital artifact for display within the specific mobile application generated screen. 11. The management server of claim 1, wherein the digital artifact is an advertisement, receipt, ticket, coupon, media, or content received at the mobile application. 12. The management server of claim 1, wherein the request for the digital artifact is triggered by contactless services. 13. The management server of claim 1, wherein the request for the digital artifact is triggered by a geographical location of the mobile device. 14. The management server of claim 1, wherein the request for the digital artifact is automatically generated through a proximity-based interaction with a smart poster, a kiosk, or a point-of-sale device. 15. The management server of claim 1, wherein the management server updates targeting parameters based on continuous updates of at least one of personal information or transactions stored at the management. 16. The management server of claim 1, wherein targeting parameters comprises personal information and/or transactions. 17. The management server of claim 6, 7, wherein personal information comprises location, gender, age, interest, affiliation ,userid, pageid, zip code, area code, and occupation. 18. The management server of claim 6, 7, wherein transactions comprises historical payment transactions, real-time payment transactions, contactless transactions made using the mobile device, internet commerce, bill pay, top spend categories, merchants, storage of banking information, account balance, payment history, funds transfer , tickets, receipts, coupons, and transactions made by the user but not through the mobile device, and raw data downloaded from banks. 19. A non-transitory computer readable medium, comprising:
computer code for receiving at a management server a request for a digital artifact from a mobile application, wherein the request is automatically triggered when a user browses a specific mobile application generated screen, wherein the mobile application is not browser based and is preinstalled or downloaded and installed on the mobile device, the mobile device comprising a mobile device display, a mobile device processor, a mobile device radio interface, and a mobile device wireless fidelity (Wi-Fi) interface, the specific mobile application generated screen corresponds to a specific screen, scene, or area of the mobile application; computer code for selecting at the management server the digital artifact based on one or more targeting parameters; and computer code for sending from the management server the digital artifact for display within the specific mobile application generated screen. 20. The computer code of claim 19, wherein the management server updates targeting parameters based on continuous updates of at least one of personal information or transactions stored at the management. | A method and system for sending an artifact to a mobile communication device of a user. In one implementation, the method includes receiving a request from an application to send an artifact to a mobile communication device of a user; retrieving personal information from a user profile of the user; retrieving a transaction history of the user, the transaction history including a history of transactions made by the user through the mobile communication device; selecting an artifact to send to the mobile communication device based on the user profile and the transaction history of the user; and sending the selected artifact to the mobile communication device.1. A method, comprising:
receiving at a management server a request for a digital artifact from a mobile application, wherein the request is automatically triggered when a user browses a specific mobile application generated screen, the mobile application is not browser based and is a preinstalled or downloaded and installed on the mobile device, the mobile device comprising a mobile device display, a mobile device processor, a mobile device radio interface, and a mobile device wireless fidelity (Wi-Fi) interface, the specific mobile application generated screen corresponds to a specific screen, scene, or area of the mobile application; selecting the digital artifact at the management server based on one or more targeting parameters stored at the management server, and sending the digital artifact from the management server to the mobile application for display within the specific mobile application generated screen. 2. The method of claim 1, wherein the digital artifact is an advertisement, receipt, ticket, coupon, media, or content received at the mobile application. 3. The method of claim 1, wherein the request for the digital artifact is triggered by contactless services. 4. The method of claim 1, wherein the request for the digital artifact is triggered by a geographical location of the mobile device. 5. The method of claim 1, wherein the request for the digital artifact is automatically generated through a proximity-based interaction with a smart poster, a kiosk, or a point-of-sale device. 6. The method of claim 1, wherein the management server updates targeting parameters based on continuous updates of at least one of personal information or transactions stored at the management. 7. The method of claim 1, wherein targeting parameters comprises personal information and/or transactions. 8. The method of claim 6, 7, wherein personal information comprises location, gender, age, interest, affiliation ,userid, pageid, zip code, area code, and occupation. 9. The method of claim 6, 7, wherein transactions comprises historical payment transactions, real-time payment transactions, contactless transactions made using the mobile device, internet commerce, bill pay, top spend categories, merchants, storage of banking information, account balance, payment history, funds transfer , tickets, receipts, coupons, and transactions made by the user but not through the mobile device, and raw data downloaded from banks. 10. A management server, comprising:
a management server transceiver that receives a request for a digital artifact from a mobile application, wherein the request is automatically triggered when a user browses a specific mobile application generated screen, the mobile application is not browser based and is preinstalled or downloaded and installed on the mobile device, the mobile device comprising a mobile device display, a mobile device processor, a mobile device radio interface, and a mobile device wireless fidelity (Wi-Fi) interface, the specific mobile application generated screen corresponds to a specific screen, scene, or area of the mobile application; a management server processor that selects the digital artifact based on one or more targeting parameters; and a management server transceiver that sends the digital artifact for display within the specific mobile application generated screen. 11. The management server of claim 1, wherein the digital artifact is an advertisement, receipt, ticket, coupon, media, or content received at the mobile application. 12. The management server of claim 1, wherein the request for the digital artifact is triggered by contactless services. 13. The management server of claim 1, wherein the request for the digital artifact is triggered by a geographical location of the mobile device. 14. The management server of claim 1, wherein the request for the digital artifact is automatically generated through a proximity-based interaction with a smart poster, a kiosk, or a point-of-sale device. 15. The management server of claim 1, wherein the management server updates targeting parameters based on continuous updates of at least one of personal information or transactions stored at the management. 16. The management server of claim 1, wherein targeting parameters comprises personal information and/or transactions. 17. The management server of claim 6, 7, wherein personal information comprises location, gender, age, interest, affiliation ,userid, pageid, zip code, area code, and occupation. 18. The management server of claim 6, 7, wherein transactions comprises historical payment transactions, real-time payment transactions, contactless transactions made using the mobile device, internet commerce, bill pay, top spend categories, merchants, storage of banking information, account balance, payment history, funds transfer , tickets, receipts, coupons, and transactions made by the user but not through the mobile device, and raw data downloaded from banks. 19. A non-transitory computer readable medium, comprising:
computer code for receiving at a management server a request for a digital artifact from a mobile application, wherein the request is automatically triggered when a user browses a specific mobile application generated screen, wherein the mobile application is not browser based and is preinstalled or downloaded and installed on the mobile device, the mobile device comprising a mobile device display, a mobile device processor, a mobile device radio interface, and a mobile device wireless fidelity (Wi-Fi) interface, the specific mobile application generated screen corresponds to a specific screen, scene, or area of the mobile application; computer code for selecting at the management server the digital artifact based on one or more targeting parameters; and computer code for sending from the management server the digital artifact for display within the specific mobile application generated screen. 20. The computer code of claim 19, wherein the management server updates targeting parameters based on continuous updates of at least one of personal information or transactions stored at the management. | 3,600 |
13,424 | 13,424 | 12,861,241 | 3,688 | Techniques for performing user classification based on email are provided. Emails stored in an email store may be analyzed to classify users. Information included in the stored emails may be extracted, and users may be classified into categories according to the extracted information. The extracted information may be analyzed in a manner so as to protect the personal information of the users according to any applicable privacy standards. Any number of types of emails may be analyzed to classify users in any number of ways. For instance, a plurality of commercial emails stored in the email store may be determined The commercial emails may be counted as conversions for an advertising campaign. The commercial emails may be parsed to extract commercial information. The commercial information may be parsed to generate user classification data. The user classification data may be used in various ways, including for targeting users with advertisements. | 1. A method, comprising:
determining a plurality of commercial emails in an email store; parsing the commercial emails to extract commercial information included in the commercial emails; and processing the commercial information to generate user classification data. 2. The method of claim 1, wherein said determining comprises:
analyzing at least one of an email header or an email body of each of a plurality of emails in the email store for one or more commercial email indications; and categorizing as a commercial email each email of the plurality of emails that includes one or more of the commercial email indications. 3. The method of claim 1, wherein said parsing comprises:
disassociating email recipient identity information from the extracted commercial information. 4. The method of claim 1, wherein said processing comprises:
analyzing the commercial information to determine one or more users that purchased one or more items in a shopping category; and generating user classification data that categorizes the determined one or more users in the shopping category. 5. The method of claim 1, wherein said processing comprises:
analyzing the commercial information to determine a number of commercial emails received by a user in a period of time; and generating user classification data that categorizes the user in a frequent shopper category based at least on the determined number of commercial emails. 6. The method of claim 1, wherein said processing comprises:
analyzing the commercial information to determine an amount of money spent by a user in an item purchase indicated in a commercial email addressed to the user; and generating user classification data that categorizes the user in a spending level category based on the determined amount of money. 7. The method of claim 1, wherein said processing comprises:
analyzing the commercial information to determine an expiration time indication indicated in a commercial email addressed to a user for a leased item; and generating user classification data that categorizes the user in a time-based purchaser category based on the determined expiration time. 8. The method of claim 1, wherein said processing comprises:
analyzing the commercial information to determine an indication in a commercial email addressed to a user that the user owns an item of an item type; and generating user classification data that categorizes the user in an exclusion category associated with the item type based on the determined indication. 9. The method of claim 1, wherein said processing comprises:
generating user classification data that categorizes a user in at least one of a purchase time category, a purchase frequency category, an average purchase amount category, or a purchaser demographics category based at least on commercial information extracted from at least one commercial email addressed to the user. 10. The method of claim 1, wherein said processing comprises:
determining a plurality of purchases made by a user from commercial information extracted from a plurality of commercial emails addressed to the user; determining that the plurality of purchases are correlated; and generating user classification data that categorizes the user in a category based on the correlated purchases. 11. The method of claim 1, wherein said processing comprises:
analyzing the commercial information to determine that a plurality of users have performed at least one of having purchased a same item, purchased a same type of item, purchased an item from a same vendor, or spent a similar amount of money on a purchase; determining the plurality of users to have similar purchasing characteristics based on said analyzing; and generating user classification data that categorizes the plurality of users together in a similar purchasing characteristics category. 12. The method of claim 1, further comprising:
generating a user profile for a user based at least on one or more categories in the user classification data that include the user. 13. The method of claim 1, further comprising:
selecting an online advertisement for display based at least on the generated user classification data. 14. The method of claim 13, wherein said selecting comprises:
selecting the online advertisement for display to a user as an advertisement for an item selected based on a category associated with the user in the user classification data. 15. The method of claim 13, wherein said selecting comprises:
selecting the online advertisement for display to a user as an advertisement for an item selected as an upsell of another item indicated to have been previously purchased by the user. 16. The method of claim 13, wherein said selecting comprises:
selecting the online advertisement for display to a user as an advertisement for a sequential sale item to an item indicated to have been previously purchased by the user. 17. The method of claim 1, further comprising:
using the determined commercial emails to indicate conversions. 18. A user classifier, comprising:
a commercial email determiner configured to determine a plurality of commercial emails in an email store; a commercial email parser configured to parse the commercial emails to extract commercial information included in the commercial emails; and a commercial information processor configured to process the commercial information to generate user classification data. 19. The user classifier of claim 18, wherein the commercial information processor comprises:
a commercial information analyzer configured to analyze the commercial information to categorize one or more users in one or more categories; and a user classification data generator configured to generate user classification data that indicates the one or more users categorized in the one or more categories. 20. The user classifier of claim 19, wherein the commercial information analyzer is configured to analyze the commercial information to categorize one or more users in at least one of a shopping category, a frequent shopper category, a spending level category, a time-based purchaser category, a purchase time category, a purchase frequency category, an average purchase amount category, a purchaser demographics category, or a similar purchasing characteristics category. 21. The user classifier of claim 19, wherein the commercial information analyzer is configured to analyze the commercial information to determine an indication in a commercial email addressed to a user that the user owns an item of an item type; and
wherein the user classification data generator is configured to generate user classification data that includes the user in an exclusion category associated with the item type based on the determined indication. 22. The user classifier of claim 19, wherein the commercial information analyzer is configured to determine a plurality of purchases made by a user from commercial information extracted from a plurality of commercial emails addressed to the user, and to determine that the plurality of purchases are correlated; and
wherein the user classification data generator is configured to generate user classification data that categorizes the user in a category based on the correlated purchases. 23. The user classifier of claim 19, wherein the commercial information analyzer is configured to analyze the commercial information to determine that a plurality of users have performed at least one of having purchased a same item, purchased a same type of item, purchased an item from a same vendor, or spent a similar amount of money on a purchase, and to determine the plurality of users to have similar purchasing characteristics; and
wherein the user classification data generator is configured to generate user classification data that categorizes the plurality of users together in a similar purchasing characteristics category. 24. The user classifier of claim 18, further comprising:
a user profile generator configured to generate a user profile for a user based at least on one or more categories in the user classification data that include the user. 25. The user classifier of claim 18, further comprising:
an advertisement selector configured to select an online advertisement for display based at least on the generated user classification data. 26. A computer program product comprising a computer-readable medium having computer program logic recorded thereon for enabling a processor to classify users, comprising:
first computer program logic means for enabling the processor to determine a plurality of commercial emails in an email store; second computer program logic means for enabling the processor to parse the commercial emails to extract commercial information included in the commercial emails; and third computer program logic means for enabling the processor to process the commercial information to generate user classification data. | Techniques for performing user classification based on email are provided. Emails stored in an email store may be analyzed to classify users. Information included in the stored emails may be extracted, and users may be classified into categories according to the extracted information. The extracted information may be analyzed in a manner so as to protect the personal information of the users according to any applicable privacy standards. Any number of types of emails may be analyzed to classify users in any number of ways. For instance, a plurality of commercial emails stored in the email store may be determined The commercial emails may be counted as conversions for an advertising campaign. The commercial emails may be parsed to extract commercial information. The commercial information may be parsed to generate user classification data. The user classification data may be used in various ways, including for targeting users with advertisements.1. A method, comprising:
determining a plurality of commercial emails in an email store; parsing the commercial emails to extract commercial information included in the commercial emails; and processing the commercial information to generate user classification data. 2. The method of claim 1, wherein said determining comprises:
analyzing at least one of an email header or an email body of each of a plurality of emails in the email store for one or more commercial email indications; and categorizing as a commercial email each email of the plurality of emails that includes one or more of the commercial email indications. 3. The method of claim 1, wherein said parsing comprises:
disassociating email recipient identity information from the extracted commercial information. 4. The method of claim 1, wherein said processing comprises:
analyzing the commercial information to determine one or more users that purchased one or more items in a shopping category; and generating user classification data that categorizes the determined one or more users in the shopping category. 5. The method of claim 1, wherein said processing comprises:
analyzing the commercial information to determine a number of commercial emails received by a user in a period of time; and generating user classification data that categorizes the user in a frequent shopper category based at least on the determined number of commercial emails. 6. The method of claim 1, wherein said processing comprises:
analyzing the commercial information to determine an amount of money spent by a user in an item purchase indicated in a commercial email addressed to the user; and generating user classification data that categorizes the user in a spending level category based on the determined amount of money. 7. The method of claim 1, wherein said processing comprises:
analyzing the commercial information to determine an expiration time indication indicated in a commercial email addressed to a user for a leased item; and generating user classification data that categorizes the user in a time-based purchaser category based on the determined expiration time. 8. The method of claim 1, wherein said processing comprises:
analyzing the commercial information to determine an indication in a commercial email addressed to a user that the user owns an item of an item type; and generating user classification data that categorizes the user in an exclusion category associated with the item type based on the determined indication. 9. The method of claim 1, wherein said processing comprises:
generating user classification data that categorizes a user in at least one of a purchase time category, a purchase frequency category, an average purchase amount category, or a purchaser demographics category based at least on commercial information extracted from at least one commercial email addressed to the user. 10. The method of claim 1, wherein said processing comprises:
determining a plurality of purchases made by a user from commercial information extracted from a plurality of commercial emails addressed to the user; determining that the plurality of purchases are correlated; and generating user classification data that categorizes the user in a category based on the correlated purchases. 11. The method of claim 1, wherein said processing comprises:
analyzing the commercial information to determine that a plurality of users have performed at least one of having purchased a same item, purchased a same type of item, purchased an item from a same vendor, or spent a similar amount of money on a purchase; determining the plurality of users to have similar purchasing characteristics based on said analyzing; and generating user classification data that categorizes the plurality of users together in a similar purchasing characteristics category. 12. The method of claim 1, further comprising:
generating a user profile for a user based at least on one or more categories in the user classification data that include the user. 13. The method of claim 1, further comprising:
selecting an online advertisement for display based at least on the generated user classification data. 14. The method of claim 13, wherein said selecting comprises:
selecting the online advertisement for display to a user as an advertisement for an item selected based on a category associated with the user in the user classification data. 15. The method of claim 13, wherein said selecting comprises:
selecting the online advertisement for display to a user as an advertisement for an item selected as an upsell of another item indicated to have been previously purchased by the user. 16. The method of claim 13, wherein said selecting comprises:
selecting the online advertisement for display to a user as an advertisement for a sequential sale item to an item indicated to have been previously purchased by the user. 17. The method of claim 1, further comprising:
using the determined commercial emails to indicate conversions. 18. A user classifier, comprising:
a commercial email determiner configured to determine a plurality of commercial emails in an email store; a commercial email parser configured to parse the commercial emails to extract commercial information included in the commercial emails; and a commercial information processor configured to process the commercial information to generate user classification data. 19. The user classifier of claim 18, wherein the commercial information processor comprises:
a commercial information analyzer configured to analyze the commercial information to categorize one or more users in one or more categories; and a user classification data generator configured to generate user classification data that indicates the one or more users categorized in the one or more categories. 20. The user classifier of claim 19, wherein the commercial information analyzer is configured to analyze the commercial information to categorize one or more users in at least one of a shopping category, a frequent shopper category, a spending level category, a time-based purchaser category, a purchase time category, a purchase frequency category, an average purchase amount category, a purchaser demographics category, or a similar purchasing characteristics category. 21. The user classifier of claim 19, wherein the commercial information analyzer is configured to analyze the commercial information to determine an indication in a commercial email addressed to a user that the user owns an item of an item type; and
wherein the user classification data generator is configured to generate user classification data that includes the user in an exclusion category associated with the item type based on the determined indication. 22. The user classifier of claim 19, wherein the commercial information analyzer is configured to determine a plurality of purchases made by a user from commercial information extracted from a plurality of commercial emails addressed to the user, and to determine that the plurality of purchases are correlated; and
wherein the user classification data generator is configured to generate user classification data that categorizes the user in a category based on the correlated purchases. 23. The user classifier of claim 19, wherein the commercial information analyzer is configured to analyze the commercial information to determine that a plurality of users have performed at least one of having purchased a same item, purchased a same type of item, purchased an item from a same vendor, or spent a similar amount of money on a purchase, and to determine the plurality of users to have similar purchasing characteristics; and
wherein the user classification data generator is configured to generate user classification data that categorizes the plurality of users together in a similar purchasing characteristics category. 24. The user classifier of claim 18, further comprising:
a user profile generator configured to generate a user profile for a user based at least on one or more categories in the user classification data that include the user. 25. The user classifier of claim 18, further comprising:
an advertisement selector configured to select an online advertisement for display based at least on the generated user classification data. 26. A computer program product comprising a computer-readable medium having computer program logic recorded thereon for enabling a processor to classify users, comprising:
first computer program logic means for enabling the processor to determine a plurality of commercial emails in an email store; second computer program logic means for enabling the processor to parse the commercial emails to extract commercial information included in the commercial emails; and third computer program logic means for enabling the processor to process the commercial information to generate user classification data. | 3,600 |
13,425 | 13,425 | 13,335,268 | 3,689 | Structural analysis automation allows the implementation of more detailed or accurate analysis methodology that reflects the actual behavior of the damaged or repaired structure and consequently improves the resulting damage disposition for example by Increasing the allowable damages and structural repairs applicability, increasing the allowable damage limits causing the reduction of unnecessary installation of structural repairs, optimizing repairs and increasing fly-by periods and inspection intervals. | 1. A method, implemented at least in part by at least one computer including a processor, a display and a storage device, of assessing structural damage to an aircraft, the method comprising:
detecting damage to an aircraft; characterizing the detected damage; automatically with the processor, assessing the characterized detected damage and structural properties; automatically with the processor, suggesting a damage disposition; and automatically, with the processor, enabling a user to manage structural damage, repairs and maintenance information. 2. The method of claim 1 wherein the damage disposition includes allowable damage, fly-by, temporary repair, permanent repair, and/or contacting the aircraft manufacturer for specific disposition. 3. The method of claim 1 further including using the processor to test for at least one of static, fatigue and damage tolerance structural analysis. 4. The method of claim 1 further including generating a damage report; and conditioned on approval of said damage report via a network, automatically by computer generating at least one maintenance or repair instruction. 5. The method of claim 1 further including generating the damage disposition by automatically comparing assessed damage to a Structural Repair Manual. 6. The method of claim 1 further including requesting a dedicated damage assessment performing specific structural analysis. 7. The method of claim 6 wherein the dedicated damage assessment uses several parameters including damage type, geometry and dimensions of affected areas, material parameters and structural loads. 8. The method of claim 6 further including performing a static and/or fatigue analysis based on tensile, compression, buckling, post-buckling, crippling and/or durability failure criteria. 9. The method of claim 1 further including automatically providing the number of flight cycles allowed before the repair installation. 10. The method of claim 1 further including automatically providing new inspection intervals for repair location. 11. The method of claim 6 further including performing a crack propagation and/or damage growth analysis. 12. The method of claim 1 further including management of damages, repairs and maintenance information comprising, but not limited to, providing visualization and generating reports for damages and repairs per aircraft and/or per fleet, and communicating alerts on inspection intervals for repair location. 13. A system for assessing structural damage to an aircraft comprising:
at least one input arrangement that provides input concerning damage to the aircraft; at least one computer coupled to the input arrangement, the at least one computer including a processor, a display and a storage device; automatically with the processor, assessing the characterized detected damage and structural properties; automatically suggesting a damage disposition; and automatically, with the processor, enabling structural damages, repairs and maintenance information management. 14. The system of claim 13 wherein the damage disposition includes allowable damage, fly-by, temporary repair, permanent repair, or contact the aircraft manufacturer for specific disposition. 15. The system of claim 13 wherein the processor automatically performs automated structural analysis to test for at least one of static, fatigue and damage tolerance analysis. 16. The system of claim 13 wherein the processor automatically generates a damage report; and conditioned on approval of said damage report, automatically generates at least one maintenance or repair instruction. 17. The system of claim 13 wherein the processor generates the damage disposition by automatically comparing assessed damage to a Structural Repair Manual. 18. The system of claim 13 wherein the processor provides a dedicated damage assessment by performing specific structural analysis. 19. The system of claim 18 wherein the damage assessment uses several parameters including damage type, geometry and dimensions of affected areas, material parameters and structural loads. 20. The system of claim 18 wherein the processor performs a static and/or fatigue analysis based on tensile, compression, buckling, post-buckling, crippling and/or durability failure criteria. 21. The system of claim 13 wherein the processor automatically provides the number of flight cycles allowed before the repair installation. 22. The system of claim 13 wherein the processor automatically provides new inspection intervals for repair location. 23. The system of claim 18 wherein the processor automatically performs a crack propagation and/or damage growth analysis. 24. The system of claim 13 wherein the processor allows management of damages, repairs and maintenance information comprising, but not limited to, providing visualization and generating reports for damages and repairs per aircraft and/or per fleet, and communicating alerts on inspection intervals for repair location. 25. In a system for assessing structural damage to an aircraft, a non-transitory storage device for use with at least one computer coupled to sensors, the at least one computer including a processor, a display and a storage device, the storage device storing instructions that when executed by the at least one processor:
non-destructively detects damage to the aircraft in response to outputs from the sensors; characterizes the detected damage, assesses the characterized detected damage and structural properties; and suggests a damage disposition. 26. The method of claim 1 wherein the sensor detects at least one of visual, Eddy Current, X-Ray, Die Penetrant, Ultrasound, acoustic emission, Comparative Vacuum, Lamb waves, electro-mechanical impedance and optical. 27. The method of claim 1 wherein the damage characterizing uses automatic and/or human-assisted algorithms to assess the severity of the damage based on a flight history or other database stored on a storage device coupled to the processor. 28. The method of claim 1, wherein said detecting damage comprises using a sensor coupled to the processor to automatically detect damage. 29. The system of claim 13, wherein the at least one input arrangement comprises at least one sensor that automatically detects aircraft damage. | Structural analysis automation allows the implementation of more detailed or accurate analysis methodology that reflects the actual behavior of the damaged or repaired structure and consequently improves the resulting damage disposition for example by Increasing the allowable damages and structural repairs applicability, increasing the allowable damage limits causing the reduction of unnecessary installation of structural repairs, optimizing repairs and increasing fly-by periods and inspection intervals.1. A method, implemented at least in part by at least one computer including a processor, a display and a storage device, of assessing structural damage to an aircraft, the method comprising:
detecting damage to an aircraft; characterizing the detected damage; automatically with the processor, assessing the characterized detected damage and structural properties; automatically with the processor, suggesting a damage disposition; and automatically, with the processor, enabling a user to manage structural damage, repairs and maintenance information. 2. The method of claim 1 wherein the damage disposition includes allowable damage, fly-by, temporary repair, permanent repair, and/or contacting the aircraft manufacturer for specific disposition. 3. The method of claim 1 further including using the processor to test for at least one of static, fatigue and damage tolerance structural analysis. 4. The method of claim 1 further including generating a damage report; and conditioned on approval of said damage report via a network, automatically by computer generating at least one maintenance or repair instruction. 5. The method of claim 1 further including generating the damage disposition by automatically comparing assessed damage to a Structural Repair Manual. 6. The method of claim 1 further including requesting a dedicated damage assessment performing specific structural analysis. 7. The method of claim 6 wherein the dedicated damage assessment uses several parameters including damage type, geometry and dimensions of affected areas, material parameters and structural loads. 8. The method of claim 6 further including performing a static and/or fatigue analysis based on tensile, compression, buckling, post-buckling, crippling and/or durability failure criteria. 9. The method of claim 1 further including automatically providing the number of flight cycles allowed before the repair installation. 10. The method of claim 1 further including automatically providing new inspection intervals for repair location. 11. The method of claim 6 further including performing a crack propagation and/or damage growth analysis. 12. The method of claim 1 further including management of damages, repairs and maintenance information comprising, but not limited to, providing visualization and generating reports for damages and repairs per aircraft and/or per fleet, and communicating alerts on inspection intervals for repair location. 13. A system for assessing structural damage to an aircraft comprising:
at least one input arrangement that provides input concerning damage to the aircraft; at least one computer coupled to the input arrangement, the at least one computer including a processor, a display and a storage device; automatically with the processor, assessing the characterized detected damage and structural properties; automatically suggesting a damage disposition; and automatically, with the processor, enabling structural damages, repairs and maintenance information management. 14. The system of claim 13 wherein the damage disposition includes allowable damage, fly-by, temporary repair, permanent repair, or contact the aircraft manufacturer for specific disposition. 15. The system of claim 13 wherein the processor automatically performs automated structural analysis to test for at least one of static, fatigue and damage tolerance analysis. 16. The system of claim 13 wherein the processor automatically generates a damage report; and conditioned on approval of said damage report, automatically generates at least one maintenance or repair instruction. 17. The system of claim 13 wherein the processor generates the damage disposition by automatically comparing assessed damage to a Structural Repair Manual. 18. The system of claim 13 wherein the processor provides a dedicated damage assessment by performing specific structural analysis. 19. The system of claim 18 wherein the damage assessment uses several parameters including damage type, geometry and dimensions of affected areas, material parameters and structural loads. 20. The system of claim 18 wherein the processor performs a static and/or fatigue analysis based on tensile, compression, buckling, post-buckling, crippling and/or durability failure criteria. 21. The system of claim 13 wherein the processor automatically provides the number of flight cycles allowed before the repair installation. 22. The system of claim 13 wherein the processor automatically provides new inspection intervals for repair location. 23. The system of claim 18 wherein the processor automatically performs a crack propagation and/or damage growth analysis. 24. The system of claim 13 wherein the processor allows management of damages, repairs and maintenance information comprising, but not limited to, providing visualization and generating reports for damages and repairs per aircraft and/or per fleet, and communicating alerts on inspection intervals for repair location. 25. In a system for assessing structural damage to an aircraft, a non-transitory storage device for use with at least one computer coupled to sensors, the at least one computer including a processor, a display and a storage device, the storage device storing instructions that when executed by the at least one processor:
non-destructively detects damage to the aircraft in response to outputs from the sensors; characterizes the detected damage, assesses the characterized detected damage and structural properties; and suggests a damage disposition. 26. The method of claim 1 wherein the sensor detects at least one of visual, Eddy Current, X-Ray, Die Penetrant, Ultrasound, acoustic emission, Comparative Vacuum, Lamb waves, electro-mechanical impedance and optical. 27. The method of claim 1 wherein the damage characterizing uses automatic and/or human-assisted algorithms to assess the severity of the damage based on a flight history or other database stored on a storage device coupled to the processor. 28. The method of claim 1, wherein said detecting damage comprises using a sensor coupled to the processor to automatically detect damage. 29. The system of claim 13, wherein the at least one input arrangement comprises at least one sensor that automatically detects aircraft damage. | 3,600 |
13,426 | 13,426 | 13,920,292 | 3,628 | An approach is provided in which a tracking device is attached to an object and receives nearby object routes from multiple nearby tracking devices, each attached to respective nearby objects. The tracking device compares an expected route corresponding to the object with the received nearby object routes to determine whether the object is being transported along the expected route. When the tracking device determines that the object has been incorrectly routed, the tracking device generates a notification. | 1. A method for tracking objects, implemented by an information handling system, comprising:
receiving, at a tracking device attached to an object, a plurality of nearby object routes from a plurality of nearby tracking devices each attached to one of a plurality of nearby objects; comparing, by the tracking device, an expected route corresponding to the object with the received plurality of nearby object routes; and generating a notification, by the tracking device, that indicates the object is deviating from the expected route in response to the comparison. 2. The method of claim 1 wherein the comparing further comprises:
identifying an actual overlap percentage of the plurality of nearby object routes that include a nearby object route segment matching an expected route segment included in the expected route; and
determining that the actual overlap percentage fails to reach a required overlap percentage. 3. The method of claim 2 further comprising:
selecting the expected route segment, from a plurality of expected route segments, based upon a route progression indicator; and
for each of the plurality of nearby object routes, selecting the nearby route segment based upon the route progression indicator for which to match against the selected expected route segment. 4. The method of claim 1 wherein the notification provided by the tracking device is selected from the group consisting of an audio notification and a visual notification. 5. The method of claim 1 wherein the notification is a broadcast wireless message. 6. The method of claim 1 further comprising:
receiving facility data at the tracking device, wherein the receiving of the facility data indicates that the object is located at a facility;
comparing the facility data to one or more expected route waypoints included in the expected route; and
generating the notification in response to the facility data failing to match one or more of the expected route waypoints. 7. The method of claim 6 further comprising:
setting a timer in response to receiving the facility data;
receiving subsequent facility data subsequent to setting the timer;
in response to receiving the subsequent facility data, determining that the timer exceeds a facility timeframe threshold; and
generating a different notification, by the tracking device, in response to the determination. 8. The method of claim 1 wherein the expected route is stored in the tracking device. 9. An information handling system comprising:
one or more processors; a memory coupled to at least one of the one or more processors; one or more wireless transceivers accessible by at least one of the one or more transceivers; a set of computer program instructions stored in the memory and executed by at least one of the processors in order to perform actions of:
receiving, at the information handling device attached to an object, a plurality of nearby object routes from a plurality of nearby tracking devices each attached to one of a plurality of nearby objects;
comparing, by the information handling device, an expected route corresponding to the object with the received plurality of nearby object routes; and
generating a notification, by the information handling device, that indicates the object is deviating from the expected route in response to the comparison. 10. The information handling system of claim 9 wherein the processors perform additional actions comprising:
identifying an actual overlap percentage of the plurality of nearby object routes that include a nearby object route segment matching an expected route segment included in the expected route; and
determining that the actual overlap percentage fails to reach a required overlap percentage. 11. The information handling system of claim 10 wherein the processors perform additional actions comprising:
selecting the expected route segment, from a plurality of expected route segments, based upon a route progression indicator; and
for each of the plurality of nearby object routes, selecting the nearby route segment based upon the route progression indicator for which to match against the selected expected route segment. 12. The information handling system of claim 9 wherein the notification provided by the information handling device is selected from the group consisting of an audio notification and a visual notification. 13. The information handling system of claim 9 wherein the notification is a broadcast wireless message. 14. The information handling system of claim 9 wherein the processors perform additional actions comprising:
receiving facility data at the information handling device, wherein the receiving of the facility data indicates that the object is located at a facility;
comparing the facility data to one or more expected route waypoints included in the expected route; and
generating the notification in response to the facility data failing to match one or more of the expected route waypoints. 15. The information handling system of claim 14 wherein the processors perform additional actions comprising:
setting a timer in response to receiving the facility data;
receiving subsequent facility data subsequent to setting the timer;
in response to receiving the subsequent facility data, determining that the timer exceeds a facility timeframe threshold; and
generating a different notification, by the information handling device, in response to the determination. 16. A computer program product stored in a computer readable storage medium, comprising computer program code that, when executed by an information handling system, causes the information handling system to perform actions comprising:
receiving, at the information handling device attached to an object, a plurality of nearby object routes from a plurality of nearby tracking devices each attached to one of a plurality of nearby objects; comparing, by the information handling device, an expected route corresponding to the object with the received plurality of nearby object routes; and generating a notification, by the information handling device, that indicates the object is deviating from the expected route in response to the comparison. 17. The computer program product of claim 16 wherein the information handling system performs further actions comprising:
identifying an actual overlap percentage of the plurality of nearby object routes that include a nearby object route segment matching an expected route segment included in the expected route; and
determining that the actual overlap percentage fails to reach a required overlap percentage. 18. The computer program product of claim 17 wherein the information handling system performs further actions comprising:
selecting the expected route segment, from a plurality of expected route segments, based upon a route progression indicator; and
for each of the plurality of nearby object routes, selecting the nearby route segment based upon the route progression indicator for which to match against the selected expected route segment. 19. The computer program product of claim 16 wherein the notification provided by the information handling device is selected from the group consisting of an audio notification and a visual notification. 20. The computer program product of claim 16 wherein the notification is a broadcast wireless message. | An approach is provided in which a tracking device is attached to an object and receives nearby object routes from multiple nearby tracking devices, each attached to respective nearby objects. The tracking device compares an expected route corresponding to the object with the received nearby object routes to determine whether the object is being transported along the expected route. When the tracking device determines that the object has been incorrectly routed, the tracking device generates a notification.1. A method for tracking objects, implemented by an information handling system, comprising:
receiving, at a tracking device attached to an object, a plurality of nearby object routes from a plurality of nearby tracking devices each attached to one of a plurality of nearby objects; comparing, by the tracking device, an expected route corresponding to the object with the received plurality of nearby object routes; and generating a notification, by the tracking device, that indicates the object is deviating from the expected route in response to the comparison. 2. The method of claim 1 wherein the comparing further comprises:
identifying an actual overlap percentage of the plurality of nearby object routes that include a nearby object route segment matching an expected route segment included in the expected route; and
determining that the actual overlap percentage fails to reach a required overlap percentage. 3. The method of claim 2 further comprising:
selecting the expected route segment, from a plurality of expected route segments, based upon a route progression indicator; and
for each of the plurality of nearby object routes, selecting the nearby route segment based upon the route progression indicator for which to match against the selected expected route segment. 4. The method of claim 1 wherein the notification provided by the tracking device is selected from the group consisting of an audio notification and a visual notification. 5. The method of claim 1 wherein the notification is a broadcast wireless message. 6. The method of claim 1 further comprising:
receiving facility data at the tracking device, wherein the receiving of the facility data indicates that the object is located at a facility;
comparing the facility data to one or more expected route waypoints included in the expected route; and
generating the notification in response to the facility data failing to match one or more of the expected route waypoints. 7. The method of claim 6 further comprising:
setting a timer in response to receiving the facility data;
receiving subsequent facility data subsequent to setting the timer;
in response to receiving the subsequent facility data, determining that the timer exceeds a facility timeframe threshold; and
generating a different notification, by the tracking device, in response to the determination. 8. The method of claim 1 wherein the expected route is stored in the tracking device. 9. An information handling system comprising:
one or more processors; a memory coupled to at least one of the one or more processors; one or more wireless transceivers accessible by at least one of the one or more transceivers; a set of computer program instructions stored in the memory and executed by at least one of the processors in order to perform actions of:
receiving, at the information handling device attached to an object, a plurality of nearby object routes from a plurality of nearby tracking devices each attached to one of a plurality of nearby objects;
comparing, by the information handling device, an expected route corresponding to the object with the received plurality of nearby object routes; and
generating a notification, by the information handling device, that indicates the object is deviating from the expected route in response to the comparison. 10. The information handling system of claim 9 wherein the processors perform additional actions comprising:
identifying an actual overlap percentage of the plurality of nearby object routes that include a nearby object route segment matching an expected route segment included in the expected route; and
determining that the actual overlap percentage fails to reach a required overlap percentage. 11. The information handling system of claim 10 wherein the processors perform additional actions comprising:
selecting the expected route segment, from a plurality of expected route segments, based upon a route progression indicator; and
for each of the plurality of nearby object routes, selecting the nearby route segment based upon the route progression indicator for which to match against the selected expected route segment. 12. The information handling system of claim 9 wherein the notification provided by the information handling device is selected from the group consisting of an audio notification and a visual notification. 13. The information handling system of claim 9 wherein the notification is a broadcast wireless message. 14. The information handling system of claim 9 wherein the processors perform additional actions comprising:
receiving facility data at the information handling device, wherein the receiving of the facility data indicates that the object is located at a facility;
comparing the facility data to one or more expected route waypoints included in the expected route; and
generating the notification in response to the facility data failing to match one or more of the expected route waypoints. 15. The information handling system of claim 14 wherein the processors perform additional actions comprising:
setting a timer in response to receiving the facility data;
receiving subsequent facility data subsequent to setting the timer;
in response to receiving the subsequent facility data, determining that the timer exceeds a facility timeframe threshold; and
generating a different notification, by the information handling device, in response to the determination. 16. A computer program product stored in a computer readable storage medium, comprising computer program code that, when executed by an information handling system, causes the information handling system to perform actions comprising:
receiving, at the information handling device attached to an object, a plurality of nearby object routes from a plurality of nearby tracking devices each attached to one of a plurality of nearby objects; comparing, by the information handling device, an expected route corresponding to the object with the received plurality of nearby object routes; and generating a notification, by the information handling device, that indicates the object is deviating from the expected route in response to the comparison. 17. The computer program product of claim 16 wherein the information handling system performs further actions comprising:
identifying an actual overlap percentage of the plurality of nearby object routes that include a nearby object route segment matching an expected route segment included in the expected route; and
determining that the actual overlap percentage fails to reach a required overlap percentage. 18. The computer program product of claim 17 wherein the information handling system performs further actions comprising:
selecting the expected route segment, from a plurality of expected route segments, based upon a route progression indicator; and
for each of the plurality of nearby object routes, selecting the nearby route segment based upon the route progression indicator for which to match against the selected expected route segment. 19. The computer program product of claim 16 wherein the notification provided by the information handling device is selected from the group consisting of an audio notification and a visual notification. 20. The computer program product of claim 16 wherein the notification is a broadcast wireless message. | 3,600 |
13,427 | 13,427 | 14,509,856 | 3,691 | One or more embodiments described herein include methods and systems for remitting funds via a social networking system. More specifically, systems and methods described herein provide users the ability to remit funds to co-users utilizing social network profiles and notifications. Additionally, systems and methods described herein determine one or more risk levels for a remittance request based on a variety of social network factors. | 1. A method comprising:
receiving a request, from a sender, to electronically transfer funds to a recipient, wherein the sender and the recipient are associated via a social network; accessing information from the social network about one or more of the sender, the recipient, or a relationship between the sender and the recipient; calculating, by at least one processor, a risk level associated with the request to transfer funds based on the information from the social network; if the identified risk level is below a predetermined threshold, proceeding with the request to electronically transfer funds to the recipient; and if the identified risk level is above the predetermined threshold, canceling the request to electronically transfer funds to the recipient. 2. The method as recited in claim 1, further comprising:
determining, based on the accessed social network information, at least one of a length of time the sender has been a member of the social network, a country of residence of the sender, or a level of activity the sender has related to a destination country associated with the recipient; and using the at least one of the length of time the sender has been a member of the social network, the country of residence of the sender, or the level of activity the sender has related to the destination country associated with the recipient to calculate the risk level. 3. The method as recited in claim 1, further comprising:
calculating, based on the accessed social network information, a realness score for the sender; and using the realness score for the sender to calculate the risk level. 4. The method as recited in claim 3, wherein calculating the realness score for the sender comprises determining one or more of: whether the sender has been tagged in photos posted to the social network, whether co-users of the social network wished the sender happy birthday, a number of messages exchanged between the sender and co-users of the social network, or whether co-users like or comment on posts made by the sender. 5. The method as recited in claim 1, further comprising determining, based on the accessed social network information, at least one of a length of time the recipient has been a member of the social network, the recipient's country of residence, or a level of interaction activity the recipient has had with the sender. 6. The method as recited in claim 1, further comprising determining a country of residence of the sender and a country of residence of the recipient, wherein the country of residence of the sender and the country of residence of the recipient are different countries. 7. The method as recited in claim 6, further comprising canceling the request to electronically transfer funds to the recipient based on one or more of the country of residence of the sender or the country of residence of the recipient being unapproved. 8. The method as recited in claim 1, further comprising limiting an amount of funds that the sender can transfer to the recipient if the risk level is within a predetermined range. 9. The method as recited in claim 1, further comprising requiring the sender to pass a challenge in order to transfer funds to the recipient if the risk level is within a predetermined range. 10. The method as recited in claim 9, wherein the challenge comprises a question based on information in a social network profile for the sender or information from the social network about social network friends of the sender. 11. A method comprising:
receiving a request, from a sender, to electronically remit funds; calculating, by at least one processor, a first risk level associated with the sender to remit funds; based on the first risk level associated with the sender being below a first predetermined threshold, providing a list of potential recipients of the funds; receiving a selection of a recipient from the list of potential recipients; calculating a relationship coefficient representative of a relationship between the sender and the selected recipient; determining, by the at least one processor, a second risk level for the request to electronically remit funds based on the identified relationship coefficient between the sender and the selected recipient; if the second risk level is below a second predetermined threshold, proceeding with the request to electronically remit funds to the recipient; and if the second risk level is above the second predetermined threshold, canceling the request to electronically remit funds to the selected recipient. 12. The method as recited in claim 11, wherein calculating the relationship coefficient representative of the relationship between the sender and the selected recipient comprises analyzing social network interactions between the sender and the selected recipient. 13. The method as recited in claim 12, wherein analyzing social network interactions between the sender and the selected recipient comprises one or more of analyzing social network activities indicating a strength of the relationship between the sender and the selected recipient or identifying past electronic fund remittances between the sender and the selected recipient. 14. The method as recited in claim 13, wherein analyzing social network activities indicating the strength of the relationship between the sender and the selected recipient comprises analyzing one or more of:
one or more of a number, frequency, or length of social network messages between the sender and the selected recipient, social network posts by the sender that reference the selected recipient, social network posts by the recipient that reference the selected sender, posted social network media that includes or references both the sender and the selected recipient, a number of social network friends common between the sender and the selected recipient, and analyzing location check-ins indicating the sender and the selected recipient were in the same geographical area at the same time. 15. The method as recited in claim 14, further comprising:
calculating an implied relationship score between the sender and the recipient based on one or more of:
a number, frequency, or length of social network messages between the sender and friends of the selected recipient, or
a number, frequency, or length of social network messages between the selected recipient and friends of the sender, and
using the implied relationship score between the sender and the recipient to calculate the relationship coefficient representative of the relationship between the sender and the selected recipient. 16. The method as recited in claim 12, further comprising:
determining a length of time the sender has been a member of a social network, a country of residence of the sender, or a level of activity the sender has related to a destination country associated with the recipient; and. using the at least one of the length of time the sender has been a member of the social network, the country of residence of the sender, or the level of activity the sender has related to the destination country associated with the recipient to calculate the first risk level. 17. The method as recited in claim 16, wherein determining the level of activity the sender has related to the destination country associated with the recipient comprises determining one or more of: a number of social network friends the sender has from the destination country or whether the sender has visited the destination country. 18. The method as recited in claim 11, wherein providing the list of potential recipients of the funds comprises determining a plurality of potential recipients likely to be selected by the sender to receive electronically remitted funds and including the potential recipients likely to be selected in the list. 19. A system comprising:
at least one processor; and at least one non-transitory computer-readable storage medium storing instructions thereon that, when executed by the at least one processor, cause the system to:
receive a request, from a sender, to electronically transfer funds to a recipient, wherein the sender and the recipient are associated via a social network;
access information from the social network about one or more of the sender, the recipient, or a relationship between the sender and the recipient;
calculate a first risk level associated with the request to transfer funds based on the information from the social network;
if the identified risk level is below a predetermined threshold, proceed with the request to electronically transfer funds to the recipient; and
if the identified risk is above the predetermined threshold, cancel the request to electronically transfer funds to the recipient. 20. The system as recited in claim 19, further comprising instructions that, when executed by the at least one processor, cause the system to:
calculate a second risk level associated with the sender based on the information from the social network; calculate a third risk level associated with the recipient based on the information from the social network; identifying a total risk level based on the first risk level, the second risk level, and the third risk level; wherein the identified risk level comprises the total risk level. | One or more embodiments described herein include methods and systems for remitting funds via a social networking system. More specifically, systems and methods described herein provide users the ability to remit funds to co-users utilizing social network profiles and notifications. Additionally, systems and methods described herein determine one or more risk levels for a remittance request based on a variety of social network factors.1. A method comprising:
receiving a request, from a sender, to electronically transfer funds to a recipient, wherein the sender and the recipient are associated via a social network; accessing information from the social network about one or more of the sender, the recipient, or a relationship between the sender and the recipient; calculating, by at least one processor, a risk level associated with the request to transfer funds based on the information from the social network; if the identified risk level is below a predetermined threshold, proceeding with the request to electronically transfer funds to the recipient; and if the identified risk level is above the predetermined threshold, canceling the request to electronically transfer funds to the recipient. 2. The method as recited in claim 1, further comprising:
determining, based on the accessed social network information, at least one of a length of time the sender has been a member of the social network, a country of residence of the sender, or a level of activity the sender has related to a destination country associated with the recipient; and using the at least one of the length of time the sender has been a member of the social network, the country of residence of the sender, or the level of activity the sender has related to the destination country associated with the recipient to calculate the risk level. 3. The method as recited in claim 1, further comprising:
calculating, based on the accessed social network information, a realness score for the sender; and using the realness score for the sender to calculate the risk level. 4. The method as recited in claim 3, wherein calculating the realness score for the sender comprises determining one or more of: whether the sender has been tagged in photos posted to the social network, whether co-users of the social network wished the sender happy birthday, a number of messages exchanged between the sender and co-users of the social network, or whether co-users like or comment on posts made by the sender. 5. The method as recited in claim 1, further comprising determining, based on the accessed social network information, at least one of a length of time the recipient has been a member of the social network, the recipient's country of residence, or a level of interaction activity the recipient has had with the sender. 6. The method as recited in claim 1, further comprising determining a country of residence of the sender and a country of residence of the recipient, wherein the country of residence of the sender and the country of residence of the recipient are different countries. 7. The method as recited in claim 6, further comprising canceling the request to electronically transfer funds to the recipient based on one or more of the country of residence of the sender or the country of residence of the recipient being unapproved. 8. The method as recited in claim 1, further comprising limiting an amount of funds that the sender can transfer to the recipient if the risk level is within a predetermined range. 9. The method as recited in claim 1, further comprising requiring the sender to pass a challenge in order to transfer funds to the recipient if the risk level is within a predetermined range. 10. The method as recited in claim 9, wherein the challenge comprises a question based on information in a social network profile for the sender or information from the social network about social network friends of the sender. 11. A method comprising:
receiving a request, from a sender, to electronically remit funds; calculating, by at least one processor, a first risk level associated with the sender to remit funds; based on the first risk level associated with the sender being below a first predetermined threshold, providing a list of potential recipients of the funds; receiving a selection of a recipient from the list of potential recipients; calculating a relationship coefficient representative of a relationship between the sender and the selected recipient; determining, by the at least one processor, a second risk level for the request to electronically remit funds based on the identified relationship coefficient between the sender and the selected recipient; if the second risk level is below a second predetermined threshold, proceeding with the request to electronically remit funds to the recipient; and if the second risk level is above the second predetermined threshold, canceling the request to electronically remit funds to the selected recipient. 12. The method as recited in claim 11, wherein calculating the relationship coefficient representative of the relationship between the sender and the selected recipient comprises analyzing social network interactions between the sender and the selected recipient. 13. The method as recited in claim 12, wherein analyzing social network interactions between the sender and the selected recipient comprises one or more of analyzing social network activities indicating a strength of the relationship between the sender and the selected recipient or identifying past electronic fund remittances between the sender and the selected recipient. 14. The method as recited in claim 13, wherein analyzing social network activities indicating the strength of the relationship between the sender and the selected recipient comprises analyzing one or more of:
one or more of a number, frequency, or length of social network messages between the sender and the selected recipient, social network posts by the sender that reference the selected recipient, social network posts by the recipient that reference the selected sender, posted social network media that includes or references both the sender and the selected recipient, a number of social network friends common between the sender and the selected recipient, and analyzing location check-ins indicating the sender and the selected recipient were in the same geographical area at the same time. 15. The method as recited in claim 14, further comprising:
calculating an implied relationship score between the sender and the recipient based on one or more of:
a number, frequency, or length of social network messages between the sender and friends of the selected recipient, or
a number, frequency, or length of social network messages between the selected recipient and friends of the sender, and
using the implied relationship score between the sender and the recipient to calculate the relationship coefficient representative of the relationship between the sender and the selected recipient. 16. The method as recited in claim 12, further comprising:
determining a length of time the sender has been a member of a social network, a country of residence of the sender, or a level of activity the sender has related to a destination country associated with the recipient; and. using the at least one of the length of time the sender has been a member of the social network, the country of residence of the sender, or the level of activity the sender has related to the destination country associated with the recipient to calculate the first risk level. 17. The method as recited in claim 16, wherein determining the level of activity the sender has related to the destination country associated with the recipient comprises determining one or more of: a number of social network friends the sender has from the destination country or whether the sender has visited the destination country. 18. The method as recited in claim 11, wherein providing the list of potential recipients of the funds comprises determining a plurality of potential recipients likely to be selected by the sender to receive electronically remitted funds and including the potential recipients likely to be selected in the list. 19. A system comprising:
at least one processor; and at least one non-transitory computer-readable storage medium storing instructions thereon that, when executed by the at least one processor, cause the system to:
receive a request, from a sender, to electronically transfer funds to a recipient, wherein the sender and the recipient are associated via a social network;
access information from the social network about one or more of the sender, the recipient, or a relationship between the sender and the recipient;
calculate a first risk level associated with the request to transfer funds based on the information from the social network;
if the identified risk level is below a predetermined threshold, proceed with the request to electronically transfer funds to the recipient; and
if the identified risk is above the predetermined threshold, cancel the request to electronically transfer funds to the recipient. 20. The system as recited in claim 19, further comprising instructions that, when executed by the at least one processor, cause the system to:
calculate a second risk level associated with the sender based on the information from the social network; calculate a third risk level associated with the recipient based on the information from the social network; identifying a total risk level based on the first risk level, the second risk level, and the third risk level; wherein the identified risk level comprises the total risk level. | 3,600 |
13,428 | 13,428 | 14,134,828 | 3,697 | Methods, devices, and systems for facilitation of efficient processing of a plurality of electronic message packets communicated to an application via a network from a plurality of message sources. The facilitation involves receiving each of the plurality of electronic message packets from the network, and storing, upon receipt thereof, each of the received electronic message packets in a single buffer irrespective of which message source of the plurality of message sources each of the received electronic message packets originated from, the single buffer being accessible by the application. | 1. A method for facilitation of efficient processing of a plurality of electronic message packets communicated to an application via a network from a plurality of message sources, the method comprising:
receiving each of the plurality of electronic message packets from the network; and storing, by a processor upon receipt thereof, each of the received electronic message packets in a single buffer irrespective of which message source of the plurality of message sources each of the received electronic message packets originated from, the single buffer being accessible by the application to access the electronic message packets stored therein. 2. The method of claim 1, wherein each of the plurality of electronic message packets comprise a format for transmission using Transmission Control Protocol (“TCP”). 3. The method of claim 1, wherein the plurality of electronic message packets comprise financial messages, the plurality of message sources comprise market participants, and the application comprises an order entry gateway application for use with an exchange operational to match trades using the financial messages. 4. The method of claim 1, wherein source information of each of the plurality of electronic message packets is maintained and provided with the organized electronic message packets for the common destination application. 5. The method of claim 1, wherein the plurality of message sources are each indicated on a list of sources, and wherein receiving further comprises determining whether each message of the plurality of messages originated from a source included on the list of sources. 6. The method of 5, wherein storing further comprises only storing in the single buffer electronic message packets determined to have a source indicated on the list of sources. 7. The method of 1, wherein the receiving and the storing are handled by a network layer, and the application accesses the singular buffer via a transport layer coupled with the network layer. 8. A system for facilitation of efficient processing of a plurality of electronic message packets communicated to an application via a network from a plurality of message sources, the system comprising:
a first logic stored in a memory and configured to be executed by a processor to cause the system to receive each of the plurality of electronic message packets from the network; and a second logic stored in a memory and configured to be executed by a processor to cause the system to store, upon receipt thereof, each of the received electronic message packets in a single buffer irrespective of which message source of the plurality of message sources each of the received electronic message packets originated from, the single buffer being accessible by the application to access the electronic message packets stored therein. 9. The system of claim 8, wherein each of the plurality of electronic message packets comprise a format for transmission using Transmission Control Protocol (“TCP”). 10. The system of claim 8, wherein the plurality of electronic message packets comprise financial messages, the plurality of message sources comprise market participants, and the application comprises an order entry gateway application for use with an exchange operational to match trades using the financial messages. 11. The system of claim 8, wherein source information of each of the plurality of electronic message packets is maintained and provided with the organized electronic message packets for the common destination application. 12. The system of claim 8, wherein the plurality of message sources are each indicated on a list of sources, and wherein the first logic is further configured to determine whether each message of the plurality of messages originated from a source included on the list of sources. 13. The system of 12, wherein second logic is further configured to only store in the single buffer electronic message packets determined to have a source indicated on the list of sources. 14. The system of 8, wherein the first logic and the second logic are handled by a network layer, and the application accesses the singular buffer via a transport layer coupled with the network layer. 15. A system for facilitation of efficient processing of a plurality of electronic message packets communicated to an application via a network from a plurality of message sources, the system comprising:
at least one memory operable to store the plurality of electronic message packets; and at least one processor configured to cause the system to:
receive each of the plurality of electronic message packets from the network; and
store, upon receipt thereof, each of the received electronic message packets in a single buffer in the memory irrespective of which message source of the plurality of message sources each of the received electronic message packets originated from, the single buffer being accessible by the application to access the electronic message packets stored therein. 16. The system of claim 15, wherein each of the plurality of electronic message packets comprise a format for transmission using Transmission Control Protocol (“TCP”). 17. The system of claim 15, wherein the plurality of electronic message packets comprise financial messages, the plurality of message sources comprise market participants, and the application comprises an order entry gateway application for use with an exchange operational to match trades using the financial messages. 18. The system of claim 15, wherein source information of each of the plurality of electronic message packets is maintained and provided with the organized electronic message packets for the common destination application. 19. The system of claim 15, wherein the plurality of message sources are each indicated on a list of sources, and wherein the processor is further configured to cause the system to determine whether each message of the plurality of messages originated from a source included on the list of sources. 20. The method of 19, wherein the processor is further configured to cause the system to only store in the single buffer electronic message packets determined to have a source indicated on the list of sources. 21. The method of 15, wherein processor is further configured to cause the system to receive and store each of the plurality of electronic message packets using a network layer of the system, and the application accesses the singular buffer via a transport layer coupled with the network layer. | Methods, devices, and systems for facilitation of efficient processing of a plurality of electronic message packets communicated to an application via a network from a plurality of message sources. The facilitation involves receiving each of the plurality of electronic message packets from the network, and storing, upon receipt thereof, each of the received electronic message packets in a single buffer irrespective of which message source of the plurality of message sources each of the received electronic message packets originated from, the single buffer being accessible by the application.1. A method for facilitation of efficient processing of a plurality of electronic message packets communicated to an application via a network from a plurality of message sources, the method comprising:
receiving each of the plurality of electronic message packets from the network; and storing, by a processor upon receipt thereof, each of the received electronic message packets in a single buffer irrespective of which message source of the plurality of message sources each of the received electronic message packets originated from, the single buffer being accessible by the application to access the electronic message packets stored therein. 2. The method of claim 1, wherein each of the plurality of electronic message packets comprise a format for transmission using Transmission Control Protocol (“TCP”). 3. The method of claim 1, wherein the plurality of electronic message packets comprise financial messages, the plurality of message sources comprise market participants, and the application comprises an order entry gateway application for use with an exchange operational to match trades using the financial messages. 4. The method of claim 1, wherein source information of each of the plurality of electronic message packets is maintained and provided with the organized electronic message packets for the common destination application. 5. The method of claim 1, wherein the plurality of message sources are each indicated on a list of sources, and wherein receiving further comprises determining whether each message of the plurality of messages originated from a source included on the list of sources. 6. The method of 5, wherein storing further comprises only storing in the single buffer electronic message packets determined to have a source indicated on the list of sources. 7. The method of 1, wherein the receiving and the storing are handled by a network layer, and the application accesses the singular buffer via a transport layer coupled with the network layer. 8. A system for facilitation of efficient processing of a plurality of electronic message packets communicated to an application via a network from a plurality of message sources, the system comprising:
a first logic stored in a memory and configured to be executed by a processor to cause the system to receive each of the plurality of electronic message packets from the network; and a second logic stored in a memory and configured to be executed by a processor to cause the system to store, upon receipt thereof, each of the received electronic message packets in a single buffer irrespective of which message source of the plurality of message sources each of the received electronic message packets originated from, the single buffer being accessible by the application to access the electronic message packets stored therein. 9. The system of claim 8, wherein each of the plurality of electronic message packets comprise a format for transmission using Transmission Control Protocol (“TCP”). 10. The system of claim 8, wherein the plurality of electronic message packets comprise financial messages, the plurality of message sources comprise market participants, and the application comprises an order entry gateway application for use with an exchange operational to match trades using the financial messages. 11. The system of claim 8, wherein source information of each of the plurality of electronic message packets is maintained and provided with the organized electronic message packets for the common destination application. 12. The system of claim 8, wherein the plurality of message sources are each indicated on a list of sources, and wherein the first logic is further configured to determine whether each message of the plurality of messages originated from a source included on the list of sources. 13. The system of 12, wherein second logic is further configured to only store in the single buffer electronic message packets determined to have a source indicated on the list of sources. 14. The system of 8, wherein the first logic and the second logic are handled by a network layer, and the application accesses the singular buffer via a transport layer coupled with the network layer. 15. A system for facilitation of efficient processing of a plurality of electronic message packets communicated to an application via a network from a plurality of message sources, the system comprising:
at least one memory operable to store the plurality of electronic message packets; and at least one processor configured to cause the system to:
receive each of the plurality of electronic message packets from the network; and
store, upon receipt thereof, each of the received electronic message packets in a single buffer in the memory irrespective of which message source of the plurality of message sources each of the received electronic message packets originated from, the single buffer being accessible by the application to access the electronic message packets stored therein. 16. The system of claim 15, wherein each of the plurality of electronic message packets comprise a format for transmission using Transmission Control Protocol (“TCP”). 17. The system of claim 15, wherein the plurality of electronic message packets comprise financial messages, the plurality of message sources comprise market participants, and the application comprises an order entry gateway application for use with an exchange operational to match trades using the financial messages. 18. The system of claim 15, wherein source information of each of the plurality of electronic message packets is maintained and provided with the organized electronic message packets for the common destination application. 19. The system of claim 15, wherein the plurality of message sources are each indicated on a list of sources, and wherein the processor is further configured to cause the system to determine whether each message of the plurality of messages originated from a source included on the list of sources. 20. The method of 19, wherein the processor is further configured to cause the system to only store in the single buffer electronic message packets determined to have a source indicated on the list of sources. 21. The method of 15, wherein processor is further configured to cause the system to receive and store each of the plurality of electronic message packets using a network layer of the system, and the application accesses the singular buffer via a transport layer coupled with the network layer. | 3,600 |
13,429 | 13,429 | 14,476,664 | 3,635 | A roof mounting bracket is disclosed which creates a deformation in a roof panel seam using opposing set points. In a preferred embodiment, a generally U-shaped bracket includes two or more threaded fasteners in a first arm of the bracket and one or more opposing threaded fasteners in the second arm. Void in bracket is placed over the panel seam, with the first arm on a first side of the seam and the second arm on the opposite side of the seam. First screws inserted into the fasteners in first arm pass through the first arm and the first screw heads contact the first side of the seam, slightly engaging the seam and creating first deformations in the seam as the set screws are tightened. Second screws inserted into the fasteners in the second arm pass through the second arm and the second screw heads contact the second side of the seam in the spaces between the first deformations on the opposite side of the seam, engaging the seam and creating second deformations in the seam as the second screws are tightened. The opposing contact points create a “wave” deformation in the seam, securing the bracket to the seam. The opposing set points of the present invention allow secure attachment of the bracket to the seam without having to “dimple” or dent the panel seam using a single set screw, requiring less force by the user. Bracket can include varying numbers of opposing fasteners in first and second arms for varying numbers of opposing set points. In an alternative embodiment, bracket can further comprise divots into which first deformations are recesses to create a deeper “wave” the seam for stronger attachment to seam. | 1. A roof mounting bracket for securing accessories to seamed panel roof systems, the bracket comprising:
a first member, the first member having coupled thereto two or more first projections to be disposed on first side of a roof panel seam; a second member disposed opposite the first member on the opposite side of the panel roof seam, the second member having one or more second projections, wherein the second one or more projections are positioned opposite the spaces between the first projections of the first member; wherein engaging the first two or more projections to the first side of a seam of a roof panel creates first two or more deformations in the seam; and wherein engaging the second one or more projections to the opposite side of the roof panel seam creates a second one or more deformations in the roof panel seam in the spaces between the first deformations, creating a generally wave-shaped distortion of the roof panel seam. 2. The bracket of claim 1 wherein the top of first member and top of second member are attached to a third member, defining a generally U-shaped bracket wherein the two or more first projections and the one or more second projections extend into the space defined by the first member, the second member and the third member, and wherein the space is configured to receive the roof panel seam. 3. The bracket of claim 2 wherein the projections comprise screws, and the screws are coupled to first member and second member by threads formed in first member and second member. 4. The bracket of claim 3 wherein threading the screws through the fasteners and tightening the screws cause heads of the screws to engage the seam and create the first two or more deformations and the second one or more deformations in the roof panel seam. 5. The bracket of claim 2 further comprising a notch in third member for aligning roof panel seam within space. 6. The bracket of claim 1 wherein the bracket is comprise of aluminum. 7. The bracket of claim 1 wherein the bracket is comprised of brass. 8. The bracket of claim 1 wherein the third member comprises one or more fasteners for securing a roof accessory thereto. 9. The bracket of claim 8 wherein the roof accessory comprises a snow barricade mounting system. 10. The bracket of claim 8 wherein the roof accessory comprises a solar panel mounting system. 11. The bracket of claim 8 wherein the roof accessory comprises a signage mounting system. 12. The bracket of claim 8 wherein the roof accessory comprises a lightening protection system. 13. The bracket of claim 1 wherein the first two or more projections are knobs coupled to first member, and the second one or more projections are first screws coupled to second member by threads formed in second member. 14. The bracket of claim 13 further comprising an attaching means for securing first member to second member, and wherein first member and second member define a channel configured to receive the roof panel seam when secured together. 15. The bracket of claim 14 wherein securing first member to second member causes the knobs of the first member to engage the seam and create the first two or more deformations, and wherein threading the first screws through the fasteners and tightening the screws cause the heads of the first screws to engage the seam and create the second one or more deformations in the roof panel seam. 16. The bracket of claim 14 wherein the attaching means are comprised of one or more pairs of fasteners formed in the first member and the second member and further comprised of second screws threaded through fasteners in the first member and the second member. 17. The bracket of claim 13 further comprising a notch in second member at the top of the channel for aligning roof panel seam within space. 18. The bracket of claim 13 wherein the bracket is aluminum. 19. The bracket of claim 13 wherein the bracket is brass. 20. The bracket of claim 13 wherein the bracket is zinc. 21. The bracket of claim 13 wherein the first member comprises one or more fasteners for securing a roof accessory thereto. 22. The bracket of claim 21 wherein the roof accessory comprises a snow barricade mounting system. 23. The bracket of claim 21 wherein the roof accessory comprises a solar panel mounting system. 24. The bracket of claim 21 wherein the roof accessory comprises a signage mounting system. 25. The bracket of claim 21 wherein the roof accessory comprises a lightening protection system. 26. A roof mounting bracket for securing accessories to seamed panel roof systems, the bracket comprising:
a first member, the first member having coupled thereto two or more first projections to be disposed on first side of a roof panel seam; a second member disposed opposite the first member on the opposite side of the panel roof seam, the second member having one or more second projections, wherein the second one or more projections are positioned opposite the spaces between the first projections of the first member; a third member, wherein the first, second and third members define a generally U-shaped bracket wherein the two or more first projections and the one or more second projections extend into the space defined by the first member, the second member and the third member; wherein engaging the first two or more projections to the first side of a seam of a roof panel creates first two or more deformations in the seam; and wherein engaging the second one or more projections to the opposite side of the roof panel seam creates a second one or more deformations in the roof panel seam in the spaces between the first deformations, creating a generally wave-shaped distortion of the roof panel seam. 27. A roof mounting bracket for securing accessories to seamed panel roof systems, the bracket comprising:
a first member, the first member having coupled thereto two or more first projections to be disposed on first side of a roof panel seam; a second member disposed opposite the first member on the opposite side of the panel roof seam, the second member having one or more second projections, wherein the second one or more projections are positioned opposite the spaces between the first projections of the first member, the second member further comprising two or more divots positioned opposition the two or more first projections; wherein engaging the first two or more projections to the first side of a seam of a roof panel creates first two or more deformations in the seam, and wherein the deformations are recessed into the divots; and wherein engaging the second one or more projections to the opposite side of the roof panel seam creates a second one or more deformations in the roof panel seam in the spaces between the first deformations, creating a generally wave-shaped distortion of the roof panel seam. 28. The bracket of claim 27 wherein the top of first member and top of second member are attached to a third member, defining a generally U-shaped bracket wherein the two or more first projections and the one or more second projections extend into the space defined by the first member, the second member and the third member, and wherein the space is configured to receive the roof panel seam. 29. The bracket of claim 28 wherein the projections comprise screws, and the screws are coupled to first member and second member by fasteners formed in first member and second member. 30. The bracket of claim 29 wherein threading the screws through the fasteners and tightening the screws cause heads of the screws to engage the seam and create the first two or more deformations and the second one or more deformations in the roof panel seam. 31. The bracket of claim 2, further comprising a lip extending from the first member into the space, said lip configured for insertion under a portion of the roof panel seam. 32. The bracket of claim 28, further comprising a lip extending from the first member into the space, said lip configured for insertion under a portion of the roof panel seam. 33. A roof mounting bracket for securing accessories to seamed panel roof systems, the bracket comprising:
a first member, the first member having coupled thereto two or more first projections to be disposed on first side of a roof panel seam; a second member opposite the first member, the second member having coupled thereto an extrusion portion having one or more second projections, wherein the second one or more projections are positioned opposite the spaces between the first projections; wherein engaging the first two or more projections to the first side of a roof panel seam of a roof panel creates first two or more deformations in the roof panel seam; and wherein engaging the second one or more projections to the opposite side of the roof panel seam creates a second one or more deformations in the roof panel seam in the spaces between the first deformations, creating a generally wave-shaped distortion of the roof panel seam. 34. The bracket of claim 33 wherein the top of first member and top of second member are attached to a third member, defining a generally U-shaped bracket wherein the two or more first projections and the one or more second projections extend into the space defined by the first member, the second member and the third member, and wherein the space is configured to receive the seam. 35. The bracket of claim 34 wherein the projections comprise screws, and the screws are coupled to first member and second member by fasteners formed in first member and second member. 36. A roof mounting bracket for securing accessories to seamed panel roof systems, the bracket comprising:
a first member, the first member having coupled thereto two or more first projections to be disposed on first side of a roof panel seam; a second member opposite the first member, the second member having coupled thereto an extrusion portion having one or more second projections, wherein the second one or more projections are positioned opposite the spaces between the first projections, the second member further comprising two or more divots positioned opposition the two or more first projections; wherein engaging the first two or more projections to the first side of a roof panel seam creates first two or more deformations in the roof panel seam, and wherein the deformations are recessed into the divots; and wherein engaging the second one or more projections to the opposite side of the roof panel seam creates a second one or more deformations in the roof panel seam in the spaces between the first deformations, creating a generally wave-shaped distortion of the roof panel seam. 37. The bracket of claim 36 wherein the top of first member and top of second member are attached to a third member, defining a generally U-shaped bracket wherein the two or more first projections and the one or more second projections extend into the space defined by the first member, the second member and the third member, and wherein the space is configured to receive the roof panel seam. 38. The bracket of claim 37 wherein the projections comprise screws, and the screws are coupled to first member and second member by fasteners formed in first member and second member. | A roof mounting bracket is disclosed which creates a deformation in a roof panel seam using opposing set points. In a preferred embodiment, a generally U-shaped bracket includes two or more threaded fasteners in a first arm of the bracket and one or more opposing threaded fasteners in the second arm. Void in bracket is placed over the panel seam, with the first arm on a first side of the seam and the second arm on the opposite side of the seam. First screws inserted into the fasteners in first arm pass through the first arm and the first screw heads contact the first side of the seam, slightly engaging the seam and creating first deformations in the seam as the set screws are tightened. Second screws inserted into the fasteners in the second arm pass through the second arm and the second screw heads contact the second side of the seam in the spaces between the first deformations on the opposite side of the seam, engaging the seam and creating second deformations in the seam as the second screws are tightened. The opposing contact points create a “wave” deformation in the seam, securing the bracket to the seam. The opposing set points of the present invention allow secure attachment of the bracket to the seam without having to “dimple” or dent the panel seam using a single set screw, requiring less force by the user. Bracket can include varying numbers of opposing fasteners in first and second arms for varying numbers of opposing set points. In an alternative embodiment, bracket can further comprise divots into which first deformations are recesses to create a deeper “wave” the seam for stronger attachment to seam.1. A roof mounting bracket for securing accessories to seamed panel roof systems, the bracket comprising:
a first member, the first member having coupled thereto two or more first projections to be disposed on first side of a roof panel seam; a second member disposed opposite the first member on the opposite side of the panel roof seam, the second member having one or more second projections, wherein the second one or more projections are positioned opposite the spaces between the first projections of the first member; wherein engaging the first two or more projections to the first side of a seam of a roof panel creates first two or more deformations in the seam; and wherein engaging the second one or more projections to the opposite side of the roof panel seam creates a second one or more deformations in the roof panel seam in the spaces between the first deformations, creating a generally wave-shaped distortion of the roof panel seam. 2. The bracket of claim 1 wherein the top of first member and top of second member are attached to a third member, defining a generally U-shaped bracket wherein the two or more first projections and the one or more second projections extend into the space defined by the first member, the second member and the third member, and wherein the space is configured to receive the roof panel seam. 3. The bracket of claim 2 wherein the projections comprise screws, and the screws are coupled to first member and second member by threads formed in first member and second member. 4. The bracket of claim 3 wherein threading the screws through the fasteners and tightening the screws cause heads of the screws to engage the seam and create the first two or more deformations and the second one or more deformations in the roof panel seam. 5. The bracket of claim 2 further comprising a notch in third member for aligning roof panel seam within space. 6. The bracket of claim 1 wherein the bracket is comprise of aluminum. 7. The bracket of claim 1 wherein the bracket is comprised of brass. 8. The bracket of claim 1 wherein the third member comprises one or more fasteners for securing a roof accessory thereto. 9. The bracket of claim 8 wherein the roof accessory comprises a snow barricade mounting system. 10. The bracket of claim 8 wherein the roof accessory comprises a solar panel mounting system. 11. The bracket of claim 8 wherein the roof accessory comprises a signage mounting system. 12. The bracket of claim 8 wherein the roof accessory comprises a lightening protection system. 13. The bracket of claim 1 wherein the first two or more projections are knobs coupled to first member, and the second one or more projections are first screws coupled to second member by threads formed in second member. 14. The bracket of claim 13 further comprising an attaching means for securing first member to second member, and wherein first member and second member define a channel configured to receive the roof panel seam when secured together. 15. The bracket of claim 14 wherein securing first member to second member causes the knobs of the first member to engage the seam and create the first two or more deformations, and wherein threading the first screws through the fasteners and tightening the screws cause the heads of the first screws to engage the seam and create the second one or more deformations in the roof panel seam. 16. The bracket of claim 14 wherein the attaching means are comprised of one or more pairs of fasteners formed in the first member and the second member and further comprised of second screws threaded through fasteners in the first member and the second member. 17. The bracket of claim 13 further comprising a notch in second member at the top of the channel for aligning roof panel seam within space. 18. The bracket of claim 13 wherein the bracket is aluminum. 19. The bracket of claim 13 wherein the bracket is brass. 20. The bracket of claim 13 wherein the bracket is zinc. 21. The bracket of claim 13 wherein the first member comprises one or more fasteners for securing a roof accessory thereto. 22. The bracket of claim 21 wherein the roof accessory comprises a snow barricade mounting system. 23. The bracket of claim 21 wherein the roof accessory comprises a solar panel mounting system. 24. The bracket of claim 21 wherein the roof accessory comprises a signage mounting system. 25. The bracket of claim 21 wherein the roof accessory comprises a lightening protection system. 26. A roof mounting bracket for securing accessories to seamed panel roof systems, the bracket comprising:
a first member, the first member having coupled thereto two or more first projections to be disposed on first side of a roof panel seam; a second member disposed opposite the first member on the opposite side of the panel roof seam, the second member having one or more second projections, wherein the second one or more projections are positioned opposite the spaces between the first projections of the first member; a third member, wherein the first, second and third members define a generally U-shaped bracket wherein the two or more first projections and the one or more second projections extend into the space defined by the first member, the second member and the third member; wherein engaging the first two or more projections to the first side of a seam of a roof panel creates first two or more deformations in the seam; and wherein engaging the second one or more projections to the opposite side of the roof panel seam creates a second one or more deformations in the roof panel seam in the spaces between the first deformations, creating a generally wave-shaped distortion of the roof panel seam. 27. A roof mounting bracket for securing accessories to seamed panel roof systems, the bracket comprising:
a first member, the first member having coupled thereto two or more first projections to be disposed on first side of a roof panel seam; a second member disposed opposite the first member on the opposite side of the panel roof seam, the second member having one or more second projections, wherein the second one or more projections are positioned opposite the spaces between the first projections of the first member, the second member further comprising two or more divots positioned opposition the two or more first projections; wherein engaging the first two or more projections to the first side of a seam of a roof panel creates first two or more deformations in the seam, and wherein the deformations are recessed into the divots; and wherein engaging the second one or more projections to the opposite side of the roof panel seam creates a second one or more deformations in the roof panel seam in the spaces between the first deformations, creating a generally wave-shaped distortion of the roof panel seam. 28. The bracket of claim 27 wherein the top of first member and top of second member are attached to a third member, defining a generally U-shaped bracket wherein the two or more first projections and the one or more second projections extend into the space defined by the first member, the second member and the third member, and wherein the space is configured to receive the roof panel seam. 29. The bracket of claim 28 wherein the projections comprise screws, and the screws are coupled to first member and second member by fasteners formed in first member and second member. 30. The bracket of claim 29 wherein threading the screws through the fasteners and tightening the screws cause heads of the screws to engage the seam and create the first two or more deformations and the second one or more deformations in the roof panel seam. 31. The bracket of claim 2, further comprising a lip extending from the first member into the space, said lip configured for insertion under a portion of the roof panel seam. 32. The bracket of claim 28, further comprising a lip extending from the first member into the space, said lip configured for insertion under a portion of the roof panel seam. 33. A roof mounting bracket for securing accessories to seamed panel roof systems, the bracket comprising:
a first member, the first member having coupled thereto two or more first projections to be disposed on first side of a roof panel seam; a second member opposite the first member, the second member having coupled thereto an extrusion portion having one or more second projections, wherein the second one or more projections are positioned opposite the spaces between the first projections; wherein engaging the first two or more projections to the first side of a roof panel seam of a roof panel creates first two or more deformations in the roof panel seam; and wherein engaging the second one or more projections to the opposite side of the roof panel seam creates a second one or more deformations in the roof panel seam in the spaces between the first deformations, creating a generally wave-shaped distortion of the roof panel seam. 34. The bracket of claim 33 wherein the top of first member and top of second member are attached to a third member, defining a generally U-shaped bracket wherein the two or more first projections and the one or more second projections extend into the space defined by the first member, the second member and the third member, and wherein the space is configured to receive the seam. 35. The bracket of claim 34 wherein the projections comprise screws, and the screws are coupled to first member and second member by fasteners formed in first member and second member. 36. A roof mounting bracket for securing accessories to seamed panel roof systems, the bracket comprising:
a first member, the first member having coupled thereto two or more first projections to be disposed on first side of a roof panel seam; a second member opposite the first member, the second member having coupled thereto an extrusion portion having one or more second projections, wherein the second one or more projections are positioned opposite the spaces between the first projections, the second member further comprising two or more divots positioned opposition the two or more first projections; wherein engaging the first two or more projections to the first side of a roof panel seam creates first two or more deformations in the roof panel seam, and wherein the deformations are recessed into the divots; and wherein engaging the second one or more projections to the opposite side of the roof panel seam creates a second one or more deformations in the roof panel seam in the spaces between the first deformations, creating a generally wave-shaped distortion of the roof panel seam. 37. The bracket of claim 36 wherein the top of first member and top of second member are attached to a third member, defining a generally U-shaped bracket wherein the two or more first projections and the one or more second projections extend into the space defined by the first member, the second member and the third member, and wherein the space is configured to receive the roof panel seam. 38. The bracket of claim 37 wherein the projections comprise screws, and the screws are coupled to first member and second member by fasteners formed in first member and second member. | 3,600 |
13,430 | 13,430 | 14,956,561 | 3,628 | A method and apparatus for export control includes providing input for an invoice to a computer device. The invoice is for a sale or potential sale of at least one of goods and services. A computer device determines whether at least one of a customer, location for receipt of goods, and location for receipt of services is associated with an embargo state. The computer device blocks any portion of the invoice determined to be associated with an embargo state. The computer device determines if the at least one of goods and services requires at least one export license or other permission for exporting the at least one of goods and services. The computer device assigns permissions that are available. The computer device also communicates or identifies any permission or export license that is needed to be requested to initiate a permission or export license request for that export license or permission. | 1-20. (canceled) 21. A method of providing export control comprising:
providing input for an order to a computer device having non-transitory memory and a processor connected to the memory, the order comprising a sale or potential sale of at least one of goods and services; the computer device identifying all receiver countries associated with the order to account for an entire supply chain associated with the order, the receiver countries comprising intermediate receiving countries and final destination countries for the order; the computer device determining whether at least one of a customer, location for receipt of goods, and location for receipt of services is associated with an embargo state based on the identified receiver countries; the computer device blocking a first portion of the order determined to be associated with an embargo state by removing that first portion of the order associated with the embargo state; the computer device determining whether the at least one of goods and services requires at least one export license or other permission for exporting the at least one of goods and services; the computer device automatically assigning permissions or export licenses that are available; the computer device communicating or identifying any permission or export license that is needed to be requested to initiate a permission or export license request for that export license or permission; and the computer device blocking a second portion of the order upon a determination that all necessary permissions and necessary export licenses are not assigned to the second portion of the order; wherein the blocking of the second portion of the order upon the determination that all necessary permissions and necessary export licenses are not assigned to the second portion of the order comprises deleting or voiding the second portion of the order that does not have all necessary permissions and necessary export licenses and communicating information identifying all necessary permissions and necessary export licenses needed for the blocked second portion of the order based on results from a root cause analysis of the order for communicating the information to a user via at least one of a display device and a printer. 22. The method of claim 21 further comprising:
the computer device determining whether at least one contract partner is associated with any of the at least one of goods and services and wherein the computer device is a computer system. 23. The method of claim 22 further comprising:
for each contract partner determined to be associated with any of the at least one goods and services, determining whether any additional permission is available for that contract partner and determining whether any additional export license is available for that contract partner. 24. The method of claim 23 wherein the second portion of the order missing the assignment of all necessary permissions and necessary export licenses is only a subpart of the order and is not the whole order; and
the computer device is comprised of at least one of a permissions device, an advanced warning verification device, a contract partner assessment device, an exportable location determination device, an export license device, and a product identifier determination device configured to determine export control numbers for the at least one of goods and services. 25. The method of claim 21 wherein the blocking of the second portion of the order upon the determination that all necessary permissions and necessary export licenses are not assigned to the second portion of the order also comprises communicating that the second portion of the order should be blocked to a user of the computer device. 26. The method of claim 21 further comprising:
after the computer device assigns the permissions or export licenses that are available, the computer device evaluating the order by running a root cause analysis of the order to determine any permission or export license that is needed for that order; and
wherein the at least one of goods and services is comprised of at least one of military goods, military services, civil goods and civil services. 27. The method of claim 21 wherein the second portion of the order missing the assignment of all necessary permissions and necessary export licenses is only a subpart of the order and is not the whole order; and
the blocking voids the second portion of the order to prevent delivery of the second portion of the order and the method further comprises:
removing items from the order associated with the blocked second portion of the order to which no necessary permissions and export licenses are available so that the order has all necessary permissions and necessary export licenses. 28. A computer system comprising:
a computer device connected to a product identifier determination device, an export license device, an exportable location determination device, a permissions device, and a contract partner assessment device, the computer device having non-transitory memory and a processor connected to the memory; the product identifier determination device configured to determine export product identifiers for at least one of products and services identified in an order; the export license device configured to identify export licenses required for exporting at least one of products and services identified in the order; the exportable location determination device configured to determine a location of each and every receiver that receives at least one of products and services identified in the order for exporting of the at least one of products and services identified in the order, the receiver comprising at least one intermediate receiver and at least one final destination receiver; the permissions device configured to automatically assign at least one of permissions and export licenses to at least a portion of the order; the contract partner assessment device configured to determine whether any contract partner is identified in the order and determine any permissions that are required for exporting the at least one of products and services identified in the order; the computer device configured to permit the order when all necessary permissions and necessary export licenses are assigned to the order; and the computer device configured to block a first portion of the order when all necessary permissions and necessary export licenses are not assigned to the first portion of the order such that the first portion of the order that does not have all necessary permissions and necessary export licenses is deleted or voided and the computer device configured to communicate information via at least one of a printer and a display device connected to the computer device, the communicated information identifying all necessary permissions and necessary export licenses needed for the blocked first portion of the order based on results of a root cause analysis of the order performed by the computer device. 29. The system of claim 28 wherein the product identifier determination device is connected to the permissions device, the export license device is connected to the permissions device, the exportable location determination device is connected to the permissions device, and the subcontractor assessment device is connected to the permissions device. 30. The system of claim 28 wherein the computer device is connected to the product identifier determination device via a network connection, the computer device is connected to the export license device via a network connection, the computer device is connected to the exportable location determination device via a network connection, the permissions device is connected to the computer device via a network connection, and the computer device is connected to the subcontractor assessment device via a network connection. 31. The system of claim 28 wherein the first portion of the order is a subpart of the order and is not the whole order; and
the product identifier determination device, the export license device, the exportable location determination device, the permissions device, and the subcontractor assessment device are interconnected modules. 32. A communication system comprising:
a computer device connected to a product identifier determination device, an export license device, an exportable location determination device, a permissions device, and a contract partner assessment device, the computer device having non-transitory memory and a processor connected to the memory; the computer device connected to at least one input device to receive user input, the user input comprising at least one of order data for an order and an order identifier for the order; the product identifier determination device configured to automatically determine export product identifiers for at least one of products and services identified in the order; the export license device configured to automatically identify export licenses required for exporting at least one of products and services identified in the order; the exportable location determination device configured to automatically determine a location of each and every receiver that receives at least one of products and services identified in the order for exporting of the at least one of products and services identified in the order to account for an entirety of a supply chain for the order; the contract partner assessment device configured to automatically determine whether any contract partner is identified in the order and for each identified contract partner and determine whether at least one of permissions and export licenses are available via the contract partner; the permissions device configured to automatically assign at least one of permissions and export licenses to at least a portion of the order; the computer device configured to automatically determine whether any receiver is associated with an embargo state to block at least a first portion of the order to which at least one of product and services are deliverable to a receiver when that receiver is associated with the embargo state to remove that portion of the order and to not block a receiver when that receiver is not associated with an embargo state; the computer device configured to permit the order when all necessary permissions and necessary export licenses are assigned to the order; and the computer device configured to automatically block a second portion of the order when all necessary permissions and necessary export licenses are not assigned to the second portion of the order such that the second portion of the order that does not have all necessary permissions and necessary export licenses is deleted or voided and communicating information identifying all necessary permissions and necessary export licenses needed for the blocked second portion of the order via at least one of a display device and a printer, the communicated information being based on a root cause analysis of the order performed by the computer device. 33. The system of claim 32 wherein the product identifier determination device is connected to the permissions device, the export license device is connected to the permissions device, the exportable location determination device is connected to the permissions device, and the contract partner assessment device is connected to the permissions device. 34. The system of claim 32 wherein the computer device is connected to the product identifier determination device via a network connection, the computer device is connected to the export license device via a network connection, the computer device is connected to the exportable location determination device via a network connection, the permissions device is connected to the computer device via a network connection, and the computer device is connected to the contract partner assessment device via a network connection. 35. The system of claim 32 wherein the product identifier determination device, the export license device, the exportable location determination device, the permissions device, and the subcontractor assessment device are interconnected modules and wherein the communicating of the information occurs by the computer device causing the information to be displayed on the display device for a user of the computer device. 36. The system of claim 32 further comprising an advanced warning verification device connected to at least one of the computer device and the product identifier determination device; and
the second portion of the order is a subpart of the order and is not the whole order; and
the blocking voids the second portion of the order and the blocking performed by the computer device also comprises removing items from the order associated with the blocked second portion of the order so that the order is modified to have all necessary permissions and necessary export licenses. 37. An apparatus to provide export control comprising:
a first computer device and a second computer device connected to the first computer device, the first computer device having a processor connected to non-transitory memory, the second computer device having a processor connected to non-transitory memory; the first computer device configured to determine export product identifiers for at least one of products and services identified in an order and determine whether the order impermissibly includes at least one embargo related entity based on all receivers of the products and services of the order, the receivers comprising at least one intermediate receiver and at least one final receiver; the second computer device having a plurality of tables stored in the memory of the second computer device; the second computer device configured to determine a location of each and every receiver that receives at least one of products and services identified in the order to account for an entirety of a supply chain for exporting of the products and services identified in the order, the second computer device configured to identify export licenses required for exporting the products and services identified in the order and automatically assign at least one of permissions and export licenses to at least a portion of the order; and the second computer device configured to block a first portion of the order upon a determination that all necessary permissions and necessary export licenses are not assigned to the first portion of the order such that the first portion of the order is voided or deleted and the apparatus being configured to communicate information via at least one of a printer and a display device connected to the apparatus, the communicated information identifying all necessary permissions and necessary export licenses needed for the blocked first portion of the order based on results of a root cause analysis of the order performed by the apparatus; and the second computer device configured to not block the order when all necessary permissions and necessary export licenses are assigned to the order. 38. The apparatus of claim 37 wherein the second computer device has an assessor that determines whether any contract partner is identified in the order and for each identified contract partner, determines whether at least one of permissions and export licenses are available via the contract partner. 39. The apparatus of claim 38 wherein the first portion of the order is a subpart of an invoice and is not a whole invoice; and
wherein the blocking voids the subpart of the invoice and the blocking performed by the assessor results in removal of items from the order associated with the blocked subpart to which no necessary permissions and export licenses are available so that the order is modified to have all necessary permissions and necessary export licenses; and
the tables are comprised of a country list table, an embargo list table, a table of available licenses, and a table of available licenses via at least one contract partner. 40. The apparatus of claim 38 wherein the assessor communicates that the first portion of the order that does not have all the necessary permissions and necessary export licenses should be blocked to a user of the apparatus. | A method and apparatus for export control includes providing input for an invoice to a computer device. The invoice is for a sale or potential sale of at least one of goods and services. A computer device determines whether at least one of a customer, location for receipt of goods, and location for receipt of services is associated with an embargo state. The computer device blocks any portion of the invoice determined to be associated with an embargo state. The computer device determines if the at least one of goods and services requires at least one export license or other permission for exporting the at least one of goods and services. The computer device assigns permissions that are available. The computer device also communicates or identifies any permission or export license that is needed to be requested to initiate a permission or export license request for that export license or permission.1-20. (canceled) 21. A method of providing export control comprising:
providing input for an order to a computer device having non-transitory memory and a processor connected to the memory, the order comprising a sale or potential sale of at least one of goods and services; the computer device identifying all receiver countries associated with the order to account for an entire supply chain associated with the order, the receiver countries comprising intermediate receiving countries and final destination countries for the order; the computer device determining whether at least one of a customer, location for receipt of goods, and location for receipt of services is associated with an embargo state based on the identified receiver countries; the computer device blocking a first portion of the order determined to be associated with an embargo state by removing that first portion of the order associated with the embargo state; the computer device determining whether the at least one of goods and services requires at least one export license or other permission for exporting the at least one of goods and services; the computer device automatically assigning permissions or export licenses that are available; the computer device communicating or identifying any permission or export license that is needed to be requested to initiate a permission or export license request for that export license or permission; and the computer device blocking a second portion of the order upon a determination that all necessary permissions and necessary export licenses are not assigned to the second portion of the order; wherein the blocking of the second portion of the order upon the determination that all necessary permissions and necessary export licenses are not assigned to the second portion of the order comprises deleting or voiding the second portion of the order that does not have all necessary permissions and necessary export licenses and communicating information identifying all necessary permissions and necessary export licenses needed for the blocked second portion of the order based on results from a root cause analysis of the order for communicating the information to a user via at least one of a display device and a printer. 22. The method of claim 21 further comprising:
the computer device determining whether at least one contract partner is associated with any of the at least one of goods and services and wherein the computer device is a computer system. 23. The method of claim 22 further comprising:
for each contract partner determined to be associated with any of the at least one goods and services, determining whether any additional permission is available for that contract partner and determining whether any additional export license is available for that contract partner. 24. The method of claim 23 wherein the second portion of the order missing the assignment of all necessary permissions and necessary export licenses is only a subpart of the order and is not the whole order; and
the computer device is comprised of at least one of a permissions device, an advanced warning verification device, a contract partner assessment device, an exportable location determination device, an export license device, and a product identifier determination device configured to determine export control numbers for the at least one of goods and services. 25. The method of claim 21 wherein the blocking of the second portion of the order upon the determination that all necessary permissions and necessary export licenses are not assigned to the second portion of the order also comprises communicating that the second portion of the order should be blocked to a user of the computer device. 26. The method of claim 21 further comprising:
after the computer device assigns the permissions or export licenses that are available, the computer device evaluating the order by running a root cause analysis of the order to determine any permission or export license that is needed for that order; and
wherein the at least one of goods and services is comprised of at least one of military goods, military services, civil goods and civil services. 27. The method of claim 21 wherein the second portion of the order missing the assignment of all necessary permissions and necessary export licenses is only a subpart of the order and is not the whole order; and
the blocking voids the second portion of the order to prevent delivery of the second portion of the order and the method further comprises:
removing items from the order associated with the blocked second portion of the order to which no necessary permissions and export licenses are available so that the order has all necessary permissions and necessary export licenses. 28. A computer system comprising:
a computer device connected to a product identifier determination device, an export license device, an exportable location determination device, a permissions device, and a contract partner assessment device, the computer device having non-transitory memory and a processor connected to the memory; the product identifier determination device configured to determine export product identifiers for at least one of products and services identified in an order; the export license device configured to identify export licenses required for exporting at least one of products and services identified in the order; the exportable location determination device configured to determine a location of each and every receiver that receives at least one of products and services identified in the order for exporting of the at least one of products and services identified in the order, the receiver comprising at least one intermediate receiver and at least one final destination receiver; the permissions device configured to automatically assign at least one of permissions and export licenses to at least a portion of the order; the contract partner assessment device configured to determine whether any contract partner is identified in the order and determine any permissions that are required for exporting the at least one of products and services identified in the order; the computer device configured to permit the order when all necessary permissions and necessary export licenses are assigned to the order; and the computer device configured to block a first portion of the order when all necessary permissions and necessary export licenses are not assigned to the first portion of the order such that the first portion of the order that does not have all necessary permissions and necessary export licenses is deleted or voided and the computer device configured to communicate information via at least one of a printer and a display device connected to the computer device, the communicated information identifying all necessary permissions and necessary export licenses needed for the blocked first portion of the order based on results of a root cause analysis of the order performed by the computer device. 29. The system of claim 28 wherein the product identifier determination device is connected to the permissions device, the export license device is connected to the permissions device, the exportable location determination device is connected to the permissions device, and the subcontractor assessment device is connected to the permissions device. 30. The system of claim 28 wherein the computer device is connected to the product identifier determination device via a network connection, the computer device is connected to the export license device via a network connection, the computer device is connected to the exportable location determination device via a network connection, the permissions device is connected to the computer device via a network connection, and the computer device is connected to the subcontractor assessment device via a network connection. 31. The system of claim 28 wherein the first portion of the order is a subpart of the order and is not the whole order; and
the product identifier determination device, the export license device, the exportable location determination device, the permissions device, and the subcontractor assessment device are interconnected modules. 32. A communication system comprising:
a computer device connected to a product identifier determination device, an export license device, an exportable location determination device, a permissions device, and a contract partner assessment device, the computer device having non-transitory memory and a processor connected to the memory; the computer device connected to at least one input device to receive user input, the user input comprising at least one of order data for an order and an order identifier for the order; the product identifier determination device configured to automatically determine export product identifiers for at least one of products and services identified in the order; the export license device configured to automatically identify export licenses required for exporting at least one of products and services identified in the order; the exportable location determination device configured to automatically determine a location of each and every receiver that receives at least one of products and services identified in the order for exporting of the at least one of products and services identified in the order to account for an entirety of a supply chain for the order; the contract partner assessment device configured to automatically determine whether any contract partner is identified in the order and for each identified contract partner and determine whether at least one of permissions and export licenses are available via the contract partner; the permissions device configured to automatically assign at least one of permissions and export licenses to at least a portion of the order; the computer device configured to automatically determine whether any receiver is associated with an embargo state to block at least a first portion of the order to which at least one of product and services are deliverable to a receiver when that receiver is associated with the embargo state to remove that portion of the order and to not block a receiver when that receiver is not associated with an embargo state; the computer device configured to permit the order when all necessary permissions and necessary export licenses are assigned to the order; and the computer device configured to automatically block a second portion of the order when all necessary permissions and necessary export licenses are not assigned to the second portion of the order such that the second portion of the order that does not have all necessary permissions and necessary export licenses is deleted or voided and communicating information identifying all necessary permissions and necessary export licenses needed for the blocked second portion of the order via at least one of a display device and a printer, the communicated information being based on a root cause analysis of the order performed by the computer device. 33. The system of claim 32 wherein the product identifier determination device is connected to the permissions device, the export license device is connected to the permissions device, the exportable location determination device is connected to the permissions device, and the contract partner assessment device is connected to the permissions device. 34. The system of claim 32 wherein the computer device is connected to the product identifier determination device via a network connection, the computer device is connected to the export license device via a network connection, the computer device is connected to the exportable location determination device via a network connection, the permissions device is connected to the computer device via a network connection, and the computer device is connected to the contract partner assessment device via a network connection. 35. The system of claim 32 wherein the product identifier determination device, the export license device, the exportable location determination device, the permissions device, and the subcontractor assessment device are interconnected modules and wherein the communicating of the information occurs by the computer device causing the information to be displayed on the display device for a user of the computer device. 36. The system of claim 32 further comprising an advanced warning verification device connected to at least one of the computer device and the product identifier determination device; and
the second portion of the order is a subpart of the order and is not the whole order; and
the blocking voids the second portion of the order and the blocking performed by the computer device also comprises removing items from the order associated with the blocked second portion of the order so that the order is modified to have all necessary permissions and necessary export licenses. 37. An apparatus to provide export control comprising:
a first computer device and a second computer device connected to the first computer device, the first computer device having a processor connected to non-transitory memory, the second computer device having a processor connected to non-transitory memory; the first computer device configured to determine export product identifiers for at least one of products and services identified in an order and determine whether the order impermissibly includes at least one embargo related entity based on all receivers of the products and services of the order, the receivers comprising at least one intermediate receiver and at least one final receiver; the second computer device having a plurality of tables stored in the memory of the second computer device; the second computer device configured to determine a location of each and every receiver that receives at least one of products and services identified in the order to account for an entirety of a supply chain for exporting of the products and services identified in the order, the second computer device configured to identify export licenses required for exporting the products and services identified in the order and automatically assign at least one of permissions and export licenses to at least a portion of the order; and the second computer device configured to block a first portion of the order upon a determination that all necessary permissions and necessary export licenses are not assigned to the first portion of the order such that the first portion of the order is voided or deleted and the apparatus being configured to communicate information via at least one of a printer and a display device connected to the apparatus, the communicated information identifying all necessary permissions and necessary export licenses needed for the blocked first portion of the order based on results of a root cause analysis of the order performed by the apparatus; and the second computer device configured to not block the order when all necessary permissions and necessary export licenses are assigned to the order. 38. The apparatus of claim 37 wherein the second computer device has an assessor that determines whether any contract partner is identified in the order and for each identified contract partner, determines whether at least one of permissions and export licenses are available via the contract partner. 39. The apparatus of claim 38 wherein the first portion of the order is a subpart of an invoice and is not a whole invoice; and
wherein the blocking voids the subpart of the invoice and the blocking performed by the assessor results in removal of items from the order associated with the blocked subpart to which no necessary permissions and export licenses are available so that the order is modified to have all necessary permissions and necessary export licenses; and
the tables are comprised of a country list table, an embargo list table, a table of available licenses, and a table of available licenses via at least one contract partner. 40. The apparatus of claim 38 wherein the assessor communicates that the first portion of the order that does not have all the necessary permissions and necessary export licenses should be blocked to a user of the apparatus. | 3,600 |
13,431 | 13,431 | 15,007,837 | 3,684 | A method includes receiving a request to verify a dynamic security code included in a transaction authorization request message. The transaction authorization request message was generated in connection with a payment account transaction. The method further includes performing a verification process with respect to the dynamic security code to generate a verification result. In addition, the transaction authorization request message may be modified by adding the verification result to the transaction authorization request message. Also, the modified transaction authorization request message may be transmitted to an issuer of a payment account designated for use in the payment account transaction. | 1. A method comprising:
receiving a request to verify a dynamic security code included in a transaction authorization request message, the transaction authorization request message generated in connection with a payment account transaction; performing a verification process with respect to the dynamic security code to generate a verification result; modifying the transaction authorization request message by adding the verification result to the transaction authorization request message; and transmitting the modified transaction authorization request message to an issuer of a payment account designated for use in the payment account transaction. 2. The method of claim 1, wherein receiving said request to verify includes receiving said dynamic security code and a PAN (primary account number) that identifies the designated payment account. 3. The method of claim 1, wherein the transmitting modified transaction authorization request message includes transmitting a static security code associated with the designated payment account. 4. The method of claim 3, wherein the transmitted modified transaction authorization request message does not include the dynamic security code. 5. The method of claim 1, wherein the dynamic security code consists of a three or four digit number. 6. The method of claim 1, wherein the verification process includes comparing the dynamic security code with a parallel-generated current dynamic security code and a parallel-generated previous dynamic security code, said parallel-generated current dynamic security code and said parallel-generated previous dynamic security code adjacent to each other in a sequence of parallel-generated dynamic security codes parallel-generated for the designated payment account. 7. The method of claim 1, further comprising:
making a determination as to approving or declining the payment account transaction based at least in part on said verification result. 8. The method of claim 7, wherein the determination as to approving or declining is made in a case where the issuer fails to respond to the transmitting step. 9. The method of claim 8, wherein the determination is made based at least in part on at least one rule pre-defined by the issuer prior to the payment account transaction. 10. The method of claim 1, further comprising:
receiving a transaction authorization response message from the issuer in response to the transmitted modified transaction authorization request message. 11. The method of claim 10, further comprising:
transmitting the transaction authorization response message to a transaction acquirer, the transmitted transaction authorization response message not including the verification result. 12. A method comprising:
receiving a transaction authorization request message in a computer operated by an operator of a payment network; detecting, in said computer, that the received transaction authorization request message includes a dynamic security code; and in response to a result of the detecting step, transmitting a request to verify the dynamic security code. 13. The method of claim 12, wherein the detecting is based on an account number range that corresponds to a payment account number included in the received transaction authorization request message. 14. The method of claim 12, wherein the dynamic security code consists of a three or four digit number. 15. An apparatus comprising:
a processor; and a memory in communication with the processor and storing program instructions, the processor operative with the program instructions to perform functions as follows:
receiving a request to verify a dynamic security code included in a transaction authorization request message, the transaction authorization request message generated in connection with a payment account transaction;
performing a verification process with respect to the dynamic security code to generate a verification result;
modifying the transaction authorization request message by adding the verification result to the transaction authorization request message; and
transmitting the modified transaction authorization request message to an issuer of a payment account designated for use in the payment account transaction. 16. The apparatus of claim 15, wherein receiving said request to verify includes receiving said dynamic security code and a PAN (primary account number) that identifies the designated payment account. 17. The apparatus of claim 15, wherein the transmitting modified transaction authorization request message includes transmitting a static security code associated with the designated payment account. 18. The apparatus of claim 17, wherein the transmitted modified transaction authorization request message does not include the dynamic security code. 19. The apparatus of claim 15, wherein the dynamic security code consists of a three or four digit number. 20. The apparatus of claim 15, wherein the verification process includes comparing the dynamic security code with a parallel-generated current dynamic security code and a parallel-generated previous dynamic security code, said parallel-generated current dynamic security code and said parallel-generated previous dynamic security code adjacent to each other in a sequence of parallel-generated dynamic security codes parallel-generated for the designated payment account. | A method includes receiving a request to verify a dynamic security code included in a transaction authorization request message. The transaction authorization request message was generated in connection with a payment account transaction. The method further includes performing a verification process with respect to the dynamic security code to generate a verification result. In addition, the transaction authorization request message may be modified by adding the verification result to the transaction authorization request message. Also, the modified transaction authorization request message may be transmitted to an issuer of a payment account designated for use in the payment account transaction.1. A method comprising:
receiving a request to verify a dynamic security code included in a transaction authorization request message, the transaction authorization request message generated in connection with a payment account transaction; performing a verification process with respect to the dynamic security code to generate a verification result; modifying the transaction authorization request message by adding the verification result to the transaction authorization request message; and transmitting the modified transaction authorization request message to an issuer of a payment account designated for use in the payment account transaction. 2. The method of claim 1, wherein receiving said request to verify includes receiving said dynamic security code and a PAN (primary account number) that identifies the designated payment account. 3. The method of claim 1, wherein the transmitting modified transaction authorization request message includes transmitting a static security code associated with the designated payment account. 4. The method of claim 3, wherein the transmitted modified transaction authorization request message does not include the dynamic security code. 5. The method of claim 1, wherein the dynamic security code consists of a three or four digit number. 6. The method of claim 1, wherein the verification process includes comparing the dynamic security code with a parallel-generated current dynamic security code and a parallel-generated previous dynamic security code, said parallel-generated current dynamic security code and said parallel-generated previous dynamic security code adjacent to each other in a sequence of parallel-generated dynamic security codes parallel-generated for the designated payment account. 7. The method of claim 1, further comprising:
making a determination as to approving or declining the payment account transaction based at least in part on said verification result. 8. The method of claim 7, wherein the determination as to approving or declining is made in a case where the issuer fails to respond to the transmitting step. 9. The method of claim 8, wherein the determination is made based at least in part on at least one rule pre-defined by the issuer prior to the payment account transaction. 10. The method of claim 1, further comprising:
receiving a transaction authorization response message from the issuer in response to the transmitted modified transaction authorization request message. 11. The method of claim 10, further comprising:
transmitting the transaction authorization response message to a transaction acquirer, the transmitted transaction authorization response message not including the verification result. 12. A method comprising:
receiving a transaction authorization request message in a computer operated by an operator of a payment network; detecting, in said computer, that the received transaction authorization request message includes a dynamic security code; and in response to a result of the detecting step, transmitting a request to verify the dynamic security code. 13. The method of claim 12, wherein the detecting is based on an account number range that corresponds to a payment account number included in the received transaction authorization request message. 14. The method of claim 12, wherein the dynamic security code consists of a three or four digit number. 15. An apparatus comprising:
a processor; and a memory in communication with the processor and storing program instructions, the processor operative with the program instructions to perform functions as follows:
receiving a request to verify a dynamic security code included in a transaction authorization request message, the transaction authorization request message generated in connection with a payment account transaction;
performing a verification process with respect to the dynamic security code to generate a verification result;
modifying the transaction authorization request message by adding the verification result to the transaction authorization request message; and
transmitting the modified transaction authorization request message to an issuer of a payment account designated for use in the payment account transaction. 16. The apparatus of claim 15, wherein receiving said request to verify includes receiving said dynamic security code and a PAN (primary account number) that identifies the designated payment account. 17. The apparatus of claim 15, wherein the transmitting modified transaction authorization request message includes transmitting a static security code associated with the designated payment account. 18. The apparatus of claim 17, wherein the transmitted modified transaction authorization request message does not include the dynamic security code. 19. The apparatus of claim 15, wherein the dynamic security code consists of a three or four digit number. 20. The apparatus of claim 15, wherein the verification process includes comparing the dynamic security code with a parallel-generated current dynamic security code and a parallel-generated previous dynamic security code, said parallel-generated current dynamic security code and said parallel-generated previous dynamic security code adjacent to each other in a sequence of parallel-generated dynamic security codes parallel-generated for the designated payment account. | 3,600 |
13,432 | 13,432 | 14,090,382 | 3,626 | A system and method for presenting experimentally-determined data relating to a region of interest on a medical patient to a user. A computer memory stores a ROC analysis of historical data for a region of interest of a plurality of different subjects. A computer processor is programmed to compare the experimentally-determined data to historical data based on the ROC analysis of the historical data and identify the experimentally-determined data to be utilized in reaching an at least preliminary conclusion regarding the medical patient. A display device is operatively connected to the computer processor to present a visible display graphically depicting a result of the comparison performed by the processor. | 1. A system for presenting experimentally-determined data relating to a region of interest on a medical patient, the system comprising:
a non-transitory, computer-readable medium storing a receiver operating characteristic analysis of historical data for a region of interest on each of a plurality of different subjects, wherein the region of interest on each of the plurality of different subjects corresponds to the region of interest on the medical patient; a processor programmed to perform a comparison of the experimentally-determined data to the receiver operating characteristic analysis of the historical data stored by the computer-readable medium and identify the experimentally-determined data to be utilized to reach an at least preliminary conclusion regarding the medical patient based on the experimentally-determined data; and a display device operatively connected to the processor to present a visible display graphically depicting a result of the comparison performed by the processor. 2. The system of claim 1, wherein the computer-readable medium stores the receiver operating characteristic analysis of tissue thickness data collected within the region of interest in each of the plurality of different subjects. 3. The system of claim 1, wherein the processor is programmed to utilize a subset of the receiver operating characteristic analysis including historical data of the plurality of different subjects with a desired demographic in common with the medical patient. 4. The system of claim 1, wherein said comparison performed by the processor comprises a comparison of the experimentally-determined data to the receiver operating characteristic analysis of the historical data for a left eye of the plurality of different subjects to the experimentally-determined data for the left eye of the medical patient. 5. The system of claim 1, wherein the processor is programmed to compare the experimentally-determined data to the receiver operating characteristic analysis of the historical data that is weighted based on a number of the plurality of different subjects that contributed to the experimentally-determined data at each of a plurality of spatial locations within the region of interest. 6. The system of claim 1, wherein the processor is programmed to establish a likelihood that the experimentally-determined data by itself at a plurality of different spatial locations is an accurate predictor of whether the medical patient has a medical condition based at least in part on the receiver operating characteristic analysis of the historical data at the plurality of different spatial locations of the plurality of different subjects. 7. The system of claim 6, wherein the processor is programmed to generate a display graphically representing the likelihood as an image lacking alphanumeric characters. 8. A method of presenting experimentally-determined data relating to a region of interest on a medical patient for predicting whether the medical patient has a medical condition, the method comprising:
using a computer processor, accessing a receiver operating characteristic analysis of historical data for the region of interest on each of a plurality of different subjects from a non-transitory computer memory, wherein each of the plurality of different subjects is known as having the medical condition or not having the medical condition when the historical data was collected, and the region of interest on each of the plurality of different subjects corresponds to the region of interest on the medical patient; identifying a subset of spatial locations in the region of interest where the experimentally-determined data is an accurate predictor of the medical condition to be utilized to reach an at least preliminary conclusion regarding the medical patient based on the receiver operating characteristic analysis of the historical data; comparing the experimentally-determined data at the subset of spatial locations of the medical patient to the receiver operating characteristic analysis of the historical data stored by the computer-readable medium; and generating a graphic display to be presented by a display device operatively connected to the computer processor to a user for graphically expressing a result of said comparing. 9. The method of claim 8, wherein said accessing the receiver operating characteristic analysis of historical data comprises selecting an appropriate receiver operating characteristic analysis of historical data collected from a first region of interest of the plurality of different subjects independently of a second region of interest of the plurality of different subjects. 10. The method of claim 9, wherein the first region of interest comprises a left eye of the plurality of different subjects and the second region of interest comprises a right eye of the plurality of different subjects. 11. The method of claim 8 further comprising filtering the plurality of different subjects based on age and limiting the receiver operating characteristic analysis of historical data to the receiver operating characteristic analysis of historical data collected from a subset of the plurality of different subjects with an age that is approximately equal to an age of the medical patient. 12. The method of claim 8, wherein the subset of spatial locations in the region of interest where the experimentally-determined data is an accurate predictor of the medical condition is weighted based on a number of the plurality of different subjects that contributed to the experimentally-determined data within the subset of spatial locations within the region of interest. 13. The method of claim 8, wherein the graphic display comprises an image that is devoid of alphanumeric characters. 14. A method of predicting whether a medical patient comprises a medical condition, the method comprising:
utilizing a computer processor, receiving a measured thickness of tissue at a plurality of spatial locations on an eye of the medical patient; utilizing a receiver operating characteristic analysis of historical tissue thickness data for eyes belonging to a plurality of different subjects that were known as having the medical condition or not having the medical condition when the historical tissue thickness data was collected to identify a subset of the spatial locations where the measured thickness is an accurate predictor of the medical condition; comparing the measured thickness at each location in the subset of the spatial locations to threshold thickness values for each location in the subset of the spatial locations, wherein the threshold thickness values are used to preliminarily distinguish between medical patients with the medical condition and medical patients without the medical condition; and generating an image that graphically represents a result of said comparing and a likelihood that each spatial location within the subset of the spatial locations provides an accurate prediction of whether the medical patient is afflicted with the medical condition to be presented to a user for rendering a preliminary diagnosis. 15. The method of claim 14, wherein, at the plurality of spatial locations on the eye of the medical patient where the measured thickness is determined, the measured thickness is suggestive, but not dispositive of the medical condition. 16. The method of claim 14, wherein the subset of the spatial locations comprises locations within a region extending from a cornea to a retina of the eye. 17. The method of claim 14 further comprising filtering the plurality of different subjects based on age and limiting the receiver operating characteristic analysis of historical data to the receiver operating characteristic analysis of historical data collected from a subset of the plurality of different subjects with an age that is approximately equal to an age of the medical patient. 18. A method of graphically depicting spatial locations within a region of interest that are useful predictors of a medical condition, the method comprising:
receiving clinical data specific to the spatial locations for a plurality of different patients obtained during medical examinations of those patients, wherein the plurality of different patients comprise a plurality of positive patients who have been independently confirmed to have the medical condition and a plurality of negative patients who have been independently confirmed as not having the medical condition; utilizing a computer processor, conducting a receiver operating characteristic analysis of the clinical data; and generating a graphic representation of a result of the receiver operating characteristic analysis for each of the spatial locations, wherein the graphic representation comprises an arrangement of each result of the receiver operating characteristic analysis that reflects the respective arrangement of each of the plurality of different locations of the patients where the clinical data was collected. 19. The method of claim 18, wherein the clinical data comprises a thickness of ocular tissue at the plurality of different locations of an eye of the patients. 20. The method of claim 18 further comprising generating a graphical display comprising an arrangement of current clinical data collected from the different spatial locations on a current patient who is undergoing medical examination to determine whether the current patient is afflicted with the medical condition, wherein the current clinical data is arranged in an arrangement that reflects the arrangement of the result of the receiver operating characteristic analysis for each spatial location. 21. The method of claim 18, wherein said result of the receiver operating characteristic analysis for the spatial locations comprises values reflecting an area under a receiver-operating-characteristic curve for the plurality of different locations. 22. The method of claim 21, wherein the values reflecting an area under a receiver-operating-characteristic curve included as the result of the receiver operating characteristic analysis are represented by a color appearing in locations corresponding to the plurality of different locations where the clinical data was collected. | A system and method for presenting experimentally-determined data relating to a region of interest on a medical patient to a user. A computer memory stores a ROC analysis of historical data for a region of interest of a plurality of different subjects. A computer processor is programmed to compare the experimentally-determined data to historical data based on the ROC analysis of the historical data and identify the experimentally-determined data to be utilized in reaching an at least preliminary conclusion regarding the medical patient. A display device is operatively connected to the computer processor to present a visible display graphically depicting a result of the comparison performed by the processor.1. A system for presenting experimentally-determined data relating to a region of interest on a medical patient, the system comprising:
a non-transitory, computer-readable medium storing a receiver operating characteristic analysis of historical data for a region of interest on each of a plurality of different subjects, wherein the region of interest on each of the plurality of different subjects corresponds to the region of interest on the medical patient; a processor programmed to perform a comparison of the experimentally-determined data to the receiver operating characteristic analysis of the historical data stored by the computer-readable medium and identify the experimentally-determined data to be utilized to reach an at least preliminary conclusion regarding the medical patient based on the experimentally-determined data; and a display device operatively connected to the processor to present a visible display graphically depicting a result of the comparison performed by the processor. 2. The system of claim 1, wherein the computer-readable medium stores the receiver operating characteristic analysis of tissue thickness data collected within the region of interest in each of the plurality of different subjects. 3. The system of claim 1, wherein the processor is programmed to utilize a subset of the receiver operating characteristic analysis including historical data of the plurality of different subjects with a desired demographic in common with the medical patient. 4. The system of claim 1, wherein said comparison performed by the processor comprises a comparison of the experimentally-determined data to the receiver operating characteristic analysis of the historical data for a left eye of the plurality of different subjects to the experimentally-determined data for the left eye of the medical patient. 5. The system of claim 1, wherein the processor is programmed to compare the experimentally-determined data to the receiver operating characteristic analysis of the historical data that is weighted based on a number of the plurality of different subjects that contributed to the experimentally-determined data at each of a plurality of spatial locations within the region of interest. 6. The system of claim 1, wherein the processor is programmed to establish a likelihood that the experimentally-determined data by itself at a plurality of different spatial locations is an accurate predictor of whether the medical patient has a medical condition based at least in part on the receiver operating characteristic analysis of the historical data at the plurality of different spatial locations of the plurality of different subjects. 7. The system of claim 6, wherein the processor is programmed to generate a display graphically representing the likelihood as an image lacking alphanumeric characters. 8. A method of presenting experimentally-determined data relating to a region of interest on a medical patient for predicting whether the medical patient has a medical condition, the method comprising:
using a computer processor, accessing a receiver operating characteristic analysis of historical data for the region of interest on each of a plurality of different subjects from a non-transitory computer memory, wherein each of the plurality of different subjects is known as having the medical condition or not having the medical condition when the historical data was collected, and the region of interest on each of the plurality of different subjects corresponds to the region of interest on the medical patient; identifying a subset of spatial locations in the region of interest where the experimentally-determined data is an accurate predictor of the medical condition to be utilized to reach an at least preliminary conclusion regarding the medical patient based on the receiver operating characteristic analysis of the historical data; comparing the experimentally-determined data at the subset of spatial locations of the medical patient to the receiver operating characteristic analysis of the historical data stored by the computer-readable medium; and generating a graphic display to be presented by a display device operatively connected to the computer processor to a user for graphically expressing a result of said comparing. 9. The method of claim 8, wherein said accessing the receiver operating characteristic analysis of historical data comprises selecting an appropriate receiver operating characteristic analysis of historical data collected from a first region of interest of the plurality of different subjects independently of a second region of interest of the plurality of different subjects. 10. The method of claim 9, wherein the first region of interest comprises a left eye of the plurality of different subjects and the second region of interest comprises a right eye of the plurality of different subjects. 11. The method of claim 8 further comprising filtering the plurality of different subjects based on age and limiting the receiver operating characteristic analysis of historical data to the receiver operating characteristic analysis of historical data collected from a subset of the plurality of different subjects with an age that is approximately equal to an age of the medical patient. 12. The method of claim 8, wherein the subset of spatial locations in the region of interest where the experimentally-determined data is an accurate predictor of the medical condition is weighted based on a number of the plurality of different subjects that contributed to the experimentally-determined data within the subset of spatial locations within the region of interest. 13. The method of claim 8, wherein the graphic display comprises an image that is devoid of alphanumeric characters. 14. A method of predicting whether a medical patient comprises a medical condition, the method comprising:
utilizing a computer processor, receiving a measured thickness of tissue at a plurality of spatial locations on an eye of the medical patient; utilizing a receiver operating characteristic analysis of historical tissue thickness data for eyes belonging to a plurality of different subjects that were known as having the medical condition or not having the medical condition when the historical tissue thickness data was collected to identify a subset of the spatial locations where the measured thickness is an accurate predictor of the medical condition; comparing the measured thickness at each location in the subset of the spatial locations to threshold thickness values for each location in the subset of the spatial locations, wherein the threshold thickness values are used to preliminarily distinguish between medical patients with the medical condition and medical patients without the medical condition; and generating an image that graphically represents a result of said comparing and a likelihood that each spatial location within the subset of the spatial locations provides an accurate prediction of whether the medical patient is afflicted with the medical condition to be presented to a user for rendering a preliminary diagnosis. 15. The method of claim 14, wherein, at the plurality of spatial locations on the eye of the medical patient where the measured thickness is determined, the measured thickness is suggestive, but not dispositive of the medical condition. 16. The method of claim 14, wherein the subset of the spatial locations comprises locations within a region extending from a cornea to a retina of the eye. 17. The method of claim 14 further comprising filtering the plurality of different subjects based on age and limiting the receiver operating characteristic analysis of historical data to the receiver operating characteristic analysis of historical data collected from a subset of the plurality of different subjects with an age that is approximately equal to an age of the medical patient. 18. A method of graphically depicting spatial locations within a region of interest that are useful predictors of a medical condition, the method comprising:
receiving clinical data specific to the spatial locations for a plurality of different patients obtained during medical examinations of those patients, wherein the plurality of different patients comprise a plurality of positive patients who have been independently confirmed to have the medical condition and a plurality of negative patients who have been independently confirmed as not having the medical condition; utilizing a computer processor, conducting a receiver operating characteristic analysis of the clinical data; and generating a graphic representation of a result of the receiver operating characteristic analysis for each of the spatial locations, wherein the graphic representation comprises an arrangement of each result of the receiver operating characteristic analysis that reflects the respective arrangement of each of the plurality of different locations of the patients where the clinical data was collected. 19. The method of claim 18, wherein the clinical data comprises a thickness of ocular tissue at the plurality of different locations of an eye of the patients. 20. The method of claim 18 further comprising generating a graphical display comprising an arrangement of current clinical data collected from the different spatial locations on a current patient who is undergoing medical examination to determine whether the current patient is afflicted with the medical condition, wherein the current clinical data is arranged in an arrangement that reflects the arrangement of the result of the receiver operating characteristic analysis for each spatial location. 21. The method of claim 18, wherein said result of the receiver operating characteristic analysis for the spatial locations comprises values reflecting an area under a receiver-operating-characteristic curve for the plurality of different locations. 22. The method of claim 21, wherein the values reflecting an area under a receiver-operating-characteristic curve included as the result of the receiver operating characteristic analysis are represented by a color appearing in locations corresponding to the plurality of different locations where the clinical data was collected. | 3,600 |
13,433 | 13,433 | 14,515,280 | 3,622 | An advertising and rewarding system, method, and process are provided. Among its various embodiments and enabling features, an embodiment may guarantee a lower price for an item of interest than what a consumer is willing or committed to pay. | 1. A computer-implemented method for advertising, the method comprising, by a computer system:
associating in a database a first price with an item; presenting to a user an indication of the item and an indication of the first price; associating in the database the user with an account; determining a first amount based at least in part on the first price, wherein the first amount is equal to or more than the first price; associating a second price with the item, wherein the second price is lower than the first price; receiving a commitment to pay for the first amount, wherein the second price is not disclosed to the user; determining a second amount based at least in part on the second price, wherein the second amount is equal to or more than the second price; determining a credit based at least in part on the first amount and the second amount; and associating in the database the credit with the account. 2. The method of claim 1, wherein:
receiving a commitment to pay the first amount comprises receiving a payment to account for the first amount; presenting to the user the indication of the item and the indication of the first price comprises presenting to the user the indication of the item, the indication of the first price, and an indication of a lower price, wherein the lower price is not revealed; and associating the second price with the item comprises associating in the database a percentage with the item, whereby the second price may be determined based on the percentage and the first price. 3. The method of claim 1, further comprising:
presenting to a second user an indication of the item and an indication of the first price; associating in the database a second account with the second user; receiving a commitment to pay for the first amount from the second user, wherein the second user does not know the second price; and associating in the database the credit with the second account, wherein there is no expiry associated with the credit being associated with the second account. 4. The method of claim 1, further comprising:
presenting to the user a request that the user will not disclose the credit in any written record; and receiving from the user an indication of an agreement that the user will not disclose the credit publicly. 5. The method of claim 1, further comprising:
determining a time interval; determining a release date based at least in part on the time interval and the time of receiving the commitment to pay for the first amount; presenting to the user an indication of the credit; and wherein associating in the database the credit with the account comprises associating in the database the credit with the account at or after the release date. 6. The method of claim 5, wherein presenting to the user the indication of the credit comprises presenting to the user the indication of the credit at or after the release date. 7. The method of claim 1, further comprising:
determining a time interval; determining a release time based at least in part on the time interval and the time of receiving the commitment to pay for the first amount; presenting to the user an indication of the credit; and receiving from the user a request to remove from the account a sum less or equal to the credit; and in response to receiving the request to withdraw a sum less or equal to the credit before the release date, sending the user an indication of denial. 8. The method of claim 1, further comprising:
associating a third price with a second item; determining a fourth price based on the credit and the third price, wherein the fourth price is lower than the third price; associating the fourth price with the second item; and presenting to the user an indication of the second item, an indication of the third price, and an indication of the fourth price, wherein the fourth price includes a zero amount or a percentage discount of the third price. 9. The method of claim 8, wherein determining the fourth price based on the credit and the third price comprises:
determining a second credit based at least in part on the credit, wherein the second credit is more than the credit; and determining the fourth price based on the second credit and the third price. 10. The method of claim 8, further comprising:
determining a third amount based on the fourth price; determining a fifth price in relation to the second item, where the fifth price is lower than the fourth price; determining a fourth amount based at least in part on the fifth price; receiving an indication of commitment to pay for the third amount from the user, wherein the user does not know the fifth price; determining a second credit based at least in part on the fourth amount and the third amount; determining a deduction amount based at least on the credit and the third amount; and in response to receiving the indication of commitment to pay for the third amount, reduce the credit by the deduction amount and associate the second credit with the account. 11. The method of claim 1, further comprising:
determining a reference amount; associating in the database a balance with the account, wherein the balance includes zero; determining that the balance plus the credit is equal to or more than the reference amount; and wherein associating the credit with the account comprises associating another credit with the account, the other credit comprising the balance and the credit. 12. The method of claim 1, further comprising:
determining a reference count; associating in the database a current count with the account; incrementing the current count by one; and determining that the current count is equal to or more than the reference count. 13. The method of claim 1, further comprising:
associating in the database a reference count; associating in the database a current count; in response to receiving a commitment to pay for the first amount from the first user, incrementing the current count by one; presenting to a second user an indication of a second item and an indication of a third price, wherein the second item is not the item; associating in the database a second account with the second user; determining a third amount based at least in part on the third price, wherein the third amount is equal to or more than the third price; determining a fourth price in relation to the third price, wherein the fourth price is lower than the third price; receiving a commitment to pay for the third amount from the second user, wherein the second user does not know the fourth price; determining a fourth amount based at least in part on the fourth price, wherein the fourth amount is equal to or more than the fourth price; in response to receiving the commitment to pay for the third amount from the second user, incrementing the current count by one; determining that the current count is equal to or greater than the reference count; determining a second credit based at least in part on the third amount and the fourth amount; and wherein associating in the database the credit with the account comprises associating in the database the credit with the account and the second credit with the second account in response to determining that the current count is equal to or greater than the reference count. 14. The method of claim 13, further comprising:
associating in the database a reference amount; associating in the database a current amount with a group, wherein the current amount includes zero; associating in the database the user with the group; receiving a request from the second user to join the group; in response to receiving the request from the second user to join the group, associating in the database the second user with the group; wherein associating in the database the current count comprises associating in the database the current count with the group; in response to receiving the commitment to pay for the first amount from the user, increasing the current amount by the credit; in response to receiving the commitment to pay for the third amount from the second user, increasing the current amount by the second credit; determining that the current amount equals to or exceeds the reference amount; and wherein associating in the database the credit with the account and the second credit with the second account in response to determining that the current count is equal to or greater than the reference count comprises associating in the database the credit with the account and the second credit with the second account, in response to determining that the current count is equal to or greater than the reference count, and in response to determining that the current amount equals to or exceeds the reference amount. 15. The method of claim 1, further comprising:
associating in the database a credit balance with the account, wherein the credit balance includes zero; associating in the database a second user with a second account; receiving from the user a request to associate a gift amount with the second user; determining a second credit based at least in part on the gift amount, wherein the second credit is larger than the gift amount; wherein associating in the database the credit with the account comprises adding in the database the credit to the credit balance associated with the account; determining that the gift amount is equal or less than the credit balance; and in response to receiving from the user a request to associate the gift amount with the second user, subtracting the gift amount from the credit balance associated with the account, and associating the second credit with the second account. 16. The method of claim 1, further comprising:
associating in the database a second account, wherein the second account includes a charity account; in response to receiving the commitment to pay for the first amount from the user, presenting an indication of the second account and an indication of the credit to the user; receiving an indication from the user that he does not want to associate the credit with the second account; and wherein associating in the database the credit with the account comprises associating in the database the credit with the account in response to receiving an indication from the user that he does not want to associate the credit with the second account. 17. The method of claim 1, further comprising:
associating in the database a second account, wherein the second account includes a charity account; in response to receiving the commitment to pay for the first amount from the user, presenting an indication of the second account and an indication of the credit to the user; receiving an indication from the user that he wants to associate a gift amount with the second account, wherein the gift amount is equal to or less than the credit; and in response to receiving the indication from the user that he wants to associate the gift amount with the second account, reduce the credit by the gift amount; and wherein associating in the database the credit with the account comprises associating in the database the reduced credit with the account and the gift amount with the second account. 18. The method of claim 17, further comprising:
in response to receiving the indication from the user that he wants to associate the gift amount with the second account, determining a bonus amount; and wherein associating in the database the reduced credit with the account and the gift amount with the second account comprises associating in the database the reduced credit with the account and the gift amount and the bonus amount with the second account. 19. A method comprising:
under control of one or more computer systems of an online service, the one or more computer systems configured with executable instructions, presenting to a user an indication of a first price and an indication of a product or service, wherein the user is associated with an account of the online service; receiving from the user an indication of a commitment to pay for the first price in relation to the product or service; in relation to receiving from the user the indication of the commitment to pay for the first price, presenting to the user an indication of a discount or a second price, wherein the second price is lower than the first price; and charging the account based at least on the discount or the second price. 20. A computer-implemented method for advertising, the method comprising, by a computer system:
associating in a database system a first price with an item; associating in the database system a second price or a discount with the item, wherein the second price is lower than the first price, or the discount is in relation to the first price; presenting to a user an indication of the item and an indication of the first price; receiving from the user an indication of payment for the item, wherein the second price or the discount is not disclosed to the user; in response to receiving the indication of payment for the item, generating a message, wherein the message associates the second price or the discount with the item; and presenting the message to the user. | An advertising and rewarding system, method, and process are provided. Among its various embodiments and enabling features, an embodiment may guarantee a lower price for an item of interest than what a consumer is willing or committed to pay.1. A computer-implemented method for advertising, the method comprising, by a computer system:
associating in a database a first price with an item; presenting to a user an indication of the item and an indication of the first price; associating in the database the user with an account; determining a first amount based at least in part on the first price, wherein the first amount is equal to or more than the first price; associating a second price with the item, wherein the second price is lower than the first price; receiving a commitment to pay for the first amount, wherein the second price is not disclosed to the user; determining a second amount based at least in part on the second price, wherein the second amount is equal to or more than the second price; determining a credit based at least in part on the first amount and the second amount; and associating in the database the credit with the account. 2. The method of claim 1, wherein:
receiving a commitment to pay the first amount comprises receiving a payment to account for the first amount; presenting to the user the indication of the item and the indication of the first price comprises presenting to the user the indication of the item, the indication of the first price, and an indication of a lower price, wherein the lower price is not revealed; and associating the second price with the item comprises associating in the database a percentage with the item, whereby the second price may be determined based on the percentage and the first price. 3. The method of claim 1, further comprising:
presenting to a second user an indication of the item and an indication of the first price; associating in the database a second account with the second user; receiving a commitment to pay for the first amount from the second user, wherein the second user does not know the second price; and associating in the database the credit with the second account, wherein there is no expiry associated with the credit being associated with the second account. 4. The method of claim 1, further comprising:
presenting to the user a request that the user will not disclose the credit in any written record; and receiving from the user an indication of an agreement that the user will not disclose the credit publicly. 5. The method of claim 1, further comprising:
determining a time interval; determining a release date based at least in part on the time interval and the time of receiving the commitment to pay for the first amount; presenting to the user an indication of the credit; and wherein associating in the database the credit with the account comprises associating in the database the credit with the account at or after the release date. 6. The method of claim 5, wherein presenting to the user the indication of the credit comprises presenting to the user the indication of the credit at or after the release date. 7. The method of claim 1, further comprising:
determining a time interval; determining a release time based at least in part on the time interval and the time of receiving the commitment to pay for the first amount; presenting to the user an indication of the credit; and receiving from the user a request to remove from the account a sum less or equal to the credit; and in response to receiving the request to withdraw a sum less or equal to the credit before the release date, sending the user an indication of denial. 8. The method of claim 1, further comprising:
associating a third price with a second item; determining a fourth price based on the credit and the third price, wherein the fourth price is lower than the third price; associating the fourth price with the second item; and presenting to the user an indication of the second item, an indication of the third price, and an indication of the fourth price, wherein the fourth price includes a zero amount or a percentage discount of the third price. 9. The method of claim 8, wherein determining the fourth price based on the credit and the third price comprises:
determining a second credit based at least in part on the credit, wherein the second credit is more than the credit; and determining the fourth price based on the second credit and the third price. 10. The method of claim 8, further comprising:
determining a third amount based on the fourth price; determining a fifth price in relation to the second item, where the fifth price is lower than the fourth price; determining a fourth amount based at least in part on the fifth price; receiving an indication of commitment to pay for the third amount from the user, wherein the user does not know the fifth price; determining a second credit based at least in part on the fourth amount and the third amount; determining a deduction amount based at least on the credit and the third amount; and in response to receiving the indication of commitment to pay for the third amount, reduce the credit by the deduction amount and associate the second credit with the account. 11. The method of claim 1, further comprising:
determining a reference amount; associating in the database a balance with the account, wherein the balance includes zero; determining that the balance plus the credit is equal to or more than the reference amount; and wherein associating the credit with the account comprises associating another credit with the account, the other credit comprising the balance and the credit. 12. The method of claim 1, further comprising:
determining a reference count; associating in the database a current count with the account; incrementing the current count by one; and determining that the current count is equal to or more than the reference count. 13. The method of claim 1, further comprising:
associating in the database a reference count; associating in the database a current count; in response to receiving a commitment to pay for the first amount from the first user, incrementing the current count by one; presenting to a second user an indication of a second item and an indication of a third price, wherein the second item is not the item; associating in the database a second account with the second user; determining a third amount based at least in part on the third price, wherein the third amount is equal to or more than the third price; determining a fourth price in relation to the third price, wherein the fourth price is lower than the third price; receiving a commitment to pay for the third amount from the second user, wherein the second user does not know the fourth price; determining a fourth amount based at least in part on the fourth price, wherein the fourth amount is equal to or more than the fourth price; in response to receiving the commitment to pay for the third amount from the second user, incrementing the current count by one; determining that the current count is equal to or greater than the reference count; determining a second credit based at least in part on the third amount and the fourth amount; and wherein associating in the database the credit with the account comprises associating in the database the credit with the account and the second credit with the second account in response to determining that the current count is equal to or greater than the reference count. 14. The method of claim 13, further comprising:
associating in the database a reference amount; associating in the database a current amount with a group, wherein the current amount includes zero; associating in the database the user with the group; receiving a request from the second user to join the group; in response to receiving the request from the second user to join the group, associating in the database the second user with the group; wherein associating in the database the current count comprises associating in the database the current count with the group; in response to receiving the commitment to pay for the first amount from the user, increasing the current amount by the credit; in response to receiving the commitment to pay for the third amount from the second user, increasing the current amount by the second credit; determining that the current amount equals to or exceeds the reference amount; and wherein associating in the database the credit with the account and the second credit with the second account in response to determining that the current count is equal to or greater than the reference count comprises associating in the database the credit with the account and the second credit with the second account, in response to determining that the current count is equal to or greater than the reference count, and in response to determining that the current amount equals to or exceeds the reference amount. 15. The method of claim 1, further comprising:
associating in the database a credit balance with the account, wherein the credit balance includes zero; associating in the database a second user with a second account; receiving from the user a request to associate a gift amount with the second user; determining a second credit based at least in part on the gift amount, wherein the second credit is larger than the gift amount; wherein associating in the database the credit with the account comprises adding in the database the credit to the credit balance associated with the account; determining that the gift amount is equal or less than the credit balance; and in response to receiving from the user a request to associate the gift amount with the second user, subtracting the gift amount from the credit balance associated with the account, and associating the second credit with the second account. 16. The method of claim 1, further comprising:
associating in the database a second account, wherein the second account includes a charity account; in response to receiving the commitment to pay for the first amount from the user, presenting an indication of the second account and an indication of the credit to the user; receiving an indication from the user that he does not want to associate the credit with the second account; and wherein associating in the database the credit with the account comprises associating in the database the credit with the account in response to receiving an indication from the user that he does not want to associate the credit with the second account. 17. The method of claim 1, further comprising:
associating in the database a second account, wherein the second account includes a charity account; in response to receiving the commitment to pay for the first amount from the user, presenting an indication of the second account and an indication of the credit to the user; receiving an indication from the user that he wants to associate a gift amount with the second account, wherein the gift amount is equal to or less than the credit; and in response to receiving the indication from the user that he wants to associate the gift amount with the second account, reduce the credit by the gift amount; and wherein associating in the database the credit with the account comprises associating in the database the reduced credit with the account and the gift amount with the second account. 18. The method of claim 17, further comprising:
in response to receiving the indication from the user that he wants to associate the gift amount with the second account, determining a bonus amount; and wherein associating in the database the reduced credit with the account and the gift amount with the second account comprises associating in the database the reduced credit with the account and the gift amount and the bonus amount with the second account. 19. A method comprising:
under control of one or more computer systems of an online service, the one or more computer systems configured with executable instructions, presenting to a user an indication of a first price and an indication of a product or service, wherein the user is associated with an account of the online service; receiving from the user an indication of a commitment to pay for the first price in relation to the product or service; in relation to receiving from the user the indication of the commitment to pay for the first price, presenting to the user an indication of a discount or a second price, wherein the second price is lower than the first price; and charging the account based at least on the discount or the second price. 20. A computer-implemented method for advertising, the method comprising, by a computer system:
associating in a database system a first price with an item; associating in the database system a second price or a discount with the item, wherein the second price is lower than the first price, or the discount is in relation to the first price; presenting to a user an indication of the item and an indication of the first price; receiving from the user an indication of payment for the item, wherein the second price or the discount is not disclosed to the user; in response to receiving the indication of payment for the item, generating a message, wherein the message associates the second price or the discount with the item; and presenting the message to the user. | 3,600 |
13,434 | 13,434 | 14,874,699 | 3,664 | A teaching apparatus that is connected to a control apparatus controlling a welding robot and outputs a command intended for the welding robot to the control apparatus is provided. The teaching apparatus includes a welding-parameter-manipulating portion provided on a front face and accepting an operation of changing a setting that defines a movement, of the welding robot, an enabling switch provided on a back face and accepting an operation of changing a state of electrification of the welding robot, and a robot-manipulating portion provided on the back face and accepting an operation of executing the movement of the welding robot. The welding-parameter-manipulating portion is positioned on a left side, in front view, with respect to the center, and the enabling switch and the robot-manipulating portion are positioned on a right side, in rear view, with respect to the center. | 1. A teaching apparatus that is connected to a control apparatus controlling a robot and outputs a command intended for the robot to the control apparatus, the teaching apparatus comprising:
a setting-manipulating portion provided on a first face of the teaching apparatus and accepting an operation of changing a setting that defines a movement of the robot; an enabling switch provided on a second face of the teaching apparatus that is opposite the first face, the enabling switch accepting an operation of changing a state of electrification of the robot; and a robot-movement-manipulating portion provided on the second face and accepting an operation of executing the movement of the robot, wherein, seen from a side of the first face, the setting-manipulating portion provided on the first face is positioned on a left side or a right side with respect to a center of the teaching apparatus, and the enabling switch and the robot-movement-manipulating portion provided on the second face are positioned on a same side as the setting-manipulating portion. 2. The teaching apparatus according to claim 1,
wherein a side face extending between the first face and the second face has a width that allows an operator to hold the teaching apparatus with one hand, wherein the enabling switch is positioned in such a manner as to be operable with the one hand that is holding the teaching apparatus, wherein the setting-manipulating portion is positioned within a reach of a thumb of the one hand in a state where the enabling switch is operated with at least any one of second, third, and fourth fingers of the one hand, and wherein the robot-movement-manipulating portion is positioned within a reach of the first finger of the one hand in the state where the enabling switch is operated with at least any one of the second, third, and fourth fingers of the one hand. 3. The teaching apparatus according to claim 1, further comprising:
a display provided on the first face, wherein the setting-manipulating portion includes
a first button that accepts an operation of displaying, on the display, a screen for changing any of parameters defining a welding operation performed by the robot;
a second button that accepts an operation of selecting one of the parameters displayed on the screen; and
a third button that accepts an operation of changing a value of the selected parameter. 4. The teaching apparatus according to claim 2, further comprising:
a display provided on the first face, wherein the setting-manipulating portion includes
a first button that accepts an operation of displaying, on the display, a screen for changing any of parameters defining a welding operation performed by the robot;
a second button that accepts an operation of selecting one of the parameters displayed on the screen; and
a third button that accepts an operation of changing a value of the selected parameter. 5. The teaching apparatus according to claim 1, wherein the enabling switch and the robot-movement-manipulating portion are each provided at a position excluding a surface of the teaching apparatus that comes into contact with a flat surface if the teaching apparatus is placed on the flat surface with the second face facing the flat surface. 6. The teaching apparatus according to claim 1, further comprising a plate-like supporting portion provided between the enabling switch and the robot-movement-manipulating portion, the supporting portion supporting a first finger of one of operator's hands that is holding the teaching apparatus. 7. The teaching apparatus according to claim 1, wherein the robot-movement-manipulating portion is positioned on a surface sloping at an angle of 5 degrees to 30 degrees with respect to a horizontal direction in a state where the teaching apparatus is placed on a flat surface with the second face facing the flat surface. 8. The teaching apparatus according to claim 1, wherein the teaching apparatus has a weight of 1.2 kg or less and a thickness of 5 cm or smaller, the thickness corresponding to a width of a side face extending between the first face and the second face. 9. The teaching apparatus according to claim 1, wherein an interval between the enabling switch and the robot-movement-manipulating portion is 5 cm or smaller. 10. A teaching apparatus that is connected to a control apparatus controlling a robot and outputs a command intended for the robot to the control apparatus, the teaching apparatus comprising:
a setting-manipulating portion that accepts an operation of changing a setting that defines a movement of the robot; an enabling switch that accepts an operation of changing a state of electrification of the robot; and a robot-movement-manipulating portion that accepts an operation of executing the movement of the robot, wherein the enabling switch is positioned on one of two lateral sides with respect to a center of the teaching apparatus and in such a manner as to be operable with one of operator's hands that is holding the teaching apparatus, and wherein, in a state where the teaching apparatus is held and the enabling switch is operated with the one hand, the setting-manipulating portion and the robot-movement-manipulating portion are each positioned within a reach of at least any one of a thumb and fingers of the one hand. | A teaching apparatus that is connected to a control apparatus controlling a welding robot and outputs a command intended for the welding robot to the control apparatus is provided. The teaching apparatus includes a welding-parameter-manipulating portion provided on a front face and accepting an operation of changing a setting that defines a movement, of the welding robot, an enabling switch provided on a back face and accepting an operation of changing a state of electrification of the welding robot, and a robot-manipulating portion provided on the back face and accepting an operation of executing the movement of the welding robot. The welding-parameter-manipulating portion is positioned on a left side, in front view, with respect to the center, and the enabling switch and the robot-manipulating portion are positioned on a right side, in rear view, with respect to the center.1. A teaching apparatus that is connected to a control apparatus controlling a robot and outputs a command intended for the robot to the control apparatus, the teaching apparatus comprising:
a setting-manipulating portion provided on a first face of the teaching apparatus and accepting an operation of changing a setting that defines a movement of the robot; an enabling switch provided on a second face of the teaching apparatus that is opposite the first face, the enabling switch accepting an operation of changing a state of electrification of the robot; and a robot-movement-manipulating portion provided on the second face and accepting an operation of executing the movement of the robot, wherein, seen from a side of the first face, the setting-manipulating portion provided on the first face is positioned on a left side or a right side with respect to a center of the teaching apparatus, and the enabling switch and the robot-movement-manipulating portion provided on the second face are positioned on a same side as the setting-manipulating portion. 2. The teaching apparatus according to claim 1,
wherein a side face extending between the first face and the second face has a width that allows an operator to hold the teaching apparatus with one hand, wherein the enabling switch is positioned in such a manner as to be operable with the one hand that is holding the teaching apparatus, wherein the setting-manipulating portion is positioned within a reach of a thumb of the one hand in a state where the enabling switch is operated with at least any one of second, third, and fourth fingers of the one hand, and wherein the robot-movement-manipulating portion is positioned within a reach of the first finger of the one hand in the state where the enabling switch is operated with at least any one of the second, third, and fourth fingers of the one hand. 3. The teaching apparatus according to claim 1, further comprising:
a display provided on the first face, wherein the setting-manipulating portion includes
a first button that accepts an operation of displaying, on the display, a screen for changing any of parameters defining a welding operation performed by the robot;
a second button that accepts an operation of selecting one of the parameters displayed on the screen; and
a third button that accepts an operation of changing a value of the selected parameter. 4. The teaching apparatus according to claim 2, further comprising:
a display provided on the first face, wherein the setting-manipulating portion includes
a first button that accepts an operation of displaying, on the display, a screen for changing any of parameters defining a welding operation performed by the robot;
a second button that accepts an operation of selecting one of the parameters displayed on the screen; and
a third button that accepts an operation of changing a value of the selected parameter. 5. The teaching apparatus according to claim 1, wherein the enabling switch and the robot-movement-manipulating portion are each provided at a position excluding a surface of the teaching apparatus that comes into contact with a flat surface if the teaching apparatus is placed on the flat surface with the second face facing the flat surface. 6. The teaching apparatus according to claim 1, further comprising a plate-like supporting portion provided between the enabling switch and the robot-movement-manipulating portion, the supporting portion supporting a first finger of one of operator's hands that is holding the teaching apparatus. 7. The teaching apparatus according to claim 1, wherein the robot-movement-manipulating portion is positioned on a surface sloping at an angle of 5 degrees to 30 degrees with respect to a horizontal direction in a state where the teaching apparatus is placed on a flat surface with the second face facing the flat surface. 8. The teaching apparatus according to claim 1, wherein the teaching apparatus has a weight of 1.2 kg or less and a thickness of 5 cm or smaller, the thickness corresponding to a width of a side face extending between the first face and the second face. 9. The teaching apparatus according to claim 1, wherein an interval between the enabling switch and the robot-movement-manipulating portion is 5 cm or smaller. 10. A teaching apparatus that is connected to a control apparatus controlling a robot and outputs a command intended for the robot to the control apparatus, the teaching apparatus comprising:
a setting-manipulating portion that accepts an operation of changing a setting that defines a movement of the robot; an enabling switch that accepts an operation of changing a state of electrification of the robot; and a robot-movement-manipulating portion that accepts an operation of executing the movement of the robot, wherein the enabling switch is positioned on one of two lateral sides with respect to a center of the teaching apparatus and in such a manner as to be operable with one of operator's hands that is holding the teaching apparatus, and wherein, in a state where the teaching apparatus is held and the enabling switch is operated with the one hand, the setting-manipulating portion and the robot-movement-manipulating portion are each positioned within a reach of at least any one of a thumb and fingers of the one hand. | 3,600 |
13,435 | 13,435 | 14,587,467 | 3,696 | Price change categories may be identified for price changes corresponding to different times. Codes may then be selected based on the identified price change categories and stored. The stored codes may be used for price validation and/or other purposes. | 1. A method comprising:
(a) calculating, by a computer system, a price change value for each of times t(m,1) through t(m,N) for which there is data representing a price value, wherein the times t(m,1) through t(m,N) are during a time frame F(m); (b) identifying, by the computer system, and for each of the times t(m,1) through t(m,N) for which a price change value is calculated, a price change category corresponding to a range of price changes that includes that price change value, wherein each identified category is a member of a group of price change categories, wherein each of the price change categories in the group corresponds to a different range of price changes; (c) selecting, by the computer system and from a code table comprising codes for each of multiple different combinations of price change categories, a code for time frame F(m) corresponding to the price change categories identified for the times t(m,1) through t(m,N); (d) storing, by the computer system, the code selected for time frame F(m); and (e) repeating (a) through (d) for multiple iterations, each iteration corresponding to a different value of m and a successively later time frame. 2. The method of claim 1, wherein
the code table comprises codes for each of multiple different combinations of price change categories, for each of multiple different combinations of price change categories and absence of one or more price change categories, and for the absence of any price change categories, and step (c) comprises selecting a code for time frame F(m) corresponding to all of the price change categories identified for the times t(m,1) through t(m,N) and to all of the times t(m,1) through t(m,N) for which none of the price change categories was identified. 3. The method of claim 1, wherein step (a) comprises determining price changes as absolute values of differences between prices. 4. The method of claim 1, wherein step (d) comprises storing the code selected for time frame F(m) by appending to a code stored for time frame F(m−1). 5. The method of claim 1, further comprising:
(f) accessing the stored codes by the computer system; and (g) validating, by the computer system, one of a settlement price or an order price based on the accessed stored codes. 6. The method of claim 1, wherein n≧5. 7. One or more non-transitory computer-readable media storing computer executable instructions that, when executed, cause a computer system to perform operations that include:
(a) calculating a price change value for each of times t(m,1) through t(m,N) for which there is data representing a price value, wherein the times t(m,1) through t(m,N) are during a time frame F(m); (b) identifying, for each of the times t(m,1) through t(m,N) for which a price change value is calculated, a price change category corresponding to a range of price changes that includes that price change value, wherein each identified category is a member of a group of price change categories, wherein each of the price change categories in the group corresponds to a different range of price changes; (c) selecting, from a code table comprising codes for each of multiple different combinations of price change categories, a code for time frame F(m) corresponding to the price change categories identified for the times t(m,1) through t(m,N); (d) storing the code selected for time frame F(m); and (e) repeating (a) through (d) for multiple iterations, each iteration corresponding to a different value of m and a successively later time frame. 8. The one or more non-transitory computer-readable media of claim 7, wherein
the code table comprises codes for each of multiple different combinations of price change categories, for each of multiple different combinations of price change categories and absence of one or more price change categories, and for the absence of any price change categories, and step (c) comprises selecting a code for time frame F(m) corresponding to all of the price change categories identified for the times t(m,1) through t(m,N) and to all of the times t(m,1) through t(m,N) for which none of the price change categories was identified. 9. The one or more non-transitory computer-readable media of claim 7, wherein step (a) comprises determining price changes as absolute values of differences between prices. 10. The one or more non-transitory computer-readable media of claim 7, wherein step (d) comprises storing the code selected for time frame F(m) by appending to a code stored for time frame F(m−1). 11. The one or more non-transitory computer-readable media of claim 7, further comprising stored computer executable instructions that, when executed, cause a computer system to perform operations that include:
(f) accessing the stored codes; and (g) validating one of a settlement price or an order price based on the accessed stored codes. 12. The one or more non-transitory computer-readable media of claim 7, wherein n≧5. 13. A method comprising:
(a) calculating a price change ΔP(q) by a computer system, wherein the price change ΔP(q) corresponds to a time t(q) and is based on a difference between a price corresponding to the time t(q) and a price corresponding to a previous time t(q−1); (b) identifying, by the computer system, a price change category for ΔP(q), wherein the identified category is a member of a group of price change categories, wherein each of the price change categories in the group corresponds to a different range of price changes, and wherein the price change category identified for ΔP(q) corresponds to a range of price changes that includes ΔP(q); (c) storing, by the computer system, a code corresponding to the price change category identified for ΔP(q); and (d) repeating (a) through (c) for multiple iterations, each iteration corresponding to a successively incremented value of q and a successively later time. 14. The method of claim 13, wherein each of the price change categories corresponds to a range bounded by multiples of a standard deviation of price changes corresponding to times in a time period prior to the time t(q). 15. The method of claim 14, wherein a first portion of the price change categories represent positive ranges of standard deviations, a second portion of the price change categories represent negative ranges of standard deviations, and a center price change category represents a range of changes that includes no change. 16. The method of claim 14, wherein
the center price change category code is a single digit and is a 0 or a 1, and each of the remaining price change category codes has the same number of digits, includes digits selected from 1 and 0, and begins with a digit that is different from the single digit of the center price change category code. 17. The method of claim 13, further comprising:
(e) accessing the stored codes by the computer system; and (f) validating, by the computer system, one of a settlement price or an order price based on the accessed stored codes. 18. One or more non-transitory computer-readable media storing computer executable instructions that, when executed, cause a computer system to perform operations that include:
(a) calculating a price change ΔP(q), wherein the price change ΔP(q) corresponds to a time t(q) and is based on a difference between a price corresponding to the time t(q) and a price corresponding to a previous time t(q−1); (b) identifying a price change category for ΔP(q), wherein the identified category is a member of a group of price change categories, wherein each of the price change categories in the group corresponds to a different range of price changes, and wherein the price change category identified for ΔP(q) corresponds to a range of price changes that includes ΔP(q); (c) storing a code corresponding to the price change category identified for ΔP(q); and (d) repeating (a) through (c) for multiple iterations, each iteration corresponding to a successively incremented value of q and a successively later time. 19. The one or more non-transitory computer-readable media of claim 18, wherein
each of the price change categories corresponds to a range bounded by multiples of a standard deviation of price changes corresponding to times in a time period prior to the time t(q). 20. The one or more non-transitory computer-readable media of claim 19, wherein a first portion of the price change categories represent positive ranges of standard deviations, a second portion of the price change categories represent negative ranges of standard deviations, and a center price change category represents a range of changes that includes no change. 21. The one or more non-transitory computer-readable media of claim 19, wherein the center price change category code is a single digit and is a 0 or a 1, and
each of the remaining price change category codes has the same number of digits, includes digits selected from 1 and 0, and begins with a digit that is different from the single digit of the center price change category code. 22. The one or more non-transitory computer-readable media of claim 18, further comprising stored computer executable instructions that, when executed, cause a computer system to perform operations that include:
(e) accessing the stored codes; and (f) validating one of a settlement price or an order price based on the accessed stored codes. | Price change categories may be identified for price changes corresponding to different times. Codes may then be selected based on the identified price change categories and stored. The stored codes may be used for price validation and/or other purposes.1. A method comprising:
(a) calculating, by a computer system, a price change value for each of times t(m,1) through t(m,N) for which there is data representing a price value, wherein the times t(m,1) through t(m,N) are during a time frame F(m); (b) identifying, by the computer system, and for each of the times t(m,1) through t(m,N) for which a price change value is calculated, a price change category corresponding to a range of price changes that includes that price change value, wherein each identified category is a member of a group of price change categories, wherein each of the price change categories in the group corresponds to a different range of price changes; (c) selecting, by the computer system and from a code table comprising codes for each of multiple different combinations of price change categories, a code for time frame F(m) corresponding to the price change categories identified for the times t(m,1) through t(m,N); (d) storing, by the computer system, the code selected for time frame F(m); and (e) repeating (a) through (d) for multiple iterations, each iteration corresponding to a different value of m and a successively later time frame. 2. The method of claim 1, wherein
the code table comprises codes for each of multiple different combinations of price change categories, for each of multiple different combinations of price change categories and absence of one or more price change categories, and for the absence of any price change categories, and step (c) comprises selecting a code for time frame F(m) corresponding to all of the price change categories identified for the times t(m,1) through t(m,N) and to all of the times t(m,1) through t(m,N) for which none of the price change categories was identified. 3. The method of claim 1, wherein step (a) comprises determining price changes as absolute values of differences between prices. 4. The method of claim 1, wherein step (d) comprises storing the code selected for time frame F(m) by appending to a code stored for time frame F(m−1). 5. The method of claim 1, further comprising:
(f) accessing the stored codes by the computer system; and (g) validating, by the computer system, one of a settlement price or an order price based on the accessed stored codes. 6. The method of claim 1, wherein n≧5. 7. One or more non-transitory computer-readable media storing computer executable instructions that, when executed, cause a computer system to perform operations that include:
(a) calculating a price change value for each of times t(m,1) through t(m,N) for which there is data representing a price value, wherein the times t(m,1) through t(m,N) are during a time frame F(m); (b) identifying, for each of the times t(m,1) through t(m,N) for which a price change value is calculated, a price change category corresponding to a range of price changes that includes that price change value, wherein each identified category is a member of a group of price change categories, wherein each of the price change categories in the group corresponds to a different range of price changes; (c) selecting, from a code table comprising codes for each of multiple different combinations of price change categories, a code for time frame F(m) corresponding to the price change categories identified for the times t(m,1) through t(m,N); (d) storing the code selected for time frame F(m); and (e) repeating (a) through (d) for multiple iterations, each iteration corresponding to a different value of m and a successively later time frame. 8. The one or more non-transitory computer-readable media of claim 7, wherein
the code table comprises codes for each of multiple different combinations of price change categories, for each of multiple different combinations of price change categories and absence of one or more price change categories, and for the absence of any price change categories, and step (c) comprises selecting a code for time frame F(m) corresponding to all of the price change categories identified for the times t(m,1) through t(m,N) and to all of the times t(m,1) through t(m,N) for which none of the price change categories was identified. 9. The one or more non-transitory computer-readable media of claim 7, wherein step (a) comprises determining price changes as absolute values of differences between prices. 10. The one or more non-transitory computer-readable media of claim 7, wherein step (d) comprises storing the code selected for time frame F(m) by appending to a code stored for time frame F(m−1). 11. The one or more non-transitory computer-readable media of claim 7, further comprising stored computer executable instructions that, when executed, cause a computer system to perform operations that include:
(f) accessing the stored codes; and (g) validating one of a settlement price or an order price based on the accessed stored codes. 12. The one or more non-transitory computer-readable media of claim 7, wherein n≧5. 13. A method comprising:
(a) calculating a price change ΔP(q) by a computer system, wherein the price change ΔP(q) corresponds to a time t(q) and is based on a difference between a price corresponding to the time t(q) and a price corresponding to a previous time t(q−1); (b) identifying, by the computer system, a price change category for ΔP(q), wherein the identified category is a member of a group of price change categories, wherein each of the price change categories in the group corresponds to a different range of price changes, and wherein the price change category identified for ΔP(q) corresponds to a range of price changes that includes ΔP(q); (c) storing, by the computer system, a code corresponding to the price change category identified for ΔP(q); and (d) repeating (a) through (c) for multiple iterations, each iteration corresponding to a successively incremented value of q and a successively later time. 14. The method of claim 13, wherein each of the price change categories corresponds to a range bounded by multiples of a standard deviation of price changes corresponding to times in a time period prior to the time t(q). 15. The method of claim 14, wherein a first portion of the price change categories represent positive ranges of standard deviations, a second portion of the price change categories represent negative ranges of standard deviations, and a center price change category represents a range of changes that includes no change. 16. The method of claim 14, wherein
the center price change category code is a single digit and is a 0 or a 1, and each of the remaining price change category codes has the same number of digits, includes digits selected from 1 and 0, and begins with a digit that is different from the single digit of the center price change category code. 17. The method of claim 13, further comprising:
(e) accessing the stored codes by the computer system; and (f) validating, by the computer system, one of a settlement price or an order price based on the accessed stored codes. 18. One or more non-transitory computer-readable media storing computer executable instructions that, when executed, cause a computer system to perform operations that include:
(a) calculating a price change ΔP(q), wherein the price change ΔP(q) corresponds to a time t(q) and is based on a difference between a price corresponding to the time t(q) and a price corresponding to a previous time t(q−1); (b) identifying a price change category for ΔP(q), wherein the identified category is a member of a group of price change categories, wherein each of the price change categories in the group corresponds to a different range of price changes, and wherein the price change category identified for ΔP(q) corresponds to a range of price changes that includes ΔP(q); (c) storing a code corresponding to the price change category identified for ΔP(q); and (d) repeating (a) through (c) for multiple iterations, each iteration corresponding to a successively incremented value of q and a successively later time. 19. The one or more non-transitory computer-readable media of claim 18, wherein
each of the price change categories corresponds to a range bounded by multiples of a standard deviation of price changes corresponding to times in a time period prior to the time t(q). 20. The one or more non-transitory computer-readable media of claim 19, wherein a first portion of the price change categories represent positive ranges of standard deviations, a second portion of the price change categories represent negative ranges of standard deviations, and a center price change category represents a range of changes that includes no change. 21. The one or more non-transitory computer-readable media of claim 19, wherein the center price change category code is a single digit and is a 0 or a 1, and
each of the remaining price change category codes has the same number of digits, includes digits selected from 1 and 0, and begins with a digit that is different from the single digit of the center price change category code. 22. The one or more non-transitory computer-readable media of claim 18, further comprising stored computer executable instructions that, when executed, cause a computer system to perform operations that include:
(e) accessing the stored codes; and (f) validating one of a settlement price or an order price based on the accessed stored codes. | 3,600 |
13,436 | 13,436 | 15,014,947 | 3,634 | A system incorporating a camera sensor situated in a room having walls with windows and sun blinds. The sun blinds may control outdoor light to the room. Indoor light sources may provide artificial light in the room. A controller may receive signals from the camera sensor. The controller may estimate a presence of occupants and provide control signals to the sun blinds and light sources. A room temperature sensor and an HVAC system may be connected to the controller. A preset temperature, which may depend on occupancy, in the room or zone may be achieved with various kinds of heating or cooling. At the same time, outdoor light and indoor artificial light may be controlled to obtain a preset intensity of lighting in the room, which may depend on occupancy, in a manner to achieve a minimum cost of energy used by the HVAC and the light sources. | 1. A lighting control system comprising:
one or more sun blinds situated over one or more windows of a room; a camera sensor with a field of view covering the room; and a controller connected to the camera sensor and the one or more sun blinds; and wherein: the camera sensor detects light in the room and sends a signal representing the light intensity in the room to the controller; the controller processes the light intensity signal to estimate presence of occupants in the room and to determine whether an intensity of outdoor illumination should be increased, decreased or left the same; if the controller determines that the intensity of the outdoor illumination should be increased or decreased, then the controller sends a sun blind signal to cause the one or more sun blinds to open or close, respectively. 2. The system of claim 1, further comprising:
one or more indoor light sources having an intensity control input connected to the controller; and wherein: the controller processes the light intensity signal to determine whether an intensity of indoor light should be increased, decreased or left the same; and if the controller determines that the intensity of the indoor light should be increased or decreased, then the controller sends a signal to the intensity control input of the one or more indoor light sources to increase or decrease the intensity of the indoor light, respectively. 3. The system of claim 2, wherein whether the intensity of the outdoor light should be changed and the intensity of indoor light should be changed is determined from an intensity signal from the camera sensor and a program containing occupant configuration preferences used by the controller. 4. The system of claim 2, wherein a sun blind is a variable transmissive light mechanism that passes light of an intensity as indicated by the sun blind signal. 5. The system of claim 2, wherein the intensity of the indoor lighting in the room can be increased or decreased according to a signal to the intensity control input of the one or more indoor light sources. 6. The system of claim 3, further comprising:
an HVAC system connected to a temperature sensor in the room and to the controller; and wherein the controller determines, according to a program containing occupant configuration preferences or settings, what the intensity of the outdoor light, the intensity of indoor light and the temperature should be to minimize costs of energy used in view of occupant configuration preferences or settings. 7. The system of claim 6, wherein the occupant configuration preferences or settings incorporate one or more items selected from a group comprising light intensities, glare levels, lighting levels, heating gains caused by outside light, occupancy, occupants' locations, comfort levels, controls of zones, spatial definition of one or more occupancy zones, sunlight direction, indoor temperatures, outdoor temperature, energy savings, prices of different kinds of energy, frequency and speed of changing sun blinds, frequency and speed of light changes, unoccupied presets, one or more settings of one or more cameras or camera sensors, and settings of an HVAC. 8. A method for controlling light intensity in a space comprising:
detecting a presence of a person or occupant in a zone of interest of a space monitored by a camera sensor; detecting an intensity of light with a camera sensor in the space having one or more windows that can with adjustable one or more sun blinds allow more or less light into the space monitored by a camera sensor; converting the intensity of the light into an intensity signal; and adjusting the one or more sun blinds to increase or reduce an amount of light passing through the one or more windows according to a detected preset occupancy and the magnitude of the intensity signal to achieve a preset level of intensity of light in the space. 9. The method of claim 8, further comprising adjusting one or more indoor light sources in the space with a source signal in combination with the adjusting the one or more sun blinds according to the magnitude of the intensity signal to obtain the preset level of intensity of light in the space. 10. The method of claim 9, further comprising adjusting a temperature with an HVAC in the space to a preset level of temperature in combination with the adjusting the one or more sun blinds according to the magnitude of the intensity signal and adjusting the one or more indoor light sources with a source signal to obtain the preset level of intensity of light in the space in a manner to achieve a minimum cost of energy used by the HVAC and the one or more indoor light sources. 11. The method of claim 10, wherein:
if one or more occupants are detected in the space, then the preset level of temperature and the preset level of intensity of light are set to values that are comfortable for the one or more occupants in the manner to achieve a minimum cost of energy used by the HVAC and the one or more indoor light sources; and if there is a lack of detection of one or more occupants in the space, then the preset level of temperature and the preset level of intensity of light are set to values in a manner to achieve a minimum cost of energy used by the HVAC and the one or more indoor light sources without damage to the space or to any components in the space. 12. An illumination mechanism comprising:
one or more camera sensors situated in a room having walls with one or more windows; one or more sun blinds situated over the one or windows, respectively; one or more indoor sources of light in the room; and a controller having an input connected to the one or more camera sensors, having a first output connected to the one or more sun blinds, and having a second output connected to the one or more indoor sources of light; and wherein: the one or more camera sensors detect light in the room; the controller receives a first signal from the one or more camera sensors indicating an intensity of light in the room; and in response to the first signal, the controller estimates a presence of occupants in the room and provides a second signal to the one or more sun blinds letting in an amount of outdoor light through the one or more windows into the room in accordance with the second signal, and the controller provides a third signal to the one or more indoor sources of light to provide an amount of artificial indoor light in accordance with the third signal, to achieve a preset intensity of light in the room. 13. The mechanism of claim 12 further comprising:
a temperature sensor in the room connected to the controller; and
an HVAC system connected to the controller. 14. The mechanism of claim 13, wherein a temperature in the room is affected by the one or more indoor lighting sources and the one or more sun blinds as controlled by the second and third signals. 15. The mechanism of claim 14, wherein a preset temperature in the room is achieved with an HVAC providing heating or cooling in the room in combination with adjusting the one or more sun blinds according to the second signal, adjusting the one or more indoor lighting sources according to the third signal to obtain the preset intensity of lighting in the room in a manner to achieve a minimum cost of energy used by the HVAC and the one or more indoor lighting sources. 16. The mechanism of claim 12, wherein whether there is a presence of one or more occupants in the space, is determined according to the camera sensor and the controller. 17. The mechanism of claim 15, wherein if one or more occupants are detected in the room, then the preset level of temperature and the preset intensity of light are set to values that are comfortable for the one or more occupants in a manner to achieve a minimum of energy used by the HVAC and the one or more indoor lighting sources. 18. The mechanism of claim 17, wherein if there is a lack of detection of one or more occupants in the space, then the preset level of temperature and the preset intensity of light are set to values in a manner to achieve a minimum cost of energy used by the HVAC and the one or more indoor lighting sources without damage to the space or to any components in the space. 19. The mechanism of claim 13, wherein an area of the room comprises two or more pre-defined overlapping or non-overlapping zones. 20. The mechanism of claim 19, wherein for each zone, a combination of temperature, an amount of indoor light and an amount of outdoor light, are selected so that a preset light intensity and temperature are achieved for each zone with regard to occupancy and that a total cost of energy for lighting and HVAC is minimized. | A system incorporating a camera sensor situated in a room having walls with windows and sun blinds. The sun blinds may control outdoor light to the room. Indoor light sources may provide artificial light in the room. A controller may receive signals from the camera sensor. The controller may estimate a presence of occupants and provide control signals to the sun blinds and light sources. A room temperature sensor and an HVAC system may be connected to the controller. A preset temperature, which may depend on occupancy, in the room or zone may be achieved with various kinds of heating or cooling. At the same time, outdoor light and indoor artificial light may be controlled to obtain a preset intensity of lighting in the room, which may depend on occupancy, in a manner to achieve a minimum cost of energy used by the HVAC and the light sources.1. A lighting control system comprising:
one or more sun blinds situated over one or more windows of a room; a camera sensor with a field of view covering the room; and a controller connected to the camera sensor and the one or more sun blinds; and wherein: the camera sensor detects light in the room and sends a signal representing the light intensity in the room to the controller; the controller processes the light intensity signal to estimate presence of occupants in the room and to determine whether an intensity of outdoor illumination should be increased, decreased or left the same; if the controller determines that the intensity of the outdoor illumination should be increased or decreased, then the controller sends a sun blind signal to cause the one or more sun blinds to open or close, respectively. 2. The system of claim 1, further comprising:
one or more indoor light sources having an intensity control input connected to the controller; and wherein: the controller processes the light intensity signal to determine whether an intensity of indoor light should be increased, decreased or left the same; and if the controller determines that the intensity of the indoor light should be increased or decreased, then the controller sends a signal to the intensity control input of the one or more indoor light sources to increase or decrease the intensity of the indoor light, respectively. 3. The system of claim 2, wherein whether the intensity of the outdoor light should be changed and the intensity of indoor light should be changed is determined from an intensity signal from the camera sensor and a program containing occupant configuration preferences used by the controller. 4. The system of claim 2, wherein a sun blind is a variable transmissive light mechanism that passes light of an intensity as indicated by the sun blind signal. 5. The system of claim 2, wherein the intensity of the indoor lighting in the room can be increased or decreased according to a signal to the intensity control input of the one or more indoor light sources. 6. The system of claim 3, further comprising:
an HVAC system connected to a temperature sensor in the room and to the controller; and wherein the controller determines, according to a program containing occupant configuration preferences or settings, what the intensity of the outdoor light, the intensity of indoor light and the temperature should be to minimize costs of energy used in view of occupant configuration preferences or settings. 7. The system of claim 6, wherein the occupant configuration preferences or settings incorporate one or more items selected from a group comprising light intensities, glare levels, lighting levels, heating gains caused by outside light, occupancy, occupants' locations, comfort levels, controls of zones, spatial definition of one or more occupancy zones, sunlight direction, indoor temperatures, outdoor temperature, energy savings, prices of different kinds of energy, frequency and speed of changing sun blinds, frequency and speed of light changes, unoccupied presets, one or more settings of one or more cameras or camera sensors, and settings of an HVAC. 8. A method for controlling light intensity in a space comprising:
detecting a presence of a person or occupant in a zone of interest of a space monitored by a camera sensor; detecting an intensity of light with a camera sensor in the space having one or more windows that can with adjustable one or more sun blinds allow more or less light into the space monitored by a camera sensor; converting the intensity of the light into an intensity signal; and adjusting the one or more sun blinds to increase or reduce an amount of light passing through the one or more windows according to a detected preset occupancy and the magnitude of the intensity signal to achieve a preset level of intensity of light in the space. 9. The method of claim 8, further comprising adjusting one or more indoor light sources in the space with a source signal in combination with the adjusting the one or more sun blinds according to the magnitude of the intensity signal to obtain the preset level of intensity of light in the space. 10. The method of claim 9, further comprising adjusting a temperature with an HVAC in the space to a preset level of temperature in combination with the adjusting the one or more sun blinds according to the magnitude of the intensity signal and adjusting the one or more indoor light sources with a source signal to obtain the preset level of intensity of light in the space in a manner to achieve a minimum cost of energy used by the HVAC and the one or more indoor light sources. 11. The method of claim 10, wherein:
if one or more occupants are detected in the space, then the preset level of temperature and the preset level of intensity of light are set to values that are comfortable for the one or more occupants in the manner to achieve a minimum cost of energy used by the HVAC and the one or more indoor light sources; and if there is a lack of detection of one or more occupants in the space, then the preset level of temperature and the preset level of intensity of light are set to values in a manner to achieve a minimum cost of energy used by the HVAC and the one or more indoor light sources without damage to the space or to any components in the space. 12. An illumination mechanism comprising:
one or more camera sensors situated in a room having walls with one or more windows; one or more sun blinds situated over the one or windows, respectively; one or more indoor sources of light in the room; and a controller having an input connected to the one or more camera sensors, having a first output connected to the one or more sun blinds, and having a second output connected to the one or more indoor sources of light; and wherein: the one or more camera sensors detect light in the room; the controller receives a first signal from the one or more camera sensors indicating an intensity of light in the room; and in response to the first signal, the controller estimates a presence of occupants in the room and provides a second signal to the one or more sun blinds letting in an amount of outdoor light through the one or more windows into the room in accordance with the second signal, and the controller provides a third signal to the one or more indoor sources of light to provide an amount of artificial indoor light in accordance with the third signal, to achieve a preset intensity of light in the room. 13. The mechanism of claim 12 further comprising:
a temperature sensor in the room connected to the controller; and
an HVAC system connected to the controller. 14. The mechanism of claim 13, wherein a temperature in the room is affected by the one or more indoor lighting sources and the one or more sun blinds as controlled by the second and third signals. 15. The mechanism of claim 14, wherein a preset temperature in the room is achieved with an HVAC providing heating or cooling in the room in combination with adjusting the one or more sun blinds according to the second signal, adjusting the one or more indoor lighting sources according to the third signal to obtain the preset intensity of lighting in the room in a manner to achieve a minimum cost of energy used by the HVAC and the one or more indoor lighting sources. 16. The mechanism of claim 12, wherein whether there is a presence of one or more occupants in the space, is determined according to the camera sensor and the controller. 17. The mechanism of claim 15, wherein if one or more occupants are detected in the room, then the preset level of temperature and the preset intensity of light are set to values that are comfortable for the one or more occupants in a manner to achieve a minimum of energy used by the HVAC and the one or more indoor lighting sources. 18. The mechanism of claim 17, wherein if there is a lack of detection of one or more occupants in the space, then the preset level of temperature and the preset intensity of light are set to values in a manner to achieve a minimum cost of energy used by the HVAC and the one or more indoor lighting sources without damage to the space or to any components in the space. 19. The mechanism of claim 13, wherein an area of the room comprises two or more pre-defined overlapping or non-overlapping zones. 20. The mechanism of claim 19, wherein for each zone, a combination of temperature, an amount of indoor light and an amount of outdoor light, are selected so that a preset light intensity and temperature are achieved for each zone with regard to occupancy and that a total cost of energy for lighting and HVAC is minimized. | 3,600 |
13,437 | 13,437 | 14,788,261 | 3,691 | A method and system personalizes and facilitates an electronic tax return preparation interview in a tax return preparation system, using a multi-sectional view of interview content, according to one embodiment. The method and system displays first user income information at least partially based on user data, and displays characteristics for the first user income information in a first section of a user interface to indicate to the user which of the first user income information has been identified by an electronic tax return preparation system, according to one embodiment. The method and system, in a second section of the user interface, acquires second user income information from the user, and updates the first section of the user interface with the second user income information acquired from the user within the second section of the user interface. | 1. A computing system implemented method for personalizing and facilitating an electronic tax return preparation interview in a tax return preparation system, by using a multi-sectional view of interview content to progress a user through the electronic tax return preparation interview, comprising:
displaying, with a computing device, first user income information at least partially based on user data received from a user, wherein the first user income information identifies one or more of employee wages, contractor income, retirement income, unemployment income, alimony, and investment income; prior to acquiring second user income information from the user during the tax return preparation interview, displaying characteristics for the first user income information in a first section of a user interface to orient the user with an income section of a tax return preparation interview and to indicate to the user which of the first user income information has been identified by an electronic tax return preparation system; in a second section of the user interface, acquiring second user income information from the user, in response to receipt of an indication from the user that the first user income information is an incomplete representation of total user income information for the user; and updating the first section of the user interface with the second user income information acquired from the user within the second section of the user interface to provide an updated status of the total user income information acquired by the electronic tax return preparation system for the user, to improve understandability by the user of the tax return preparation interview and to reduce a likelihood of abandonment of the tax return preparation interview by the user. 2. The method of claim 1, wherein acquiring the second user income includes providing, in the second section of the user interface, at least one of:
an expandable table of contents of tax topics associated with taxable income for the user; and a guided question and answer exploration through the tax topics associated with the taxable income. 3. The method of claim 2, wherein the tax topics associated with the taxable income for the user are ranked in order of relevance to the user, at least partially based on the first user income information and at least partially based on the user data, wherein providing the guided question and answer exploration through tax topics associated with the taxable income includes providing questions related to the tax topics associated with the taxable income, in the order of relevance to the user. 4. The method of claim 1, wherein the characteristics include a source of user income and a quantity of the user income. 5. The method of claim 1, wherein the first section is different from the second section and the first section occupies a different area within the user interface than the second section. 6. The method of claim 5, wherein the first section is positioned above the second section in the user interface. 7. The method of claim 1, further comprising:
displaying, with a computing device, user deduction information at least partially based on user data received from a user. 8. The method of claim 7, wherein the user deduction information identifies one or more of child tax credit, mortgage interest, earned income credit, student load interest, dependent information, and charitable donations for the user. 9. The method of claim 7, wherein the user deduction information is first user deduction information, the method further comprising:
prior to acquiring second user deduction information from the user during the tax return preparation interview, displaying characteristics for the first user deduction information in the first section of the user interface to orient the user with a deduction section of the tax return preparation interview and to indicate to the user which of the first user deduction information has been identified by the electronic tax return preparation system as being relevant to the user. 10. The method of claim 9, further comprising:
in the second section of the user interface, acquiring the second user deduction information from the user, in response to receipt of an indication from the user that the first user deduction information is an incomplete representation of total user deduction information for the user; and updating the first section of the user interface with the second user deduction information acquired from the user within the second section of the user interface to provide an updated status of the total user deduction information acquired by the electronic tax return preparation system for the user, to improve understandability by the user of the tax return preparation interview and to reduce the likelihood of abandonment of the tax return preparation interview by the user. 11. The method of claim 10, wherein acquiring the second user deduction includes providing, in the second section of the user interface, at least one of:
an expandable and self-explorable table of contents of tax topics associated with tax deductions and credits; and a guided question and answer exploration through the tax topics associated with tax deductions and credits. 12. The method of claim 11, wherein the tax topics associated with the tax deductions and credits are ranked in order of relevance to the user, based on the first and second user income information and at least partially based on the user data, wherein providing the guided question and answer exploration through tax topics includes providing questions related with the tax topics associated with the tax deduction and credits in the order of relevance to the user. 13. The method of claim 1, wherein the user data includes one or more of:
a change in marital status; a change in number of dependents; a change of address; and a death. 14. The method of claim 1, wherein user data includes one or more of:
a job change; a change in salary; a new dependent; a change of address; a purchase of a home; a selling of a home; receipt of unemployment; educational expenses; indication of having performed contract work; and ownership of a business. 15. A system for personalizing and facilitating an electronic tax return preparation interview in a tax return preparation system, using a multi-sectional view of interview content, the system comprising:
at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which, when executed by any set of the one or more processors, perform a process for personalizing and facilitating an electronic tax return preparation interview in a tax return preparation system, using a multi-sectional view of interview content, the process including:
displaying, with a computing device, first user income information at least partially based on user data received from a user, wherein the first user income information identifies one or more of employee wages, contractor income, retirement income, unemployment income, alimony, and investment income;
prior to acquiring second user income information from the user during the tax return preparation interview, displaying characteristics for the first user income information in a first section of a user interface to orient the user with an income section of a tax return preparation interview and to indicate to the user which of the first user income information has been identified by an electronic tax return preparation system;
in a second section of the user interface, acquiring second user income information from the user, in response to receipt of an indication from the user that the first user income information is an incomplete representation of total user income information for the user; and
updating the first section of the user interface with the second user income information acquired from the user within the second section of the user interface to provide an updated status of the total user income information acquired by the electronic tax return preparation system for the user, to improve understandability by the user of the tax return preparation interview and to reduce a likelihood of abandonment of the tax return preparation interview by the user. 16. The system of claim 15, wherein acquiring the second user income includes providing, in the second section of the user interface, at least one of:
an expandable table of contents of tax topics associated with taxable income for the user; and a guided question and answer exploration through the tax topics associated with the taxable income. 17. The system of claim 16, wherein the tax topics associated with the taxable income for the user are ranked in order of relevance to the user, at least partially based on the first user income information and at least partially based on the user data, wherein providing the guided question and answer exploration through tax topics associated with the taxable income includes providing questions related to the tax topics associated with the taxable income, in the order of relevance to the user. 18. The system of claim 15, wherein the characteristics include a source of user income and a quantity of the user income. 19. The system of claim 15, wherein the first section is different from the second section and the first section occupies a different area within the user interface than the second section. 20. The system of claim 19, wherein the first section is positioned above the second section in the user interface. 21. The system of claim 15, further comprising:
displaying, with a computing device, user deduction information at least partially based on user data received from a user. 22. The system of claim 21, wherein the user deduction information identifies one or more of child tax credit, mortgage interest, earned income credit, student load interest, dependent information, and charitable donations for the user. 23. The system of claim 21, wherein the user deduction information is first user deduction information, the method further comprising:
prior to acquiring second user deduction information from the user during the tax return preparation interview, displaying characteristics for the first user deduction information in the first section of the user interface to orient the user with a deduction section of the tax return preparation interview and to indicate to the user which of the first user deduction information has been identified by the electronic tax return preparation system as being relevant to the user. 24. The system of claim 23, further comprising:
in the second section of the user interface, acquiring the second user deduction information from the user, in response to receipt of an indication from the user that the first user deduction information is an incomplete representation of total user deduction information for the user; and updating the first section of the user interface with the second user deduction information acquired from the user within the second section of the user interface to provide an updated status of the total user deduction information acquired by the electronic tax return preparation system for the user, to improve understandability by the user of the tax return preparation interview and to reduce the likelihood of abandonment of the tax return preparation interview by the user. 25. The system of claim 24, wherein acquiring the second user deduction includes providing, in the second section of the user interface, at least one of:
an expandable and self-explorable table of contents of tax topics associated with tax deductions and credits; and a guided question and answer exploration through the tax topics associated with tax deductions and credits. 26. The system of claim 25, wherein the tax topics associated with the tax deductions and credits are ranked in order of relevance to the user, based on the first and second user income information and at least partially based on the user data, wherein providing the guided question and answer exploration through tax topics includes providing questions related with the tax topics associated with the tax deduction and credits in the order of relevance to the user. 27. The system of claim 15, wherein the user data includes one or more of:
a change in marital status; a change in number of dependents; a change of address; and a death. 28. The system of claim 15, wherein user data includes one or more of:
a job change; a change in salary; a new dependent; a change of address; a purchase of a home; a selling of a home; receipt of unemployment; educational expenses; indication of having performed contract work; and ownership of a business. | A method and system personalizes and facilitates an electronic tax return preparation interview in a tax return preparation system, using a multi-sectional view of interview content, according to one embodiment. The method and system displays first user income information at least partially based on user data, and displays characteristics for the first user income information in a first section of a user interface to indicate to the user which of the first user income information has been identified by an electronic tax return preparation system, according to one embodiment. The method and system, in a second section of the user interface, acquires second user income information from the user, and updates the first section of the user interface with the second user income information acquired from the user within the second section of the user interface.1. A computing system implemented method for personalizing and facilitating an electronic tax return preparation interview in a tax return preparation system, by using a multi-sectional view of interview content to progress a user through the electronic tax return preparation interview, comprising:
displaying, with a computing device, first user income information at least partially based on user data received from a user, wherein the first user income information identifies one or more of employee wages, contractor income, retirement income, unemployment income, alimony, and investment income; prior to acquiring second user income information from the user during the tax return preparation interview, displaying characteristics for the first user income information in a first section of a user interface to orient the user with an income section of a tax return preparation interview and to indicate to the user which of the first user income information has been identified by an electronic tax return preparation system; in a second section of the user interface, acquiring second user income information from the user, in response to receipt of an indication from the user that the first user income information is an incomplete representation of total user income information for the user; and updating the first section of the user interface with the second user income information acquired from the user within the second section of the user interface to provide an updated status of the total user income information acquired by the electronic tax return preparation system for the user, to improve understandability by the user of the tax return preparation interview and to reduce a likelihood of abandonment of the tax return preparation interview by the user. 2. The method of claim 1, wherein acquiring the second user income includes providing, in the second section of the user interface, at least one of:
an expandable table of contents of tax topics associated with taxable income for the user; and a guided question and answer exploration through the tax topics associated with the taxable income. 3. The method of claim 2, wherein the tax topics associated with the taxable income for the user are ranked in order of relevance to the user, at least partially based on the first user income information and at least partially based on the user data, wherein providing the guided question and answer exploration through tax topics associated with the taxable income includes providing questions related to the tax topics associated with the taxable income, in the order of relevance to the user. 4. The method of claim 1, wherein the characteristics include a source of user income and a quantity of the user income. 5. The method of claim 1, wherein the first section is different from the second section and the first section occupies a different area within the user interface than the second section. 6. The method of claim 5, wherein the first section is positioned above the second section in the user interface. 7. The method of claim 1, further comprising:
displaying, with a computing device, user deduction information at least partially based on user data received from a user. 8. The method of claim 7, wherein the user deduction information identifies one or more of child tax credit, mortgage interest, earned income credit, student load interest, dependent information, and charitable donations for the user. 9. The method of claim 7, wherein the user deduction information is first user deduction information, the method further comprising:
prior to acquiring second user deduction information from the user during the tax return preparation interview, displaying characteristics for the first user deduction information in the first section of the user interface to orient the user with a deduction section of the tax return preparation interview and to indicate to the user which of the first user deduction information has been identified by the electronic tax return preparation system as being relevant to the user. 10. The method of claim 9, further comprising:
in the second section of the user interface, acquiring the second user deduction information from the user, in response to receipt of an indication from the user that the first user deduction information is an incomplete representation of total user deduction information for the user; and updating the first section of the user interface with the second user deduction information acquired from the user within the second section of the user interface to provide an updated status of the total user deduction information acquired by the electronic tax return preparation system for the user, to improve understandability by the user of the tax return preparation interview and to reduce the likelihood of abandonment of the tax return preparation interview by the user. 11. The method of claim 10, wherein acquiring the second user deduction includes providing, in the second section of the user interface, at least one of:
an expandable and self-explorable table of contents of tax topics associated with tax deductions and credits; and a guided question and answer exploration through the tax topics associated with tax deductions and credits. 12. The method of claim 11, wherein the tax topics associated with the tax deductions and credits are ranked in order of relevance to the user, based on the first and second user income information and at least partially based on the user data, wherein providing the guided question and answer exploration through tax topics includes providing questions related with the tax topics associated with the tax deduction and credits in the order of relevance to the user. 13. The method of claim 1, wherein the user data includes one or more of:
a change in marital status; a change in number of dependents; a change of address; and a death. 14. The method of claim 1, wherein user data includes one or more of:
a job change; a change in salary; a new dependent; a change of address; a purchase of a home; a selling of a home; receipt of unemployment; educational expenses; indication of having performed contract work; and ownership of a business. 15. A system for personalizing and facilitating an electronic tax return preparation interview in a tax return preparation system, using a multi-sectional view of interview content, the system comprising:
at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which, when executed by any set of the one or more processors, perform a process for personalizing and facilitating an electronic tax return preparation interview in a tax return preparation system, using a multi-sectional view of interview content, the process including:
displaying, with a computing device, first user income information at least partially based on user data received from a user, wherein the first user income information identifies one or more of employee wages, contractor income, retirement income, unemployment income, alimony, and investment income;
prior to acquiring second user income information from the user during the tax return preparation interview, displaying characteristics for the first user income information in a first section of a user interface to orient the user with an income section of a tax return preparation interview and to indicate to the user which of the first user income information has been identified by an electronic tax return preparation system;
in a second section of the user interface, acquiring second user income information from the user, in response to receipt of an indication from the user that the first user income information is an incomplete representation of total user income information for the user; and
updating the first section of the user interface with the second user income information acquired from the user within the second section of the user interface to provide an updated status of the total user income information acquired by the electronic tax return preparation system for the user, to improve understandability by the user of the tax return preparation interview and to reduce a likelihood of abandonment of the tax return preparation interview by the user. 16. The system of claim 15, wherein acquiring the second user income includes providing, in the second section of the user interface, at least one of:
an expandable table of contents of tax topics associated with taxable income for the user; and a guided question and answer exploration through the tax topics associated with the taxable income. 17. The system of claim 16, wherein the tax topics associated with the taxable income for the user are ranked in order of relevance to the user, at least partially based on the first user income information and at least partially based on the user data, wherein providing the guided question and answer exploration through tax topics associated with the taxable income includes providing questions related to the tax topics associated with the taxable income, in the order of relevance to the user. 18. The system of claim 15, wherein the characteristics include a source of user income and a quantity of the user income. 19. The system of claim 15, wherein the first section is different from the second section and the first section occupies a different area within the user interface than the second section. 20. The system of claim 19, wherein the first section is positioned above the second section in the user interface. 21. The system of claim 15, further comprising:
displaying, with a computing device, user deduction information at least partially based on user data received from a user. 22. The system of claim 21, wherein the user deduction information identifies one or more of child tax credit, mortgage interest, earned income credit, student load interest, dependent information, and charitable donations for the user. 23. The system of claim 21, wherein the user deduction information is first user deduction information, the method further comprising:
prior to acquiring second user deduction information from the user during the tax return preparation interview, displaying characteristics for the first user deduction information in the first section of the user interface to orient the user with a deduction section of the tax return preparation interview and to indicate to the user which of the first user deduction information has been identified by the electronic tax return preparation system as being relevant to the user. 24. The system of claim 23, further comprising:
in the second section of the user interface, acquiring the second user deduction information from the user, in response to receipt of an indication from the user that the first user deduction information is an incomplete representation of total user deduction information for the user; and updating the first section of the user interface with the second user deduction information acquired from the user within the second section of the user interface to provide an updated status of the total user deduction information acquired by the electronic tax return preparation system for the user, to improve understandability by the user of the tax return preparation interview and to reduce the likelihood of abandonment of the tax return preparation interview by the user. 25. The system of claim 24, wherein acquiring the second user deduction includes providing, in the second section of the user interface, at least one of:
an expandable and self-explorable table of contents of tax topics associated with tax deductions and credits; and a guided question and answer exploration through the tax topics associated with tax deductions and credits. 26. The system of claim 25, wherein the tax topics associated with the tax deductions and credits are ranked in order of relevance to the user, based on the first and second user income information and at least partially based on the user data, wherein providing the guided question and answer exploration through tax topics includes providing questions related with the tax topics associated with the tax deduction and credits in the order of relevance to the user. 27. The system of claim 15, wherein the user data includes one or more of:
a change in marital status; a change in number of dependents; a change of address; and a death. 28. The system of claim 15, wherein user data includes one or more of:
a job change; a change in salary; a new dependent; a change of address; a purchase of a home; a selling of a home; receipt of unemployment; educational expenses; indication of having performed contract work; and ownership of a business. | 3,600 |
13,438 | 13,438 | 14,630,092 | 3,621 | Systems and methods for publishing content are provided. One method includes generating a content item template for a content item configured for publication within one or more resources. The method further includes storing the content item template within a memory for later publication. The method further includes receiving input data from the content provider and detecting a trigger signal associated with the content item. The method further includes entering the content item into an auction in response to detecting the trigger signal. The method further includes adding the input data provided by the content provider via the interface to the content item template to generate the content item prior to publication of the content item within the one or more resources. | 1. A method comprising:
generating, by a content publication system including one or more processors, a content item template for a content item configured for publication within one or more resources provided by one or more publishers, the content item associated with a content provider, the generating including creating a content item template that includes a set of content and one or more fields configured to be populated at a later time based on subsequent input from the content provider; storing, by the content publication system, the generated content item template within a memory for later publication; prior to receiving the subsequent input from the content provider, withholding the content item from publication through auctions; receiving, by the content publication system, the subsequent input from the content provider through a social media interface that is separate from an interface of the content publication system; detecting, by the one or more processors, a trigger signal indicating that the content item is available for entry into an auction based on a current time being after a start time of a live event, wherein the trigger signal is defined by the content provider; entering, by the content publication system, the content item into an auction to publish content items within a resource provided by a publisher only after detecting the trigger signal and receiving the subsequent input; populating, by the content publication system, the stored content item template with the subsequent input data received from the content provider through the social media interface to generate the content item prior to publication of the content item within the resource provided by the publisher based on an outcome of the auction; and providing the content item for presentation in the resource provided by the publisher. 2. The method of claim 1, further comprising:
linking, by the content publication system, to a social network account of the content provider. 3. (canceled) 4. The method of claim 1, wherein the step of entering the content item into the auction comprises entering the content item into the auction within a threshold amount of time after receipt of the subsequent input data or detecting the trigger signal. 5. (canceled) 6. The method of claim 1, further comprising receiving input indicating manual activation of the trigger signal by the content provider. 7. The method of claim 1, the step of detecting the trigger signal comprising:
monitoring, by the one or more processors, the trigger condition and determining whether the trigger condition has been fulfilled; and activating the trigger signal in response to determining the trigger condition has been fulfilled. 8. (canceled) 9. The method of claim 1, further comprising:
publishing a plurality of first instances of the content item within the one or more resources; receiving interaction data indicating interactions by one or more user devices with the first instances of the content item; modifying the content item template to provide an indication relating to the interactions based on the interaction data; and publishing a second instance of the content item within the one or more resources using the modified content item template including the indication relating to the interactions. 10. The method of claim 9, the step of publishing the second instance comprising publishing the second instance of the content item within the one or more resources within a threshold amount of time after receiving the interaction data. 11. The method of claim 9, wherein the interaction data comprises data relating to one or more of:
a number of views of the content item; a number of selections of the content item; or a number of conversions associated with the content item. 12. A system comprising:
at least one computing device operably coupled to at least one memory and configured to: generate, by a content publication system including one or more processors, a content item template for a content item configured for publication within one or more resources provided by one or more publishers, the content item associated with a content provider, the generating including creating a content item template that includes a set of content and one or more fields configured to be populated at a later time based on subsequent input from the content provider; store, by the content publication system, the generated content item template within a memory for later publication; prior to receiving the subsequent input from the content provider, withhold the content item from publication through auctions; receive, by the content publication system, the subsequent input from the content provider through a social media interface that is separate from an interface of the content publication system; detect a trigger signal indicating that the content item is available for entry into an auction based on a current time being after a start time of a live event, wherein the trigger signal is defined by the content provider; enter, by the content publication system, the content item into an auction to publish content items within a resource provided by a publisher only after detecting the trigger signal and receiving the subsequent input; populate, by the content publication system, the stored content item template with the subsequent input data received from the content provider through the social media interface to generate the content item prior to publication of the content item within the resource provided by the publisher based on an outcome of the auction, and provide the content item for presentation in the resource provided by the publisher. 13. The system of claim 12, the content item template comprising a text field, the subsequent input data comprising a text string, and the at least one computing device configured to modify the content item template by inserting the text string into the text field prior to publication of the content item. 14. The system of claim 12, wherein the at least one computing device is configured to enter the content item into the auction within a threshold amount of time after receipt of the input data or detecting the trigger signal. 15. (canceled) 16. The system of claim 12, wherein the at least one computing device is configured receive input indicating manual activation of the trigger signal by the content provider. 17. The system of claim 12, wherein the at least one computing device is configured to detect the trigger signal by:
monitoring the trigger condition and determining whether the trigger condition has been fulfilled; and activating the trigger signal in response to determining the trigger condition has been fulfilled. 18. The system of claim 12, wherein the at least one computing device is further configured to:
publish a plurality of first instances of the content item within the one or more resources; receive interaction data indicating interactions by one or more user devices with the first instances of the content item; modify the content item template to provide an indication relating to the interactions based on the interaction data; and publish a second instance of the content item within the one or more resources using the modified content item template including the indication relating to the interactions. 19. The system of claim 18, wherein the at least one computing device is configured to publish the second instance of the content item within the one or more resources within a threshold amount of time after receiving the interaction data. 20. One or more non-transitory computer-readable storage media having instructions stored thereon that, when executed by one or more processors, cause the one or more processors to execute operations comprising:
generating, a content item template for a content item configured for publication within one or more resources provided by one or more publishers, the content item associated with a content provider, the generating including creating a content item template that includes a set of content and one or more fields configured to be populated at a later time based on subsequent input from the content provider; storing the generated content item template within a memory for later publication; prior to receiving the subsequent input from the content provider, withholding the content item from publication through auctions; receiving the subsequent input from the content provider through a social media interface that is separate from an interface of the content publication system; detecting a trigger signal indicating that the content item is available for entry into an auction based on a current time being after a start time of a live event, wherein the trigger signal is defined by the content provider; entering the content item into an auction to publish content items within a resource provided by a publisher only after detecting the trigger signal and receiving the subsequent input; populating the stored content item template with the subsequent input data received from the content provider through the social media interface to generate the content item prior to publication of the content item within the resource provided by the publisher based on an outcome of the auction; and providing the content item for presentation in the resource provided by the publisher. 21. The method of claim 1, wherein the stored content item template has been processed through a build process, and the content item is provided for presentation without waiting for another build process to complete after receiving the subsequent input data. | Systems and methods for publishing content are provided. One method includes generating a content item template for a content item configured for publication within one or more resources. The method further includes storing the content item template within a memory for later publication. The method further includes receiving input data from the content provider and detecting a trigger signal associated with the content item. The method further includes entering the content item into an auction in response to detecting the trigger signal. The method further includes adding the input data provided by the content provider via the interface to the content item template to generate the content item prior to publication of the content item within the one or more resources.1. A method comprising:
generating, by a content publication system including one or more processors, a content item template for a content item configured for publication within one or more resources provided by one or more publishers, the content item associated with a content provider, the generating including creating a content item template that includes a set of content and one or more fields configured to be populated at a later time based on subsequent input from the content provider; storing, by the content publication system, the generated content item template within a memory for later publication; prior to receiving the subsequent input from the content provider, withholding the content item from publication through auctions; receiving, by the content publication system, the subsequent input from the content provider through a social media interface that is separate from an interface of the content publication system; detecting, by the one or more processors, a trigger signal indicating that the content item is available for entry into an auction based on a current time being after a start time of a live event, wherein the trigger signal is defined by the content provider; entering, by the content publication system, the content item into an auction to publish content items within a resource provided by a publisher only after detecting the trigger signal and receiving the subsequent input; populating, by the content publication system, the stored content item template with the subsequent input data received from the content provider through the social media interface to generate the content item prior to publication of the content item within the resource provided by the publisher based on an outcome of the auction; and providing the content item for presentation in the resource provided by the publisher. 2. The method of claim 1, further comprising:
linking, by the content publication system, to a social network account of the content provider. 3. (canceled) 4. The method of claim 1, wherein the step of entering the content item into the auction comprises entering the content item into the auction within a threshold amount of time after receipt of the subsequent input data or detecting the trigger signal. 5. (canceled) 6. The method of claim 1, further comprising receiving input indicating manual activation of the trigger signal by the content provider. 7. The method of claim 1, the step of detecting the trigger signal comprising:
monitoring, by the one or more processors, the trigger condition and determining whether the trigger condition has been fulfilled; and activating the trigger signal in response to determining the trigger condition has been fulfilled. 8. (canceled) 9. The method of claim 1, further comprising:
publishing a plurality of first instances of the content item within the one or more resources; receiving interaction data indicating interactions by one or more user devices with the first instances of the content item; modifying the content item template to provide an indication relating to the interactions based on the interaction data; and publishing a second instance of the content item within the one or more resources using the modified content item template including the indication relating to the interactions. 10. The method of claim 9, the step of publishing the second instance comprising publishing the second instance of the content item within the one or more resources within a threshold amount of time after receiving the interaction data. 11. The method of claim 9, wherein the interaction data comprises data relating to one or more of:
a number of views of the content item; a number of selections of the content item; or a number of conversions associated with the content item. 12. A system comprising:
at least one computing device operably coupled to at least one memory and configured to: generate, by a content publication system including one or more processors, a content item template for a content item configured for publication within one or more resources provided by one or more publishers, the content item associated with a content provider, the generating including creating a content item template that includes a set of content and one or more fields configured to be populated at a later time based on subsequent input from the content provider; store, by the content publication system, the generated content item template within a memory for later publication; prior to receiving the subsequent input from the content provider, withhold the content item from publication through auctions; receive, by the content publication system, the subsequent input from the content provider through a social media interface that is separate from an interface of the content publication system; detect a trigger signal indicating that the content item is available for entry into an auction based on a current time being after a start time of a live event, wherein the trigger signal is defined by the content provider; enter, by the content publication system, the content item into an auction to publish content items within a resource provided by a publisher only after detecting the trigger signal and receiving the subsequent input; populate, by the content publication system, the stored content item template with the subsequent input data received from the content provider through the social media interface to generate the content item prior to publication of the content item within the resource provided by the publisher based on an outcome of the auction, and provide the content item for presentation in the resource provided by the publisher. 13. The system of claim 12, the content item template comprising a text field, the subsequent input data comprising a text string, and the at least one computing device configured to modify the content item template by inserting the text string into the text field prior to publication of the content item. 14. The system of claim 12, wherein the at least one computing device is configured to enter the content item into the auction within a threshold amount of time after receipt of the input data or detecting the trigger signal. 15. (canceled) 16. The system of claim 12, wherein the at least one computing device is configured receive input indicating manual activation of the trigger signal by the content provider. 17. The system of claim 12, wherein the at least one computing device is configured to detect the trigger signal by:
monitoring the trigger condition and determining whether the trigger condition has been fulfilled; and activating the trigger signal in response to determining the trigger condition has been fulfilled. 18. The system of claim 12, wherein the at least one computing device is further configured to:
publish a plurality of first instances of the content item within the one or more resources; receive interaction data indicating interactions by one or more user devices with the first instances of the content item; modify the content item template to provide an indication relating to the interactions based on the interaction data; and publish a second instance of the content item within the one or more resources using the modified content item template including the indication relating to the interactions. 19. The system of claim 18, wherein the at least one computing device is configured to publish the second instance of the content item within the one or more resources within a threshold amount of time after receiving the interaction data. 20. One or more non-transitory computer-readable storage media having instructions stored thereon that, when executed by one or more processors, cause the one or more processors to execute operations comprising:
generating, a content item template for a content item configured for publication within one or more resources provided by one or more publishers, the content item associated with a content provider, the generating including creating a content item template that includes a set of content and one or more fields configured to be populated at a later time based on subsequent input from the content provider; storing the generated content item template within a memory for later publication; prior to receiving the subsequent input from the content provider, withholding the content item from publication through auctions; receiving the subsequent input from the content provider through a social media interface that is separate from an interface of the content publication system; detecting a trigger signal indicating that the content item is available for entry into an auction based on a current time being after a start time of a live event, wherein the trigger signal is defined by the content provider; entering the content item into an auction to publish content items within a resource provided by a publisher only after detecting the trigger signal and receiving the subsequent input; populating the stored content item template with the subsequent input data received from the content provider through the social media interface to generate the content item prior to publication of the content item within the resource provided by the publisher based on an outcome of the auction; and providing the content item for presentation in the resource provided by the publisher. 21. The method of claim 1, wherein the stored content item template has been processed through a build process, and the content item is provided for presentation without waiting for another build process to complete after receiving the subsequent input data. | 3,600 |
13,439 | 13,439 | 15,238,746 | 3,695 | Data transaction request message information associated with a user, a first limit parameter associated with the user, and a second limit parameter associated with the user are stored in memory. A processing system calculates, at a first time, data transaction requests associated with the user and a transactional rate parameter associated with the user based on a relationship between the data transaction requests associated with the user and the second limit amount parameter. Data transaction request messages received from the user between the first time and a second later time are monitored. The transactional rate parameter is adjusted based on data transaction requests associated with the user received between the first and second times. A transactional limit parameter is calculated using the data transaction requests associated with the user, the transactional rate parameter, and the first limit parameter. When the transactional limit parameter is exceeded, execution of further data transactions of a first type requested by the user between the first time and the second later time is suspended. | 1. A computer system for processing electronic data transaction messages, comprising:
a backend computer server configured to determine a first limit parameter associated with a user and a second limit parameter associated with the user; a frontend computer server configured for communication with the backend server and to receive from user devices electronic data transaction request messages and from the backend computer server the first limit parameter associated with the user and the second limit parameter associated with the user, the frontend server including: a memory configured to store electronic data transaction request message information associated with the user, the first limit parameter associated with the user, and the second limit parameter associated with the user, and a processing system that includes at least one processor, the processing system configured to: at a first time, calculate data transaction requests associated with the user and a transactional rate parameter associated with the user based on a relationship between the data transaction requests associated with the user and the second limit amount parameter; monitor data transaction request messages received from one or more client computers associated with the user between the first time and a second later time; adjust the transactional rate parameter based on currently pending data transaction requests associated with the user received between the first and second times; calculate a transactional limit parameter using the data transaction requests associated with the user, the transactional rate parameter, and the first limit parameter; determine whether the transactional limit parameter is exceeded; and when the transactional limit parameter is exceeded, suspend execution of further data transactions of a first type requested by the user between the first time and the second later time. 2. The computer system in claim 1, wherein the processing system is configured, when the transactional limit is exceeded, to permit further data transactions of a second different type requested by the user between the first time and a second later time. 3. The computer system in claim 1, wherein different ones of the data transaction request messages include different units of measure, and wherein the processing system is configured to convert the different data transaction requests to a same unit of measure. 4. The computer system in claim 1, wherein the processing system is configured to permit further data transactions requested by the user between the first time and a second later time when the transactional limit parameter is not exceeded based on the monitored data transaction request messages. 5. The computer system in claim 1, wherein different ones of the data transaction requests include different units of measure, and
wherein the processing system is configured to: calculate a difference parameter for each set of data transaction requests having a different unit of measure, calculate the current transactional limit at a time between the first and second times using the calculated difference parameters. 6. The computer system in claim 1, wherein the processing system is configured to adjust the first limit parameter and the second limit parameter using a predetermined factor. 7. A method for processing electronic data transaction messages, comprising:
a backend computer server determining a first limit parameter associated with a user and a second limit parameter associated with the user; a frontend server receiving from user devices electronic data transaction request messages and from the backend computer server the first limit parameter associated with the user and the second limit parameter associated with the user; storing in a non-transitory storage medium electronic data transaction request message information associated with the user, the first limit parameter associated with the user, and the second limit parameter associated with the user; calculating at a first time data transaction requests associated with the user and a transactional rate parameter associated with the user based on a relationship between the data transaction requests associated with the user and the second limit amount parameter; monitoring data transaction request messages received from one or more client computers associated with the user between the first time and a second later time; adjusting the transactional rate parameter based on data transaction requests associated with the user received between the first and second times; calculating a transactional limit parameter using the data transaction requests associated with the user, the transactional rate parameter, and the first limit parameter; determining whether the transactional limit parameter is exceeded; and when the transactional limit parameter is exceeded, suspending execution of further data transactions of a first type requested by the user between the first time and the second later time. 8. The method in claim 7, further comprising, when the transactional limit is exceeded, permitting further data transactions of a second different type requested by the user between the first time and a second later time. 9. The method in claim 7, wherein different ones of the data transaction requests include different units of measure, and wherein the method further comprises converting the different data transaction requests to a same unit of measure. 10. The method in claim 7, further comprising permitting further data transactions requested by the user between the first time and a second later time when the transactional limit parameter is not exceeded based on the monitored data transaction request messages. 11. The method in claim 7, wherein different ones of the data transaction requests include different units of measure, the method further comprising:
calculating a difference parameter for each set of data transaction requests having a different unit of measure, calculating the current transactional limit at a time between the first and second times using the calculated difference parameters. 12. The method in claim 7, further comprising adjusting the first limit parameter and the second limit parameter using a predetermined factor. | Data transaction request message information associated with a user, a first limit parameter associated with the user, and a second limit parameter associated with the user are stored in memory. A processing system calculates, at a first time, data transaction requests associated with the user and a transactional rate parameter associated with the user based on a relationship between the data transaction requests associated with the user and the second limit amount parameter. Data transaction request messages received from the user between the first time and a second later time are monitored. The transactional rate parameter is adjusted based on data transaction requests associated with the user received between the first and second times. A transactional limit parameter is calculated using the data transaction requests associated with the user, the transactional rate parameter, and the first limit parameter. When the transactional limit parameter is exceeded, execution of further data transactions of a first type requested by the user between the first time and the second later time is suspended.1. A computer system for processing electronic data transaction messages, comprising:
a backend computer server configured to determine a first limit parameter associated with a user and a second limit parameter associated with the user; a frontend computer server configured for communication with the backend server and to receive from user devices electronic data transaction request messages and from the backend computer server the first limit parameter associated with the user and the second limit parameter associated with the user, the frontend server including: a memory configured to store electronic data transaction request message information associated with the user, the first limit parameter associated with the user, and the second limit parameter associated with the user, and a processing system that includes at least one processor, the processing system configured to: at a first time, calculate data transaction requests associated with the user and a transactional rate parameter associated with the user based on a relationship between the data transaction requests associated with the user and the second limit amount parameter; monitor data transaction request messages received from one or more client computers associated with the user between the first time and a second later time; adjust the transactional rate parameter based on currently pending data transaction requests associated with the user received between the first and second times; calculate a transactional limit parameter using the data transaction requests associated with the user, the transactional rate parameter, and the first limit parameter; determine whether the transactional limit parameter is exceeded; and when the transactional limit parameter is exceeded, suspend execution of further data transactions of a first type requested by the user between the first time and the second later time. 2. The computer system in claim 1, wherein the processing system is configured, when the transactional limit is exceeded, to permit further data transactions of a second different type requested by the user between the first time and a second later time. 3. The computer system in claim 1, wherein different ones of the data transaction request messages include different units of measure, and wherein the processing system is configured to convert the different data transaction requests to a same unit of measure. 4. The computer system in claim 1, wherein the processing system is configured to permit further data transactions requested by the user between the first time and a second later time when the transactional limit parameter is not exceeded based on the monitored data transaction request messages. 5. The computer system in claim 1, wherein different ones of the data transaction requests include different units of measure, and
wherein the processing system is configured to: calculate a difference parameter for each set of data transaction requests having a different unit of measure, calculate the current transactional limit at a time between the first and second times using the calculated difference parameters. 6. The computer system in claim 1, wherein the processing system is configured to adjust the first limit parameter and the second limit parameter using a predetermined factor. 7. A method for processing electronic data transaction messages, comprising:
a backend computer server determining a first limit parameter associated with a user and a second limit parameter associated with the user; a frontend server receiving from user devices electronic data transaction request messages and from the backend computer server the first limit parameter associated with the user and the second limit parameter associated with the user; storing in a non-transitory storage medium electronic data transaction request message information associated with the user, the first limit parameter associated with the user, and the second limit parameter associated with the user; calculating at a first time data transaction requests associated with the user and a transactional rate parameter associated with the user based on a relationship between the data transaction requests associated with the user and the second limit amount parameter; monitoring data transaction request messages received from one or more client computers associated with the user between the first time and a second later time; adjusting the transactional rate parameter based on data transaction requests associated with the user received between the first and second times; calculating a transactional limit parameter using the data transaction requests associated with the user, the transactional rate parameter, and the first limit parameter; determining whether the transactional limit parameter is exceeded; and when the transactional limit parameter is exceeded, suspending execution of further data transactions of a first type requested by the user between the first time and the second later time. 8. The method in claim 7, further comprising, when the transactional limit is exceeded, permitting further data transactions of a second different type requested by the user between the first time and a second later time. 9. The method in claim 7, wherein different ones of the data transaction requests include different units of measure, and wherein the method further comprises converting the different data transaction requests to a same unit of measure. 10. The method in claim 7, further comprising permitting further data transactions requested by the user between the first time and a second later time when the transactional limit parameter is not exceeded based on the monitored data transaction request messages. 11. The method in claim 7, wherein different ones of the data transaction requests include different units of measure, the method further comprising:
calculating a difference parameter for each set of data transaction requests having a different unit of measure, calculating the current transactional limit at a time between the first and second times using the calculated difference parameters. 12. The method in claim 7, further comprising adjusting the first limit parameter and the second limit parameter using a predetermined factor. | 3,600 |
13,440 | 13,440 | 15,730,630 | 3,685 | An electronic compression filter is designed capable of locating unnecessary data in polling data. A statistical based polling error analysis using past polling data and past voting data from multiple geographic regions, converting these error signals into filtered occurrence frequencies associated with various standard deviation intervals, assigning priority codes to repeating geographic regions and then compressing these signals. The purpose is to reduce the amount of polling data to be processed, but application of the compression filter to upcoming polling data can predict the winner of the upcoming election. | 1. An electronic compression filtering system that compresses polling data and improves computer performance used in processing the compressed polling data comprising:
a digital computer with an accessible relational database; a first input means for receiving past polling data applicable to the Republican and Democrat candidates in an election from at least one past polling period from multiple geographic regions; a second input means for receiving past voting data related to the polling data received in said first input means; a first logic means for generating polling error data from said past polling data and said past voting data; a second logic means for generating rounded occurrence event data from the said polling error data and arranged into standard deviation intervals, said standard deviation intervals rounded to the nearest whole integer or half integer; and said rounded occurrence event data has a standard deviation interval value associated with each geographic region; a third logic means for generating occurrence frequency data from the rounded occurrence event data; wherein said standard deviation interval value is selected from one of the following:
(i) 0;
(ii) 0 and one or more of the following values: −1 and +1, when whole integer rounding is used, and
(iii) 0 and one or more of the following: values: −0.5, +0.5, −1 and +1, when half integer rounding is used; and
wherein said occurrence frequency data maintains a relationship to the geographic regions, the Republican and Democrat candidates, and each past polling period;
a fourth logic means for combining said occurrence frequency data applicable to the geographic regions for the Republican and Democrat candidates for at least one past polling period and for generating electronic compression filter data that are related to a limited number of geographic regions and comprising a reduction of at least 30 to 90 percent of the total number of geographic regions; and an application means for processing said electronic compression filter data by performing at least one of the following steps:
(a) a report generation means for generating a report identifying said limited number of geographic regions; and
(b) a projection processing means for applying said limited number of geographic regions to polling data applicable to an upcoming election comprising:
an input means for receiving polling data applicable to an upcoming election;
a means for processing said polling data applicable to an upcoming election as reduced by said limited number of geographic regions; and
a means for displaying a projected winner of said upcoming election. 2. The system of claim 1 wherein said occurrence frequency data have a standard deviation interval value of 0. 3. The system of claim 2 wherein said occurrence event data are rounded to the nearest whole integer. 4. The system of claim 1 wherein said occurrence event data are rounded to the nearest half integer. 5. The system of claim 1 wherein a priority code is assigned to the electronic compression filter data and equal to the number of times each geographic region occurs, and said application means uses said projection processing set forth under step (b). 6. The system of claim 5 wherein each geographic region with an assigned priority code has the highest priority code, and said application means uses said projection processing set forth under step (b). 7. (canceled) 8. (canceled) 9. A method of filtering and compressing polling data that improves computer performance in processing the compressed polling data comprising:
receiving past polling data applicable to the Republican and Democrat candidates in at least one past election period from multiple geographic regions; receiving past voting data applicable to said past polling data; generating polling error data from said past polling data and said past voting data; generating rounded occurrence event data from the said polling error data and arranged into standard deviation intervals and rounded to the nearest whole integer or half integer; and said rounded occurrence event data has a standard deviation interval value associated with each geographic region; generating occurrence frequency data from said rounded occurrence event data, wherein said standard deviation interval value is selected from one of the following:
(i) 0 or 0 and one or more of the following values: −1 and +1, when whole integer rounding is used, and
(ii) 0 or 0 and one or more of the following: values: −0.5, +0.5, −1 and +1, when half integer rounding is used, and wherein said occurrence frequency data maintain a relationship to the geographic regions applicable to the Republican and Democrat candidates and to each past polling period;
generating electronic compression filter data from the occurrence frequency data by combining the geographic regions for the Republican and Democrat candidates for at least one past polling period, wherein said electronic compression filter data are related to a limited number of geographic regions and comprising a reduction of at least 30 to 90 percent of the total number of geographic regions; and applying said electronic compression filter data by performing at least one additional step selected from the group consisting of:
(a) generating a report identifying said limited number of geographic regions included within the compression filter data; and
(b) projecting a winner in an upcoming election by:
receiving polling data applicable to an upcoming election;
processing said polling data applicable to said upcoming election as reduced by said limited number of geographic regions; and
displaying a projected winner of said upcoming election. 10. The method of claim 9 wherein said occurrence frequency data are further filtered by using a standard deviation interval value of 0. 11. The method of claim 9 wherein said occurrence event data are rounded to the nearest whole integer. 12. The method of claim 9 wherein said occurrence event data are rounded to the nearest half integer. 13. The method of claim 9 wherein the geographic regions included within the compression filter data are assigned a priority code equal to the number of times each geographic region occurs and said additional step uses step (b). 14. The method of claim 9 wherein only those geographic regions with the highest priority codes are selected and said additional step uses step (b). 15. A method of filtering and compressing polling data in a national United States election that improves computer performance in processing the compressed polling data comprising:
receiving past polling data applicable to the Republican and Democrat candidates in at least one past polling period in a United States presidential election; receiving past voting data related to said past polling data; generating polling error data from said past polling data and said past voting data; generating rounded occurrence event data from said polling error data and arranged into standard deviation intervals, said standard deviation intervals being rounded to the nearest whole integer or half integer; and said rounded occurrence event data has a standard deviation interval value associated with each geographic region; generating occurrence frequency data from said rounded occurrence event data wherein said occurrence frequency data maintain a relationship to the States applicable to the Republican and Democratic candidates and to each past polling period, and wherein said standard deviation interval value is selected from one of the following:
(i) 0;
(ii) 0 and one or more of the following values: −1 and +1, when whole integer rounding is used, and
(iii) 0 and one or more of the following: values: −0.5, +0.5, −1 and +1, when half integer rounding is used; and
generating compression filter data from the occurrence frequency by combining the States for the Republican and Democrat candidates for at least one past polling period and resulting in States being repeated; each of said States are assigned a priority code equal to the number of times each State occurs; and at least one priority code is selected resulting in a limited number of States of no more than 25 nor less than 8 States included within said compression filter data; and subjecting said compression filter data to at least one additional step selected from the group consisting of:
(a) generating a report identifying said limited number of States included within the compression filter data; and
(b) receiving polling data for an upcoming US presidential election for the Republican and Democrat candidates,
processing said polling data for said upcoming US presidential election as reduced by said limited number of States included within said compression filter data; and
displaying a projected winner of said upcoming US presidential election. 16. The method of claim 15 wherein said occurrence event data are rounded to the nearest standard deviation interval whole integer and the selected standard deviation interval value is 0. 17. The method of claim 15 wherein said additional step uses step (b), said occurrence event data are rounded to the nearest standard deviation interval half integer, and the selected standard deviation interval value is selected from one of the following values:
0;
0 plus −0.5;
0 plus +0.5; and
0 plus −0.5 plus +0.5 18. The method of claim 15 wherein the past polling data are from the election period immediately prior to a current election cycle and said additional step uses step (b). 19. The method of claim 15 wherein said additional step uses step (b) and the past polling data are from multiple election periods selected from one of the following:
two election periods closest in time to an upcoming election;
two election periods within 4 election periods closest in time to an upcoming election;
three election periods closest in time to an upcoming election; and
three election periods within 4 election periods closest in time to an upcoming election. 20. The method of claim 15 wherein said additional step uses step (b) and multiple different filter and compression setting are selected. | An electronic compression filter is designed capable of locating unnecessary data in polling data. A statistical based polling error analysis using past polling data and past voting data from multiple geographic regions, converting these error signals into filtered occurrence frequencies associated with various standard deviation intervals, assigning priority codes to repeating geographic regions and then compressing these signals. The purpose is to reduce the amount of polling data to be processed, but application of the compression filter to upcoming polling data can predict the winner of the upcoming election.1. An electronic compression filtering system that compresses polling data and improves computer performance used in processing the compressed polling data comprising:
a digital computer with an accessible relational database; a first input means for receiving past polling data applicable to the Republican and Democrat candidates in an election from at least one past polling period from multiple geographic regions; a second input means for receiving past voting data related to the polling data received in said first input means; a first logic means for generating polling error data from said past polling data and said past voting data; a second logic means for generating rounded occurrence event data from the said polling error data and arranged into standard deviation intervals, said standard deviation intervals rounded to the nearest whole integer or half integer; and said rounded occurrence event data has a standard deviation interval value associated with each geographic region; a third logic means for generating occurrence frequency data from the rounded occurrence event data; wherein said standard deviation interval value is selected from one of the following:
(i) 0;
(ii) 0 and one or more of the following values: −1 and +1, when whole integer rounding is used, and
(iii) 0 and one or more of the following: values: −0.5, +0.5, −1 and +1, when half integer rounding is used; and
wherein said occurrence frequency data maintains a relationship to the geographic regions, the Republican and Democrat candidates, and each past polling period;
a fourth logic means for combining said occurrence frequency data applicable to the geographic regions for the Republican and Democrat candidates for at least one past polling period and for generating electronic compression filter data that are related to a limited number of geographic regions and comprising a reduction of at least 30 to 90 percent of the total number of geographic regions; and an application means for processing said electronic compression filter data by performing at least one of the following steps:
(a) a report generation means for generating a report identifying said limited number of geographic regions; and
(b) a projection processing means for applying said limited number of geographic regions to polling data applicable to an upcoming election comprising:
an input means for receiving polling data applicable to an upcoming election;
a means for processing said polling data applicable to an upcoming election as reduced by said limited number of geographic regions; and
a means for displaying a projected winner of said upcoming election. 2. The system of claim 1 wherein said occurrence frequency data have a standard deviation interval value of 0. 3. The system of claim 2 wherein said occurrence event data are rounded to the nearest whole integer. 4. The system of claim 1 wherein said occurrence event data are rounded to the nearest half integer. 5. The system of claim 1 wherein a priority code is assigned to the electronic compression filter data and equal to the number of times each geographic region occurs, and said application means uses said projection processing set forth under step (b). 6. The system of claim 5 wherein each geographic region with an assigned priority code has the highest priority code, and said application means uses said projection processing set forth under step (b). 7. (canceled) 8. (canceled) 9. A method of filtering and compressing polling data that improves computer performance in processing the compressed polling data comprising:
receiving past polling data applicable to the Republican and Democrat candidates in at least one past election period from multiple geographic regions; receiving past voting data applicable to said past polling data; generating polling error data from said past polling data and said past voting data; generating rounded occurrence event data from the said polling error data and arranged into standard deviation intervals and rounded to the nearest whole integer or half integer; and said rounded occurrence event data has a standard deviation interval value associated with each geographic region; generating occurrence frequency data from said rounded occurrence event data, wherein said standard deviation interval value is selected from one of the following:
(i) 0 or 0 and one or more of the following values: −1 and +1, when whole integer rounding is used, and
(ii) 0 or 0 and one or more of the following: values: −0.5, +0.5, −1 and +1, when half integer rounding is used, and wherein said occurrence frequency data maintain a relationship to the geographic regions applicable to the Republican and Democrat candidates and to each past polling period;
generating electronic compression filter data from the occurrence frequency data by combining the geographic regions for the Republican and Democrat candidates for at least one past polling period, wherein said electronic compression filter data are related to a limited number of geographic regions and comprising a reduction of at least 30 to 90 percent of the total number of geographic regions; and applying said electronic compression filter data by performing at least one additional step selected from the group consisting of:
(a) generating a report identifying said limited number of geographic regions included within the compression filter data; and
(b) projecting a winner in an upcoming election by:
receiving polling data applicable to an upcoming election;
processing said polling data applicable to said upcoming election as reduced by said limited number of geographic regions; and
displaying a projected winner of said upcoming election. 10. The method of claim 9 wherein said occurrence frequency data are further filtered by using a standard deviation interval value of 0. 11. The method of claim 9 wherein said occurrence event data are rounded to the nearest whole integer. 12. The method of claim 9 wherein said occurrence event data are rounded to the nearest half integer. 13. The method of claim 9 wherein the geographic regions included within the compression filter data are assigned a priority code equal to the number of times each geographic region occurs and said additional step uses step (b). 14. The method of claim 9 wherein only those geographic regions with the highest priority codes are selected and said additional step uses step (b). 15. A method of filtering and compressing polling data in a national United States election that improves computer performance in processing the compressed polling data comprising:
receiving past polling data applicable to the Republican and Democrat candidates in at least one past polling period in a United States presidential election; receiving past voting data related to said past polling data; generating polling error data from said past polling data and said past voting data; generating rounded occurrence event data from said polling error data and arranged into standard deviation intervals, said standard deviation intervals being rounded to the nearest whole integer or half integer; and said rounded occurrence event data has a standard deviation interval value associated with each geographic region; generating occurrence frequency data from said rounded occurrence event data wherein said occurrence frequency data maintain a relationship to the States applicable to the Republican and Democratic candidates and to each past polling period, and wherein said standard deviation interval value is selected from one of the following:
(i) 0;
(ii) 0 and one or more of the following values: −1 and +1, when whole integer rounding is used, and
(iii) 0 and one or more of the following: values: −0.5, +0.5, −1 and +1, when half integer rounding is used; and
generating compression filter data from the occurrence frequency by combining the States for the Republican and Democrat candidates for at least one past polling period and resulting in States being repeated; each of said States are assigned a priority code equal to the number of times each State occurs; and at least one priority code is selected resulting in a limited number of States of no more than 25 nor less than 8 States included within said compression filter data; and subjecting said compression filter data to at least one additional step selected from the group consisting of:
(a) generating a report identifying said limited number of States included within the compression filter data; and
(b) receiving polling data for an upcoming US presidential election for the Republican and Democrat candidates,
processing said polling data for said upcoming US presidential election as reduced by said limited number of States included within said compression filter data; and
displaying a projected winner of said upcoming US presidential election. 16. The method of claim 15 wherein said occurrence event data are rounded to the nearest standard deviation interval whole integer and the selected standard deviation interval value is 0. 17. The method of claim 15 wherein said additional step uses step (b), said occurrence event data are rounded to the nearest standard deviation interval half integer, and the selected standard deviation interval value is selected from one of the following values:
0;
0 plus −0.5;
0 plus +0.5; and
0 plus −0.5 plus +0.5 18. The method of claim 15 wherein the past polling data are from the election period immediately prior to a current election cycle and said additional step uses step (b). 19. The method of claim 15 wherein said additional step uses step (b) and the past polling data are from multiple election periods selected from one of the following:
two election periods closest in time to an upcoming election;
two election periods within 4 election periods closest in time to an upcoming election;
three election periods closest in time to an upcoming election; and
three election periods within 4 election periods closest in time to an upcoming election. 20. The method of claim 15 wherein said additional step uses step (b) and multiple different filter and compression setting are selected. | 3,600 |
13,441 | 13,441 | 14,857,600 | 3,626 | The present invention relates generally to a prediction of health risk. Aspects of the present invention include using a general model to model a user's health risk. In embodiments of the present invention the general model is modified to a user's specific behaviors or inputs. In embodiments of the present invention the model is compared to actual data obtained by sensors in everyday consumer products. In embodiments of the present invention, based on the outcome of the comparison, an emergency response can be triggered and or health and wellness improvement behaviors can be suggested. | 1. A health risk prediction system for predicting a health risk profile of a user, the system comprising:
a data storage that stores data collected from a consumer product sensor and data input into the data storage; and a personal predictive medical analytics system that:
creates a general health model;
modifies the health model based on learned behavior;
compares the data stored in the data storage to the modified health model to determine a deviation in the data from the modified health model; and
generates a predictive health risk profile based on the comparison. 2. The system of claim 1 wherein the personal predictive medical analytics system triggers a diagnostic response. 3. The system of claim 1 wherein the personal predictive medical analytics system inquires further regarding the health risk profile. 4. The system of claim 1 wherein the personal predictive medical analytics system activates a response. 5. The system of claim 1 wherein the consumer product is a phone. 6. The system of claim 1 wherein the consumer product is a computer. 7. The system of claim 1 wherein the consumer product is a car. 8. A method for generating a predictive health risk profile, comprising:
collecting data from a consumer product sensor; creating a general health model for a user; modifying the general health model for the user based on the user's behavior to create a specific health model; comparing the data to the specific health model to determine a deviation in the data from the specific health model; and generating a predictive health risk profile based on the comparison. 9. The method of claim 8 further comprising triggering a diagnostic response. 10. The method of claim 8 further comprising inquiring further regarding the health risk profile. 11. The method of claim 8 further comprising activating a response. 12. The method of claim 8 wherein the consumer product is a phone. 13. The method of claim 8 wherein the consumer product is a computer. 14. The method of claim 8 wherein the consumer product is a car. 15. A context determination method in generating a health prediction profile, comprising:
collecting a first data from a first sensor in a first consumer product; determining the context of the first data to determine information about a user relating to the user's environment; using the context of the data to collect a second data from a second consumer product; collecting the second data from the second consumer product; correlating the first and second data based on the context; comparing the first and second data to a health model; and triggering a response based on the outcome of the comparison such that if the data deviates from the model, the response includes prompting the user. 16. The method of claim 15 wherein the first consumer product is a phone. 17. The method of claim 15 wherein the first consumer product is a tablet. 18. The method of claim 15 further comprising activating an emergency response based on a response from the user to the prompting. 19. The method of claim 15 wherein the health model is k-Nearest Neighbor. 20. The method of claim 15 wherein the health model is updated based on user behavior. | The present invention relates generally to a prediction of health risk. Aspects of the present invention include using a general model to model a user's health risk. In embodiments of the present invention the general model is modified to a user's specific behaviors or inputs. In embodiments of the present invention the model is compared to actual data obtained by sensors in everyday consumer products. In embodiments of the present invention, based on the outcome of the comparison, an emergency response can be triggered and or health and wellness improvement behaviors can be suggested.1. A health risk prediction system for predicting a health risk profile of a user, the system comprising:
a data storage that stores data collected from a consumer product sensor and data input into the data storage; and a personal predictive medical analytics system that:
creates a general health model;
modifies the health model based on learned behavior;
compares the data stored in the data storage to the modified health model to determine a deviation in the data from the modified health model; and
generates a predictive health risk profile based on the comparison. 2. The system of claim 1 wherein the personal predictive medical analytics system triggers a diagnostic response. 3. The system of claim 1 wherein the personal predictive medical analytics system inquires further regarding the health risk profile. 4. The system of claim 1 wherein the personal predictive medical analytics system activates a response. 5. The system of claim 1 wherein the consumer product is a phone. 6. The system of claim 1 wherein the consumer product is a computer. 7. The system of claim 1 wherein the consumer product is a car. 8. A method for generating a predictive health risk profile, comprising:
collecting data from a consumer product sensor; creating a general health model for a user; modifying the general health model for the user based on the user's behavior to create a specific health model; comparing the data to the specific health model to determine a deviation in the data from the specific health model; and generating a predictive health risk profile based on the comparison. 9. The method of claim 8 further comprising triggering a diagnostic response. 10. The method of claim 8 further comprising inquiring further regarding the health risk profile. 11. The method of claim 8 further comprising activating a response. 12. The method of claim 8 wherein the consumer product is a phone. 13. The method of claim 8 wherein the consumer product is a computer. 14. The method of claim 8 wherein the consumer product is a car. 15. A context determination method in generating a health prediction profile, comprising:
collecting a first data from a first sensor in a first consumer product; determining the context of the first data to determine information about a user relating to the user's environment; using the context of the data to collect a second data from a second consumer product; collecting the second data from the second consumer product; correlating the first and second data based on the context; comparing the first and second data to a health model; and triggering a response based on the outcome of the comparison such that if the data deviates from the model, the response includes prompting the user. 16. The method of claim 15 wherein the first consumer product is a phone. 17. The method of claim 15 wherein the first consumer product is a tablet. 18. The method of claim 15 further comprising activating an emergency response based on a response from the user to the prompting. 19. The method of claim 15 wherein the health model is k-Nearest Neighbor. 20. The method of claim 15 wherein the health model is updated based on user behavior. | 3,600 |
13,442 | 13,442 | 14,486,335 | 3,686 | A method and system for securely storing and accessing sensitive user data (e.g., personally identifying information or PII) is described. In an aspect, PII is divided into a plurality of separately stored data stores based on what type or field of PII are collected. Each piece of PII data or PII datum is associated with a unique code so as to form data pairs comprising the PII datum and the unique code associated with that PII datum. A tumbler data structure allows secure association of the unique codes for the PII data for each user. Once the tumbler data structure is unlocked, a provider can search and access the PII data of its users. | 1. A method for storing and accessing personally identifying information (PII) including a plurality of fields of PII, comprising:
collecting a plurality of PII data relating to a plurality of fields of PII for each user of a plurality of users; for each collected PII datum and for each of said users and for each field of PII collected, associating a unique identifying code with said PII datum so as to create unique data pairs, each data pair comprising said PII datum and its associated unique identifying code; for each of said fields of PII collected, storing said data pairs relating to a PII datum in said field of PII in respective separate data stores so that the data pairs for the plurality of fields of PII are not all stored in a same data store but are separated by the field of PII to which they relate; storing in a separate and secure data store a data structure that associates the unique identifying codes for each PII datum that are associated with a given user once said separate and secure data store is unlocked. 2. The method of claim 1, further comprising unlocking said separate and secure data store having the data structure that associates the unique identifying codes with their associated PII data so as to obtain the PII fields for said given user. 3. The method of claim 2, said unlocking comprising unencrypting an encrypted secure data store. 4. The method of claim 1, further comprising searching at least a range of PII based on a search criterion. 5. A system for storing and accessing sensitive personally identifying information (PII), comprising:
a first data store comprising a plurality of data pairs of a first field type, each of said data pairs of the first field type including a PII of said first field type and a corresponding unique identifying code for each of said PII of the first field type; a second data store comprising a plurality of data pairs of a second field type, different from said first field type, each of said data pairs of the second field type including a PII of said second field type and a corresponding unique identifying code for each of said PII of the second field type; and a third data store comprising associating said unique identifying codes of the first field type data pairs with said unique identifying codes of the second field type data pairs so as to permit uniquely associating the corresponding PII of said first types with the corresponding PII of said second types. | A method and system for securely storing and accessing sensitive user data (e.g., personally identifying information or PII) is described. In an aspect, PII is divided into a plurality of separately stored data stores based on what type or field of PII are collected. Each piece of PII data or PII datum is associated with a unique code so as to form data pairs comprising the PII datum and the unique code associated with that PII datum. A tumbler data structure allows secure association of the unique codes for the PII data for each user. Once the tumbler data structure is unlocked, a provider can search and access the PII data of its users.1. A method for storing and accessing personally identifying information (PII) including a plurality of fields of PII, comprising:
collecting a plurality of PII data relating to a plurality of fields of PII for each user of a plurality of users; for each collected PII datum and for each of said users and for each field of PII collected, associating a unique identifying code with said PII datum so as to create unique data pairs, each data pair comprising said PII datum and its associated unique identifying code; for each of said fields of PII collected, storing said data pairs relating to a PII datum in said field of PII in respective separate data stores so that the data pairs for the plurality of fields of PII are not all stored in a same data store but are separated by the field of PII to which they relate; storing in a separate and secure data store a data structure that associates the unique identifying codes for each PII datum that are associated with a given user once said separate and secure data store is unlocked. 2. The method of claim 1, further comprising unlocking said separate and secure data store having the data structure that associates the unique identifying codes with their associated PII data so as to obtain the PII fields for said given user. 3. The method of claim 2, said unlocking comprising unencrypting an encrypted secure data store. 4. The method of claim 1, further comprising searching at least a range of PII based on a search criterion. 5. A system for storing and accessing sensitive personally identifying information (PII), comprising:
a first data store comprising a plurality of data pairs of a first field type, each of said data pairs of the first field type including a PII of said first field type and a corresponding unique identifying code for each of said PII of the first field type; a second data store comprising a plurality of data pairs of a second field type, different from said first field type, each of said data pairs of the second field type including a PII of said second field type and a corresponding unique identifying code for each of said PII of the second field type; and a third data store comprising associating said unique identifying codes of the first field type data pairs with said unique identifying codes of the second field type data pairs so as to permit uniquely associating the corresponding PII of said first types with the corresponding PII of said second types. | 3,600 |
13,443 | 13,443 | 14,093,375 | 3,649 | A system for computing present value of civil legal cases and disputes using decision tree analysis that accounts for multiple possible outcomes with differing chances of occurrence and/or economic result. The system also computes odds of success, remaining length of litigation, hidden assumptions conveyed in settlement offers, and trains users in the valuation process. | 1. A computer implemented method, comprising:
generating a decision tree for the flow of litigation to possible outcomes based on whether the valuation pertains to a case before judgment, after judgment, or for the entirety of a case before and after judgment, the type of case being identified by data input from a user device or server; computing a valuation for each outcome resulting from issues of law terminating the litigation based on input-specified percentage odds of prevailing and dollar amounts expected to be gained or lost in the scope of attorney fees and costs relating to issues of law; adjusting the valuation of each outcome for issues of law branches by adding input-specified expense of attorney fees and costs expended on establishing or defeating the legal viability of claims, taking into account whether attorney fees and costs are reciprocal, one-way shifting, or not subject to any shifting; adjusting the valuation of each outcome for issues of law to account for input-specified prejudgment and/or postjudgment interest expended during the time required to establish or defeat the legal viability of claims; adjusting the valuation of each outcome for issues of law to account for input-specified discount rate as applied to the remainder of the time period until final resolution; computing the valuation for each outcome resulting from questions of fact resolving issues related to witness credibility, document authenticity, relative weights of evidence, and other issues going to evidentiary proof, including high, low, and other applicable estimates of money damages; adjusting the valuation of each outcome for questions of fact to account for input-specified expense of attorney fees and costs expended to prove or disprove factual claims, taking into account whether attorney fees and costs are reciprocal, one-way shifting, or not subject to any shifting; adjusting the valuation of each outcome relating to questions of fact to account for input-specified prejudgment and/or postjudgment interest on money damages corresponding to the time required to prove or disprove factual claims; adjusting the valuation of each outcome relating to resolution of questions of fact to account for input-specified discount rate as applied to the remainder of the time period until final resolution; computing the final expected value as the sum of expected, adjusted values of all possible outcomes; 2. The method of claim 1, wherein differences in intermediate and final computations due to revised, different, or additional data input from one or more users collaborating on valuation over a data or internet connection are computed; 3. The method of claim 1, wherein a non-transitory display of the decision tree, intermediate and final computations, and timeline are transmitted, printed, and/or otherwise rendered; 4. The method of claim 1, wherein odds, money damages, attorney fees, costs, and/or risk aversion premium are computed based on input-specified final expected value and other variables, with the risk aversion premium resulting from the difference between input specified final expected value and the computation resulting from the specified variables of damages, attorney fees, costs, interest, and discount rate. 5. The method of claim 1, wherein a computing device trains the user in the computer implemented method by presenting examples, eliciting input from the user, comparing user answers with result computed by the method of claim 1, and displaying the result. 6. The method of claim 1, applied to a database of multiple hypothetical, historical, or contemporaneous cases to determine statistics such as average, median, high, and low values for the cases in the data set. 7. The method of claim 1, applying to an action (such as a complaint and/or appeal) and applied to one or more cross-actions (such as cross-complaint(s) and/or cross-appeal(s)) and combining the value for the action and all cross-actions in two- and multi-party litigation. 8. A system, comprising:
a networked or non-networked environment of data storage and exchange between at least one user, at least one processor or distributed fractional processing resulting in the functional equivalent of a processor, and at least one display mechanism (whether transitory, non-transitory, and/or tangible) which are configured to: generate a decision tree showing the flow of litigation to possible outcomes based on whether the valuation pertains to a case before judgment, after judgment, or for the entirety of a case before and after judgment, the type of case being identified by input from a user device or server; compute the valuation for each outcome resulting from issues of law terminating the litigation based on input-specified percentage odds of prevailing and dollar amounts expected to be gained or lost in scope of attorney fees and costs relating to issues of law; adjust the valuation of each outcome for issues of law branches by adding the expense of input-specified attorney fees and costs expended on establishing or defeating the legal viability of claims, taking into account whether attorney fees and costs are reciprocal, one-way shifting, or not subject to any shifting; adjust the valuation of each outcome for issues of law to account for input-specified prejudgment and/or postjudgment interest expended during the time required to establish or defeat the legal viability of claims; adjust the valuation of each outcome for issues of law to account for a discount rate as applied to the remainder of the time period until final resolution; compute the valuation for each outcome resulting from questions of fact resolving issues related to witness credibility, document authenticity, relative weights of evidence, and other issues going to evidentiary proof, including high, low, and other applicable estimates of money damages; adjust the valuation of each outcome for questions of fact to account for the expense of attorney fees and costs expended to prove or disprove factual claims, taking into account whether attorney fees and costs are reciprocal, one-way shifting, or not subject to any shifting; adjust the valuation of each outcome relating to questions of fact to account for prejudgment and/or postjudgment interest on money damages corresponding to the time required to prove or disprove factual claims; adjust the valuation of each outcome relating to resolution of questions of fact to account for the discount rate as applied to the remainder of the time period until final resolution; compute the final expected value as the sum of expected, adjusted values of all possible outcomes. 9. The system of claim 8, wherein differences in intermediate and final computations due to revised, different, or additional data input from one or more users collaborating on valuation over a data or internet connection are computed. 10. The system of claim 8, wherein a non-transitory display of the decision tree, intermediate and final computations, and timeline, are transmitted, printed, and/or otherwise rendered. 11. The system of claim 8, wherein the system trains the user by displaying examples, eliciting input from the user, comparing user answers with result computed by the method of claim 6, and displaying the result of the comparison. 12. The system of claim 8, wherein at least one processor is configured to apply to a database for multiple hypothetical, historical, or contemporaneous cases to determine statistics such as average, median, high, and low, values for the cases in the data set. 13. The system of claim 8, wherein at least one processor is configured to apply to an action (such as a complaint and/or appeal) and applied to one or more cross-actions (such as cross-complaint(s) and/or cross-appeal(s)) and combining the value for the action and all cross-actions in two- and multi-party litigation. 14. A non-transitory computer readable medium encoded with a computer program comprising instructions that when executed cause a computer to perform operations:
generating a decision tree showing the flow of litigation to possible outcomes based on whether the valuation pertains to a case before judgment, after judgment, or for the entirety of a case before and after judgment; computing the valuation for each outcome resulting from issues of law terminating the litigation based on percentage odds of prevailing and dollar amounts expected to be gained or lost in the following categories: scope of attorney fees and costs relating to issues of law; adjusting the valuation of each outcome for issues of law branches by adding the expense of attorney fees and costs expended on establishing or defeating the legal viability of claims, taking into account whether attorney fees and costs are reciprocal, one-way shifting, or not subject to any shifting; adjusting the valuation of each outcome for issues of law to account for prejudgment and/or postjudgment interest expended during the time required to establish or defeat the legal viability of claims; adjusting the valuation of each outcome for issues of law to account for the discount rate as applied to the remainder of the time period until final resolution; computing the valuation for each outcome resulting from questions of fact resolving issues related to witness credibility, document authenticity, relative weights of evidence, and other issues going to evidentiary proof, including high, low, and other applicable estimates of money damages; adjusting the valuation of each outcome for questions of fact to account for the expense of attorney fees and costs expended to prove or disprove factual claims, taking into account whether attorney fees and costs are reciprocal, one-way shifting, or not subject to any shifting; adjusting the valuation of each outcome relating to questions of fact to account for prejudgment and/or postjudgment interest on money damages corresponding to the time required to prove or disprove factual claims; adjusting the valuation of each outcome relating to resolution of questions of fact to account for the discount rate as applied to the remainder of the time period until final resolution; computing the final expected value as the sum of expected, adjusted values of all possible outcomes. 15. The computer readable medium of claim 14, further comprising the instructions that when executed cause the computer to perform operations wherein differences in intermediate and final computations due to revised, different, or additional data input from one or more users collaborating on valuation over a data or internet connection are computed. 16. The computer readable medium of claim 14, further comprising the instructions that when executed cause the computer to perform operations to transmit, render, or print a non-transitory display of the decision tree, intermediate and final computations, and timeline. 17. The computer readable medium of claim 14, further comprising the instructions that when executed cause the computer to perform operations wherein percentage odds, money damages, attorney fees, costs, and/or risk aversion premium are computed based on input-specified final expected value and other variables, with the risk aversion premium resulting from the difference between input specified final expected value and the computation resulting from the specified variables of damages, attorney fees, costs, interest, and discount rate. 18. The computer readable medium of claim 14, further comprising the instructions that when executed cause the computer to perform operations wherein the system trains the user by presenting examples, eliciting input from the user, comparing user answers with result computed by the method of claim 11, and displaying the result of the comparison. 19. The computer readable medium of claim 14, further comprising the instructions that when executed cause the computer to apply operations to a database for multiple hypothetical, historical, or contemporaneous cases to determine statistics such as average, median, high, and low, expected final values for the cases in the data set. 20. The computer readable medium of claim 14, further comprising the instructions that when executed cause the computer to perform operations wherein at least one processor is configured to apply to an action (such as a complaint and/or appeal) and applied to one or more cross-actions (such as cross-complaint(s) and/or cross-appeal(s)) and combining the value for the action and all cross-actions in two- and multi-party litigation. | A system for computing present value of civil legal cases and disputes using decision tree analysis that accounts for multiple possible outcomes with differing chances of occurrence and/or economic result. The system also computes odds of success, remaining length of litigation, hidden assumptions conveyed in settlement offers, and trains users in the valuation process.1. A computer implemented method, comprising:
generating a decision tree for the flow of litigation to possible outcomes based on whether the valuation pertains to a case before judgment, after judgment, or for the entirety of a case before and after judgment, the type of case being identified by data input from a user device or server; computing a valuation for each outcome resulting from issues of law terminating the litigation based on input-specified percentage odds of prevailing and dollar amounts expected to be gained or lost in the scope of attorney fees and costs relating to issues of law; adjusting the valuation of each outcome for issues of law branches by adding input-specified expense of attorney fees and costs expended on establishing or defeating the legal viability of claims, taking into account whether attorney fees and costs are reciprocal, one-way shifting, or not subject to any shifting; adjusting the valuation of each outcome for issues of law to account for input-specified prejudgment and/or postjudgment interest expended during the time required to establish or defeat the legal viability of claims; adjusting the valuation of each outcome for issues of law to account for input-specified discount rate as applied to the remainder of the time period until final resolution; computing the valuation for each outcome resulting from questions of fact resolving issues related to witness credibility, document authenticity, relative weights of evidence, and other issues going to evidentiary proof, including high, low, and other applicable estimates of money damages; adjusting the valuation of each outcome for questions of fact to account for input-specified expense of attorney fees and costs expended to prove or disprove factual claims, taking into account whether attorney fees and costs are reciprocal, one-way shifting, or not subject to any shifting; adjusting the valuation of each outcome relating to questions of fact to account for input-specified prejudgment and/or postjudgment interest on money damages corresponding to the time required to prove or disprove factual claims; adjusting the valuation of each outcome relating to resolution of questions of fact to account for input-specified discount rate as applied to the remainder of the time period until final resolution; computing the final expected value as the sum of expected, adjusted values of all possible outcomes; 2. The method of claim 1, wherein differences in intermediate and final computations due to revised, different, or additional data input from one or more users collaborating on valuation over a data or internet connection are computed; 3. The method of claim 1, wherein a non-transitory display of the decision tree, intermediate and final computations, and timeline are transmitted, printed, and/or otherwise rendered; 4. The method of claim 1, wherein odds, money damages, attorney fees, costs, and/or risk aversion premium are computed based on input-specified final expected value and other variables, with the risk aversion premium resulting from the difference between input specified final expected value and the computation resulting from the specified variables of damages, attorney fees, costs, interest, and discount rate. 5. The method of claim 1, wherein a computing device trains the user in the computer implemented method by presenting examples, eliciting input from the user, comparing user answers with result computed by the method of claim 1, and displaying the result. 6. The method of claim 1, applied to a database of multiple hypothetical, historical, or contemporaneous cases to determine statistics such as average, median, high, and low values for the cases in the data set. 7. The method of claim 1, applying to an action (such as a complaint and/or appeal) and applied to one or more cross-actions (such as cross-complaint(s) and/or cross-appeal(s)) and combining the value for the action and all cross-actions in two- and multi-party litigation. 8. A system, comprising:
a networked or non-networked environment of data storage and exchange between at least one user, at least one processor or distributed fractional processing resulting in the functional equivalent of a processor, and at least one display mechanism (whether transitory, non-transitory, and/or tangible) which are configured to: generate a decision tree showing the flow of litigation to possible outcomes based on whether the valuation pertains to a case before judgment, after judgment, or for the entirety of a case before and after judgment, the type of case being identified by input from a user device or server; compute the valuation for each outcome resulting from issues of law terminating the litigation based on input-specified percentage odds of prevailing and dollar amounts expected to be gained or lost in scope of attorney fees and costs relating to issues of law; adjust the valuation of each outcome for issues of law branches by adding the expense of input-specified attorney fees and costs expended on establishing or defeating the legal viability of claims, taking into account whether attorney fees and costs are reciprocal, one-way shifting, or not subject to any shifting; adjust the valuation of each outcome for issues of law to account for input-specified prejudgment and/or postjudgment interest expended during the time required to establish or defeat the legal viability of claims; adjust the valuation of each outcome for issues of law to account for a discount rate as applied to the remainder of the time period until final resolution; compute the valuation for each outcome resulting from questions of fact resolving issues related to witness credibility, document authenticity, relative weights of evidence, and other issues going to evidentiary proof, including high, low, and other applicable estimates of money damages; adjust the valuation of each outcome for questions of fact to account for the expense of attorney fees and costs expended to prove or disprove factual claims, taking into account whether attorney fees and costs are reciprocal, one-way shifting, or not subject to any shifting; adjust the valuation of each outcome relating to questions of fact to account for prejudgment and/or postjudgment interest on money damages corresponding to the time required to prove or disprove factual claims; adjust the valuation of each outcome relating to resolution of questions of fact to account for the discount rate as applied to the remainder of the time period until final resolution; compute the final expected value as the sum of expected, adjusted values of all possible outcomes. 9. The system of claim 8, wherein differences in intermediate and final computations due to revised, different, or additional data input from one or more users collaborating on valuation over a data or internet connection are computed. 10. The system of claim 8, wherein a non-transitory display of the decision tree, intermediate and final computations, and timeline, are transmitted, printed, and/or otherwise rendered. 11. The system of claim 8, wherein the system trains the user by displaying examples, eliciting input from the user, comparing user answers with result computed by the method of claim 6, and displaying the result of the comparison. 12. The system of claim 8, wherein at least one processor is configured to apply to a database for multiple hypothetical, historical, or contemporaneous cases to determine statistics such as average, median, high, and low, values for the cases in the data set. 13. The system of claim 8, wherein at least one processor is configured to apply to an action (such as a complaint and/or appeal) and applied to one or more cross-actions (such as cross-complaint(s) and/or cross-appeal(s)) and combining the value for the action and all cross-actions in two- and multi-party litigation. 14. A non-transitory computer readable medium encoded with a computer program comprising instructions that when executed cause a computer to perform operations:
generating a decision tree showing the flow of litigation to possible outcomes based on whether the valuation pertains to a case before judgment, after judgment, or for the entirety of a case before and after judgment; computing the valuation for each outcome resulting from issues of law terminating the litigation based on percentage odds of prevailing and dollar amounts expected to be gained or lost in the following categories: scope of attorney fees and costs relating to issues of law; adjusting the valuation of each outcome for issues of law branches by adding the expense of attorney fees and costs expended on establishing or defeating the legal viability of claims, taking into account whether attorney fees and costs are reciprocal, one-way shifting, or not subject to any shifting; adjusting the valuation of each outcome for issues of law to account for prejudgment and/or postjudgment interest expended during the time required to establish or defeat the legal viability of claims; adjusting the valuation of each outcome for issues of law to account for the discount rate as applied to the remainder of the time period until final resolution; computing the valuation for each outcome resulting from questions of fact resolving issues related to witness credibility, document authenticity, relative weights of evidence, and other issues going to evidentiary proof, including high, low, and other applicable estimates of money damages; adjusting the valuation of each outcome for questions of fact to account for the expense of attorney fees and costs expended to prove or disprove factual claims, taking into account whether attorney fees and costs are reciprocal, one-way shifting, or not subject to any shifting; adjusting the valuation of each outcome relating to questions of fact to account for prejudgment and/or postjudgment interest on money damages corresponding to the time required to prove or disprove factual claims; adjusting the valuation of each outcome relating to resolution of questions of fact to account for the discount rate as applied to the remainder of the time period until final resolution; computing the final expected value as the sum of expected, adjusted values of all possible outcomes. 15. The computer readable medium of claim 14, further comprising the instructions that when executed cause the computer to perform operations wherein differences in intermediate and final computations due to revised, different, or additional data input from one or more users collaborating on valuation over a data or internet connection are computed. 16. The computer readable medium of claim 14, further comprising the instructions that when executed cause the computer to perform operations to transmit, render, or print a non-transitory display of the decision tree, intermediate and final computations, and timeline. 17. The computer readable medium of claim 14, further comprising the instructions that when executed cause the computer to perform operations wherein percentage odds, money damages, attorney fees, costs, and/or risk aversion premium are computed based on input-specified final expected value and other variables, with the risk aversion premium resulting from the difference between input specified final expected value and the computation resulting from the specified variables of damages, attorney fees, costs, interest, and discount rate. 18. The computer readable medium of claim 14, further comprising the instructions that when executed cause the computer to perform operations wherein the system trains the user by presenting examples, eliciting input from the user, comparing user answers with result computed by the method of claim 11, and displaying the result of the comparison. 19. The computer readable medium of claim 14, further comprising the instructions that when executed cause the computer to apply operations to a database for multiple hypothetical, historical, or contemporaneous cases to determine statistics such as average, median, high, and low, expected final values for the cases in the data set. 20. The computer readable medium of claim 14, further comprising the instructions that when executed cause the computer to perform operations wherein at least one processor is configured to apply to an action (such as a complaint and/or appeal) and applied to one or more cross-actions (such as cross-complaint(s) and/or cross-appeal(s)) and combining the value for the action and all cross-actions in two- and multi-party litigation. | 3,600 |
13,444 | 13,444 | 15,227,097 | 3,662 | A seat assembly is provided with a seat bottom, a seat back, and a plurality of sensors operably connected to at least one of the seat bottom and the seat back to detect a seating condition of a seated occupant. A controller is in electrical communication with the plurality of sensors and the at least one actuator. The controller is programmed to receive input from the plurality of sensors indicative of a seating condition of the seated occupant. The seating condition of the seated occupant is compared to stored seating conditions of prior seat occupants to determine that the seated occupant is a prior occupant. | 1. A seat assembly comprising:
a seat bottom; a seat back; a plurality of sensors operably connected to at least one of the seat bottom and the seat back to detect a seating condition of a seated occupant; and a controller in electrical communication with the plurality of sensors and the at least one actuator, the controller being programmed to:
receive input from the plurality of sensors indicative of a seating condition of the seated occupant,
compare the seating condition of the seated occupant to stored seating conditions of prior seat occupants, and
determine that the seated occupant is a prior occupant. 2. The seat assembly of claim 1 wherein the plurality of sensors comprise a plurality of inertial sensors. 3. The seat assembly of claim 1 wherein the plurality of sensors comprise a plurality of accelerometers. 4. The seat assembly of claim 1 wherein the plurality of sensors comprise a plurality of gyroscopes. 5. The seat assembly of claim 1 wherein the plurality of sensors comprise a plurality of six-axis sensors. 6. The seat assembly of claim 1 wherein the plurality of sensors comprise an array of four sensors. 7. The seat assembly of claim 1 wherein the controller is further programmed to store the input for the seating condition of the seated occupant. 8. The seat assembly of claim 7 wherein the controller is further programmed to receive input from the plurality of sensors indicative of a second seating condition of the seated occupant. 9. The seat assembly of claim 8 wherein the controller is further programmed to store the input for the second seating condition of the seated occupant. 10. The seat assembly of claim 8 wherein the controller is further programmed to:
compare the second seating condition for the seated occupant to stored seating conditions of prior occupants; and
determine that the seated occupant is a prior occupant. 11. The seat assembly of claim 8 wherein the controller is further programmed to determine a range of seating conditions for the seated occupant from the stored seating conditions. 12. The seat assembly of claim 8 wherein the controller is further programmed to determine a tolerance for at least one of the stored seating conditions of the seated occupant for further determination of the seated occupant. 13. The seat assembly of claim 12 wherein the controller is in electrical communication with a vehicle control module, and the controller is further programmed to:
receive input indicative of a vehicle driving condition from the vehicle control module; and
store the input for the vehicle driving condition with the stored seating condition. 14. The seat assembly of claim 13 wherein the controller is further programmed to:
compare the stored seating condition and the stored vehicle driving condition to stored seating conditions and vehicle driving conditions of prior seat occupants; and
determine that the seated occupant is a prior occupant. 15. The seat assembly of claim 1 further comprising at least one actuator operably connected to at least one of the seat bottom and the seat back for adjustment of at least one of a plurality of settings of the seat assembly. 16. The seat assembly of claim 15 wherein the controller is further programmed to adjust the at least one actuator to a predetermined setting corresponding to the prior occupant. 17. A computer-program product embodied in a non-transitory computer readable medium that is programmed for identifying an occupant of a seat assembly, the computer-program product comprising instructions for:
receiving input from a plurality of sensors of a seat assembly indicative of a seating condition of a seated occupant; comparing the seating condition of the seated occupant to stored seating conditions of prior seat occupants; and determining that the seated occupant is a prior occupant. 18. The computer-program product of claim 17 further comprising instructions for storing the input for the seating condition of the seated occupant. 19. The computer-program product of claim 18 further comprising instructions for receiving input from the plurality of sensors indicative of a second seating condition of the seated occupant. 20. A method for identifying an occupant of a seat assembly, the method comprising steps of:
receiving input from a plurality of sensors of a seat assembly indicative of a seating condition of a seated occupant; comparing the seating condition of the seated occupant to stored seating conditions of prior seat occupants; and determining that the seated occupant is a prior occupant. | A seat assembly is provided with a seat bottom, a seat back, and a plurality of sensors operably connected to at least one of the seat bottom and the seat back to detect a seating condition of a seated occupant. A controller is in electrical communication with the plurality of sensors and the at least one actuator. The controller is programmed to receive input from the plurality of sensors indicative of a seating condition of the seated occupant. The seating condition of the seated occupant is compared to stored seating conditions of prior seat occupants to determine that the seated occupant is a prior occupant.1. A seat assembly comprising:
a seat bottom; a seat back; a plurality of sensors operably connected to at least one of the seat bottom and the seat back to detect a seating condition of a seated occupant; and a controller in electrical communication with the plurality of sensors and the at least one actuator, the controller being programmed to:
receive input from the plurality of sensors indicative of a seating condition of the seated occupant,
compare the seating condition of the seated occupant to stored seating conditions of prior seat occupants, and
determine that the seated occupant is a prior occupant. 2. The seat assembly of claim 1 wherein the plurality of sensors comprise a plurality of inertial sensors. 3. The seat assembly of claim 1 wherein the plurality of sensors comprise a plurality of accelerometers. 4. The seat assembly of claim 1 wherein the plurality of sensors comprise a plurality of gyroscopes. 5. The seat assembly of claim 1 wherein the plurality of sensors comprise a plurality of six-axis sensors. 6. The seat assembly of claim 1 wherein the plurality of sensors comprise an array of four sensors. 7. The seat assembly of claim 1 wherein the controller is further programmed to store the input for the seating condition of the seated occupant. 8. The seat assembly of claim 7 wherein the controller is further programmed to receive input from the plurality of sensors indicative of a second seating condition of the seated occupant. 9. The seat assembly of claim 8 wherein the controller is further programmed to store the input for the second seating condition of the seated occupant. 10. The seat assembly of claim 8 wherein the controller is further programmed to:
compare the second seating condition for the seated occupant to stored seating conditions of prior occupants; and
determine that the seated occupant is a prior occupant. 11. The seat assembly of claim 8 wherein the controller is further programmed to determine a range of seating conditions for the seated occupant from the stored seating conditions. 12. The seat assembly of claim 8 wherein the controller is further programmed to determine a tolerance for at least one of the stored seating conditions of the seated occupant for further determination of the seated occupant. 13. The seat assembly of claim 12 wherein the controller is in electrical communication with a vehicle control module, and the controller is further programmed to:
receive input indicative of a vehicle driving condition from the vehicle control module; and
store the input for the vehicle driving condition with the stored seating condition. 14. The seat assembly of claim 13 wherein the controller is further programmed to:
compare the stored seating condition and the stored vehicle driving condition to stored seating conditions and vehicle driving conditions of prior seat occupants; and
determine that the seated occupant is a prior occupant. 15. The seat assembly of claim 1 further comprising at least one actuator operably connected to at least one of the seat bottom and the seat back for adjustment of at least one of a plurality of settings of the seat assembly. 16. The seat assembly of claim 15 wherein the controller is further programmed to adjust the at least one actuator to a predetermined setting corresponding to the prior occupant. 17. A computer-program product embodied in a non-transitory computer readable medium that is programmed for identifying an occupant of a seat assembly, the computer-program product comprising instructions for:
receiving input from a plurality of sensors of a seat assembly indicative of a seating condition of a seated occupant; comparing the seating condition of the seated occupant to stored seating conditions of prior seat occupants; and determining that the seated occupant is a prior occupant. 18. The computer-program product of claim 17 further comprising instructions for storing the input for the seating condition of the seated occupant. 19. The computer-program product of claim 18 further comprising instructions for receiving input from the plurality of sensors indicative of a second seating condition of the seated occupant. 20. A method for identifying an occupant of a seat assembly, the method comprising steps of:
receiving input from a plurality of sensors of a seat assembly indicative of a seating condition of a seated occupant; comparing the seating condition of the seated occupant to stored seating conditions of prior seat occupants; and determining that the seated occupant is a prior occupant. | 3,600 |
13,445 | 13,445 | 13,270,971 | 3,626 | Methods and systems for determining and managing an individual and portable health score are disclosed. The method may include receiving individual health data. The method may further include determining one or more relevant health factors in response to the individual health data. Furthermore, the method may include assigning relative weights to the one or more relevant health factors. Subsequently, the method may include determining a baseline health score based on the relative weights of the one or more relevant health factors and the individual health data. The method for determining a health score may include adjusting the baseline health score in response to one or more qualified health actions, condition overrides, and/or quality checking. The disclosure may enable a national standard for a unique health score that reflects the combination of an individual's health status and the value of the individual's actions. | 1. A method for determining a health score comprising:
receiving individual health data; determining one or more relevant health factors in response to the individual health data; assigning relative weights to the one or more relevant health factors; determining, with a processing device, a baseline health score based on the relative weights of the one or more relevant health factors and the individual health data; and adjusting the baseline health score in response to one or more qualified health actions. 2. The method of claim 1, where the individual health data comprises certified health data. 3. The method of claim 1, where the health score is determined independent of a health plan. 4. The method of claim 1, where the health score in determined independent of a vendor. 5. The method of claim 1, further comprising:
adjusting the baseline health score in response to one or more condition overrides. 6. The method of claim 1, further comprising:
adjusting the baseline health score in response to quality checking. 7. The method of claim 1, where determining one or more relevant health factors comprises determining:
one or more core health factors; one or more age-gender based factors; and one or more health condition based factors. 8. The method of claim 1, where determining the baseline health score comprises:
determining a points adjustment for each relevant health factor in response to a result measurement and a target measurement; and subtracting the points adjustment for each relevant health factor from an initial health score. 9. The method of claim 8, where determining a points adjustment for each relevant health factor comprises:
determining a miss metric by comparing the result measurement to the target measurement; determining a final difference by comparing the miss metric to a metric cap; determining a points per increment of the final difference by comparing the relevant health factor's relative weight to the metric cap; and determining the points adjustment by multiplying the final difference and the points per increment. 10. The method of claim 1, where adjusting the baseline health score in response to one or more certified qualified actions comprises:
determining the applicability of a certified qualified action; determining the period of applicability of the certified qualified action; and adjusting the baseline health score during the applicable period of the certified qualified action. 11. The method of claim 5, where adjusting the baseline health score in response to one or more condition overrides comprises:
determining the applicability of a condition override; determining the period of applicability of the condition override; and adjusting the incremental impact of one or more relevant health factors during the applicable period in response to the condition override. 12. The method of claim 6, where adjusting the baseline health score in response to quality checking comprises:
receiving an appeal; determining the applicability of the appeal; determining the period of applicability of the appeal; and adjusting the baseline health score during the applicable period of the appeal. 13. A system for determining a health score comprising:
a data storage device configured to store a database comprising one or more records; a server in data communication with the data storage device suitably programmed to:
receive individual health data;
determine one or more relevant health factors in response to the individual health data;
assign relative weights to the one or more relevant health factors;
determine a baseline health score based on the relative weights of the one or more relevant health factors and the individual health data; and
adjust the baseline health score in response to one or more qualified health actions. 14. The system of claim 13, where the individual health data comprises certified health data. 15. The system of claim 13, where the health score is determined independent of a health plan. 16. The system of claim 13, the server further programmed to:
adjust the baseline health score in response to one or more condition overrides. 17. The system of claim 13, the server further programmed to:
adjust the baseline health score in response to quality checking. 18. The system of claim 13, where determining one or more relevant health factors comprises determining:
one or more core health factors; one or more age-gender based factors; and one or more health condition based factors. 19. The system of claim 13, where determining the baseline health score comprises:
determining a points adjustment for each relevant health factor in response to a result measurement and a target measurement; and subtracting the points adjustment for each relevant health factor from an initial health score. 20. The system of claim 19, where determining a points adjustment for each relevant health factor comprises:
determining a miss metric by comparing the result measurement to the target measurement; determining a final difference by comparing the miss metric to a metric cap; determining a points per increment of the final difference by comparing the relevant health factor's relative weight to the metric cap; determining the points adjustment by multiplying the final difference and the points per increment. 21. The system of claim 16, where adjusting the baseline health score in response to one or more certified qualified actions comprises:
determining the applicability of a certified qualified action; determining the period of applicability of the certified qualified action; and adjusting the baseline health score during the applicable period of the certified qualified action. 22. The system of claim 16, where adjusting the baseline health score in response to one or more condition overrides comprises:
determining the applicability of a condition override; determining the period of applicability of the condition override; and adjusting the incremental impact of one or more relevant health factors during the applicable period in response to the condition override. 23. The system of claim 17, where adjusting the baseline health score in response to quality checking comprises:
receiving an appeal; determining the applicability of the appeal; determining the period of applicability of the appeal; and adjusting the baseline health score during the applicable period of the appeal. 24. A system for managing one or more health scores comprising:
a data storage device configured to store a database comprising one or more records; a server in data communication with the data storage device suitably programmed to:
receive one or more user inputs;
receive healthcare data from one or more healthcare data sources in response to the one or more user inputs;
aggregate the received healthcare data, where aggregating comprises:
removing redundancy within the received healthcare data, and
resolving anomalies within the received healthcare data; and
determine a first health score in response to the processed received healthcare data. 25. The system of claim 24, the server further configured to:
determine a plurality of health scores; and determine a success measurement in response to the plurality of health scores. 26. The system of claim 24, the one or more records comprising:
received healthcare data; one or more calculated health scores; one or more calculations used to determine the one or more health scores. 27. The system of claim 26, further configured to:
receive a first set of one or more calculated health scores from a first health plan; and output a second set of one or more calculated health scores to a second health plan. 28. The system of claim 26, the one or more records comprising:
one or more appeals. 29. The system of claim 28, the one or more records further comprising:
timestamp data describing when the records were stored in the data storage device; source data describing the source of the records. 30. The system of claim 29, the server further programmed to output one or more records in response to one or more user inputs. 31. The system of claim 24, where receiving one or more user inputs comprises:
receiving one or more healthcare data source flow selections; receiving one or more healthcare provider data flow selections; and receiving one more health plan data flow selections. 32. The system of claim 31, the server further configured to control access to one or more records in response to receiving one or more health plan data flow selections. 33. The system of claim 31, the server further configured to output one or more records to a health plan in response to one or more health plan data flow selections. 34. The system of claim 31, where receiving user healthcare data from one or more health data sources comprises receiving user healthcare data across one or more data channels in response to one or more healthcare data source flow selections. 35. A method for determining a health score comprising:
Assigning, with a processing device, relative weights to one or more core health factors, one or more age-gender based factors, and one or more health condition based factors; determining a first intermediate health score in response to the one or more core factors; determining a second intermediate health score by adjusting the first intermediate health score in response to the one or more age-gender based factors; determining a third intermediate health score by adjusting the second intermediate health score in response to the one or more health condition based factors; determining a fourth intermediate health score by adjusting the third intermediate health score in response to one or more condition overrides; determining a fifth intermediate health score by adjusting the fourth intermediate health score in response to the one or more qualified health actions; and determining the health score by adjusting the fifth intermediate health score in response to quality checking. | Methods and systems for determining and managing an individual and portable health score are disclosed. The method may include receiving individual health data. The method may further include determining one or more relevant health factors in response to the individual health data. Furthermore, the method may include assigning relative weights to the one or more relevant health factors. Subsequently, the method may include determining a baseline health score based on the relative weights of the one or more relevant health factors and the individual health data. The method for determining a health score may include adjusting the baseline health score in response to one or more qualified health actions, condition overrides, and/or quality checking. The disclosure may enable a national standard for a unique health score that reflects the combination of an individual's health status and the value of the individual's actions.1. A method for determining a health score comprising:
receiving individual health data; determining one or more relevant health factors in response to the individual health data; assigning relative weights to the one or more relevant health factors; determining, with a processing device, a baseline health score based on the relative weights of the one or more relevant health factors and the individual health data; and adjusting the baseline health score in response to one or more qualified health actions. 2. The method of claim 1, where the individual health data comprises certified health data. 3. The method of claim 1, where the health score is determined independent of a health plan. 4. The method of claim 1, where the health score in determined independent of a vendor. 5. The method of claim 1, further comprising:
adjusting the baseline health score in response to one or more condition overrides. 6. The method of claim 1, further comprising:
adjusting the baseline health score in response to quality checking. 7. The method of claim 1, where determining one or more relevant health factors comprises determining:
one or more core health factors; one or more age-gender based factors; and one or more health condition based factors. 8. The method of claim 1, where determining the baseline health score comprises:
determining a points adjustment for each relevant health factor in response to a result measurement and a target measurement; and subtracting the points adjustment for each relevant health factor from an initial health score. 9. The method of claim 8, where determining a points adjustment for each relevant health factor comprises:
determining a miss metric by comparing the result measurement to the target measurement; determining a final difference by comparing the miss metric to a metric cap; determining a points per increment of the final difference by comparing the relevant health factor's relative weight to the metric cap; and determining the points adjustment by multiplying the final difference and the points per increment. 10. The method of claim 1, where adjusting the baseline health score in response to one or more certified qualified actions comprises:
determining the applicability of a certified qualified action; determining the period of applicability of the certified qualified action; and adjusting the baseline health score during the applicable period of the certified qualified action. 11. The method of claim 5, where adjusting the baseline health score in response to one or more condition overrides comprises:
determining the applicability of a condition override; determining the period of applicability of the condition override; and adjusting the incremental impact of one or more relevant health factors during the applicable period in response to the condition override. 12. The method of claim 6, where adjusting the baseline health score in response to quality checking comprises:
receiving an appeal; determining the applicability of the appeal; determining the period of applicability of the appeal; and adjusting the baseline health score during the applicable period of the appeal. 13. A system for determining a health score comprising:
a data storage device configured to store a database comprising one or more records; a server in data communication with the data storage device suitably programmed to:
receive individual health data;
determine one or more relevant health factors in response to the individual health data;
assign relative weights to the one or more relevant health factors;
determine a baseline health score based on the relative weights of the one or more relevant health factors and the individual health data; and
adjust the baseline health score in response to one or more qualified health actions. 14. The system of claim 13, where the individual health data comprises certified health data. 15. The system of claim 13, where the health score is determined independent of a health plan. 16. The system of claim 13, the server further programmed to:
adjust the baseline health score in response to one or more condition overrides. 17. The system of claim 13, the server further programmed to:
adjust the baseline health score in response to quality checking. 18. The system of claim 13, where determining one or more relevant health factors comprises determining:
one or more core health factors; one or more age-gender based factors; and one or more health condition based factors. 19. The system of claim 13, where determining the baseline health score comprises:
determining a points adjustment for each relevant health factor in response to a result measurement and a target measurement; and subtracting the points adjustment for each relevant health factor from an initial health score. 20. The system of claim 19, where determining a points adjustment for each relevant health factor comprises:
determining a miss metric by comparing the result measurement to the target measurement; determining a final difference by comparing the miss metric to a metric cap; determining a points per increment of the final difference by comparing the relevant health factor's relative weight to the metric cap; determining the points adjustment by multiplying the final difference and the points per increment. 21. The system of claim 16, where adjusting the baseline health score in response to one or more certified qualified actions comprises:
determining the applicability of a certified qualified action; determining the period of applicability of the certified qualified action; and adjusting the baseline health score during the applicable period of the certified qualified action. 22. The system of claim 16, where adjusting the baseline health score in response to one or more condition overrides comprises:
determining the applicability of a condition override; determining the period of applicability of the condition override; and adjusting the incremental impact of one or more relevant health factors during the applicable period in response to the condition override. 23. The system of claim 17, where adjusting the baseline health score in response to quality checking comprises:
receiving an appeal; determining the applicability of the appeal; determining the period of applicability of the appeal; and adjusting the baseline health score during the applicable period of the appeal. 24. A system for managing one or more health scores comprising:
a data storage device configured to store a database comprising one or more records; a server in data communication with the data storage device suitably programmed to:
receive one or more user inputs;
receive healthcare data from one or more healthcare data sources in response to the one or more user inputs;
aggregate the received healthcare data, where aggregating comprises:
removing redundancy within the received healthcare data, and
resolving anomalies within the received healthcare data; and
determine a first health score in response to the processed received healthcare data. 25. The system of claim 24, the server further configured to:
determine a plurality of health scores; and determine a success measurement in response to the plurality of health scores. 26. The system of claim 24, the one or more records comprising:
received healthcare data; one or more calculated health scores; one or more calculations used to determine the one or more health scores. 27. The system of claim 26, further configured to:
receive a first set of one or more calculated health scores from a first health plan; and output a second set of one or more calculated health scores to a second health plan. 28. The system of claim 26, the one or more records comprising:
one or more appeals. 29. The system of claim 28, the one or more records further comprising:
timestamp data describing when the records were stored in the data storage device; source data describing the source of the records. 30. The system of claim 29, the server further programmed to output one or more records in response to one or more user inputs. 31. The system of claim 24, where receiving one or more user inputs comprises:
receiving one or more healthcare data source flow selections; receiving one or more healthcare provider data flow selections; and receiving one more health plan data flow selections. 32. The system of claim 31, the server further configured to control access to one or more records in response to receiving one or more health plan data flow selections. 33. The system of claim 31, the server further configured to output one or more records to a health plan in response to one or more health plan data flow selections. 34. The system of claim 31, where receiving user healthcare data from one or more health data sources comprises receiving user healthcare data across one or more data channels in response to one or more healthcare data source flow selections. 35. A method for determining a health score comprising:
Assigning, with a processing device, relative weights to one or more core health factors, one or more age-gender based factors, and one or more health condition based factors; determining a first intermediate health score in response to the one or more core factors; determining a second intermediate health score by adjusting the first intermediate health score in response to the one or more age-gender based factors; determining a third intermediate health score by adjusting the second intermediate health score in response to the one or more health condition based factors; determining a fourth intermediate health score by adjusting the third intermediate health score in response to one or more condition overrides; determining a fifth intermediate health score by adjusting the fourth intermediate health score in response to the one or more qualified health actions; and determining the health score by adjusting the fifth intermediate health score in response to quality checking. | 3,600 |
13,446 | 13,446 | 15,138,535 | 3,689 | A complex asset analysis operation, comprising: receiving data from a plurality of crowd sourced complex assets; aggregating the data received from the plurality of crowd sourced complex assets; and, performing a complex asset analysis operation based upon the data received from the plurality of crowd sourced devices, the complex asset analysis operation providing an information brokerage function for a community of complex assets by managing shared information from the plurality of crowd sourced complex assets. | 1. A computer-implementable method for performing a complex asset analysis operation, comprising:
receiving data from a plurality of crowd sourced complex assets; aggregating the data received from the plurality of crowd sourced complex assets; and, performing a complex asset analysis operation based upon the data received from the plurality of crowd sourced devices, the complex asset analysis operation providing an information brokerage function for a community of complex assets by managing shared information from the plurality of crowd sourced complex assets. 2. The method of claim 1, wherein:
the complex asset analysis operation organizes data for each of the plurality of complex assets based upon asset make, model and year of manufacture; each of the plurality of complex assets provides configuration information, the configuration information comprising at least one of as built configuration information, as maintained configuration information and as monitored configuration information. 3. The method of claim 1, wherein:
each of the plurality of complex assets register respective complex asset data and subscribe for content notifications based on a type and configuration of the complex asset. 4. The method of claim 1, wherein:
the complex asset analysis operation groups together concepts with an associated snap shot of asset performance parameters, the concepts comprising at least one of symptom, probable cause, recommended action, and cost estimate of repair. 5. The method of claim 4, wherein:
the complex asset analysis operation generates notifications for some of the plurality of complex assets based upon others of the plurality of complex assets, the some of the plurality of complex assets having at least one of the asset performance parameters in common with the others of the plurality of complex assets. 6. The method of claim 1, wherein:
the complex asset analysis operation describes and encodes symptoms entered by a user and validates whether the symptoms are new or already exist in a knowledge base for the complex asset where the knowledge base rules validated by certain complex assets and rules shared by other complex assets. | A complex asset analysis operation, comprising: receiving data from a plurality of crowd sourced complex assets; aggregating the data received from the plurality of crowd sourced complex assets; and, performing a complex asset analysis operation based upon the data received from the plurality of crowd sourced devices, the complex asset analysis operation providing an information brokerage function for a community of complex assets by managing shared information from the plurality of crowd sourced complex assets.1. A computer-implementable method for performing a complex asset analysis operation, comprising:
receiving data from a plurality of crowd sourced complex assets; aggregating the data received from the plurality of crowd sourced complex assets; and, performing a complex asset analysis operation based upon the data received from the plurality of crowd sourced devices, the complex asset analysis operation providing an information brokerage function for a community of complex assets by managing shared information from the plurality of crowd sourced complex assets. 2. The method of claim 1, wherein:
the complex asset analysis operation organizes data for each of the plurality of complex assets based upon asset make, model and year of manufacture; each of the plurality of complex assets provides configuration information, the configuration information comprising at least one of as built configuration information, as maintained configuration information and as monitored configuration information. 3. The method of claim 1, wherein:
each of the plurality of complex assets register respective complex asset data and subscribe for content notifications based on a type and configuration of the complex asset. 4. The method of claim 1, wherein:
the complex asset analysis operation groups together concepts with an associated snap shot of asset performance parameters, the concepts comprising at least one of symptom, probable cause, recommended action, and cost estimate of repair. 5. The method of claim 4, wherein:
the complex asset analysis operation generates notifications for some of the plurality of complex assets based upon others of the plurality of complex assets, the some of the plurality of complex assets having at least one of the asset performance parameters in common with the others of the plurality of complex assets. 6. The method of claim 1, wherein:
the complex asset analysis operation describes and encodes symptoms entered by a user and validates whether the symptoms are new or already exist in a knowledge base for the complex asset where the knowledge base rules validated by certain complex assets and rules shared by other complex assets. | 3,600 |
13,447 | 13,447 | 14,316,317 | 3,689 | Mappings are received that associate one or more contract classes to one or more jurisdictions. Contract classes are determined for contracts being sent by senders or signed by signers. The contract classes may be determined by content analysis performed on the contracts. Content of the contracts may be altered with clauses specifying jurisdictions in accordance with the mappings. The contracts are enabled to be sent by senders or signed by signers. | 1. A non-transitory computer storage medium storing computer-useable instructions that, when used by one or more computing devices, cause the one or more computing devices to perform operations comprising:
receiving, at a jurisdiction service, a sender mapping that associates one or more contract classes to one or more sender jurisdictions; receiving, at the jurisdiction service, an identification of a contract class for a contract being sent by a sender to a signer; altering, by the jurisdiction service, the content of the contract with a clause specifying a jurisdiction in accordance with the sender mapping; and sending, by the jurisdiction service, the contract to the signer. 2. The non-transitory computer storage medium of claim 1, further comprising analyzing, by the jurisdiction service, the content of the contract to automatically determine the contract class. 3. The non-transitory computer storage medium of claim 2, further comprising automatically selecting, by the jurisdiction service, the jurisdiction in accordance with the sender mapping. 4. The non-transitory computer storage medium of claim 3, further comprising providing, by the jurisdiction service, the sender with an opportunity to confirm the jurisdiction prior to sending the contract. 5. The non-transitory computer storage medium of claim 3, further comprising providing, by the jurisdiction service, the sender with an opportunity to select an alternate jurisdiction in accordance with the sender mapping prior to sending the contract. 6. The non-transitory computer storage medium of claim 3, further comprising enabling, by the jurisdiction service, the sender to authorize sending the contract without providing the sender with an opportunity to confirm the jurisdiction prior to sending the contract. 7. The non-transitory computer storage medium of claim 1, further comprising receiving, at the jurisdiction service, a signer mapping that associates one or more contract classes to one or more signer jurisdictions. 8. The non-transitory computer storage medium of claim 7, further comprising receiving, at the jurisdiction service, the identification of the contract class for the contract received by the signer. 9. The non-transitory computer storage medium of claim 8, further comprising analyzing, by the jurisdiction service, the content of the contract to determine the jurisdiction specified in the content. 10. The non-transitory computer storage medium of claim 9, further comprising determining, by the jurisdiction service, the jurisdiction does not match the one or more signer jurisdictions. 11. The non-transitory computer storage medium of claim 10, further comprising providing, by the jurisdiction service, a warning to the signer. 12. The non-transitory computer storage medium of claim 10, further comprising preventing, by the jurisdiction service, the signer from signing the contract. 13. The non-transitory computer storage medium of claim 7, further comprising analyzing, by the jurisdiction service, the content of the contract to the automatically determine the contract class and the jurisdiction for the contract received by the signer. 14. The non-transitory computer storage medium of claim 13, further comprising providing, by the jurisdiction service, the signer an opportunity to confirm the contract class and the jurisdiction. 15. The non-transitory computer storage medium of claim 7, further comprising determining, by the jurisdiction service, a new jurisdiction based on a comparison of the one or more sender jurisdictions to the one or more signer jurisdictions. 16. The non-transitory computer storage medium of claim 15, providing, by the jurisdiction service, the sender and the signer an opportunity to confirm the new jurisdiction. 17. The non-transitory computer storage medium of claim 16, further comprising amending, by the jurisdiction service, the content of the contract with a new clause specifying the new jurisdiction in accordance with the comparison. 18. A computer-implemented method comprising:
receiving, at a jurisdiction service, a mapping that associates one or more contract class to one or more jurisdictions; determining a contract class for a contract being sent by a sender or signed by a signer; altering, by the jurisdiction service, the content of the contract with a clause specifying a jurisdiction in accordance with the mapping; and enabling, by the jurisdiction service, the contract to be sent by the sender or signed by the signer. 19. The computer-implemented method of claim 18, further comprising tracking, by the jurisdiction service, changes to the clause made by the sender or signer and alerting parties to the contract of the changes. 20. A system comprising:
one or more processors; and a non-transitory computer storage medium storing computer-useable instructions that, when used by the one or more processors, cause the one or more processors to: receive, at a jurisdiction service, a mapping that associates one or more contract classes to one or more jurisdictions; determine a contract class for a contract being sent by a sender or signed by a signer; specify, by the jurisdiction service, a jurisdiction in accordance with the mapping in the content of the contract; enable, by the jurisdiction service, the contract to be sent by the sender or signed by the signer based on a determination that the jurisdiction is acceptable to the sender and the signer; and notify, by the jurisdiction service, the sender or the signer if any changes are made to the jurisdiction. | Mappings are received that associate one or more contract classes to one or more jurisdictions. Contract classes are determined for contracts being sent by senders or signed by signers. The contract classes may be determined by content analysis performed on the contracts. Content of the contracts may be altered with clauses specifying jurisdictions in accordance with the mappings. The contracts are enabled to be sent by senders or signed by signers.1. A non-transitory computer storage medium storing computer-useable instructions that, when used by one or more computing devices, cause the one or more computing devices to perform operations comprising:
receiving, at a jurisdiction service, a sender mapping that associates one or more contract classes to one or more sender jurisdictions; receiving, at the jurisdiction service, an identification of a contract class for a contract being sent by a sender to a signer; altering, by the jurisdiction service, the content of the contract with a clause specifying a jurisdiction in accordance with the sender mapping; and sending, by the jurisdiction service, the contract to the signer. 2. The non-transitory computer storage medium of claim 1, further comprising analyzing, by the jurisdiction service, the content of the contract to automatically determine the contract class. 3. The non-transitory computer storage medium of claim 2, further comprising automatically selecting, by the jurisdiction service, the jurisdiction in accordance with the sender mapping. 4. The non-transitory computer storage medium of claim 3, further comprising providing, by the jurisdiction service, the sender with an opportunity to confirm the jurisdiction prior to sending the contract. 5. The non-transitory computer storage medium of claim 3, further comprising providing, by the jurisdiction service, the sender with an opportunity to select an alternate jurisdiction in accordance with the sender mapping prior to sending the contract. 6. The non-transitory computer storage medium of claim 3, further comprising enabling, by the jurisdiction service, the sender to authorize sending the contract without providing the sender with an opportunity to confirm the jurisdiction prior to sending the contract. 7. The non-transitory computer storage medium of claim 1, further comprising receiving, at the jurisdiction service, a signer mapping that associates one or more contract classes to one or more signer jurisdictions. 8. The non-transitory computer storage medium of claim 7, further comprising receiving, at the jurisdiction service, the identification of the contract class for the contract received by the signer. 9. The non-transitory computer storage medium of claim 8, further comprising analyzing, by the jurisdiction service, the content of the contract to determine the jurisdiction specified in the content. 10. The non-transitory computer storage medium of claim 9, further comprising determining, by the jurisdiction service, the jurisdiction does not match the one or more signer jurisdictions. 11. The non-transitory computer storage medium of claim 10, further comprising providing, by the jurisdiction service, a warning to the signer. 12. The non-transitory computer storage medium of claim 10, further comprising preventing, by the jurisdiction service, the signer from signing the contract. 13. The non-transitory computer storage medium of claim 7, further comprising analyzing, by the jurisdiction service, the content of the contract to the automatically determine the contract class and the jurisdiction for the contract received by the signer. 14. The non-transitory computer storage medium of claim 13, further comprising providing, by the jurisdiction service, the signer an opportunity to confirm the contract class and the jurisdiction. 15. The non-transitory computer storage medium of claim 7, further comprising determining, by the jurisdiction service, a new jurisdiction based on a comparison of the one or more sender jurisdictions to the one or more signer jurisdictions. 16. The non-transitory computer storage medium of claim 15, providing, by the jurisdiction service, the sender and the signer an opportunity to confirm the new jurisdiction. 17. The non-transitory computer storage medium of claim 16, further comprising amending, by the jurisdiction service, the content of the contract with a new clause specifying the new jurisdiction in accordance with the comparison. 18. A computer-implemented method comprising:
receiving, at a jurisdiction service, a mapping that associates one or more contract class to one or more jurisdictions; determining a contract class for a contract being sent by a sender or signed by a signer; altering, by the jurisdiction service, the content of the contract with a clause specifying a jurisdiction in accordance with the mapping; and enabling, by the jurisdiction service, the contract to be sent by the sender or signed by the signer. 19. The computer-implemented method of claim 18, further comprising tracking, by the jurisdiction service, changes to the clause made by the sender or signer and alerting parties to the contract of the changes. 20. A system comprising:
one or more processors; and a non-transitory computer storage medium storing computer-useable instructions that, when used by the one or more processors, cause the one or more processors to: receive, at a jurisdiction service, a mapping that associates one or more contract classes to one or more jurisdictions; determine a contract class for a contract being sent by a sender or signed by a signer; specify, by the jurisdiction service, a jurisdiction in accordance with the mapping in the content of the contract; enable, by the jurisdiction service, the contract to be sent by the sender or signed by the signer based on a determination that the jurisdiction is acceptable to the sender and the signer; and notify, by the jurisdiction service, the sender or the signer if any changes are made to the jurisdiction. | 3,600 |
13,448 | 13,448 | 13,039,266 | 3,685 | A user policy definition of a user policy is received. The user policy definition indicates a user is receptive to receiving an offer and a user-controlled criterion for disclosure of user information. Further, persistent metadata that includes the user policy is generated. A compliance engine sends the user information with the persistent metadata to an offer provider. Further, offer data for a user is received from an offer provider. The offer data indicates a description of content in the offer and an offer criterion indicating a targeting characteristic. In addition, the compliance engine validates that the offer criterion complies with the user-controlled criterion. The offer is sent to the user upon determining that the offer criterion complies with the user-controlled criterion. | 1. A computer program product comprising a computer useable medium having a computer readable program, wherein the computer readable program when executed on a computer causes the computer to:
receive a user policy definition of a user policy that indicates a user is receptive to receiving an offer and a user-controlled criterion for disclosure of user information; generate persistent metadata that includes the user policy; send, from a compliance engine, the user information with the persistent metadata to an offer provider; and receive, from the offer provider, offer data for a user that indicates a description of content in the offer and an offer criterion indicating a targeting characteristic; validate, at the compliance engine, that the offer criterion complies with the user-controlled criterion; and send the offer to the user upon determining that the offer criterion complies with the user-controlled criterion. 2. The computer program product of claim 1, wherein the compliance engine is a system operated by a third-party trusted entity. 3. The computer program product of claim 2, wherein the set of user-controlled criteria includes a time restriction. 4. The computer program product of claim 2, wherein the set of user-controlled criteria includes a delivery type restriction. 5. The computer program product of claim 1, wherein the offer provider is a merchant. 6. The computer program product of claim 1, wherein the offer provider is an advertiser. 7. The computer program product of claim 1, wherein the offer provider is a marketer. 8. A method comprising:
receive a user policy definition of a user policy that indicates a user is receptive to receiving an offer and a user-controlled criterion for disclosure of user information; generating persistent metadata that includes the user policy; sending, from a compliance engine, the user information with the persistent metadata to an offer provider; and receiving, from the offer provider, offer data for a user that indicates a description of content in the offer and an offer criterion indicating a targeting characteristic; validating, at the compliance engine, that the offer criterion complies with the user-controlled criterion; and sending the offer to the user upon determining that the offer criterion complies with the user-controlled criterion. 9. The method of claim 8, wherein the compliance engine is a system operated by a third-party trusted entity. 10. The method of claim 9, wherein the user-controlled criteria includes a time restriction. 11. The method of claim 9, wherein the user-controlled criteria includes a delivery type restriction. 12. The method of claim 8, wherein the offer provider is a merchant. 13. The method of claim 8, wherein the offer provider is an advertiser. 14. The method of claim 8, wherein the offer provider is a marketer. 15. A system comprising:
a reception module that receives (i) a user policy definition of a user policy that indicates a user is receptive to receiving an offer and a user-controlled criterion for disclosure of user information and (ii) offer data for a user that indicates a description of content in the offer and an offer criterion indicating a targeting characteristic; a processor that generates persistent metadata that includes the user policy; a compliance engine that (i) sends the user information with the persistent metadata to an offer provider and (ii) validates that the offer criterion complies with the user-controlled criterion; and a transmission module that sends the offer to the user upon determining that the offer criterion complies with the user-controlled criterion. 16. The system of claim 15, wherein the compliance engine is a system operated by a third-party trusted entity. 17. The system of claim 15, wherein the user-controlled criteria includes a time restriction. 18. The system of claim 15, wherein the user-controlled criteria includes a delivery type restriction. 19. The system of claim 15, wherein the offer provider is a merchant. 20. The system of claim 15, wherein the offer provider is an advertiser. | A user policy definition of a user policy is received. The user policy definition indicates a user is receptive to receiving an offer and a user-controlled criterion for disclosure of user information. Further, persistent metadata that includes the user policy is generated. A compliance engine sends the user information with the persistent metadata to an offer provider. Further, offer data for a user is received from an offer provider. The offer data indicates a description of content in the offer and an offer criterion indicating a targeting characteristic. In addition, the compliance engine validates that the offer criterion complies with the user-controlled criterion. The offer is sent to the user upon determining that the offer criterion complies with the user-controlled criterion.1. A computer program product comprising a computer useable medium having a computer readable program, wherein the computer readable program when executed on a computer causes the computer to:
receive a user policy definition of a user policy that indicates a user is receptive to receiving an offer and a user-controlled criterion for disclosure of user information; generate persistent metadata that includes the user policy; send, from a compliance engine, the user information with the persistent metadata to an offer provider; and receive, from the offer provider, offer data for a user that indicates a description of content in the offer and an offer criterion indicating a targeting characteristic; validate, at the compliance engine, that the offer criterion complies with the user-controlled criterion; and send the offer to the user upon determining that the offer criterion complies with the user-controlled criterion. 2. The computer program product of claim 1, wherein the compliance engine is a system operated by a third-party trusted entity. 3. The computer program product of claim 2, wherein the set of user-controlled criteria includes a time restriction. 4. The computer program product of claim 2, wherein the set of user-controlled criteria includes a delivery type restriction. 5. The computer program product of claim 1, wherein the offer provider is a merchant. 6. The computer program product of claim 1, wherein the offer provider is an advertiser. 7. The computer program product of claim 1, wherein the offer provider is a marketer. 8. A method comprising:
receive a user policy definition of a user policy that indicates a user is receptive to receiving an offer and a user-controlled criterion for disclosure of user information; generating persistent metadata that includes the user policy; sending, from a compliance engine, the user information with the persistent metadata to an offer provider; and receiving, from the offer provider, offer data for a user that indicates a description of content in the offer and an offer criterion indicating a targeting characteristic; validating, at the compliance engine, that the offer criterion complies with the user-controlled criterion; and sending the offer to the user upon determining that the offer criterion complies with the user-controlled criterion. 9. The method of claim 8, wherein the compliance engine is a system operated by a third-party trusted entity. 10. The method of claim 9, wherein the user-controlled criteria includes a time restriction. 11. The method of claim 9, wherein the user-controlled criteria includes a delivery type restriction. 12. The method of claim 8, wherein the offer provider is a merchant. 13. The method of claim 8, wherein the offer provider is an advertiser. 14. The method of claim 8, wherein the offer provider is a marketer. 15. A system comprising:
a reception module that receives (i) a user policy definition of a user policy that indicates a user is receptive to receiving an offer and a user-controlled criterion for disclosure of user information and (ii) offer data for a user that indicates a description of content in the offer and an offer criterion indicating a targeting characteristic; a processor that generates persistent metadata that includes the user policy; a compliance engine that (i) sends the user information with the persistent metadata to an offer provider and (ii) validates that the offer criterion complies with the user-controlled criterion; and a transmission module that sends the offer to the user upon determining that the offer criterion complies with the user-controlled criterion. 16. The system of claim 15, wherein the compliance engine is a system operated by a third-party trusted entity. 17. The system of claim 15, wherein the user-controlled criteria includes a time restriction. 18. The system of claim 15, wherein the user-controlled criteria includes a delivery type restriction. 19. The system of claim 15, wherein the offer provider is a merchant. 20. The system of claim 15, wherein the offer provider is an advertiser. | 3,600 |
13,449 | 13,449 | 14,103,942 | 3,655 | A wheel end assembly includes a first shaft supported on a knuckle secured to a vehicle frame, including first clutch teeth, a second shaft secured to the halfshaft, a coil, and a collar rotatably secured to the second shaft, axially displaceable relative to the first shaft, including second clutch teeth that alternately engage the first clutch teeth due to an electromagnetic field produced by energizing the coil and disengage from the first clutch teeth. | 1. A wheel end assembly, comprising:
a first shaft supported on a knuckle secured to a vehicle frame, including first clutch teeth; a second shaft; a coil; a collar rotatably secured to the second shaft, axially displaceable relative to the first shaft, including second clutch teeth that alternately engage the first clutch teeth due to an electromagnetic field produced by energizing the coil and disengage from the first clutch teeth. 2. The wheel end assembly of claim 1, further comprising:
a wheel end supported by bearings on the knuckle and secured for rotation to the first shaft. 3. The wheel end assembly of claim 1, wherein:
the second shaft includes first spline teeth; the collar includes second spline teeth continually engaged with the first spline teeth; the first clutch teeth are located on an axial end of the first shaft; and the second clutch teeth are located on an axial end of the collar. 4. The wheel end assembly of claim 1, further comprising:
an inner hub housing secured to the knuckle and containing the coil, the collar, a plunger, a thrust bearing located axially between the plunger and the collar for transmitting axial movement of the plunger to the collar when the coil is energized, and a spring for returning the plunger to a disengaged position. 5. The wheel end assembly of claim 4, further comprising:
a second bearing for supporting the second shaft on the inner hub housing; and a third bearing for supporting the second shaft on the first shaft. 6. The wheel end assembly of claim 5, further comprising:
a snap ring for secured to the inner hub housing and contacting an axial side of the second bearing; a circlip secured to the second shaft and contacting the second bearing at an axial side of the second bearing opposite the snap ring. 7. A wheel end assembly, comprising:
a first shaft secured to a wheel end, including first clutch teeth at an axial end; a second shaft; a coil; a collar rotatably secured to the second shaft, axially displaceable relative to the first shaft, including second clutch teeth at an axial end that alternately engage the first clutch teeth due to an electromagnetic field produced by energizing the coil and disengage from the first clutch teeth. 8. The wheel end assembly of claim 7, wherein:
the wheel end is supported by bearings on a knuckle, and is secured for rotation to the first shaft. 9. The wheel end assembly of claim 7, wherein:
the second shaft includes first spline teeth; and the collar includes second spline teeth continually engaged with the first spline teeth; 10. The wheel end assembly of claim 7, further comprising:
an inner hub housing secured to the knuckle and containing the coil, the collar, a plunger, a thrust bearing located axially between the plunger and the collar for transmitting axial movement of the plunger to the collar when the coil is energized, and a spring for returning the plunger to a disengaged position. 11. The wheel end assembly of claim 10, further comprising:
a second bearing for supporting the second shaft on the inner hub housing; and a third bearing for supporting the second shaft on the first shaft. 12. The wheel end assembly of claim 11, further comprising:
a snap ring for secured to the inner hub housing and contacting an axial side of the second bearing; a circlip secured to the second shaft and contacting the second bearing at an axial side of the second bearing opposite the snap ring. 13. A wheel end assembly, comprising:
a first shaft for transmitting torque to a wheel end, including first radial clutch teeth; a second shaft; a coil; a collar rotatably secured to the second shaft, axially displaceable relative to the first shaft, including second radial clutch teeth that alternately engage the first clutch teeth due to an electromagnetic field produced by energizing the coil and disengage from the first clutch teeth. 14. The wheel end assembly of claim 13, further comprising:
a wheel end supported by bearings on a knuckle and secured for rotation to the first shaft. 15. The wheel end assembly of claim 13, wherein:
the second shaft includes first axial spline teeth; the collar includes second axial spline teeth continually engaged with said first spline teeth; the first clutch teeth are located on an axial end of the first shaft; and the second clutch teeth are located on an axial end of the collar. 16. The wheel end assembly of claim 13, further comprising:
an inner hub housing secured to the knuckle and containing the coil, the collar, a plunger, a thrust bearing located axially between the plunger and the collar for transmitting axial movement of the plunger to the collar when the coil is energized, and a spring for returning the plunger to a disengaged position. 17. The wheel end assembly of claim 16, further comprising:
a second bearing for supporting the second shaft on the inner hub housing; and a third bearing for supporting the second shaft on the first shaft. 18. The wheel end assembly of claim 17, further comprising:
a snap ring for secured to the inner hub housing and contacting an axial side of the second bearing; a circlip secured to the second shaft and contacting the second bearing at an axial side of the second bearing opposite the snap ring. | A wheel end assembly includes a first shaft supported on a knuckle secured to a vehicle frame, including first clutch teeth, a second shaft secured to the halfshaft, a coil, and a collar rotatably secured to the second shaft, axially displaceable relative to the first shaft, including second clutch teeth that alternately engage the first clutch teeth due to an electromagnetic field produced by energizing the coil and disengage from the first clutch teeth.1. A wheel end assembly, comprising:
a first shaft supported on a knuckle secured to a vehicle frame, including first clutch teeth; a second shaft; a coil; a collar rotatably secured to the second shaft, axially displaceable relative to the first shaft, including second clutch teeth that alternately engage the first clutch teeth due to an electromagnetic field produced by energizing the coil and disengage from the first clutch teeth. 2. The wheel end assembly of claim 1, further comprising:
a wheel end supported by bearings on the knuckle and secured for rotation to the first shaft. 3. The wheel end assembly of claim 1, wherein:
the second shaft includes first spline teeth; the collar includes second spline teeth continually engaged with the first spline teeth; the first clutch teeth are located on an axial end of the first shaft; and the second clutch teeth are located on an axial end of the collar. 4. The wheel end assembly of claim 1, further comprising:
an inner hub housing secured to the knuckle and containing the coil, the collar, a plunger, a thrust bearing located axially between the plunger and the collar for transmitting axial movement of the plunger to the collar when the coil is energized, and a spring for returning the plunger to a disengaged position. 5. The wheel end assembly of claim 4, further comprising:
a second bearing for supporting the second shaft on the inner hub housing; and a third bearing for supporting the second shaft on the first shaft. 6. The wheel end assembly of claim 5, further comprising:
a snap ring for secured to the inner hub housing and contacting an axial side of the second bearing; a circlip secured to the second shaft and contacting the second bearing at an axial side of the second bearing opposite the snap ring. 7. A wheel end assembly, comprising:
a first shaft secured to a wheel end, including first clutch teeth at an axial end; a second shaft; a coil; a collar rotatably secured to the second shaft, axially displaceable relative to the first shaft, including second clutch teeth at an axial end that alternately engage the first clutch teeth due to an electromagnetic field produced by energizing the coil and disengage from the first clutch teeth. 8. The wheel end assembly of claim 7, wherein:
the wheel end is supported by bearings on a knuckle, and is secured for rotation to the first shaft. 9. The wheel end assembly of claim 7, wherein:
the second shaft includes first spline teeth; and the collar includes second spline teeth continually engaged with the first spline teeth; 10. The wheel end assembly of claim 7, further comprising:
an inner hub housing secured to the knuckle and containing the coil, the collar, a plunger, a thrust bearing located axially between the plunger and the collar for transmitting axial movement of the plunger to the collar when the coil is energized, and a spring for returning the plunger to a disengaged position. 11. The wheel end assembly of claim 10, further comprising:
a second bearing for supporting the second shaft on the inner hub housing; and a third bearing for supporting the second shaft on the first shaft. 12. The wheel end assembly of claim 11, further comprising:
a snap ring for secured to the inner hub housing and contacting an axial side of the second bearing; a circlip secured to the second shaft and contacting the second bearing at an axial side of the second bearing opposite the snap ring. 13. A wheel end assembly, comprising:
a first shaft for transmitting torque to a wheel end, including first radial clutch teeth; a second shaft; a coil; a collar rotatably secured to the second shaft, axially displaceable relative to the first shaft, including second radial clutch teeth that alternately engage the first clutch teeth due to an electromagnetic field produced by energizing the coil and disengage from the first clutch teeth. 14. The wheel end assembly of claim 13, further comprising:
a wheel end supported by bearings on a knuckle and secured for rotation to the first shaft. 15. The wheel end assembly of claim 13, wherein:
the second shaft includes first axial spline teeth; the collar includes second axial spline teeth continually engaged with said first spline teeth; the first clutch teeth are located on an axial end of the first shaft; and the second clutch teeth are located on an axial end of the collar. 16. The wheel end assembly of claim 13, further comprising:
an inner hub housing secured to the knuckle and containing the coil, the collar, a plunger, a thrust bearing located axially between the plunger and the collar for transmitting axial movement of the plunger to the collar when the coil is energized, and a spring for returning the plunger to a disengaged position. 17. The wheel end assembly of claim 16, further comprising:
a second bearing for supporting the second shaft on the inner hub housing; and a third bearing for supporting the second shaft on the first shaft. 18. The wheel end assembly of claim 17, further comprising:
a snap ring for secured to the inner hub housing and contacting an axial side of the second bearing; a circlip secured to the second shaft and contacting the second bearing at an axial side of the second bearing opposite the snap ring. | 3,600 |
13,450 | 13,450 | 14,263,894 | 3,689 | A method and system is provided which can analyze customer data, including information about current products and agreements of the customer. The customer data can be used to predict various unknown parameters, including product usage data such as vehicle mileage. The customer data and predicted data can be used to generate various alert conditions. For example, an alert can be generated when a product's predicted usage data for a future time indicates that usage terms of a related agreement will be exceeded, and when a replacement product or agreement can be provided to a customer at an attractive price. An interactive deal sheet for an alert can be generated. The interactive deal sheet can allow a user to view various replacement products and agreements, and to perform additional calculations and comparisons based on inputted parameters. | 1. A method comprising:
receiving over the Internet, from a computer associated with one or more vehicle dealers, historical mileage data for current vehicles belonging to a plurality of potential customers, the historical mileage data comprising mileage readings taken by the vehicle dealers during vehicle service visits; executing software on a computer system that is hosted at one or more locations remote from the vehicle dealers, the software configured to determine, for each potential customer in the plurality of potential customers, whether the potential customer qualifies as a prospect by:
selecting, from the historical mileage data, one or more historical mileage values and corresponding historical dates associated with the current vehicle of the potential customer;
calculating, based on the historical mileage values and historical dates, an estimated rate of mileage accumulation for the current vehicle;
determining, based on the estimated rate, a first predicted mileage value for the current vehicle on a first date subsequent to the historical dates;
determining an estimated trade-in value for the current vehicle based on the first predicted mileage value;
calculating an estimated payment for a replacement vehicle based on the estimated trade-in value of the current vehicle;
identifying the potential customer as a prospect if a difference between the estimated payment for the replacement vehicle and a current payment for the current vehicle is within a predetermined range;
transmitting to at least one of the vehicle dealers, over the Internet, a list of alerts relating to the potential customers identified as prospects; allowing users authorized by the one or more vehicle dealers to access the list of alerts while restricting access by unauthorized users; associating an alert in the list of alerts with a sales task and assigning the sales task to an assigned user; and transmitting to the assigned user, over the Internet, a notification identifying the alert and the sales task. 2. The method of claim 1, further comprising:
receiving an indication from the assigned user that the sales task is complete and automatically assigning a follow-up task to at least one of the assigned user or a different user. 3. The method of claim 1, wherein at least one alert in the list of alerts is a usage alert for a potential customer in the plurality of potential customers, and the computer system generates the usage alert by:
retrieving a mileage limit for a warranty or lease associated with the current vehicle of the potential customer; determining, based on the estimated rate of mileage accumulation for the current vehicle, a second predicted mileage value for the current vehicle on a second date subsequent to the historical dates that correspond to the historical mileage values associated with the current vehicle; and determining, if the potential customer is identified as a prospect and the second predicted mileage value exceeds the mileage limit, that a usage alert is available for the potential customer. 4. The method of claim 3, further comprising:
presenting the list of alerts through a user interface accessible over the Internet, wherein the usage alerts in the list of alerts are presented before other alerts in the list. 5. The method of claim 1, wherein the list of alerts includes at least one service alert for a potential customer in the plurality of potential customers, and the computer system generates the service alert by:
retrieving at least one mileage amount relating to scheduled maintenance for the current vehicle of the potential customer; determining, based on the estimated rate of mileage accumulation for the current vehicle, a second predicted mileage value for the current vehicle on a second date subsequent to the historical dates that correspond to the historical mileage values associated with the current vehicle; and determining that the second predicted mileage value exceeds the mileage amount. 6. A system comprising:
a network-accessible database configured to store historical mileage data for current vehicles belonging to a plurality of potential customers, the historical mileage data comprising mileage readings taken by one or more vehicle dealers during vehicle service visits; one or more servers programmed to execute, for each potential customer in the plurality of potential customers, instructions that cause the server to:
select, from the historical mileage data, one or more historical mileage values and corresponding historical dates associated with the current vehicle of the potential customer;
calculate, based on the historical mileage values and historical dates, an estimated rate of mileage accumulation for the current vehicle;
determine, based on the estimated rate, a first predicted mileage value for the current vehicle on a first date subsequent to the historical dates;
determine an estimated trade-in value for the current vehicle based on the first predicted mileage value;
calculate an estimated payment for a replacement vehicle based on the estimated trade-in value of the current vehicle;
retrieve a mileage level relating to scheduled maintenance for the current vehicle;
determine, based on the estimated rate of mileage accumulation, a second predicted mileage value for the current vehicle on a second date subsequent to the historical dates associated with the current vehicle; and
generate a service alert for the potential customer if the second predicted mileage value exceeds the mileage level relating to scheduled maintenance, and if a difference between the estimated payment for the replacement vehicle and a current payment for the current vehicle is within a predetermined acceptable range; and
an interactive website configured to allow users who are authorized by the one or more vehicle dealers to access a plurality of alerts relating to the prospects while preventing other users from accessing that plurality of alerts, wherein the plurality of alerts includes at least one service alert. 7. The system of claim 6, wherein the interactive website comprises a user interface configured to:
first, receive an instruction to associate an alert in the plurality of alerts with a sales task and assign the sales task to an assigned user; second, present to the assigned user a web page identifying the alert and the sales task; and third, receive an indication from the assigned user that the sales task is complete and automatically assign a follow-up task to at least one of the assigned user or a different user. 8. The system of claim 6, wherein the interactive web site comprises an interactive deal sheet, the interactive deal sheet comprising:
input fields pre-populated with parameters from an alert in the plurality of alerts, the parameters comprising the trade-in value of the current vehicle associated with the alert; and computer-executable instructions to update, in real time, one or more output values displayed on the interactive deal sheet as the parameters in the input fields are modified, the output values comprising a difference between the current payment for the current vehicle associated with the alert and an estimated payment for the replacement vehicle associated with the alert. 9. The system of claim 6, wherein the one or more servers are further programmed to execute, for each potential customer in the plurality of potential customers, instructions that cause the server to:
retrieve a mileage limit for a warranty or lease associated with the current vehicle of the potential customer; determine, based on the estimated rate of mileage accumulation for the current vehicle, a third predicted mileage value for the current vehicle on a third date subsequent to the historical dates that correspond to the historical mileage values associated with the current vehicle; and generate a usage alert for the potential customer if the third predicted mileage value exceeds the mileage limit and a difference between the estimated payment for the replacement vehicle and the current payment for the current vehicle is within the predetermined acceptable range. 10. The system of claim 9, wherein the first date, the second date, and the third date are all the same. 11. The system of claim 6, wherein allowing users who are authorized by the one or more vehicle dealers to access the plurality of alerts comprises:
requiring each of the users to provide a password to login to the interactive website; and encrypting contents of the interactive website using public key encryption before transmitting the content to the users over the Internet. 12. The system of claim 11, wherein allowing users who are authorized by the one or more vehicle dealers to access the plurality of alerts comprises storing, in a computer database, a reference to a specific vehicle dealer for each alert in the plurality of alerts. | A method and system is provided which can analyze customer data, including information about current products and agreements of the customer. The customer data can be used to predict various unknown parameters, including product usage data such as vehicle mileage. The customer data and predicted data can be used to generate various alert conditions. For example, an alert can be generated when a product's predicted usage data for a future time indicates that usage terms of a related agreement will be exceeded, and when a replacement product or agreement can be provided to a customer at an attractive price. An interactive deal sheet for an alert can be generated. The interactive deal sheet can allow a user to view various replacement products and agreements, and to perform additional calculations and comparisons based on inputted parameters.1. A method comprising:
receiving over the Internet, from a computer associated with one or more vehicle dealers, historical mileage data for current vehicles belonging to a plurality of potential customers, the historical mileage data comprising mileage readings taken by the vehicle dealers during vehicle service visits; executing software on a computer system that is hosted at one or more locations remote from the vehicle dealers, the software configured to determine, for each potential customer in the plurality of potential customers, whether the potential customer qualifies as a prospect by:
selecting, from the historical mileage data, one or more historical mileage values and corresponding historical dates associated with the current vehicle of the potential customer;
calculating, based on the historical mileage values and historical dates, an estimated rate of mileage accumulation for the current vehicle;
determining, based on the estimated rate, a first predicted mileage value for the current vehicle on a first date subsequent to the historical dates;
determining an estimated trade-in value for the current vehicle based on the first predicted mileage value;
calculating an estimated payment for a replacement vehicle based on the estimated trade-in value of the current vehicle;
identifying the potential customer as a prospect if a difference between the estimated payment for the replacement vehicle and a current payment for the current vehicle is within a predetermined range;
transmitting to at least one of the vehicle dealers, over the Internet, a list of alerts relating to the potential customers identified as prospects; allowing users authorized by the one or more vehicle dealers to access the list of alerts while restricting access by unauthorized users; associating an alert in the list of alerts with a sales task and assigning the sales task to an assigned user; and transmitting to the assigned user, over the Internet, a notification identifying the alert and the sales task. 2. The method of claim 1, further comprising:
receiving an indication from the assigned user that the sales task is complete and automatically assigning a follow-up task to at least one of the assigned user or a different user. 3. The method of claim 1, wherein at least one alert in the list of alerts is a usage alert for a potential customer in the plurality of potential customers, and the computer system generates the usage alert by:
retrieving a mileage limit for a warranty or lease associated with the current vehicle of the potential customer; determining, based on the estimated rate of mileage accumulation for the current vehicle, a second predicted mileage value for the current vehicle on a second date subsequent to the historical dates that correspond to the historical mileage values associated with the current vehicle; and determining, if the potential customer is identified as a prospect and the second predicted mileage value exceeds the mileage limit, that a usage alert is available for the potential customer. 4. The method of claim 3, further comprising:
presenting the list of alerts through a user interface accessible over the Internet, wherein the usage alerts in the list of alerts are presented before other alerts in the list. 5. The method of claim 1, wherein the list of alerts includes at least one service alert for a potential customer in the plurality of potential customers, and the computer system generates the service alert by:
retrieving at least one mileage amount relating to scheduled maintenance for the current vehicle of the potential customer; determining, based on the estimated rate of mileage accumulation for the current vehicle, a second predicted mileage value for the current vehicle on a second date subsequent to the historical dates that correspond to the historical mileage values associated with the current vehicle; and determining that the second predicted mileage value exceeds the mileage amount. 6. A system comprising:
a network-accessible database configured to store historical mileage data for current vehicles belonging to a plurality of potential customers, the historical mileage data comprising mileage readings taken by one or more vehicle dealers during vehicle service visits; one or more servers programmed to execute, for each potential customer in the plurality of potential customers, instructions that cause the server to:
select, from the historical mileage data, one or more historical mileage values and corresponding historical dates associated with the current vehicle of the potential customer;
calculate, based on the historical mileage values and historical dates, an estimated rate of mileage accumulation for the current vehicle;
determine, based on the estimated rate, a first predicted mileage value for the current vehicle on a first date subsequent to the historical dates;
determine an estimated trade-in value for the current vehicle based on the first predicted mileage value;
calculate an estimated payment for a replacement vehicle based on the estimated trade-in value of the current vehicle;
retrieve a mileage level relating to scheduled maintenance for the current vehicle;
determine, based on the estimated rate of mileage accumulation, a second predicted mileage value for the current vehicle on a second date subsequent to the historical dates associated with the current vehicle; and
generate a service alert for the potential customer if the second predicted mileage value exceeds the mileage level relating to scheduled maintenance, and if a difference between the estimated payment for the replacement vehicle and a current payment for the current vehicle is within a predetermined acceptable range; and
an interactive website configured to allow users who are authorized by the one or more vehicle dealers to access a plurality of alerts relating to the prospects while preventing other users from accessing that plurality of alerts, wherein the plurality of alerts includes at least one service alert. 7. The system of claim 6, wherein the interactive website comprises a user interface configured to:
first, receive an instruction to associate an alert in the plurality of alerts with a sales task and assign the sales task to an assigned user; second, present to the assigned user a web page identifying the alert and the sales task; and third, receive an indication from the assigned user that the sales task is complete and automatically assign a follow-up task to at least one of the assigned user or a different user. 8. The system of claim 6, wherein the interactive web site comprises an interactive deal sheet, the interactive deal sheet comprising:
input fields pre-populated with parameters from an alert in the plurality of alerts, the parameters comprising the trade-in value of the current vehicle associated with the alert; and computer-executable instructions to update, in real time, one or more output values displayed on the interactive deal sheet as the parameters in the input fields are modified, the output values comprising a difference between the current payment for the current vehicle associated with the alert and an estimated payment for the replacement vehicle associated with the alert. 9. The system of claim 6, wherein the one or more servers are further programmed to execute, for each potential customer in the plurality of potential customers, instructions that cause the server to:
retrieve a mileage limit for a warranty or lease associated with the current vehicle of the potential customer; determine, based on the estimated rate of mileage accumulation for the current vehicle, a third predicted mileage value for the current vehicle on a third date subsequent to the historical dates that correspond to the historical mileage values associated with the current vehicle; and generate a usage alert for the potential customer if the third predicted mileage value exceeds the mileage limit and a difference between the estimated payment for the replacement vehicle and the current payment for the current vehicle is within the predetermined acceptable range. 10. The system of claim 9, wherein the first date, the second date, and the third date are all the same. 11. The system of claim 6, wherein allowing users who are authorized by the one or more vehicle dealers to access the plurality of alerts comprises:
requiring each of the users to provide a password to login to the interactive website; and encrypting contents of the interactive website using public key encryption before transmitting the content to the users over the Internet. 12. The system of claim 11, wherein allowing users who are authorized by the one or more vehicle dealers to access the plurality of alerts comprises storing, in a computer database, a reference to a specific vehicle dealer for each alert in the plurality of alerts. | 3,600 |
13,451 | 13,451 | 12,623,572 | 3,696 | An insurance policy is stored ( 101 ) as a plurality of discrete temporally-sequential policy data revisions. A legally binding revision for a first given date is then determined ( 102 ) by identifying all policy data revisions effective on the first given date and choosing a most temporally recent policy data revision temporally prior to a second given date. When a new policy data revision is ( 103 ) temporally subsequent as compared to a first policy data revision and also comprises a legally effective date range preceding at least in part an effective date range of the first policy data revision, legally non-overlapping policy data revisions are created ( 104 ) for each legally overlapping effective date range as exists between the new policy data revision and all temporally preceding revisions. Each newly-created legally non-overlapping policy data revision comprises changes introduced by the new policy data revision and at least one temporally preceding policy data revision. | 1: A method comprising:
storing an insurance policy as a plurality of discrete temporally-sequential policy data revisions, wherein each revision incorporates information from temporally prior revisions covering an effective date range of the revision; determining a legally binding revision for a first given date by identifying all policy data revisions effective on the first given date and choosing a most temporally recent policy data revision temporally prior to a second given date. 2: The method of claim 1 further comprising:
when a new policy data revision is temporally subsequent as compared to a first policy data revision and also comprises a legally effective date range preceding at least in part an effective date range of the first policy data revision, creating legally non-overlapping policy data revisions for each legally overlapping effective date range as exists between the new policy data revision and all temporally preceding policy data revisions, each newly-created legally non-overlapping policy data revision comprising changes introduced by the new policy data revision and at least one temporally preceding policy data revision. 3. The method of claim 2 further comprising:
determining differences introduced by the new policy data revision. 4. The method of claim 3 further comprising:
identifying for a user at least one of the differences. 5: The method of claim 3 further comprising:
automatically applying the differences introduced by the new policy data revision to the newly-created legally non-overlapping policy data revisions to create merged legally non-overlapping policy data revisions. 6: The method of claim 5 wherein automatically applying the differences introduced by the new policy data revision further comprises determining if applying the differences introduced by the new policy data revision to the newly-created legally non-overlapping policy data revisions creates conflicting insurance policy terms. 7: The method of claim 6 further comprising:
identifying for a user at least one of the conflicting insurance policy terms. 8: The method of claim 6 further comprising:
providing a user with an opportunity to resolve the conflicting insurance policy terms. 9: The method of claim 6 further comprising:
automatically resolving the conflicting insurance policy terms. 10: The method of claim 9 wherein automatically resolving the conflicting insurance policy terms comprises accepting terms introduced by the new data revision. 11: The method of claim 9 wherein automatically resolving the conflicting insurance policy terms comprises resolving the conflicting insurance policy terms according to a configurable method. 12: The method of claim 9 further comprising:
identifying for a user a resolution of the conflicting insurance policy terms. 13: The method of claim 6 further comprising:
allowing the user to select a merge conflict resolution strategy to resolve the conflicting insurance policy terms; and re-applying the differences introduced by the new policy data revision to the newly-created legally non-overlapping policy data revisions and resolving the conflicting insurance policy terms according to the selected merge conflict resolution strategy to create new merged legally non-overlapping policy data revisions. 14: The method of claim 5 further comprising providing a user with an opportunity to edit at least one of:
a primary superseding revision, wherein the primary superseding revision comprises the merged legally non-overlapping policy data revision having an earliest legally effective date; secondary superseding revisions, wherein the secondary superseding revisions comprise the merged legally non-overlapping policy data revisions subsequent to the primary revision. 15: The method of claim 14 further comprising:
determining differences between the primary superseding revision and a most temporally recent prior policy data revision; and determining differences between each secondary superseding revision and an immediately legally subsequent superseding revision. 16: The method of claim 15 further comprising:
detecting any conflicts between each secondary superseding revision and the immediately legally subsequent superseding revision; and detecting any conflict resolutions. 17: The method of claim 16 further comprising:
displaying the differences and the conflict resolutions to the user. 18: The method of claim 14 further comprising:
determining edited differences introduced by an edited primary superseding revision; applying the edited differences to the newly-created legally non-overlapping policy data revisions to create new merged legally non-overlapping policy data revisions. 19. The method of claim 2 further comprising:
using the legally non-overlapping policy data revisions to calculate a revised policy premium. 20: The method of claim 1 wherein each policy data revision has a corresponding change date and a corresponding legally effective date stored therewith. 21: The method of claim 20 further comprising:
using the change dates and the legally effective dates to facilitate determination of a present liability. 22: The method of claim 21 wherein the present liability is determined with respect to a claim for coverage. 23: The method of claim 20 further comprising:
querying the policy data revisions in terms of a change date to determine a status of the insurance policy as of a queried-for change date. 24: The method of claim 20 further comprising:
querying the policy data revisions in terms of a legally effective date to determine a status of the insurance policy as of a queried-for legally effective date. 25: The method of claim 1 further comprising:
when a new policy data revision is a temporally subsequent unbound version as compared to a first policy data revision and also comprises a legally effective date range preceding at least in part an effective date range of the first policy data revision, creating legally non-overlapping unbound policy data revisions for each legally overlapping effective date range as exists between the new policy data revision and all temporally preceding policy data revisions. 26: The method of claim 25 further comprising:
when a second new policy data revision is a temporally subsequent unbound version as compared to a first policy data revision and also comprises a legally effective date range preceding at least in part an effective date range of the first policy data revision, creating second legally non-overlapping unbound policy data revisions for each legally overlapping effective date range as exists between the second new policy data revision and all temporally preceding policy data revisions. 27: The method of claim 26 further comprising:
comparing the legally non-overlapping unbound policy data revisions corresponding to the new policy data revision and the second legally non-overlapping unbound policy data revisions corresponding to the second new policy data revision. 28: The method of claim 25 wherein the legally non-overlapping unbound policy data revisions become bound as of a particular effective date. 29: The method of claim 1 wherein the insurance policy comprises supplemental policy-specific data. 30: The method of claim 29 further comprising:
providing an insurance product model; substantively interpreting the insurance product model to thereby facilitate obtaining the supplemental policy-specific data. 31: The method of claim 1 wherein the second given date is selected from the group consisting of:
the second given date is the same as the first given date; and the second given date is different from the first given date. 32: A method comprising:
storing an insurance policy as a plurality of discrete temporally-sequential policy data revisions, wherein each revision incorporates information from temporally prior revisions with legally effective date ranges overlapping at least in part a legally effective date range of the revision; determining a legally binding revision for a first given date by identifying all policy data revisions effective on the given date and choosing a most temporally recent policy data revision temporally prior to a second given date. 33. (canceled) 34. (canceled) 35. (canceled) 36. (canceled) 37. (canceled) 38. (canceled) 39. (canceled) | An insurance policy is stored ( 101 ) as a plurality of discrete temporally-sequential policy data revisions. A legally binding revision for a first given date is then determined ( 102 ) by identifying all policy data revisions effective on the first given date and choosing a most temporally recent policy data revision temporally prior to a second given date. When a new policy data revision is ( 103 ) temporally subsequent as compared to a first policy data revision and also comprises a legally effective date range preceding at least in part an effective date range of the first policy data revision, legally non-overlapping policy data revisions are created ( 104 ) for each legally overlapping effective date range as exists between the new policy data revision and all temporally preceding revisions. Each newly-created legally non-overlapping policy data revision comprises changes introduced by the new policy data revision and at least one temporally preceding policy data revision.1: A method comprising:
storing an insurance policy as a plurality of discrete temporally-sequential policy data revisions, wherein each revision incorporates information from temporally prior revisions covering an effective date range of the revision; determining a legally binding revision for a first given date by identifying all policy data revisions effective on the first given date and choosing a most temporally recent policy data revision temporally prior to a second given date. 2: The method of claim 1 further comprising:
when a new policy data revision is temporally subsequent as compared to a first policy data revision and also comprises a legally effective date range preceding at least in part an effective date range of the first policy data revision, creating legally non-overlapping policy data revisions for each legally overlapping effective date range as exists between the new policy data revision and all temporally preceding policy data revisions, each newly-created legally non-overlapping policy data revision comprising changes introduced by the new policy data revision and at least one temporally preceding policy data revision. 3. The method of claim 2 further comprising:
determining differences introduced by the new policy data revision. 4. The method of claim 3 further comprising:
identifying for a user at least one of the differences. 5: The method of claim 3 further comprising:
automatically applying the differences introduced by the new policy data revision to the newly-created legally non-overlapping policy data revisions to create merged legally non-overlapping policy data revisions. 6: The method of claim 5 wherein automatically applying the differences introduced by the new policy data revision further comprises determining if applying the differences introduced by the new policy data revision to the newly-created legally non-overlapping policy data revisions creates conflicting insurance policy terms. 7: The method of claim 6 further comprising:
identifying for a user at least one of the conflicting insurance policy terms. 8: The method of claim 6 further comprising:
providing a user with an opportunity to resolve the conflicting insurance policy terms. 9: The method of claim 6 further comprising:
automatically resolving the conflicting insurance policy terms. 10: The method of claim 9 wherein automatically resolving the conflicting insurance policy terms comprises accepting terms introduced by the new data revision. 11: The method of claim 9 wherein automatically resolving the conflicting insurance policy terms comprises resolving the conflicting insurance policy terms according to a configurable method. 12: The method of claim 9 further comprising:
identifying for a user a resolution of the conflicting insurance policy terms. 13: The method of claim 6 further comprising:
allowing the user to select a merge conflict resolution strategy to resolve the conflicting insurance policy terms; and re-applying the differences introduced by the new policy data revision to the newly-created legally non-overlapping policy data revisions and resolving the conflicting insurance policy terms according to the selected merge conflict resolution strategy to create new merged legally non-overlapping policy data revisions. 14: The method of claim 5 further comprising providing a user with an opportunity to edit at least one of:
a primary superseding revision, wherein the primary superseding revision comprises the merged legally non-overlapping policy data revision having an earliest legally effective date; secondary superseding revisions, wherein the secondary superseding revisions comprise the merged legally non-overlapping policy data revisions subsequent to the primary revision. 15: The method of claim 14 further comprising:
determining differences between the primary superseding revision and a most temporally recent prior policy data revision; and determining differences between each secondary superseding revision and an immediately legally subsequent superseding revision. 16: The method of claim 15 further comprising:
detecting any conflicts between each secondary superseding revision and the immediately legally subsequent superseding revision; and detecting any conflict resolutions. 17: The method of claim 16 further comprising:
displaying the differences and the conflict resolutions to the user. 18: The method of claim 14 further comprising:
determining edited differences introduced by an edited primary superseding revision; applying the edited differences to the newly-created legally non-overlapping policy data revisions to create new merged legally non-overlapping policy data revisions. 19. The method of claim 2 further comprising:
using the legally non-overlapping policy data revisions to calculate a revised policy premium. 20: The method of claim 1 wherein each policy data revision has a corresponding change date and a corresponding legally effective date stored therewith. 21: The method of claim 20 further comprising:
using the change dates and the legally effective dates to facilitate determination of a present liability. 22: The method of claim 21 wherein the present liability is determined with respect to a claim for coverage. 23: The method of claim 20 further comprising:
querying the policy data revisions in terms of a change date to determine a status of the insurance policy as of a queried-for change date. 24: The method of claim 20 further comprising:
querying the policy data revisions in terms of a legally effective date to determine a status of the insurance policy as of a queried-for legally effective date. 25: The method of claim 1 further comprising:
when a new policy data revision is a temporally subsequent unbound version as compared to a first policy data revision and also comprises a legally effective date range preceding at least in part an effective date range of the first policy data revision, creating legally non-overlapping unbound policy data revisions for each legally overlapping effective date range as exists between the new policy data revision and all temporally preceding policy data revisions. 26: The method of claim 25 further comprising:
when a second new policy data revision is a temporally subsequent unbound version as compared to a first policy data revision and also comprises a legally effective date range preceding at least in part an effective date range of the first policy data revision, creating second legally non-overlapping unbound policy data revisions for each legally overlapping effective date range as exists between the second new policy data revision and all temporally preceding policy data revisions. 27: The method of claim 26 further comprising:
comparing the legally non-overlapping unbound policy data revisions corresponding to the new policy data revision and the second legally non-overlapping unbound policy data revisions corresponding to the second new policy data revision. 28: The method of claim 25 wherein the legally non-overlapping unbound policy data revisions become bound as of a particular effective date. 29: The method of claim 1 wherein the insurance policy comprises supplemental policy-specific data. 30: The method of claim 29 further comprising:
providing an insurance product model; substantively interpreting the insurance product model to thereby facilitate obtaining the supplemental policy-specific data. 31: The method of claim 1 wherein the second given date is selected from the group consisting of:
the second given date is the same as the first given date; and the second given date is different from the first given date. 32: A method comprising:
storing an insurance policy as a plurality of discrete temporally-sequential policy data revisions, wherein each revision incorporates information from temporally prior revisions with legally effective date ranges overlapping at least in part a legally effective date range of the revision; determining a legally binding revision for a first given date by identifying all policy data revisions effective on the given date and choosing a most temporally recent policy data revision temporally prior to a second given date. 33. (canceled) 34. (canceled) 35. (canceled) 36. (canceled) 37. (canceled) 38. (canceled) 39. (canceled) | 3,600 |
13,452 | 13,452 | 12,489,863 | 3,622 | A system and method for providing automatic advertising distribution for online computer users is disclosed. A particular embodiment includes obtaining a listing posted by a first user in a first region; processing the listing according to a set of pre-defined rules related to posting a listing in a second region, the processed listing being modified to produce a second version of the listing; pushing the second version of the listing to a server in the second region; and making the second version of the listing available for viewing by a second user in the second region. | 1. A method, including:
obtaining a listing posted by a first user in a first region; processing the listing according to a set of pre-defined rules related to posting a listing in a second region, the processed listing being modified to produce a second version of the listing; pushing the second version of the listing to a server in the second region; and making the second version of the listing available for viewing by a second user in the second region. 2. The method as claimed in claim 1 wherein obtaining the listing includes performing a screen-scraping operation. 3. The method as claimed in claim 1 wherein obtaining the listing includes performing an access to an ad source via an application programming interface (API). 4. The method as claimed in claim 1 wherein processing the listing includes performing a currency conversion operation on an object included in the listing. 5. The method as claimed in claim 1 wherein processing the listing includes performing a time conversion operation on an object included in the listing. 6. The method as claimed in claim 1 wherein processing the listing includes performing a language conversion operation on an object included in the listing. 7. The method as claimed in claim 1 including tracking an ad source to determine if new ads have been posted or deleted from the ad source. 8. The method as claimed in claim 1 wherein the first region and the second region are in different countries. 9. A system, comprising:
a processor; a database, in data communication with the processor, for storage of listings obtained from a plurality of regions; and an advertising distribution module, executable by the processor, to obtain a listing posted by a first user in a first region, process the listing according to a set of pre-defined rules related to posting a listing in a second region, the processed listing being modified to produce a second version of the listing, push the second version of the listing to a server in the second region, and make the second version of the listing available for viewing by a second user in the second region. 10. The system as claimed in claim 9 wherein the advertising distribution module being further configured to obtain the listing by performing a screen-scraping operation. 11. The system as claimed in claim 9 wherein the advertising distribution module being further configured to obtain the listing by performing an access to an ad source via an application programming interface (API). 12. The system as claimed in claim 9 wherein the advertising distribution module being further configured to process the listing by performing a currency conversion operation on an object included in the listing. 13. The system as claimed in claim 9 wherein the advertising distribution module being further configured to process the listing by performing a time conversion operation on an object included in the listing. 14. The system as claimed in claim 9 wherein the advertising distribution module being further configured to process the listing by performing a language conversion operation on an object included in the listing. 15. The system as claimed in claim 9 wherein the advertising distribution module being further configured to track an ad source to determine if new ads have been posted or deleted from the ad source. 16. The system as claimed in claim 9 wherein the first region and the second region are in different countries. 17. A machine-useable storage medium embodying instructions which, when executed by a machine, cause the machine to:
obtain a listing posted by a first user in a first region; process the listing according to a set of pre-defined rules related to posting a listing in a second region, the processed listing being modified to produce a second version of the listing; push the second version of the listing to a server in the second region; and make the second version of the listing available for viewing by a second user in the second region. 18. The machine-useable storage medium as claimed in claim 17 wherein the instructions being further configured to obtain the listing by performing a screen-scraping operation. 19. The machine-useable storage medium as claimed in claim 17 wherein the instructions being further configured to obtain the listing by performing an access to an ad source via an application programming interface (API). 20. The machine-useable storage medium as claimed in claim 17 wherein the instructions being further configured to track an ad source to determine if new ads have been posted or deleted from the ad source. | A system and method for providing automatic advertising distribution for online computer users is disclosed. A particular embodiment includes obtaining a listing posted by a first user in a first region; processing the listing according to a set of pre-defined rules related to posting a listing in a second region, the processed listing being modified to produce a second version of the listing; pushing the second version of the listing to a server in the second region; and making the second version of the listing available for viewing by a second user in the second region.1. A method, including:
obtaining a listing posted by a first user in a first region; processing the listing according to a set of pre-defined rules related to posting a listing in a second region, the processed listing being modified to produce a second version of the listing; pushing the second version of the listing to a server in the second region; and making the second version of the listing available for viewing by a second user in the second region. 2. The method as claimed in claim 1 wherein obtaining the listing includes performing a screen-scraping operation. 3. The method as claimed in claim 1 wherein obtaining the listing includes performing an access to an ad source via an application programming interface (API). 4. The method as claimed in claim 1 wherein processing the listing includes performing a currency conversion operation on an object included in the listing. 5. The method as claimed in claim 1 wherein processing the listing includes performing a time conversion operation on an object included in the listing. 6. The method as claimed in claim 1 wherein processing the listing includes performing a language conversion operation on an object included in the listing. 7. The method as claimed in claim 1 including tracking an ad source to determine if new ads have been posted or deleted from the ad source. 8. The method as claimed in claim 1 wherein the first region and the second region are in different countries. 9. A system, comprising:
a processor; a database, in data communication with the processor, for storage of listings obtained from a plurality of regions; and an advertising distribution module, executable by the processor, to obtain a listing posted by a first user in a first region, process the listing according to a set of pre-defined rules related to posting a listing in a second region, the processed listing being modified to produce a second version of the listing, push the second version of the listing to a server in the second region, and make the second version of the listing available for viewing by a second user in the second region. 10. The system as claimed in claim 9 wherein the advertising distribution module being further configured to obtain the listing by performing a screen-scraping operation. 11. The system as claimed in claim 9 wherein the advertising distribution module being further configured to obtain the listing by performing an access to an ad source via an application programming interface (API). 12. The system as claimed in claim 9 wherein the advertising distribution module being further configured to process the listing by performing a currency conversion operation on an object included in the listing. 13. The system as claimed in claim 9 wherein the advertising distribution module being further configured to process the listing by performing a time conversion operation on an object included in the listing. 14. The system as claimed in claim 9 wherein the advertising distribution module being further configured to process the listing by performing a language conversion operation on an object included in the listing. 15. The system as claimed in claim 9 wherein the advertising distribution module being further configured to track an ad source to determine if new ads have been posted or deleted from the ad source. 16. The system as claimed in claim 9 wherein the first region and the second region are in different countries. 17. A machine-useable storage medium embodying instructions which, when executed by a machine, cause the machine to:
obtain a listing posted by a first user in a first region; process the listing according to a set of pre-defined rules related to posting a listing in a second region, the processed listing being modified to produce a second version of the listing; push the second version of the listing to a server in the second region; and make the second version of the listing available for viewing by a second user in the second region. 18. The machine-useable storage medium as claimed in claim 17 wherein the instructions being further configured to obtain the listing by performing a screen-scraping operation. 19. The machine-useable storage medium as claimed in claim 17 wherein the instructions being further configured to obtain the listing by performing an access to an ad source via an application programming interface (API). 20. The machine-useable storage medium as claimed in claim 17 wherein the instructions being further configured to track an ad source to determine if new ads have been posted or deleted from the ad source. | 3,600 |
13,453 | 13,453 | 11,612,988 | 3,623 | Embodiments of the present invention address deficiencies of the art in respect to SOA virtualization and provide a novel and non-obvious method, system and computer program product for service endpoint virtualization and dynamic dependency management. In one embodiment of the invention, a method for service endpoint visualization and dynamic dependency management can be provided. The method can include issuing a ticket in lieu of a service endpoint to a querying client for an identified service, subsequently redeeming the ticket with a service endpoint to an instance of the identified service, and re-redeeming the ticket at a later time to provide a service endpoint to a different instance of the identified service. | 1. A method for service endpoint visualization and dynamic dependency management, the method comprising:
issuing a ticket in lieu of a service endpoint to a querying client for an identified service; subsequently redeeming the ticket with a service endpoint to an instance of the identified service; and, re-redeeming the ticket at a later time to provide a service endpoint to a different instance of the identified service. 2. The method of claim 1, wherein issuing a ticket in lieu of a service endpoint to a querying client for an identified service, comprises:
receiving a query for a service type; locating a ticket for the service type; and, returning the located ticket to the querying client. 3. The method of claim 2, wherein returning the located ticket to the querying client, further comprises:
determining expiration information for the ticket; and, embedding the expiration information in the ticket. 4. The method of claim 2, further comprising:
expiring the ticket after a duration specified by the expiration information; and, requiring a new ticket redemption for the service endpoint for the identified service. 5. The method of claim 1, wherein subsequently redeeming the ticket with a service endpoint to an instance of the identified service, comprises:
receiving the ticket from the querying client; locating a service endpoint to an instance of the identified service; extracting a callback for the querying client and storing the extracted callback for later retrieval; and, returning the service endpoint to the querying client. 6. The method of claim 5, further comprising:
detecting a change in the instance of the identified service; and. notifying the querying client through the callback that a new ticket redemption for a new service endpoint for a different identified service is required. 7. The method of claim 1, further comprising reporting on querying clients dependent upon the instance of the identified service. 8. The method of claim 1, wherein reporting on querying clients dependent upon the instance of the identified service, comprises classifying the querying clients. 9. The method of claim 8, further comprising notifying a class of querying clients through respective callbacks for each of the querying clients that a new ticket redemption for the service endpoint for the identified service is required. 10. A service endpoint binding data processing system configured for service endpoint visualization and dynamic dependency management, the system comprising:
a registry interface to a registry of service endpoints for different services in a service oriented architecture (SOA) component based system; and, a virtualization server coupled to the registry interface, the virtualization server comprising program code enabled to issue a ticket in lieu of a service endpoint to a querying client for an identified one of the services, to subsequently redeem the ticket with a service endpoint to an instance of the identified service, and to re-redeem the ticket at a later time to provide a service endpoint to a different instance of the identified service. 11. The system of claim 10, further comprising a data store of callback addresses for different querying clients bound to different service endpoints for the different services, the virtualization server comprising program code enabled to notify a selected one of the different querying clients to refresh a respective ticket through a corresponding callback in the data store for the selected one of the different querying clients. 12. A computer program product comprising a computer usable medium having computer usable program code for service endpoint visualization and dynamic dependency management, the computer program product including:
computer usable program code for issuing a ticket in lieu of a service endpoint to a querying client for an identified service; computer usable program code for subsequently redeeming the ticket with a service endpoint to an instance of the identified service; and, computer usable program code for re-redeeming the ticket at a later time to provide a service endpoint to a different instance of the identified service. 13. The computer program product of claim 12, wherein the computer usable program code for issuing a ticket in lieu of a service endpoint to a querying client for an identified service, comprises:
computer usable program code for receiving a query for a service type; computer usable program code for locating a ticket for the service type; and, computer usable program code for returning the located ticket to the querying client. 14. The computer program product of claim 13, wherein the computer usable program code for returning the located ticket to the querying client, further comprises:
computer usable program code for determining expiration information for the ticket; and, computer usable program code for embedding the expiration information in the ticket. 15. The computer program product of claim 13, further comprising:
computer usable program code for expiring the ticket after a duration specified by the expiration information; and, computer usable program code for requiring a new ticket redemption for the service endpoint for the identified service. 16. The computer program product of claim 12, wherein the computer usable program code for subsequently redeeming the ticket with a service endpoint to an instance of the identified service, comprises:
computer usable program code for receiving the ticket from the querying client; computer usable program code for locating a service endpoint to an instance of the identified service; computer usable program code for extracting a callback for the querying client and storing the extracted callback for later retrieval; and, computer usable program code for returning the service endpoint to the querying client. 17. The computer program product of claim 16, further comprising:
computer usable program code for detecting a change in the instance of the identified service; and. computer usable program code for notifying the querying client through the callback that a new ticket redemption for a new service endpoint for a different identified service is required. 18. The computer program product of claim 12, further comprising computer usable program code for reporting on querying clients dependent upon the instance of the identified service. 19. The computer program product of claim 12, wherein the computer usable program code for reporting on querying clients dependent upon the instance of the identified service, comprises computer usable program code for classifying the querying clients. 20. The computer program product of claim 19, further comprising computer usable program code for notifying a class of querying clients through respective callbacks for each of the querying clients that a new ticket redemption for the service endpoint for the identified service is required. | Embodiments of the present invention address deficiencies of the art in respect to SOA virtualization and provide a novel and non-obvious method, system and computer program product for service endpoint virtualization and dynamic dependency management. In one embodiment of the invention, a method for service endpoint visualization and dynamic dependency management can be provided. The method can include issuing a ticket in lieu of a service endpoint to a querying client for an identified service, subsequently redeeming the ticket with a service endpoint to an instance of the identified service, and re-redeeming the ticket at a later time to provide a service endpoint to a different instance of the identified service.1. A method for service endpoint visualization and dynamic dependency management, the method comprising:
issuing a ticket in lieu of a service endpoint to a querying client for an identified service; subsequently redeeming the ticket with a service endpoint to an instance of the identified service; and, re-redeeming the ticket at a later time to provide a service endpoint to a different instance of the identified service. 2. The method of claim 1, wherein issuing a ticket in lieu of a service endpoint to a querying client for an identified service, comprises:
receiving a query for a service type; locating a ticket for the service type; and, returning the located ticket to the querying client. 3. The method of claim 2, wherein returning the located ticket to the querying client, further comprises:
determining expiration information for the ticket; and, embedding the expiration information in the ticket. 4. The method of claim 2, further comprising:
expiring the ticket after a duration specified by the expiration information; and, requiring a new ticket redemption for the service endpoint for the identified service. 5. The method of claim 1, wherein subsequently redeeming the ticket with a service endpoint to an instance of the identified service, comprises:
receiving the ticket from the querying client; locating a service endpoint to an instance of the identified service; extracting a callback for the querying client and storing the extracted callback for later retrieval; and, returning the service endpoint to the querying client. 6. The method of claim 5, further comprising:
detecting a change in the instance of the identified service; and. notifying the querying client through the callback that a new ticket redemption for a new service endpoint for a different identified service is required. 7. The method of claim 1, further comprising reporting on querying clients dependent upon the instance of the identified service. 8. The method of claim 1, wherein reporting on querying clients dependent upon the instance of the identified service, comprises classifying the querying clients. 9. The method of claim 8, further comprising notifying a class of querying clients through respective callbacks for each of the querying clients that a new ticket redemption for the service endpoint for the identified service is required. 10. A service endpoint binding data processing system configured for service endpoint visualization and dynamic dependency management, the system comprising:
a registry interface to a registry of service endpoints for different services in a service oriented architecture (SOA) component based system; and, a virtualization server coupled to the registry interface, the virtualization server comprising program code enabled to issue a ticket in lieu of a service endpoint to a querying client for an identified one of the services, to subsequently redeem the ticket with a service endpoint to an instance of the identified service, and to re-redeem the ticket at a later time to provide a service endpoint to a different instance of the identified service. 11. The system of claim 10, further comprising a data store of callback addresses for different querying clients bound to different service endpoints for the different services, the virtualization server comprising program code enabled to notify a selected one of the different querying clients to refresh a respective ticket through a corresponding callback in the data store for the selected one of the different querying clients. 12. A computer program product comprising a computer usable medium having computer usable program code for service endpoint visualization and dynamic dependency management, the computer program product including:
computer usable program code for issuing a ticket in lieu of a service endpoint to a querying client for an identified service; computer usable program code for subsequently redeeming the ticket with a service endpoint to an instance of the identified service; and, computer usable program code for re-redeeming the ticket at a later time to provide a service endpoint to a different instance of the identified service. 13. The computer program product of claim 12, wherein the computer usable program code for issuing a ticket in lieu of a service endpoint to a querying client for an identified service, comprises:
computer usable program code for receiving a query for a service type; computer usable program code for locating a ticket for the service type; and, computer usable program code for returning the located ticket to the querying client. 14. The computer program product of claim 13, wherein the computer usable program code for returning the located ticket to the querying client, further comprises:
computer usable program code for determining expiration information for the ticket; and, computer usable program code for embedding the expiration information in the ticket. 15. The computer program product of claim 13, further comprising:
computer usable program code for expiring the ticket after a duration specified by the expiration information; and, computer usable program code for requiring a new ticket redemption for the service endpoint for the identified service. 16. The computer program product of claim 12, wherein the computer usable program code for subsequently redeeming the ticket with a service endpoint to an instance of the identified service, comprises:
computer usable program code for receiving the ticket from the querying client; computer usable program code for locating a service endpoint to an instance of the identified service; computer usable program code for extracting a callback for the querying client and storing the extracted callback for later retrieval; and, computer usable program code for returning the service endpoint to the querying client. 17. The computer program product of claim 16, further comprising:
computer usable program code for detecting a change in the instance of the identified service; and. computer usable program code for notifying the querying client through the callback that a new ticket redemption for a new service endpoint for a different identified service is required. 18. The computer program product of claim 12, further comprising computer usable program code for reporting on querying clients dependent upon the instance of the identified service. 19. The computer program product of claim 12, wherein the computer usable program code for reporting on querying clients dependent upon the instance of the identified service, comprises computer usable program code for classifying the querying clients. 20. The computer program product of claim 19, further comprising computer usable program code for notifying a class of querying clients through respective callbacks for each of the querying clients that a new ticket redemption for the service endpoint for the identified service is required. | 3,600 |
13,454 | 13,454 | 14,590,817 | 3,693 | Systems and methods of managing payments for services or products are disclosed. Billing system data is extracted or accessed to provide business intelligence and. Visit charges from multiple billing systems can be aggregated to guarantor accounts within or across multiple billing systems and provide a single statement of charges for a given time period. Accounts are accessible online. Accounts can be linked to delegate management authority of a first guarantor's account to a second (manager) guarantor. Visit charges for linked accounts are included in the manager guarantor's statement an online access. Open charges balances can be brokered or transferred to a new asset holder. Pre-determined payment options can be configured by a provider, asset holder, and/or potential asset holder. The pre-determined payment options can include an option for financing a balance. A configurable financing option may enable a guarantor to request terms and receive automatic approval, subject to authorized terms. | 1. A system for managing payments, comprising:
one or more processors; a memory in electrical communication with the one or more processors to store first visit data received from a first billing system and second visit data that is tracked by a second billing system that is independent from the first billing system, the first visit data specifying a charge for a first visit, and the second visit data specifying a charge for a second visit; a visits engine to aggregate the first visit data pertaining to the first visit charge with the second visit data pertaining to the second visit charge; a statement engine to provide a statement including information from the first visit data pertaining to the first visit charge aggregated with information from the second visit data pertaining to the second visit charge. 2. The system of claim 1, further comprising:
a payment portal to receive payment data specifying a payment vehicle for paying a payment amount; and a payment and clearance routing engine to:
transmit a transaction request to a payment gateway to request the payment gateway to obtain funds in the payment amount from a payor financial institution associated with the payment vehicle, to transfer a first portion of the payment funds to a payee financial institution associated with the first patient billing system, and to transfer a second portion of the payment funds to a payee financial institution associated with the second patient billing system; and
communicate one or more electronic posting files to notify the first patient billing system of transfer of the first portion of the payment funds toward payment of the charge for the first visit and to notify the second patient billing system of transfer of the second portion of the payment funds toward payment of the charge for the second visit. 3. The system of claim 1, further comprising an extraction engine to extract the first visit data from the first billing system and to generate a single longitudinal portrayal including the first visit data and the second visit data. 4. The system of claim 1, wherein the visits engine is further to compile the first visit charge and the second visit charge into a current batch of open charges and generate an open charges balance by aggregating all open charges of the current batch of open charges, the system further comprising:
a balance brokering engine to evaluate the open charges balance based on asset sales criteria for determining whether the open charges balance should be transferred from the first billing system to a new system of record and effectuate electronic transactions to transfer title of an accounts receivable asset that constitutes rights to collect payment for the open charges balance, including payment for the current batch of open charges, to the new system of record, if the asset sales criteria are met; and wherein the system tracks the open charges balance, including payments to pay the one or more visit charges and other transactions relating to the open charges balance, wherein the system tracks the open charges balance separate from the first billing system and tracks transactions tracked in the first billing system that pertain to the one or more visit charges. 5. The system of claim 4, further comprising:
a scoring engine configured to extract propensity-to-pay (“PTP”) characteristics from the first visit data and the second visit data, including PTP characteristics of the one or more guarantors, and calculate a PTP metric for a guarantor based on PTP characteristics of the guarantor extracted from the historical healthcare data, wherein the PTP metric indicates a likelihood that the guarantor will pay for visit charges for healthcare visits, wherein the PTP metric is one of the asset sales criteria upon which the balance brokering engine evaluates the open charges balance. 6. The system of claim 1, further comprising:
a financing engine to:
present, to a guarantor of both the charge for the first visit and the charge for the second visit, pre-determined payment options for paying an open charges balance including the charge for the first visit and the charge for the second visit, each of the pre-determined payment options including terms at least partially defined by one of a present asset holder and a potential asset holder of the open charges balance;
receive, at the payment management system, a guarantor selection of one of the pre-determined payment options for paying the open charges balance; and
determine a payment amount based on the selected one of the pre-determined payment options. 7. A computer-implemented method for managing payments, the method comprising:
receiving at one or more computing devices first visit data from a first billing system, the first visit data including a charge for a first visit; receiving at the one or more computing devices second visit data being tracked in a second billing system that is independent from the first billing system, the second visit data specifying a charge for a second visit; receiving at the one or more computing devices payment data specifying a payment vehicle for paying a payment amount; communicating a transaction request to a payment gateway to request the payment gateway process an electronic financial transaction to obtain payment funds in the payment amount from a payor financial institution associated with the payment vehicle, to transfer a first portion of the payment funds to a payee financial institution associated with the first patient billing system, and to transfer a second portion of the payment funds to a payee financial institution associated with the second patient billing system; and communicating one or more electronic posting files to notify the first billing system of transfer of the first portion of the payment funds toward payment of the charge for the first visit and to notify the second billing system of transfer of the second portion of the payment funds toward payment of the charge for the second visit. 8. The method of claim 7, wherein the payment gateway is a remote third party gateway coupled to the one or more computers by a network, wherein communicating a transaction request to the payment gateway comprises transmitting the transaction request over the network. 9. The method of claim 7, wherein the payment amount differs from the charge for the first visit and differs from the amount of the charge for the second healthcare visit. 10. The method of claim 7, further comprising:
receiving at the one or more computing devices payment option input specifying pre-determined payment options; and receiving at the one or more computing devices a selection of one of the provider pre-determined payment options; and determining the payment amount based on the selected one of the provider pre-determined payment options. 11. The method of claim 10, wherein the payment options input includes a pay-in-full discount. 12. The method of claim 10, wherein the payment options input includes provider-determined preset financing terms. 13. The method of claim 10, wherein the payment options input includes provider-determined parameters for guarantor-customized financing terms. 14. The method of claim 7, further comprising generating a single longitudinal portrayal of visit data including the first visit data and the second visit data. 15. The method of claim 7, wherein the first visit data specifies a charge for a first visit of a beneficiary and the second visit data specifies a charge for a second visit of the beneficiary. 16. The method of claim 7, wherein the first visit data specifies a charge for a first visit of a beneficiary and the second visit data specifies a charge for a second visit of a second beneficiary. 17. The method of claim 7, wherein the first visit is a first healthcare visit, the second visit is a second healthcare visit, and a beneficiary of the first healthcare visit and the second healthcare visit is a patient. 18. The method of claim 7, wherein the second visit data is received from the second billing system, wherein the second billing system is remote from the one or more computing devices. 19. The method of claim 7, wherein the first visit data includes a charge for each of a first plurality of visits during a time period, and wherein the one or more electronic posting files to notify the first patient billing system of transfer of the first portion of the payment funds and allocates the first portion of the payment funds toward payment of the charge of one or more of the first plurality of visits. 20. The method of claim 7, wherein the charge for the first visit is tracked in an account within the first billing system and the charge for the second visit is tracked in an account in the second billing system, wherein a first electronic posting file of the one or more electronic posting files specifies the account within the first billing system and a second electronic posting file of the one or more electronic posting files specifies the account within the second billing system. 21. The method of claim 7, wherein the first billing system is associated with a first balance sheet entity and the second billing system is associated with a second balance sheet entity that is independent from the first balance sheet entity. 22. The method of claim 7, wherein the charge for the first visit comprises an aggregation of a plurality of line item charges for the first visit, such that all the line item charges for the first visit were incurred for the first visit. | Systems and methods of managing payments for services or products are disclosed. Billing system data is extracted or accessed to provide business intelligence and. Visit charges from multiple billing systems can be aggregated to guarantor accounts within or across multiple billing systems and provide a single statement of charges for a given time period. Accounts are accessible online. Accounts can be linked to delegate management authority of a first guarantor's account to a second (manager) guarantor. Visit charges for linked accounts are included in the manager guarantor's statement an online access. Open charges balances can be brokered or transferred to a new asset holder. Pre-determined payment options can be configured by a provider, asset holder, and/or potential asset holder. The pre-determined payment options can include an option for financing a balance. A configurable financing option may enable a guarantor to request terms and receive automatic approval, subject to authorized terms.1. A system for managing payments, comprising:
one or more processors; a memory in electrical communication with the one or more processors to store first visit data received from a first billing system and second visit data that is tracked by a second billing system that is independent from the first billing system, the first visit data specifying a charge for a first visit, and the second visit data specifying a charge for a second visit; a visits engine to aggregate the first visit data pertaining to the first visit charge with the second visit data pertaining to the second visit charge; a statement engine to provide a statement including information from the first visit data pertaining to the first visit charge aggregated with information from the second visit data pertaining to the second visit charge. 2. The system of claim 1, further comprising:
a payment portal to receive payment data specifying a payment vehicle for paying a payment amount; and a payment and clearance routing engine to:
transmit a transaction request to a payment gateway to request the payment gateway to obtain funds in the payment amount from a payor financial institution associated with the payment vehicle, to transfer a first portion of the payment funds to a payee financial institution associated with the first patient billing system, and to transfer a second portion of the payment funds to a payee financial institution associated with the second patient billing system; and
communicate one or more electronic posting files to notify the first patient billing system of transfer of the first portion of the payment funds toward payment of the charge for the first visit and to notify the second patient billing system of transfer of the second portion of the payment funds toward payment of the charge for the second visit. 3. The system of claim 1, further comprising an extraction engine to extract the first visit data from the first billing system and to generate a single longitudinal portrayal including the first visit data and the second visit data. 4. The system of claim 1, wherein the visits engine is further to compile the first visit charge and the second visit charge into a current batch of open charges and generate an open charges balance by aggregating all open charges of the current batch of open charges, the system further comprising:
a balance brokering engine to evaluate the open charges balance based on asset sales criteria for determining whether the open charges balance should be transferred from the first billing system to a new system of record and effectuate electronic transactions to transfer title of an accounts receivable asset that constitutes rights to collect payment for the open charges balance, including payment for the current batch of open charges, to the new system of record, if the asset sales criteria are met; and wherein the system tracks the open charges balance, including payments to pay the one or more visit charges and other transactions relating to the open charges balance, wherein the system tracks the open charges balance separate from the first billing system and tracks transactions tracked in the first billing system that pertain to the one or more visit charges. 5. The system of claim 4, further comprising:
a scoring engine configured to extract propensity-to-pay (“PTP”) characteristics from the first visit data and the second visit data, including PTP characteristics of the one or more guarantors, and calculate a PTP metric for a guarantor based on PTP characteristics of the guarantor extracted from the historical healthcare data, wherein the PTP metric indicates a likelihood that the guarantor will pay for visit charges for healthcare visits, wherein the PTP metric is one of the asset sales criteria upon which the balance brokering engine evaluates the open charges balance. 6. The system of claim 1, further comprising:
a financing engine to:
present, to a guarantor of both the charge for the first visit and the charge for the second visit, pre-determined payment options for paying an open charges balance including the charge for the first visit and the charge for the second visit, each of the pre-determined payment options including terms at least partially defined by one of a present asset holder and a potential asset holder of the open charges balance;
receive, at the payment management system, a guarantor selection of one of the pre-determined payment options for paying the open charges balance; and
determine a payment amount based on the selected one of the pre-determined payment options. 7. A computer-implemented method for managing payments, the method comprising:
receiving at one or more computing devices first visit data from a first billing system, the first visit data including a charge for a first visit; receiving at the one or more computing devices second visit data being tracked in a second billing system that is independent from the first billing system, the second visit data specifying a charge for a second visit; receiving at the one or more computing devices payment data specifying a payment vehicle for paying a payment amount; communicating a transaction request to a payment gateway to request the payment gateway process an electronic financial transaction to obtain payment funds in the payment amount from a payor financial institution associated with the payment vehicle, to transfer a first portion of the payment funds to a payee financial institution associated with the first patient billing system, and to transfer a second portion of the payment funds to a payee financial institution associated with the second patient billing system; and communicating one or more electronic posting files to notify the first billing system of transfer of the first portion of the payment funds toward payment of the charge for the first visit and to notify the second billing system of transfer of the second portion of the payment funds toward payment of the charge for the second visit. 8. The method of claim 7, wherein the payment gateway is a remote third party gateway coupled to the one or more computers by a network, wherein communicating a transaction request to the payment gateway comprises transmitting the transaction request over the network. 9. The method of claim 7, wherein the payment amount differs from the charge for the first visit and differs from the amount of the charge for the second healthcare visit. 10. The method of claim 7, further comprising:
receiving at the one or more computing devices payment option input specifying pre-determined payment options; and receiving at the one or more computing devices a selection of one of the provider pre-determined payment options; and determining the payment amount based on the selected one of the provider pre-determined payment options. 11. The method of claim 10, wherein the payment options input includes a pay-in-full discount. 12. The method of claim 10, wherein the payment options input includes provider-determined preset financing terms. 13. The method of claim 10, wherein the payment options input includes provider-determined parameters for guarantor-customized financing terms. 14. The method of claim 7, further comprising generating a single longitudinal portrayal of visit data including the first visit data and the second visit data. 15. The method of claim 7, wherein the first visit data specifies a charge for a first visit of a beneficiary and the second visit data specifies a charge for a second visit of the beneficiary. 16. The method of claim 7, wherein the first visit data specifies a charge for a first visit of a beneficiary and the second visit data specifies a charge for a second visit of a second beneficiary. 17. The method of claim 7, wherein the first visit is a first healthcare visit, the second visit is a second healthcare visit, and a beneficiary of the first healthcare visit and the second healthcare visit is a patient. 18. The method of claim 7, wherein the second visit data is received from the second billing system, wherein the second billing system is remote from the one or more computing devices. 19. The method of claim 7, wherein the first visit data includes a charge for each of a first plurality of visits during a time period, and wherein the one or more electronic posting files to notify the first patient billing system of transfer of the first portion of the payment funds and allocates the first portion of the payment funds toward payment of the charge of one or more of the first plurality of visits. 20. The method of claim 7, wherein the charge for the first visit is tracked in an account within the first billing system and the charge for the second visit is tracked in an account in the second billing system, wherein a first electronic posting file of the one or more electronic posting files specifies the account within the first billing system and a second electronic posting file of the one or more electronic posting files specifies the account within the second billing system. 21. The method of claim 7, wherein the first billing system is associated with a first balance sheet entity and the second billing system is associated with a second balance sheet entity that is independent from the first balance sheet entity. 22. The method of claim 7, wherein the charge for the first visit comprises an aggregation of a plurality of line item charges for the first visit, such that all the line item charges for the first visit were incurred for the first visit. | 3,600 |
13,455 | 13,455 | 14,936,940 | 3,646 | A system and method for reducing tritium migration. In one aspect, the invention is a method of reducing tritium mitigation from a spent nuclear fuel pool containing a body of tritiated water having an exposed surface, the method comprising hermetically sealing the exposed surface of the body of tritiated water with a cover movable between an open-state and a close-state. | 1. A system for reducing tritium migration comprising:
a spent nuclear fuel pool comprising a body of tritiated water having an exposed surface; and a cover movable between an open state in which the cover does not obstruct access to the exposed surface of the body of tritiated water and a closed state in which the cover hermetically seals the exposed surface of the body of tritiated water. 2. The system of claim 1 wherein the cover is a tent structure comprising a frame and a vapor impermeable membrane coupled to the frame, the frame comprising a base that surrounds the spent nuclear fuel pool in the closed state, the tent structure forming a hermetically sealed cavity between vapor impermeable membrane and the exposed surface of the body of tritiated water in the closed-state. 3. The system of claim 2 further comprising a gasket forming a perimeter about the spent nuclear fuel pool, a hermetically sealed interface formed between the base of the frame of the tent structure and the gasket in the closed state. 4. The system of claim 3 wherein the gasket comprises an upper surface having a groove in which the base of the frame of the ten structure nests in the closed-state. 5. The system of claim 3 further comprising one or more adjustable clamps that clamp the base of the frame of the tent structure into contact with the gasket. 6. The system of claim 2 further comprising a condenser operably coupled to the hermetically sealed cavity to condense tritiated water vapor present in the hermetically sealed cavity and return dried air to the hermetically sealed cavity. 7. The system of claim 2 wherein the tent structure comprises an internal funnel for directing tritiated water vapor that condenses on an inner surface of the vapor impermeable membrane either into a waste system or back into the body of tritiated water of the spent nuclear fuel pool. 8. The system of claim 7 wherein the internal funnel comprises a drip edge located above the exposed surface of the body of tritiated water of the spent nuclear fuel pool so that the tritiated water vapor that condenses on the inner surface of the vapor impermeable membrane drips back into the body of tritiated water of the spent nuclear fuel pool. 9. The system of claim 1 wherein the cover is a tarp assembly comprising a vapor impermeable membrane, the vapor impermeable membrane comprising a perimeter region that forms a hermetically sealed perimeter that surrounds the spent nuclear fuel pool in the closed-state, the tarp assembly forming a hermetically sealed cavity between vapor impermeable membrane and the exposed surface of the body of tritiated water in the closed-state. 10. The system of claim 9 wherein the tarp assembly comprises a rotatable roller positioned on a first side of the spent nuclear fuel pool, the vapor impermeable membrane operably coupled to the roller, the vapor impermeable membrane wrapped around the roller when in the open-state so that a free distal edge of the vapor impermeable membrane is located on the first side of the spent nuclear fuel pool and un-wrapped from the roller when in the closed-state so that a free distal edge of the vapor impermeable membrane is located on a second side of the spent nuclear fuel pool opposite the first side. 11. The system of claim 10 wherein the vapor impermeable membrane does not contact the body of tritiated water in the closed-state. 11. The system of claim 10 wherein the tarp assembly comprises first and second guide channels positioned on opposite lateral sides of the spent nuclear fuel pool that extend between the first and second sides of the spent nuclear fuel pool, wherein lateral edges of the vapor impermeable membrane are secured within the first and second guide channel so as to be slidable therein. 12. The system of claim 11 wherein a hermetic seal is formed between the vapor impermeable membrane and the first and second guide channels. 13. The system of claim 11 wherein the first and second guide channels are C-channel members. 14. The system of claim 10 wherein the tarp assembly further comprises an anchor assembly located on the second side of the spent nuclear fuel pool, the anchor assembly having at least one retractable cord secured to the free distal edge. 15. The system of claim 14 wherein the anchor assembly comprises first and second retractable cords secured to the free distal edge of the vapor impermeable membrane, and wherein the first and second cords are located outboard of a perimeter of the spent nuclear fuel pool in the open-state. 16. The system of claim 9 further comprising a condenser operably coupled to the hermetically sealed cavity to condense tritiated water vapor present in the hermetically sealed cavity and return dried air to the hermetically sealed cavity. 15. The system of claim 10 wherein the tarp assembly comprises first and second seal roller assemblies located on the first and second sides of the spent nuclear fuel pool, the vapor impermeable membrane being fed through both the first and second seal roller assemblies in the closed-state to form hermetic seals between the first and second seal roller assemblies and the vapor impermeable membrane. 16. The system of claim 1 wherein the cover comprises a vapor impermeable membrane, a hermetically sealed cavity being formed between the vapor impermeable membrane and the exposed surface of the body of tritiated water. 17. The system of claim 16 further comprising at least one humidity trap located outside of the hermetically sealed cavity, the humidity trap comprising one or more exposed surfaces that are configured to induce condensation of tritiated water vapor. 18. A system for reducing tritium migration comprising:
a spent nuclear fuel pool comprising a body of tritiated water having an exposed surface; and a tent structure comprising a frame and a vapor impermeable membrane, the tent structure movable between an open state in which the tent structure does not obstruct access to the exposed surface of the body of tritiated water and a closed state in which the tent structure hermetically seals the exposed surface of the body of tritiated water. 19. The system of claim 18 further comprising a tarp assembly positioned between the tent structure and the exposed surface of the body of tritiated water, the tarp structure comprising a retractable vapor impermeable membrane movable between an open-state and a closed-state, wherein when the retractable vapor impermeable membrane dos not contact the body of tritiated water in either the closed-state or the open-state. 20. A method of reducing tritium mitigation from a spent nuclear fuel pool containing a body of tritiated water having an exposed surface, the method comprising hermetically sealing the exposed surface of the body of tritiated water with a cover movable between an open-state and a close-state. | A system and method for reducing tritium migration. In one aspect, the invention is a method of reducing tritium mitigation from a spent nuclear fuel pool containing a body of tritiated water having an exposed surface, the method comprising hermetically sealing the exposed surface of the body of tritiated water with a cover movable between an open-state and a close-state.1. A system for reducing tritium migration comprising:
a spent nuclear fuel pool comprising a body of tritiated water having an exposed surface; and a cover movable between an open state in which the cover does not obstruct access to the exposed surface of the body of tritiated water and a closed state in which the cover hermetically seals the exposed surface of the body of tritiated water. 2. The system of claim 1 wherein the cover is a tent structure comprising a frame and a vapor impermeable membrane coupled to the frame, the frame comprising a base that surrounds the spent nuclear fuel pool in the closed state, the tent structure forming a hermetically sealed cavity between vapor impermeable membrane and the exposed surface of the body of tritiated water in the closed-state. 3. The system of claim 2 further comprising a gasket forming a perimeter about the spent nuclear fuel pool, a hermetically sealed interface formed between the base of the frame of the tent structure and the gasket in the closed state. 4. The system of claim 3 wherein the gasket comprises an upper surface having a groove in which the base of the frame of the ten structure nests in the closed-state. 5. The system of claim 3 further comprising one or more adjustable clamps that clamp the base of the frame of the tent structure into contact with the gasket. 6. The system of claim 2 further comprising a condenser operably coupled to the hermetically sealed cavity to condense tritiated water vapor present in the hermetically sealed cavity and return dried air to the hermetically sealed cavity. 7. The system of claim 2 wherein the tent structure comprises an internal funnel for directing tritiated water vapor that condenses on an inner surface of the vapor impermeable membrane either into a waste system or back into the body of tritiated water of the spent nuclear fuel pool. 8. The system of claim 7 wherein the internal funnel comprises a drip edge located above the exposed surface of the body of tritiated water of the spent nuclear fuel pool so that the tritiated water vapor that condenses on the inner surface of the vapor impermeable membrane drips back into the body of tritiated water of the spent nuclear fuel pool. 9. The system of claim 1 wherein the cover is a tarp assembly comprising a vapor impermeable membrane, the vapor impermeable membrane comprising a perimeter region that forms a hermetically sealed perimeter that surrounds the spent nuclear fuel pool in the closed-state, the tarp assembly forming a hermetically sealed cavity between vapor impermeable membrane and the exposed surface of the body of tritiated water in the closed-state. 10. The system of claim 9 wherein the tarp assembly comprises a rotatable roller positioned on a first side of the spent nuclear fuel pool, the vapor impermeable membrane operably coupled to the roller, the vapor impermeable membrane wrapped around the roller when in the open-state so that a free distal edge of the vapor impermeable membrane is located on the first side of the spent nuclear fuel pool and un-wrapped from the roller when in the closed-state so that a free distal edge of the vapor impermeable membrane is located on a second side of the spent nuclear fuel pool opposite the first side. 11. The system of claim 10 wherein the vapor impermeable membrane does not contact the body of tritiated water in the closed-state. 11. The system of claim 10 wherein the tarp assembly comprises first and second guide channels positioned on opposite lateral sides of the spent nuclear fuel pool that extend between the first and second sides of the spent nuclear fuel pool, wherein lateral edges of the vapor impermeable membrane are secured within the first and second guide channel so as to be slidable therein. 12. The system of claim 11 wherein a hermetic seal is formed between the vapor impermeable membrane and the first and second guide channels. 13. The system of claim 11 wherein the first and second guide channels are C-channel members. 14. The system of claim 10 wherein the tarp assembly further comprises an anchor assembly located on the second side of the spent nuclear fuel pool, the anchor assembly having at least one retractable cord secured to the free distal edge. 15. The system of claim 14 wherein the anchor assembly comprises first and second retractable cords secured to the free distal edge of the vapor impermeable membrane, and wherein the first and second cords are located outboard of a perimeter of the spent nuclear fuel pool in the open-state. 16. The system of claim 9 further comprising a condenser operably coupled to the hermetically sealed cavity to condense tritiated water vapor present in the hermetically sealed cavity and return dried air to the hermetically sealed cavity. 15. The system of claim 10 wherein the tarp assembly comprises first and second seal roller assemblies located on the first and second sides of the spent nuclear fuel pool, the vapor impermeable membrane being fed through both the first and second seal roller assemblies in the closed-state to form hermetic seals between the first and second seal roller assemblies and the vapor impermeable membrane. 16. The system of claim 1 wherein the cover comprises a vapor impermeable membrane, a hermetically sealed cavity being formed between the vapor impermeable membrane and the exposed surface of the body of tritiated water. 17. The system of claim 16 further comprising at least one humidity trap located outside of the hermetically sealed cavity, the humidity trap comprising one or more exposed surfaces that are configured to induce condensation of tritiated water vapor. 18. A system for reducing tritium migration comprising:
a spent nuclear fuel pool comprising a body of tritiated water having an exposed surface; and a tent structure comprising a frame and a vapor impermeable membrane, the tent structure movable between an open state in which the tent structure does not obstruct access to the exposed surface of the body of tritiated water and a closed state in which the tent structure hermetically seals the exposed surface of the body of tritiated water. 19. The system of claim 18 further comprising a tarp assembly positioned between the tent structure and the exposed surface of the body of tritiated water, the tarp structure comprising a retractable vapor impermeable membrane movable between an open-state and a closed-state, wherein when the retractable vapor impermeable membrane dos not contact the body of tritiated water in either the closed-state or the open-state. 20. A method of reducing tritium mitigation from a spent nuclear fuel pool containing a body of tritiated water having an exposed surface, the method comprising hermetically sealing the exposed surface of the body of tritiated water with a cover movable between an open-state and a close-state. | 3,600 |
13,456 | 13,456 | 14,324,203 | 3,645 | A device is disclosed. The device includes a plurality of microphones to receive ultra-sound signals, wherein the ultra-sound signals include an encoded data. The device also includes a microcontroller coupled to the plurality of microphones. The microcontroller is configured to detect the ultra-sound signals through the plurality of microphones. The detection of the ultra-sound signals includes calculating an angle of arrival of the ultra-sound signals at a microphone in the plurality of microphones. The microcontroller is configured to perform a transaction based on the encoded data received via a microphone in the plurality of microphones. | 1. A device, comprising:
a plurality of microphones to receive ultra-sound signals, wherein the ultra-sound signals includes an encoded data; and a processor coupled to the plurality of microphones, the processor is configurable to detect the ultra-sound signals through the plurality of microphones, wherein the detection includes calculating an angle of arrival of the ultra-sound signals at a microphone in the plurality of microphones, wherein the processor is configurable to perform a transaction based on the encoded data received via a microphone in the plurality of microphones. 2. The device of claim 1, wherein, the processor is further configurable to disregard the ultra-sound signals if the measured angle of arrival is outside a preset threshold range. 3. The device of claim 1, wherein the processor is further configurable to measure a distance to a source of the ultra-sound signals. 4. The device of claim 3, wherein the processor is further configurable to disregard the ultra-sound signals if the measured distance is greater or smaller than a preset threshold. 5. The device of claim 1, wherein the processor is further configurable to perform a secret code exchange with a sender of the ultra-sound signals. 6. The device of claim 5, wherein the processor is configurable to encrypt data sent to the sender using the secret code. 7. A device connected to a network, the device comprising:
a processor; a memory, wherein the memory includes programming instructions to configure a mobile device when the programming instructions are transferred, via the network, to the mobile phone and executed by a processor of the mobile device, wherein after being configured through the transferred programming instructions, the mobile phone performs an operation, the operation includes,
detecting ultra-sound signals through a plurality of microphones incorporated in the mobile device, wherein the detecting includes calculating an angle of arrival of the ultra-sound signals at a microphone in the plurality of microphones. 8. The device of claim 7, wherein the operation further includes performing a transaction based on an encoded data received via a microphone in the plurality of microphones. 9. The device of claim 7, wherein the operation further includes disregarding the ultra-sound signals if the measured angle of arrival is outside a preset threshold range. 10. The device of claim 7, wherein the operation further includes measuring a distance to a source of the ultra-sound signals. 11. The device of claim 10, wherein the operation further includes disregarding the ultra-sound signals if the measured distance is greater or smaller than a preset threshold. 12. The device of claim 1, wherein the operation further includes performing a secret code exchange with a sender of the ultra-sound signals. 13. The device of claim 12, wherein the operation further includes encrypting data sent to the sender using the secret code. 14. A device, comprising:
a plurality of microphones to receive ultra-sound signals, wherein the ultra-sound signals includes an encoded data; and a microcontroller coupled to the plurality of microphones, the microcontroller is configured to detect the ultra-sound signals through the plurality of microphones, wherein the detection includes calculating an angle of arrival of the ultra-sound signals at a microphone in the plurality of microphones, wherein the microcontroller is configured to perform a transaction based on the encoded data received via a microphone in the plurality of microphones. 15. The device of claim 1, wherein, the microcontroller is further configured to disregard the ultra-sound signals if the measured angle of arrival is outside a preset threshold range. 16. The device of claim 1, wherein the microcontroller is further configured to measure a distance to a source of the ultra-sound signals. 17. The device of claim 3, wherein the microcontroller is further configured to disregard the ultra-sound signals if the measured distance is greater or smaller than a preset threshold. 18. The device of claim 1, wherein the microcontroller is further configured to perform a secret code exchange with a sender of the ultra-sound signals. 19. The device of claim 5, wherein the microcontroller is configured to encrypt data sent to the sender using the secret code. | A device is disclosed. The device includes a plurality of microphones to receive ultra-sound signals, wherein the ultra-sound signals include an encoded data. The device also includes a microcontroller coupled to the plurality of microphones. The microcontroller is configured to detect the ultra-sound signals through the plurality of microphones. The detection of the ultra-sound signals includes calculating an angle of arrival of the ultra-sound signals at a microphone in the plurality of microphones. The microcontroller is configured to perform a transaction based on the encoded data received via a microphone in the plurality of microphones.1. A device, comprising:
a plurality of microphones to receive ultra-sound signals, wherein the ultra-sound signals includes an encoded data; and a processor coupled to the plurality of microphones, the processor is configurable to detect the ultra-sound signals through the plurality of microphones, wherein the detection includes calculating an angle of arrival of the ultra-sound signals at a microphone in the plurality of microphones, wherein the processor is configurable to perform a transaction based on the encoded data received via a microphone in the plurality of microphones. 2. The device of claim 1, wherein, the processor is further configurable to disregard the ultra-sound signals if the measured angle of arrival is outside a preset threshold range. 3. The device of claim 1, wherein the processor is further configurable to measure a distance to a source of the ultra-sound signals. 4. The device of claim 3, wherein the processor is further configurable to disregard the ultra-sound signals if the measured distance is greater or smaller than a preset threshold. 5. The device of claim 1, wherein the processor is further configurable to perform a secret code exchange with a sender of the ultra-sound signals. 6. The device of claim 5, wherein the processor is configurable to encrypt data sent to the sender using the secret code. 7. A device connected to a network, the device comprising:
a processor; a memory, wherein the memory includes programming instructions to configure a mobile device when the programming instructions are transferred, via the network, to the mobile phone and executed by a processor of the mobile device, wherein after being configured through the transferred programming instructions, the mobile phone performs an operation, the operation includes,
detecting ultra-sound signals through a plurality of microphones incorporated in the mobile device, wherein the detecting includes calculating an angle of arrival of the ultra-sound signals at a microphone in the plurality of microphones. 8. The device of claim 7, wherein the operation further includes performing a transaction based on an encoded data received via a microphone in the plurality of microphones. 9. The device of claim 7, wherein the operation further includes disregarding the ultra-sound signals if the measured angle of arrival is outside a preset threshold range. 10. The device of claim 7, wherein the operation further includes measuring a distance to a source of the ultra-sound signals. 11. The device of claim 10, wherein the operation further includes disregarding the ultra-sound signals if the measured distance is greater or smaller than a preset threshold. 12. The device of claim 1, wherein the operation further includes performing a secret code exchange with a sender of the ultra-sound signals. 13. The device of claim 12, wherein the operation further includes encrypting data sent to the sender using the secret code. 14. A device, comprising:
a plurality of microphones to receive ultra-sound signals, wherein the ultra-sound signals includes an encoded data; and a microcontroller coupled to the plurality of microphones, the microcontroller is configured to detect the ultra-sound signals through the plurality of microphones, wherein the detection includes calculating an angle of arrival of the ultra-sound signals at a microphone in the plurality of microphones, wherein the microcontroller is configured to perform a transaction based on the encoded data received via a microphone in the plurality of microphones. 15. The device of claim 1, wherein, the microcontroller is further configured to disregard the ultra-sound signals if the measured angle of arrival is outside a preset threshold range. 16. The device of claim 1, wherein the microcontroller is further configured to measure a distance to a source of the ultra-sound signals. 17. The device of claim 3, wherein the microcontroller is further configured to disregard the ultra-sound signals if the measured distance is greater or smaller than a preset threshold. 18. The device of claim 1, wherein the microcontroller is further configured to perform a secret code exchange with a sender of the ultra-sound signals. 19. The device of claim 5, wherein the microcontroller is configured to encrypt data sent to the sender using the secret code. | 3,600 |
13,457 | 13,457 | 14,309,252 | 3,668 | Methods and apparatus to predict landing system operating parameters are described herein. One described example method includes measuring a value of an operating parameter of a landing system of an aircraft, and determining a ground travel path. The example method also includes determining a predicted value of the operating parameter corresponding to the ground travel path where the predicted value is based on the value of the operating parameter and the ground travel path. | 1. A method comprising:
measuring a value of an operating parameter of a landing system of an aircraft; determining a ground travel path; and calculating, using a processor, a predicted value of the operating parameter corresponding to the ground travel path, wherein the predicted value is based on the value of the operating parameter and the ground travel path. 2. The method as defined in claim 1, wherein calculating the predicted value is based on a comparison of the measured value to an empirical database. 3. The method as defined in claim 1, wherein the operating parameter is brake temperature or dispatch turn time. 4. The method as defined in claim 1, wherein calculating the predicted value of the operating parameter is further based on an external condition, the external condition including one or more of ambient air temperature, air pressure, or wind speed. 5. The method as defined in claim 1, wherein calculating the predicted value of the operating parameter is based on an internal condition, the internal condition including one or more of brake temperature, thrust reverser settings, or autobrake deceleration level. 6. The method as defined in claim 1, wherein calculating the predicted value of the operating parameter is based on heat transfer equations using one or more of a brake structure and material, landing gear structure and material, brake temperature, predicted brake material depletion, brake material depleted during a previous brake deployment or an external condition, the external condition including one or more of ambient air temperature, air pressure, or wind speed. 7. An apparatus comprising:
a sensor mounted to a landing system of an aircraft to measure an operating parameter of the landing system; and a calculator to calculate a predicted value of the operating parameter based on the operating parameter and one or more of a measured external condition or a potential ground travel path. 8. The apparatus as defined in claim 7, wherein the measured external condition is measured proximate a brake of the landing system. 9. The apparatus as defined in claim 7, wherein the calculator calculates the predicted value further based on one or more of a ground travel path or a deceleration setting. 10. The apparatus as defined in claim 7, wherein the calculator calculates the predicted value further based on a comparison with empirical data. 11. The apparatus as defined in claim 10, wherein the empirical data comprises one or more of a range of brake temperature data, ambient temperature data, or empirical reference condition data. 12. The apparatus as defined in claim 7, wherein the calculator is to use heat transfer equations based on one or more of a brake structure and material, a landing gear structure and material, brake temperature, ambient temperature, or an external condition. 13. The apparatus as defined in claim 7, wherein the operating parameter comprises a brake temperature or dispatch turn time. 14. The apparatus as defined in claim 7, further comprising one or more additional sensors to measure a value of one or more of wind speed, air pressure, or velocity of the aircraft, wherein the value is to be used to determine the predicted value of the operating parameter. 15. The apparatus as defined in claim 7, wherein when the predicted value of the operating parameter exceeds a threshold, a message is generated. 16. A method comprising:
measuring an operating parameter of a landing system of an aircraft; measuring a conditional parameter of the landing system; and comparing, using a processor, one or more of the operating parameter or the conditional parameter to empirical data to predict a dispatch turn time or brake temperature value of the aircraft. 17. The method as defined in claim 16, wherein the empirical data comprises brake cooling times for different conditions. 18. The method as defined in claim 16, wherein the empirical data is from a database comprising one or more of a range of brake temperature data, ambient temperature data, brake condition, or empirical reference condition data. 19. The method as defined in claim 16, wherein the operating parameter comprises brake temperature and the conditional parameter comprises brake ambient temperature. 20. The method as defined in claim 16, wherein the prediction of dispatch turn time or brake temperature value is further based on one or more of predicted brake material depletion, or brake material depleted during a previous brake deployment. | Methods and apparatus to predict landing system operating parameters are described herein. One described example method includes measuring a value of an operating parameter of a landing system of an aircraft, and determining a ground travel path. The example method also includes determining a predicted value of the operating parameter corresponding to the ground travel path where the predicted value is based on the value of the operating parameter and the ground travel path.1. A method comprising:
measuring a value of an operating parameter of a landing system of an aircraft; determining a ground travel path; and calculating, using a processor, a predicted value of the operating parameter corresponding to the ground travel path, wherein the predicted value is based on the value of the operating parameter and the ground travel path. 2. The method as defined in claim 1, wherein calculating the predicted value is based on a comparison of the measured value to an empirical database. 3. The method as defined in claim 1, wherein the operating parameter is brake temperature or dispatch turn time. 4. The method as defined in claim 1, wherein calculating the predicted value of the operating parameter is further based on an external condition, the external condition including one or more of ambient air temperature, air pressure, or wind speed. 5. The method as defined in claim 1, wherein calculating the predicted value of the operating parameter is based on an internal condition, the internal condition including one or more of brake temperature, thrust reverser settings, or autobrake deceleration level. 6. The method as defined in claim 1, wherein calculating the predicted value of the operating parameter is based on heat transfer equations using one or more of a brake structure and material, landing gear structure and material, brake temperature, predicted brake material depletion, brake material depleted during a previous brake deployment or an external condition, the external condition including one or more of ambient air temperature, air pressure, or wind speed. 7. An apparatus comprising:
a sensor mounted to a landing system of an aircraft to measure an operating parameter of the landing system; and a calculator to calculate a predicted value of the operating parameter based on the operating parameter and one or more of a measured external condition or a potential ground travel path. 8. The apparatus as defined in claim 7, wherein the measured external condition is measured proximate a brake of the landing system. 9. The apparatus as defined in claim 7, wherein the calculator calculates the predicted value further based on one or more of a ground travel path or a deceleration setting. 10. The apparatus as defined in claim 7, wherein the calculator calculates the predicted value further based on a comparison with empirical data. 11. The apparatus as defined in claim 10, wherein the empirical data comprises one or more of a range of brake temperature data, ambient temperature data, or empirical reference condition data. 12. The apparatus as defined in claim 7, wherein the calculator is to use heat transfer equations based on one or more of a brake structure and material, a landing gear structure and material, brake temperature, ambient temperature, or an external condition. 13. The apparatus as defined in claim 7, wherein the operating parameter comprises a brake temperature or dispatch turn time. 14. The apparatus as defined in claim 7, further comprising one or more additional sensors to measure a value of one or more of wind speed, air pressure, or velocity of the aircraft, wherein the value is to be used to determine the predicted value of the operating parameter. 15. The apparatus as defined in claim 7, wherein when the predicted value of the operating parameter exceeds a threshold, a message is generated. 16. A method comprising:
measuring an operating parameter of a landing system of an aircraft; measuring a conditional parameter of the landing system; and comparing, using a processor, one or more of the operating parameter or the conditional parameter to empirical data to predict a dispatch turn time or brake temperature value of the aircraft. 17. The method as defined in claim 16, wherein the empirical data comprises brake cooling times for different conditions. 18. The method as defined in claim 16, wherein the empirical data is from a database comprising one or more of a range of brake temperature data, ambient temperature data, brake condition, or empirical reference condition data. 19. The method as defined in claim 16, wherein the operating parameter comprises brake temperature and the conditional parameter comprises brake ambient temperature. 20. The method as defined in claim 16, wherein the prediction of dispatch turn time or brake temperature value is further based on one or more of predicted brake material depletion, or brake material depleted during a previous brake deployment. | 3,600 |
13,458 | 13,458 | 15,681,002 | 3,634 | A balance system used with a door of a cupboard comprises a transmission shaft, a first pulley on the transmission shaft, and a balance component. The first pulley is connected to a door belt, one end of the door belt is secured to the first pulley, and the other end of the belt is connected to the door. The balance component comprises a balancing member, a balancing belt and a second pulley on the transmission shaft. One end of the balancing belt is connected to the second pulley, and the other end of the balancing belt is connected to the balancing member, such that the balancing member is hung on the second pulley. The first pulley and the second pulley rotate synchronously, and the door belt and the balancing belt are wound oppositely. With the balance system, a small driving force can open/close the door. | 1. A cupboard, comprising:
a box with an open front, a back, and opposite sides; a door mounted to the box for vertical movement between open and closed positions relative to the open front; pulley system mounted adjacent to the box back and connected to the door; and a weight connected to the pulley system at a location behind the door to counter-balance the door. 2. The cupboard of claim 1 wherein the pulley system includes a first belt connected to the door and a second belt connected to the weight. 3. The cupboard of claim 1 wherein the pulley system includes a first pair of spaced apart belts attached to the door adjacent opposite edges of the door, and a second pair of spaced apart belts attached to the weight. 4. The cupboard of claim 3 wherein the pulley system includes a first pair of pulleys for winding and unwinding the first pair of belts and a second pair of pulleys to wind and unwind the second pair of belts. 5. The cupboard of claim 1 wherein the first and second pairs of belts wind and unwind in opposite directions on the first and second pairs of pulleys. 6. The cupboard of claim 1 further comprising a reversible motor operatively connected to the pulley system to raise and lower the door. 7. The cupboard of claim 1 wherein the motor is laterally centered on the box. 8. The cupboard of claim 1 wherein the pulley system includes a shaft driven by the motor, a pair of door pulleys mounted adjacent opposite ends of the shaft, a pair of weight pulleys mounted adjacent opposite ends of the shaft, a pair of door belts extending between the door and the door pulleys, and a pair of weight belts extending between the weight and the weight pulleys. 9. The cupboard of claim 8 wherein the motor has a drive gear and the shaft has a driven gear in mesh with the door gear. 10. The cupboard of claim 8 wherein the door belts wrap around the door pulleys in a first direction and the weight belts wrap around the weight pulleys in a second direction opposite the first direction. 11. The cupboard of claim 1 wherein the weight is adjacent a rear portion of the box. 12. The balance system of claim 1, wherein the door includes a plurality of louvers interconnected by lift racks at opposite sides of the louvers, and the door belt being operatively connected to the lift racks. 13. The cupboard of claim 1 wherein, the door has a plurality of louvers and a rack system connected to the louvers to raise and lower the louvers when the pulley system is actuated. 14. The cupboard of claim 1 wherein the weight extends horizontally across the back of the box. 15. The cupboard of claim 1 wherein the pulley system includes at least one pulley and at least one door belt extended between the pulley and the door. 16. The cupboard of claim 15 wherein the door belt has a rear end secured to the pulley and a forward end secured to the door. 17. The cupboard of claim 15 wherein the door belt extends forwardly from the pulley. 18. A cupboard having a door and a pulley system for opening and closing the door, the pulley system comprising:
first and second pulleys rotatably mounted on the cupboard behind the door; a first belt extending horizontally between the first pulley and the door; a second belt extending vertically from the second pulley; a weight on a lower end of the second belt to counter-balance the door. 19. The cupboard of claim 18 further comprising a shaft adjacent a rear of the cupboard, and the first and second pulleys being mounted on the shaft. 20. The cupboard of claim 19 further comprising a motor operatively connected to the shaft to rotate the shaft. 21. The cupboard of claim 18 wherein the first and second belts wind in opposite directions of the first and second pulleys, respectively. | A balance system used with a door of a cupboard comprises a transmission shaft, a first pulley on the transmission shaft, and a balance component. The first pulley is connected to a door belt, one end of the door belt is secured to the first pulley, and the other end of the belt is connected to the door. The balance component comprises a balancing member, a balancing belt and a second pulley on the transmission shaft. One end of the balancing belt is connected to the second pulley, and the other end of the balancing belt is connected to the balancing member, such that the balancing member is hung on the second pulley. The first pulley and the second pulley rotate synchronously, and the door belt and the balancing belt are wound oppositely. With the balance system, a small driving force can open/close the door.1. A cupboard, comprising:
a box with an open front, a back, and opposite sides; a door mounted to the box for vertical movement between open and closed positions relative to the open front; pulley system mounted adjacent to the box back and connected to the door; and a weight connected to the pulley system at a location behind the door to counter-balance the door. 2. The cupboard of claim 1 wherein the pulley system includes a first belt connected to the door and a second belt connected to the weight. 3. The cupboard of claim 1 wherein the pulley system includes a first pair of spaced apart belts attached to the door adjacent opposite edges of the door, and a second pair of spaced apart belts attached to the weight. 4. The cupboard of claim 3 wherein the pulley system includes a first pair of pulleys for winding and unwinding the first pair of belts and a second pair of pulleys to wind and unwind the second pair of belts. 5. The cupboard of claim 1 wherein the first and second pairs of belts wind and unwind in opposite directions on the first and second pairs of pulleys. 6. The cupboard of claim 1 further comprising a reversible motor operatively connected to the pulley system to raise and lower the door. 7. The cupboard of claim 1 wherein the motor is laterally centered on the box. 8. The cupboard of claim 1 wherein the pulley system includes a shaft driven by the motor, a pair of door pulleys mounted adjacent opposite ends of the shaft, a pair of weight pulleys mounted adjacent opposite ends of the shaft, a pair of door belts extending between the door and the door pulleys, and a pair of weight belts extending between the weight and the weight pulleys. 9. The cupboard of claim 8 wherein the motor has a drive gear and the shaft has a driven gear in mesh with the door gear. 10. The cupboard of claim 8 wherein the door belts wrap around the door pulleys in a first direction and the weight belts wrap around the weight pulleys in a second direction opposite the first direction. 11. The cupboard of claim 1 wherein the weight is adjacent a rear portion of the box. 12. The balance system of claim 1, wherein the door includes a plurality of louvers interconnected by lift racks at opposite sides of the louvers, and the door belt being operatively connected to the lift racks. 13. The cupboard of claim 1 wherein, the door has a plurality of louvers and a rack system connected to the louvers to raise and lower the louvers when the pulley system is actuated. 14. The cupboard of claim 1 wherein the weight extends horizontally across the back of the box. 15. The cupboard of claim 1 wherein the pulley system includes at least one pulley and at least one door belt extended between the pulley and the door. 16. The cupboard of claim 15 wherein the door belt has a rear end secured to the pulley and a forward end secured to the door. 17. The cupboard of claim 15 wherein the door belt extends forwardly from the pulley. 18. A cupboard having a door and a pulley system for opening and closing the door, the pulley system comprising:
first and second pulleys rotatably mounted on the cupboard behind the door; a first belt extending horizontally between the first pulley and the door; a second belt extending vertically from the second pulley; a weight on a lower end of the second belt to counter-balance the door. 19. The cupboard of claim 18 further comprising a shaft adjacent a rear of the cupboard, and the first and second pulleys being mounted on the shaft. 20. The cupboard of claim 19 further comprising a motor operatively connected to the shaft to rotate the shaft. 21. The cupboard of claim 18 wherein the first and second belts wind in opposite directions of the first and second pulleys, respectively. | 3,600 |
13,459 | 13,459 | 14,796,876 | 3,671 | A pavement striping devices for heating and applying thermoplastic material to a road surface is provided. The pavement striping device includes of: a hopper for holding a supply of particulate thermoplastic marking material in a non-molten state, an air or oil-heat transfer medium melting kettle having a series of coaxial conveyored or unconveyored conduits within, a plastic extruder for transporting the thermoplastic particulate from the hopper to the series of coaxial conveyored or unconveyored conduits with the air or oil-heat transfer medium melting kettle, a heating mechanism for heating the air or oil-heat transfer medium melting kettle and the plastic extruder to a temperature suitable for melting thermoplastic, and a means for driving the stream of molten thermoplastic through the series of coaxial conveyored or unconveyored conduits to a sprayer or extrusion die, all of which form a means by which the molten thermoplastic is directed to the pavement surface. | 1. A surface marking device for applying thermoplastic marking materials to a surface comprising:
a surface marking assembly, said surface marking assembly including a melting kettle, said melting kettle having a shell, at least one conduit member positioned within said shell to allow a hot heat transfer medium to pass around an outer perimeter of said at least one conduit within said shell, said at least one conduit constructed from a heat conductive material and having an aperture at a first end thereof for accepting thermoplastic granules, a second end of said at least one conduit fluidly connected to a material discharge collector at the bottom end of said kettle; a heating system for heating a heat transfer medium, said heat transfer medium passed through said melting kettle and around said at least one conduit; whereby said thermoplastic granules are passed from said first end of said conduit to said second end of said conduit by gravity and whereby said thermoplastic granules are melted before reaching said material discharge collector. 2. The surface marking device for applying thermoplastic marking materials to a surface of claim 1 wherein said heat transfer medium is air, said air vented to the atmosphere after being passed through said shell. 3. The surface marking device for applying thermoplastic marking materials to a surface of claim 2 wherein said air is re-circulated back to said heating system for reheating after being passed through said shell. 4. The surface marking device for applying thermoplastic marking materials to a surface of claim 1 wherein said heat transfer medium is oil, said oil being re-circulated back to said heating system for reheating after being passed through said melting shell. 5. The surface marking device for applying thermoplastic marking materials to a surface of claim 1 wherein said at least one conduit includes an auger conveyor extending at least partially through said conduit for scraping an inner surface of said conduit and providing agitation to said thermoplastic granules as they are melted. 6. The surface marking device for applying thermoplastic marking materials to a surface of claim 5 wherein said auger conveyor is a centerless screw conveyor having a helical coil shape. 7. The surface marking device for applying thermoplastic marking materials to a surface of claim 5 including a drive motor for selectively rotating said auger conveyor. 8. The surface marking device for applying thermoplastic marking materials to a surface of claim 1 wherein said conduit includes at least one fin for increasing the surface area of the outer surface of said conduit thereby increasing heat transfer to said conduit from said heat transfer medium. 9. The surface marking device for applying thermoplastic marking materials to a surface of claim 1 including a plurality of said conduits in a coaxial arrangement. 10. The surface marking device for applying thermoplastic marking materials to a surface of claim 1 including a hopper for holding a supply of said thermoplastic granules in a non-molten state for selective transfer to said at least one conduit. 11. The surface marking device for applying thermoplastic marking materials to a surface of claim 10 including a screw conveyor for transporting said thermoplastic granules from said hopper to said at least one conduit. 12. The surface marking device for applying thermoplastic marking materials to a surface of claim 11 wherein said screw conveyor is constructed and arranged to preheat said thermoplastic granules. 13. A device for melting thermoplastic marking materials in real time for application to a surface comprising:
a surface marking assembly, said surface marking assembly including a melting kettle, said melting kettle having a shell, a plurality of conduit members positioned within said shell in a coaxial spaced apart relationship, said plurality of conduit members constructed from a heat conductive material and having an aperture at a first end thereof for accepting thermoplastic granules, a second end of said at least one conduit fluidly connected to a material discharge collector at the bottom end of said kettle; a heating system for heating a heat transfer medium, said heat transfer medium passed through said melting kettle and around said plurality of conduit members; whereby said thermoplastic granules are passed from said first end of said conduit to said second end of said conduit as they are melted before reaching said material discharge collector. 14. The surface marking device for applying thermoplastic marking materials to a surface of claim 13 wherein said plurality of conduit members each include an auger conveyor extending at least partially through said conduit for scraping an inner surface of said conduit and providing agitation to said thermoplastic granules as they are melted. 15. The surface marking device for applying thermoplastic marking materials to a surface of claim 14 wherein said auger conveyors are connected together for coordinated selective rotation with a single motor. 16. The surface marking device for applying thermoplastic marking materials to a surface of claim 13 including a hopper for holding a supply of said thermoplastic granules in a non-molten state for selective transfer to said plurality of conduit members. 17. The surface marking device for applying thermoplastic marking materials to a surface of claim 16 including a screw conveyor for transporting said thermoplastic granules from said hopper to said plurality of conduit members. 18. The surface marking device for applying thermoplastic marking materials to a surface of claim 13 wherein each said conduit member includes at least one fin for increasing the surface area of the outer surface of each said conduit member thereby increasing heat transfer to said conduit from said heat transfer medium. | A pavement striping devices for heating and applying thermoplastic material to a road surface is provided. The pavement striping device includes of: a hopper for holding a supply of particulate thermoplastic marking material in a non-molten state, an air or oil-heat transfer medium melting kettle having a series of coaxial conveyored or unconveyored conduits within, a plastic extruder for transporting the thermoplastic particulate from the hopper to the series of coaxial conveyored or unconveyored conduits with the air or oil-heat transfer medium melting kettle, a heating mechanism for heating the air or oil-heat transfer medium melting kettle and the plastic extruder to a temperature suitable for melting thermoplastic, and a means for driving the stream of molten thermoplastic through the series of coaxial conveyored or unconveyored conduits to a sprayer or extrusion die, all of which form a means by which the molten thermoplastic is directed to the pavement surface.1. A surface marking device for applying thermoplastic marking materials to a surface comprising:
a surface marking assembly, said surface marking assembly including a melting kettle, said melting kettle having a shell, at least one conduit member positioned within said shell to allow a hot heat transfer medium to pass around an outer perimeter of said at least one conduit within said shell, said at least one conduit constructed from a heat conductive material and having an aperture at a first end thereof for accepting thermoplastic granules, a second end of said at least one conduit fluidly connected to a material discharge collector at the bottom end of said kettle; a heating system for heating a heat transfer medium, said heat transfer medium passed through said melting kettle and around said at least one conduit; whereby said thermoplastic granules are passed from said first end of said conduit to said second end of said conduit by gravity and whereby said thermoplastic granules are melted before reaching said material discharge collector. 2. The surface marking device for applying thermoplastic marking materials to a surface of claim 1 wherein said heat transfer medium is air, said air vented to the atmosphere after being passed through said shell. 3. The surface marking device for applying thermoplastic marking materials to a surface of claim 2 wherein said air is re-circulated back to said heating system for reheating after being passed through said shell. 4. The surface marking device for applying thermoplastic marking materials to a surface of claim 1 wherein said heat transfer medium is oil, said oil being re-circulated back to said heating system for reheating after being passed through said melting shell. 5. The surface marking device for applying thermoplastic marking materials to a surface of claim 1 wherein said at least one conduit includes an auger conveyor extending at least partially through said conduit for scraping an inner surface of said conduit and providing agitation to said thermoplastic granules as they are melted. 6. The surface marking device for applying thermoplastic marking materials to a surface of claim 5 wherein said auger conveyor is a centerless screw conveyor having a helical coil shape. 7. The surface marking device for applying thermoplastic marking materials to a surface of claim 5 including a drive motor for selectively rotating said auger conveyor. 8. The surface marking device for applying thermoplastic marking materials to a surface of claim 1 wherein said conduit includes at least one fin for increasing the surface area of the outer surface of said conduit thereby increasing heat transfer to said conduit from said heat transfer medium. 9. The surface marking device for applying thermoplastic marking materials to a surface of claim 1 including a plurality of said conduits in a coaxial arrangement. 10. The surface marking device for applying thermoplastic marking materials to a surface of claim 1 including a hopper for holding a supply of said thermoplastic granules in a non-molten state for selective transfer to said at least one conduit. 11. The surface marking device for applying thermoplastic marking materials to a surface of claim 10 including a screw conveyor for transporting said thermoplastic granules from said hopper to said at least one conduit. 12. The surface marking device for applying thermoplastic marking materials to a surface of claim 11 wherein said screw conveyor is constructed and arranged to preheat said thermoplastic granules. 13. A device for melting thermoplastic marking materials in real time for application to a surface comprising:
a surface marking assembly, said surface marking assembly including a melting kettle, said melting kettle having a shell, a plurality of conduit members positioned within said shell in a coaxial spaced apart relationship, said plurality of conduit members constructed from a heat conductive material and having an aperture at a first end thereof for accepting thermoplastic granules, a second end of said at least one conduit fluidly connected to a material discharge collector at the bottom end of said kettle; a heating system for heating a heat transfer medium, said heat transfer medium passed through said melting kettle and around said plurality of conduit members; whereby said thermoplastic granules are passed from said first end of said conduit to said second end of said conduit as they are melted before reaching said material discharge collector. 14. The surface marking device for applying thermoplastic marking materials to a surface of claim 13 wherein said plurality of conduit members each include an auger conveyor extending at least partially through said conduit for scraping an inner surface of said conduit and providing agitation to said thermoplastic granules as they are melted. 15. The surface marking device for applying thermoplastic marking materials to a surface of claim 14 wherein said auger conveyors are connected together for coordinated selective rotation with a single motor. 16. The surface marking device for applying thermoplastic marking materials to a surface of claim 13 including a hopper for holding a supply of said thermoplastic granules in a non-molten state for selective transfer to said plurality of conduit members. 17. The surface marking device for applying thermoplastic marking materials to a surface of claim 16 including a screw conveyor for transporting said thermoplastic granules from said hopper to said plurality of conduit members. 18. The surface marking device for applying thermoplastic marking materials to a surface of claim 13 wherein each said conduit member includes at least one fin for increasing the surface area of the outer surface of each said conduit member thereby increasing heat transfer to said conduit from said heat transfer medium. | 3,600 |
13,460 | 13,460 | 13,239,260 | 3,685 | The provided software application includes a module that determines a machine fingerprint of a client device at an appropriate time, such as during initial software load on the client. The fingerprint may comprise various machine-determinable measures of system configuration for the client. Each application copy may be associated with a serial number. A license host may collect serial number, fingerprint and/or IP address information from clients on which the application is installed. The host may generate a map of application installations, including geographic locations of installations and number of unique serial numbers per client in specified regions. | 1. A system for auditing software usage on multiple network devices, comprising:
a communication module; an audit database accessible by the communication module, the audit database storing audit numbers for the multiple network devices, each audit number derived from a software identifier identifying the software and from a device identifier, each software dentifier representing a particular licensing instance of the software and number of seats licensed for the instance, each device identifier being generated from a combination of user-configurable and non-user-configurable machine parameters and identifying a particular one of the multiple network devices, each audit number representing an activation of the software; a display module; at least one processor in operative communication with the communication module and the display module; and a memory in operative communication with the at least one processor and comprising executable code for the at least one processor to: instruct the communication module to access the database; read the audit numbers; sort the audit numbers according to at least one of activated license seats and unactivated license seats; read a number of seats licensed for each software identifier; and instruct the display module to display licensed seats versus activations according to the sorted audit numbers. 2. The system of claim 1, wherein the at least one processor selects a display scheme for displaying licensed seats versus activations in response to a user choice entered on a user input module in operative communication with the at least one processor. 3. The system of claim 1, wherein the display of licensed seats versus activations indicates a number of authorized software copies and a number of pirated software copies. 4. The system of claim 1, wherein each audit number further includes geographic data and wherein the at least one processor further sorts the audit numbers according to the geographic data regarding the software. 5. The system of claim 4, wherein the at least one processor identifies a trend with respect to the geographic data and a number of activations of the software. 6. The system of claim 1, wherein the at least one processor identifies a trend with respect to at least one of a number of activations of the software and the number of seats licensed. 7. The system of claim 1, wherein the at least one processor identifies a trend with respect to at least one of authorized software copies and pirated software copies. 8. The system of claim 1 wherein the display of licensed seats versus activations includes a piracy heat map. 9. A computer readable memory programmed to execute a process for auditing software usage on multiple network devices, the process when executed by a processor comprising the following steps:
receiving audit numbers via a communication module, each audit number derived from a software identifier and from a device identifier, each software identifier representing a particular licensing instance of the software and number of seats licensed for the instance, each device identifier being generated from a combination of user-configurable and non-user-configurable machine parameters and identifying a particular one of the multiple network devices, each audit number representing an activation of the software on the particular device; storing the audit numbers in an audit database; sorting the audit numbers according to at least one of activated license seats and unactivated license seats; reading a number of seats licensed for each software identifier; and instructing a display module to display licensed seats versus activations according to the sorted audit numbers. 10. The medium of claim 9, wherein the steps further comprise selecting a display scheme for displaying licensed seats versus activations in response to a user choice entered on a user input module in operative communication with the processor. 11. The medium of claim 9, wherein the display of licensed seats versus activations indicates a number of authorized software copies and a number of pirated software copies. 12. The medium of claim 9, wherein each audit number further includes geographic data and wherein the steps further comprise sorting the audit numbers according to the geographic data. 13. The medium of claim 12, wherein the steps further comprise identifying a trend with respect to the geographic data and a number of activations of the software. 14. The medium of claim 9, wherein the steps further comprise identifying a trend with respect to at least one of a number of activations of the software and the number of seats licensed. 15. The medium of claim 9, wherein the steps further comprise identifying a trend with respect to at least one of authorized software copies and pirated software copies. 16. The medium of claim 9 wherein the display of licensed seats versus activations includes a piracy heat map. | The provided software application includes a module that determines a machine fingerprint of a client device at an appropriate time, such as during initial software load on the client. The fingerprint may comprise various machine-determinable measures of system configuration for the client. Each application copy may be associated with a serial number. A license host may collect serial number, fingerprint and/or IP address information from clients on which the application is installed. The host may generate a map of application installations, including geographic locations of installations and number of unique serial numbers per client in specified regions.1. A system for auditing software usage on multiple network devices, comprising:
a communication module; an audit database accessible by the communication module, the audit database storing audit numbers for the multiple network devices, each audit number derived from a software identifier identifying the software and from a device identifier, each software dentifier representing a particular licensing instance of the software and number of seats licensed for the instance, each device identifier being generated from a combination of user-configurable and non-user-configurable machine parameters and identifying a particular one of the multiple network devices, each audit number representing an activation of the software; a display module; at least one processor in operative communication with the communication module and the display module; and a memory in operative communication with the at least one processor and comprising executable code for the at least one processor to: instruct the communication module to access the database; read the audit numbers; sort the audit numbers according to at least one of activated license seats and unactivated license seats; read a number of seats licensed for each software identifier; and instruct the display module to display licensed seats versus activations according to the sorted audit numbers. 2. The system of claim 1, wherein the at least one processor selects a display scheme for displaying licensed seats versus activations in response to a user choice entered on a user input module in operative communication with the at least one processor. 3. The system of claim 1, wherein the display of licensed seats versus activations indicates a number of authorized software copies and a number of pirated software copies. 4. The system of claim 1, wherein each audit number further includes geographic data and wherein the at least one processor further sorts the audit numbers according to the geographic data regarding the software. 5. The system of claim 4, wherein the at least one processor identifies a trend with respect to the geographic data and a number of activations of the software. 6. The system of claim 1, wherein the at least one processor identifies a trend with respect to at least one of a number of activations of the software and the number of seats licensed. 7. The system of claim 1, wherein the at least one processor identifies a trend with respect to at least one of authorized software copies and pirated software copies. 8. The system of claim 1 wherein the display of licensed seats versus activations includes a piracy heat map. 9. A computer readable memory programmed to execute a process for auditing software usage on multiple network devices, the process when executed by a processor comprising the following steps:
receiving audit numbers via a communication module, each audit number derived from a software identifier and from a device identifier, each software identifier representing a particular licensing instance of the software and number of seats licensed for the instance, each device identifier being generated from a combination of user-configurable and non-user-configurable machine parameters and identifying a particular one of the multiple network devices, each audit number representing an activation of the software on the particular device; storing the audit numbers in an audit database; sorting the audit numbers according to at least one of activated license seats and unactivated license seats; reading a number of seats licensed for each software identifier; and instructing a display module to display licensed seats versus activations according to the sorted audit numbers. 10. The medium of claim 9, wherein the steps further comprise selecting a display scheme for displaying licensed seats versus activations in response to a user choice entered on a user input module in operative communication with the processor. 11. The medium of claim 9, wherein the display of licensed seats versus activations indicates a number of authorized software copies and a number of pirated software copies. 12. The medium of claim 9, wherein each audit number further includes geographic data and wherein the steps further comprise sorting the audit numbers according to the geographic data. 13. The medium of claim 12, wherein the steps further comprise identifying a trend with respect to the geographic data and a number of activations of the software. 14. The medium of claim 9, wherein the steps further comprise identifying a trend with respect to at least one of a number of activations of the software and the number of seats licensed. 15. The medium of claim 9, wherein the steps further comprise identifying a trend with respect to at least one of authorized software copies and pirated software copies. 16. The medium of claim 9 wherein the display of licensed seats versus activations includes a piracy heat map. | 3,600 |
13,461 | 13,461 | 14,237,868 | 3,664 | A method, apparatus and computer program product are provided for deleting and/or not utilizing a PCI/PSC split in instances in which the PCI/PSC split may no longer be valid in a current location. An example method may include determining whether a current physical cell id (PCI) split is configured to camp on a selected cell. The method 5 may further include causing the current PCI split to not be utilized in an instance in which the PCI split is not configured to camp on the selected cell. | 1-40. (canceled) 41. A method comprising:
determining whether a current physical cell id (PCI) split is configured to camp on a selected cell; and causing the current PCI split to not be utilized in an instance in which the PCI split is not configured to camp on the selected cell. 42. A method of claim 41 further comprises causing the current PCI split to not be utilized in an instance in which an out of network search is caused. 43. A method of claim 41 further comprises causing the current PCI split to not be utilized in an instance in which a predetermined amount of time expires when searching for a cell before a connection with a base station is established. 44. A method of claim 41 further comprises causing the current PCI split to not be utilized in an instance in which a mobile terminal is in any cell selection state. 45. A method of claim 41 further comprises causing at least one of a tracking area update or location area update; and in an instance in which the tracking area update determines a change in location, causing the current PCI split to not be utilized. 46. A method of claim 41 further comprises causing a reselection to another public land mobile network (PLMN); and causing the current PCI split to not be utilized. 47. A method of claim 41 further comprises causing at least one of a tracking area update or location area update, receiving an indication, based on the at least one of the tracking area update or the location area update, that a current location is in an invalid tracking area for the PCI split; and causing the current PCI split to not be utilized. 48. A method of claim 41 further comprises causing the PCI split to be applied in an instance in which a mobile terminal is camped on a cell. 49. A method of claim 41, wherein the PCI split is at least one of a csg-PhysCellIdRange, closed subscriber group (CSG) primary synchronization code (PSC)Split Information, or PCI split. 50. A method of claim 41, wherein causing the current PCI split to not be utilized further comprises at least one of resetting, deleting, not using, not applying, erasing, overwriting, marking unusable, or corrupting the PCI split. 51. An apparatus comprising:
a processor and a memory including software, the memory and the software configured to, with the processor, cause the apparatus to at least:
determine whether a current physical cell id (PCI) split is configured to camp on a selected cell; and
cause the current PCI split to not be utilized in an instance in which the PCI split is not configured to camp on the selected cell. 52. An apparatus of claim 51 wherein the at least one memory including the computer program code is further configured to, with the at least one processor, cause the apparatus to cause the current PCI split to not be utilized in an instance in which an out of network search is caused. 53. An apparatus of claim 51 wherein the at least one memory including the computer program code is further configured to, with the at least one processor, cause the apparatus to cause the current PCI split to not be utilized in an instance in which a predetermined amount of time expires when searching for a cell before a connection with a base station is established. 54. An apparatus of claim 51 wherein the at least one memory including the computer program code is further configured to, with the at least one processor, cause the apparatus to cause the current PCI split to not be utilized in an instance in which a mobile terminal is in any cell selection state. 55. An apparatus of claim 51 wherein the at least one memory including the computer program code is further configured to, with the at least one processor, cause the apparatus to cause at least one of a tracking area update or location area update; and in an instance in which the tracking area update determines a change in location, cause the current PCI split to not be utilized. 56. An apparatus of claim 51 wherein the at least one memory including the computer program code is further configured to, with the at least one processor, cause the apparatus to cause a reselection to another public land mobile network (PLMN); and cause the current PCI split to not be utilized. 57. An apparatus of claim 51, wherein the at least one memory including the computer program code is further configured to, with the at least one processor, cause the apparatus to cause at least one of a tracking area update or location area update, receive an indication, based on the at least one of the tracking area update or the location area update, that a current location is in an invalid tracking area for the PCI split; and cause the current PCI split to not be utilized. 58. An apparatus of claim 51, wherein the at least one memory including the computer program code is further configured to, with the at least one processor, cause the apparatus to cause the PCI split to be applied in an instance in which a mobile terminal is camped on a cell. 59. An apparatus of claims 51, wherein the PCI split is at least one of a csg-PhysCellIdRange, closed subscriber group (CSG) primary synchronization code (PSC)Split Information, or PCI split. 60. An apparatus of claim 51, wherein causing the current PCI split to not be utilized further comprises at least one of resetting, deleting, not using, not applying, erasing, overwriting, marking unusable, or corrupting the PCI split. 61. A computer program product comprising:
at least one computer readable non-transitory memory medium having program code stored thereon, the program code which when executed by an apparatus cause the apparatus at least to:
determine whether a current physical cell id (PCI) split is configured to camp on a selected cell; and
cause the current PCI split to not be utilized in an instance in which the PCI split is not configured to camp on the selected cell. 62. A computer program product of claim 61, wherein the PCI split is at least one of a csg-PhysCellIdRange, closed subscriber group (CSG) primary synchronization code (PSC)Split Information, or PCI split. 63. A computer program product of claim 61, wherein causing the current PCI split to not be utilized further comprises at least one of resetting, deleting, not using, not applying, erasing, overwriting, marking unusable, or corrupting the PCI split. | A method, apparatus and computer program product are provided for deleting and/or not utilizing a PCI/PSC split in instances in which the PCI/PSC split may no longer be valid in a current location. An example method may include determining whether a current physical cell id (PCI) split is configured to camp on a selected cell. The method 5 may further include causing the current PCI split to not be utilized in an instance in which the PCI split is not configured to camp on the selected cell.1-40. (canceled) 41. A method comprising:
determining whether a current physical cell id (PCI) split is configured to camp on a selected cell; and causing the current PCI split to not be utilized in an instance in which the PCI split is not configured to camp on the selected cell. 42. A method of claim 41 further comprises causing the current PCI split to not be utilized in an instance in which an out of network search is caused. 43. A method of claim 41 further comprises causing the current PCI split to not be utilized in an instance in which a predetermined amount of time expires when searching for a cell before a connection with a base station is established. 44. A method of claim 41 further comprises causing the current PCI split to not be utilized in an instance in which a mobile terminal is in any cell selection state. 45. A method of claim 41 further comprises causing at least one of a tracking area update or location area update; and in an instance in which the tracking area update determines a change in location, causing the current PCI split to not be utilized. 46. A method of claim 41 further comprises causing a reselection to another public land mobile network (PLMN); and causing the current PCI split to not be utilized. 47. A method of claim 41 further comprises causing at least one of a tracking area update or location area update, receiving an indication, based on the at least one of the tracking area update or the location area update, that a current location is in an invalid tracking area for the PCI split; and causing the current PCI split to not be utilized. 48. A method of claim 41 further comprises causing the PCI split to be applied in an instance in which a mobile terminal is camped on a cell. 49. A method of claim 41, wherein the PCI split is at least one of a csg-PhysCellIdRange, closed subscriber group (CSG) primary synchronization code (PSC)Split Information, or PCI split. 50. A method of claim 41, wherein causing the current PCI split to not be utilized further comprises at least one of resetting, deleting, not using, not applying, erasing, overwriting, marking unusable, or corrupting the PCI split. 51. An apparatus comprising:
a processor and a memory including software, the memory and the software configured to, with the processor, cause the apparatus to at least:
determine whether a current physical cell id (PCI) split is configured to camp on a selected cell; and
cause the current PCI split to not be utilized in an instance in which the PCI split is not configured to camp on the selected cell. 52. An apparatus of claim 51 wherein the at least one memory including the computer program code is further configured to, with the at least one processor, cause the apparatus to cause the current PCI split to not be utilized in an instance in which an out of network search is caused. 53. An apparatus of claim 51 wherein the at least one memory including the computer program code is further configured to, with the at least one processor, cause the apparatus to cause the current PCI split to not be utilized in an instance in which a predetermined amount of time expires when searching for a cell before a connection with a base station is established. 54. An apparatus of claim 51 wherein the at least one memory including the computer program code is further configured to, with the at least one processor, cause the apparatus to cause the current PCI split to not be utilized in an instance in which a mobile terminal is in any cell selection state. 55. An apparatus of claim 51 wherein the at least one memory including the computer program code is further configured to, with the at least one processor, cause the apparatus to cause at least one of a tracking area update or location area update; and in an instance in which the tracking area update determines a change in location, cause the current PCI split to not be utilized. 56. An apparatus of claim 51 wherein the at least one memory including the computer program code is further configured to, with the at least one processor, cause the apparatus to cause a reselection to another public land mobile network (PLMN); and cause the current PCI split to not be utilized. 57. An apparatus of claim 51, wherein the at least one memory including the computer program code is further configured to, with the at least one processor, cause the apparatus to cause at least one of a tracking area update or location area update, receive an indication, based on the at least one of the tracking area update or the location area update, that a current location is in an invalid tracking area for the PCI split; and cause the current PCI split to not be utilized. 58. An apparatus of claim 51, wherein the at least one memory including the computer program code is further configured to, with the at least one processor, cause the apparatus to cause the PCI split to be applied in an instance in which a mobile terminal is camped on a cell. 59. An apparatus of claims 51, wherein the PCI split is at least one of a csg-PhysCellIdRange, closed subscriber group (CSG) primary synchronization code (PSC)Split Information, or PCI split. 60. An apparatus of claim 51, wherein causing the current PCI split to not be utilized further comprises at least one of resetting, deleting, not using, not applying, erasing, overwriting, marking unusable, or corrupting the PCI split. 61. A computer program product comprising:
at least one computer readable non-transitory memory medium having program code stored thereon, the program code which when executed by an apparatus cause the apparatus at least to:
determine whether a current physical cell id (PCI) split is configured to camp on a selected cell; and
cause the current PCI split to not be utilized in an instance in which the PCI split is not configured to camp on the selected cell. 62. A computer program product of claim 61, wherein the PCI split is at least one of a csg-PhysCellIdRange, closed subscriber group (CSG) primary synchronization code (PSC)Split Information, or PCI split. 63. A computer program product of claim 61, wherein causing the current PCI split to not be utilized further comprises at least one of resetting, deleting, not using, not applying, erasing, overwriting, marking unusable, or corrupting the PCI split. | 3,600 |
13,462 | 13,462 | 14,275,775 | 3,685 | Embodiments of the invention are directed to a centralized trusted service manager system in the form of a trusted service manager interconnectivity service hub, which facilitates and provides communications between entities involved in mobile contactless provisioning and payment systems. One embodiment of the present invention is directed to a method for processing a wallet request from a wallet provider associated with mobile communication device including a secure element through an interconnectivity hub. The method comprises receiving a wallet request in first protocol, determining an issuer associated with the account identifier, and obtaining application data. The method further comprises determining a trusted service manager associated with the secure element from among a plurality of trusted service manager computers using a routing table. Additionally, the method includes determining a second protocol and obtaining a secure element key for completing a request from a secure element trusted service manager using the second protocol. | 1. A method for processing a wallet request from a wallet provider associated with mobile communication device including a secure element through an interconnectivity hub, the method comprising:
receiving, by a server computer associated with the interconnectivity hub, a wallet request including an account identifier and a mobile communication device identifier in a first protocol; determining, by the server computer, an issuer associated with the account identifier; obtaining, by the server computer, application data associated with the issuer and the account identifier; determining, by the server computer, a trusted service manager computer associated with the secure element from among a plurality of trusted service manager computers using a routing table comprising routing information corresponding to predetermined secure element management data associated with the mobile communication device identifier; determining, by the server computer, a second protocol associated with the trusted service manager computer associated with the secure element; obtaining, by the server computer, a secure element key from the trusted service manager computer associated with the secure element using the second protocol; and providing, by the server computer, the application data and the secure element key to a provisioning computer for delivery to the secure element of the mobile communication device. 2. The method of claim 1, wherein obtaining a secure element key from the trusted service manager computer associated with the secure element using the second protocol further comprises:
receiving a secure element key request message in the first protocol, the secure element key request message including a mobile communication device identifier; translating the secure element key request message according to the second protocol; sending the translated secure element key request message to the trusted service manager computer associated with the secure element, wherein the trusted service manager computer determines the secure element key associated with the secure element of the mobile communication device; and receiving a secure element key response message in the second protocol, the secure element key response including the secure element key. 3. The method of claim 1, wherein the trusted service manager computer associated with the secure element includes a central trusted service manager computer, wherein the wallet provider is the central trusted service manager computer, wherein the second protocol is the same as the first protocol, and wherein obtaining the secure element key from the central trusted service manager computer using the second protocol includes identifying a secure element key associated with the mobile communication device stored in a key management database. 4. The method of claim 2, wherein the wallet provider is a central trusted service manager computer and wherein providing the application data and the secure element key for provisioning to the secure element of the mobile communication device further comprises:
sending the application data to the central trusted service manager computer; translating the secure element key response message according to the first protocol; and sending the translated secure element key response message to the central trusted service manager computer, the translated secure element key response message including the secure element key, wherein the central trusted service manager computer generates provisioning data using the secure element key and sends the provisioning data to the mobile communication device. 5. The method of claim 1, wherein the wallet request is received from a third party computer associated with a mobile wallet application on the mobile communication device, and wherein obtaining the secure element key from the trusted service manager computer associated with the secure element using the second protocol further comprises:
sending a provisioning request in a third protocol to a central trusted service manager computer, the provisioning request including the application data, a mobile communication device identifier, and the account identifier; and receiving a secure element key request message in the third protocol, the secure element key request message including the mobile communication device identifier; translating the secure element key request message according to the second protocol; sending the translated secure element key request message to the trusted service manager computer associated with the secure element, wherein the trusted service manager computer determines the secure element key associated with the secure element of the mobile communication device; and receiving a secure element key response message in the second protocol, the secure element key response including the secure element key. 6. The method of claim 1, wherein the wallet request is received from a third party computer associated with a mobile wallet application on the mobile communication device, wherein obtaining application data associated with the issuer and the account identifier includes:
generating, by the server computer, an issuer authorization request including the account identifier and the wallet request; and sending, by the server computer, the issuer authorization request to the issuer; and wherein obtaining the secure element key from the trusted service manager computer associated with the secure element using the second protocol further comprises: receiving a secure element key request message in the third protocol, the secure element key request message including the mobile communication device identifier; translating the secure element key request message according to the second protocol; sending the translated secure element key request message to the trusted service manager computer associated with the secure element, wherein the trusted service manager computer determines the secure element key associated with the secure element of the mobile communication device; and receiving a secure element key response message in the second protocol, the secure element key response including the secure element key. 7. The method of claim 1, wherein the wallet request is received from the issuer and wherein obtaining the secure element key from the trusted service manager computer associated with the secure element using the second protocol further comprises:
sending a provisioning request in a third protocol to a central trusted service manager computer, the provisioning request including the application data, a mobile communication device identifier, and the account identifier; and receiving a secure element key request message in the third protocol, the secure element key request message including the mobile communication device identifier; translating the secure element key request message according to the second protocol; sending the translated secure element key request message to the trusted service manager computer associated with the secure element, wherein the trusted service manager computer determines the secure element key associated with the secure element of the mobile communication device; and receiving a secure element key response message in the second protocol, the secure element key response including the secure element key. 8. The method of claim 1, wherein obtaining the secure element key from the trusted service manager computer associated with the secure element using the second protocol further comprises:
receiving a secure element key request message in the third protocol, the secure element key request message including the mobile communication device identifier; translating the secure element key request message according to the second protocol; sending the translated secure element key request message to the trusted service manager computer associated with the secure element, wherein the trusted service manager computer determines the secure element key associated with the secure element of the mobile communication device; and receiving a secure element key response message in the second protocol, the secure element key response including the secure element key; and wherein obtaining application data associated with the issuer and the account identifier includes receiving the application data in the secure element key request. 9. The method of claim 1, wherein obtaining application data associated with the issuer and the account identifier further comprises:
identifying, by the server computer, provisioning rules and authentication rules associated with the issuer; authenticating, by the server computer, the wallet request according to the authentication rules associated with the issuer; determining, by the server computer, an application account identifier account based on the provisioning rules, the provisioning rules identifying a type of application account identifier; and generating, by the server computer, application data including the application account identifier according to the type of application account identifier; and sending a provisioning notification message, by the server computer, the application account identifier to the issuer. 10. The method of claim 1, wherein obtaining application data associated with the issuer and the account identifier further comprises:
generating, by the server computer, an issuer authorization request including the account identifier and the wallet request; sending, by the server computer, the issuer authorization request to the issuer; receiving, by the server computer, an issuer authorization response from the issuer computer, the issuer authorization response including application data associated with the account identifier. 11. The method of claim 1, wherein the wallet request includes adding, deleting, activating, unlocking, locking, reissuing, replacing, or updating the mobile payment application on the secure element. 12. A server computer comprising:
a processor; and a non-transitory computer readable medium coupled to the processor, the computer readable medium comprising code executable by the processor for implementing a method for processing a wallet request from a wallet provider associated with mobile communication device including a secure element through an interconnectivity hub, the method comprising:
receiving a wallet request including an account identifier and a mobile communication device identifier in a first protocol;
determining an issuer associated with the account identifier;
obtaining application data associated with the issuer and the account identifier;
determining a trusted service manager computer associated with the secure element from among a plurality of trusted service manager computers using a routing table comprising routing information corresponding to predetermined secure element management data associated with the mobile communication device identifier;
determining a second protocol associated with the trusted service manager computer associated with the secure element;
obtaining a secure element key from the trusted service manager computer associated with the secure element using the second protocol; and
providing the application data and the secure element key for provisioning to the secure element of the mobile communication device. 13. The server computer of claim 12, wherein obtaining a secure element key from the trusted service manager computer associated with the secure element using the second protocol further comprises:
receiving a secure element key request message in the first protocol, the secure element key request message including a mobile communication device identifier; translating the secure element key request message according to the second protocol; sending the translated secure element key request message to the trusted service manager computer associated with the secure element, wherein the trusted service manager computer determines the secure element key associated with the secure element of the mobile communication device; and receiving a secure element key response message in the second protocol, the secure element key response including the secure element key. 14. The server computer of claim 12, wherein the trusted service manager computer associated with the secure element includes a central trusted service manager computer, wherein the wallet provider is the central trusted service manager computer, wherein the second protocol is the same as the first protocol, and wherein obtaining the secure element key from the central trusted service manager computer using the second protocol includes identifying a secure element key associated with the mobile communication device stored in a key management database. 15. The server computer of claim 13, wherein the wallet provider is a central trusted service manager computer and wherein providing the application data and the secure element key for provisioning to the secure element of the mobile communication device further comprises:
translating the secure element key response message according to the first protocol; and sending the translated secure element key response message to the central trusted service manager computer, the translated secure element key response message including the application data and the secure element key, wherein the central trusted service manager computer generates provisioning data using the secure element key and sends the provisioning data to the mobile communication device. 16. The server computer of claim 12, wherein the wallet request is received from a third party computer associated with a mobile wallet application on the mobile communication device, and wherein obtaining the secure element key from the trusted service manager computer associated with the secure element using the second protocol further comprises:
sending a provisioning request in a third protocol to a central trusted service manager computer, the provisioning request including the application data, a mobile communication device identifier, and the account identifier; and receiving a secure element key request message in the third protocol, the secure element key request message including the mobile communication device identifier; translating the secure element key request message according to the second protocol; sending the translated secure element key request message to the trusted service manager computer associated with the secure element, wherein the trusted service manager computer determines the secure element key associated with the secure element of the mobile communication device; and receiving a secure element key response message in the second protocol, the secure element key response including the secure element key. 17. The server computer of claim 12, wherein the wallet request is received from a third party computer associated with a mobile wallet application on the mobile communication device, wherein obtaining application data associated with the issuer and the account identifier includes:
generating, by the server computer, an issuer authorization request including the account identifier and the wallet request; and sending, by the server computer, the issuer authorization request to the issuer; and wherein obtaining the secure element key from the trusted service manager computer associated with the secure element using the second protocol further comprises: receiving a secure element key request message in the third protocol, the secure element key request message including the mobile communication device identifier; translating the secure element key request message according to the second protocol; sending the translated secure element key request message to the trusted service manager computer associated with the secure element, wherein the trusted service manager computer determines the secure element key associated with the secure element of the mobile communication device; and receiving a secure element key response message in the second protocol, the secure element key response including the secure element key. 18. The server computer of claim 12, wherein the wallet request is received from the issuer and wherein obtaining the secure element key from the trusted service manager computer associated with the secure element using the second protocol further comprises:
sending a provisioning request in a third protocol to a central trusted service manager computer, the provisioning request including the application data, a mobile communication device identifier, and the account identifier; and receiving a secure element key request message in the third protocol, the secure element key request message including the mobile communication device identifier; translating the secure element key request message according to the second protocol; sending the translated secure element key request message to the trusted service manager computer associated with the secure element, wherein the trusted service manager computer determines the secure element key associated with the secure element of the mobile communication device; and receiving a secure element key response message in the second protocol, the secure element key response including the secure element key. 19. The server computer of claim 12, wherein obtaining the secure element key from the trusted service manager computer associated with the secure element using the second protocol further comprises:
receiving a secure element key request message in the third protocol, the secure element key request message including the mobile communication device identifier; translating the secure element key request message according to the second protocol; sending the translated secure element key request message to the trusted service manager computer associated with the secure element, wherein the trusted service manager computer determines the secure element key associated with the secure element of the mobile communication device; and receiving a secure element key response message in the second protocol, the secure element key response including the secure element key; and wherein obtaining application data associated with the issuer and the account identifier includes receiving the application data in the secure element key request. 20. The server computer of claim 12, wherein obtaining application data associated with the issuer and the account identifier further comprises:
identifying, by the server computer, provisioning rules and authentication rules associated with the issuer; authenticating, by the server computer, the wallet request according to the authentication rules associated with the issuer; determining, by the server computer, an application account identifier based on the provisioning rules, the provisioning rules identifying a type of application account identifier; and generating, by the server computer, application data including the application account identifier; and reporting, by the server computer, the application account identifier to the issuer. | Embodiments of the invention are directed to a centralized trusted service manager system in the form of a trusted service manager interconnectivity service hub, which facilitates and provides communications between entities involved in mobile contactless provisioning and payment systems. One embodiment of the present invention is directed to a method for processing a wallet request from a wallet provider associated with mobile communication device including a secure element through an interconnectivity hub. The method comprises receiving a wallet request in first protocol, determining an issuer associated with the account identifier, and obtaining application data. The method further comprises determining a trusted service manager associated with the secure element from among a plurality of trusted service manager computers using a routing table. Additionally, the method includes determining a second protocol and obtaining a secure element key for completing a request from a secure element trusted service manager using the second protocol.1. A method for processing a wallet request from a wallet provider associated with mobile communication device including a secure element through an interconnectivity hub, the method comprising:
receiving, by a server computer associated with the interconnectivity hub, a wallet request including an account identifier and a mobile communication device identifier in a first protocol; determining, by the server computer, an issuer associated with the account identifier; obtaining, by the server computer, application data associated with the issuer and the account identifier; determining, by the server computer, a trusted service manager computer associated with the secure element from among a plurality of trusted service manager computers using a routing table comprising routing information corresponding to predetermined secure element management data associated with the mobile communication device identifier; determining, by the server computer, a second protocol associated with the trusted service manager computer associated with the secure element; obtaining, by the server computer, a secure element key from the trusted service manager computer associated with the secure element using the second protocol; and providing, by the server computer, the application data and the secure element key to a provisioning computer for delivery to the secure element of the mobile communication device. 2. The method of claim 1, wherein obtaining a secure element key from the trusted service manager computer associated with the secure element using the second protocol further comprises:
receiving a secure element key request message in the first protocol, the secure element key request message including a mobile communication device identifier; translating the secure element key request message according to the second protocol; sending the translated secure element key request message to the trusted service manager computer associated with the secure element, wherein the trusted service manager computer determines the secure element key associated with the secure element of the mobile communication device; and receiving a secure element key response message in the second protocol, the secure element key response including the secure element key. 3. The method of claim 1, wherein the trusted service manager computer associated with the secure element includes a central trusted service manager computer, wherein the wallet provider is the central trusted service manager computer, wherein the second protocol is the same as the first protocol, and wherein obtaining the secure element key from the central trusted service manager computer using the second protocol includes identifying a secure element key associated with the mobile communication device stored in a key management database. 4. The method of claim 2, wherein the wallet provider is a central trusted service manager computer and wherein providing the application data and the secure element key for provisioning to the secure element of the mobile communication device further comprises:
sending the application data to the central trusted service manager computer; translating the secure element key response message according to the first protocol; and sending the translated secure element key response message to the central trusted service manager computer, the translated secure element key response message including the secure element key, wherein the central trusted service manager computer generates provisioning data using the secure element key and sends the provisioning data to the mobile communication device. 5. The method of claim 1, wherein the wallet request is received from a third party computer associated with a mobile wallet application on the mobile communication device, and wherein obtaining the secure element key from the trusted service manager computer associated with the secure element using the second protocol further comprises:
sending a provisioning request in a third protocol to a central trusted service manager computer, the provisioning request including the application data, a mobile communication device identifier, and the account identifier; and receiving a secure element key request message in the third protocol, the secure element key request message including the mobile communication device identifier; translating the secure element key request message according to the second protocol; sending the translated secure element key request message to the trusted service manager computer associated with the secure element, wherein the trusted service manager computer determines the secure element key associated with the secure element of the mobile communication device; and receiving a secure element key response message in the second protocol, the secure element key response including the secure element key. 6. The method of claim 1, wherein the wallet request is received from a third party computer associated with a mobile wallet application on the mobile communication device, wherein obtaining application data associated with the issuer and the account identifier includes:
generating, by the server computer, an issuer authorization request including the account identifier and the wallet request; and sending, by the server computer, the issuer authorization request to the issuer; and wherein obtaining the secure element key from the trusted service manager computer associated with the secure element using the second protocol further comprises: receiving a secure element key request message in the third protocol, the secure element key request message including the mobile communication device identifier; translating the secure element key request message according to the second protocol; sending the translated secure element key request message to the trusted service manager computer associated with the secure element, wherein the trusted service manager computer determines the secure element key associated with the secure element of the mobile communication device; and receiving a secure element key response message in the second protocol, the secure element key response including the secure element key. 7. The method of claim 1, wherein the wallet request is received from the issuer and wherein obtaining the secure element key from the trusted service manager computer associated with the secure element using the second protocol further comprises:
sending a provisioning request in a third protocol to a central trusted service manager computer, the provisioning request including the application data, a mobile communication device identifier, and the account identifier; and receiving a secure element key request message in the third protocol, the secure element key request message including the mobile communication device identifier; translating the secure element key request message according to the second protocol; sending the translated secure element key request message to the trusted service manager computer associated with the secure element, wherein the trusted service manager computer determines the secure element key associated with the secure element of the mobile communication device; and receiving a secure element key response message in the second protocol, the secure element key response including the secure element key. 8. The method of claim 1, wherein obtaining the secure element key from the trusted service manager computer associated with the secure element using the second protocol further comprises:
receiving a secure element key request message in the third protocol, the secure element key request message including the mobile communication device identifier; translating the secure element key request message according to the second protocol; sending the translated secure element key request message to the trusted service manager computer associated with the secure element, wherein the trusted service manager computer determines the secure element key associated with the secure element of the mobile communication device; and receiving a secure element key response message in the second protocol, the secure element key response including the secure element key; and wherein obtaining application data associated with the issuer and the account identifier includes receiving the application data in the secure element key request. 9. The method of claim 1, wherein obtaining application data associated with the issuer and the account identifier further comprises:
identifying, by the server computer, provisioning rules and authentication rules associated with the issuer; authenticating, by the server computer, the wallet request according to the authentication rules associated with the issuer; determining, by the server computer, an application account identifier account based on the provisioning rules, the provisioning rules identifying a type of application account identifier; and generating, by the server computer, application data including the application account identifier according to the type of application account identifier; and sending a provisioning notification message, by the server computer, the application account identifier to the issuer. 10. The method of claim 1, wherein obtaining application data associated with the issuer and the account identifier further comprises:
generating, by the server computer, an issuer authorization request including the account identifier and the wallet request; sending, by the server computer, the issuer authorization request to the issuer; receiving, by the server computer, an issuer authorization response from the issuer computer, the issuer authorization response including application data associated with the account identifier. 11. The method of claim 1, wherein the wallet request includes adding, deleting, activating, unlocking, locking, reissuing, replacing, or updating the mobile payment application on the secure element. 12. A server computer comprising:
a processor; and a non-transitory computer readable medium coupled to the processor, the computer readable medium comprising code executable by the processor for implementing a method for processing a wallet request from a wallet provider associated with mobile communication device including a secure element through an interconnectivity hub, the method comprising:
receiving a wallet request including an account identifier and a mobile communication device identifier in a first protocol;
determining an issuer associated with the account identifier;
obtaining application data associated with the issuer and the account identifier;
determining a trusted service manager computer associated with the secure element from among a plurality of trusted service manager computers using a routing table comprising routing information corresponding to predetermined secure element management data associated with the mobile communication device identifier;
determining a second protocol associated with the trusted service manager computer associated with the secure element;
obtaining a secure element key from the trusted service manager computer associated with the secure element using the second protocol; and
providing the application data and the secure element key for provisioning to the secure element of the mobile communication device. 13. The server computer of claim 12, wherein obtaining a secure element key from the trusted service manager computer associated with the secure element using the second protocol further comprises:
receiving a secure element key request message in the first protocol, the secure element key request message including a mobile communication device identifier; translating the secure element key request message according to the second protocol; sending the translated secure element key request message to the trusted service manager computer associated with the secure element, wherein the trusted service manager computer determines the secure element key associated with the secure element of the mobile communication device; and receiving a secure element key response message in the second protocol, the secure element key response including the secure element key. 14. The server computer of claim 12, wherein the trusted service manager computer associated with the secure element includes a central trusted service manager computer, wherein the wallet provider is the central trusted service manager computer, wherein the second protocol is the same as the first protocol, and wherein obtaining the secure element key from the central trusted service manager computer using the second protocol includes identifying a secure element key associated with the mobile communication device stored in a key management database. 15. The server computer of claim 13, wherein the wallet provider is a central trusted service manager computer and wherein providing the application data and the secure element key for provisioning to the secure element of the mobile communication device further comprises:
translating the secure element key response message according to the first protocol; and sending the translated secure element key response message to the central trusted service manager computer, the translated secure element key response message including the application data and the secure element key, wherein the central trusted service manager computer generates provisioning data using the secure element key and sends the provisioning data to the mobile communication device. 16. The server computer of claim 12, wherein the wallet request is received from a third party computer associated with a mobile wallet application on the mobile communication device, and wherein obtaining the secure element key from the trusted service manager computer associated with the secure element using the second protocol further comprises:
sending a provisioning request in a third protocol to a central trusted service manager computer, the provisioning request including the application data, a mobile communication device identifier, and the account identifier; and receiving a secure element key request message in the third protocol, the secure element key request message including the mobile communication device identifier; translating the secure element key request message according to the second protocol; sending the translated secure element key request message to the trusted service manager computer associated with the secure element, wherein the trusted service manager computer determines the secure element key associated with the secure element of the mobile communication device; and receiving a secure element key response message in the second protocol, the secure element key response including the secure element key. 17. The server computer of claim 12, wherein the wallet request is received from a third party computer associated with a mobile wallet application on the mobile communication device, wherein obtaining application data associated with the issuer and the account identifier includes:
generating, by the server computer, an issuer authorization request including the account identifier and the wallet request; and sending, by the server computer, the issuer authorization request to the issuer; and wherein obtaining the secure element key from the trusted service manager computer associated with the secure element using the second protocol further comprises: receiving a secure element key request message in the third protocol, the secure element key request message including the mobile communication device identifier; translating the secure element key request message according to the second protocol; sending the translated secure element key request message to the trusted service manager computer associated with the secure element, wherein the trusted service manager computer determines the secure element key associated with the secure element of the mobile communication device; and receiving a secure element key response message in the second protocol, the secure element key response including the secure element key. 18. The server computer of claim 12, wherein the wallet request is received from the issuer and wherein obtaining the secure element key from the trusted service manager computer associated with the secure element using the second protocol further comprises:
sending a provisioning request in a third protocol to a central trusted service manager computer, the provisioning request including the application data, a mobile communication device identifier, and the account identifier; and receiving a secure element key request message in the third protocol, the secure element key request message including the mobile communication device identifier; translating the secure element key request message according to the second protocol; sending the translated secure element key request message to the trusted service manager computer associated with the secure element, wherein the trusted service manager computer determines the secure element key associated with the secure element of the mobile communication device; and receiving a secure element key response message in the second protocol, the secure element key response including the secure element key. 19. The server computer of claim 12, wherein obtaining the secure element key from the trusted service manager computer associated with the secure element using the second protocol further comprises:
receiving a secure element key request message in the third protocol, the secure element key request message including the mobile communication device identifier; translating the secure element key request message according to the second protocol; sending the translated secure element key request message to the trusted service manager computer associated with the secure element, wherein the trusted service manager computer determines the secure element key associated with the secure element of the mobile communication device; and receiving a secure element key response message in the second protocol, the secure element key response including the secure element key; and wherein obtaining application data associated with the issuer and the account identifier includes receiving the application data in the secure element key request. 20. The server computer of claim 12, wherein obtaining application data associated with the issuer and the account identifier further comprises:
identifying, by the server computer, provisioning rules and authentication rules associated with the issuer; authenticating, by the server computer, the wallet request according to the authentication rules associated with the issuer; determining, by the server computer, an application account identifier based on the provisioning rules, the provisioning rules identifying a type of application account identifier; and generating, by the server computer, application data including the application account identifier; and reporting, by the server computer, the application account identifier to the issuer. | 3,600 |
13,463 | 13,463 | 12,802,589 | 3,696 | Managing insurance information includes obtaining account information associated with an insurance account, selectively indicating a first portion of the account information that includes versioned information and a second portion of the account information that includes non-versioned information, obtaining policy information of an insurance policy associated with the insurance account, including copying at least some of the versioned information as a first portion of the insurance policy, and establishing a link between at least some of the non-versioned information and a second portion of the insurance policy. The second portion of the insurance policy that is linked with the non-versioned information is automatically updated to reflect changes to the non-versioned information. | 1. A method for managing insurance information, comprising:
obtaining account information associated with an insurance account; selectively indicating a first portion of the account information that includes versioned information and a second portion of the account information that includes non-versioned information; and obtaining policy information of an insurance policy associated with the insurance account, including copying at least some of the versioned'information as a first portion of the insurance policy and establishing a link between at least some of the non-versioned information and a second portion of the insurance policy; wherein: the second portion of the insurance policy that is linked with the non-versioned information is automatically updated to reflect changes to the non-versioned information. 2. The method of claim 1, further comprising saving a stored version of the first portion of the insurance policy and updating the first portion of the insurance policy to correspond to a modified versioned information. 3. The method of claim 1, further comprising saving a stored version of the first portion of the insurance policy and updating the first portion of the insurance policy to correspond to a modified versioned information of a bound insurance policy. 4. The method of claim 1, wherein obtaining the account information includes configuring an entity that includes versioned information and non-versioned information. 5. The method of claim 4, wherein the entity includes contact information. 6. The method of claim 4, wherein the entity includes location information. 7. The method of claim 4, wherein the entity includes address information. 8. The method of claim 1, wherein the first portion of the account information is a first configurable field and the second portion of the account information is a second configurable field. 9. The method of claim 1, wherein configuring the account includes configuring a contact; and
the method further comprises specifying a role associated with the contact, said role determining whether information pertaining to the contact is versioned information or non-versioned information. 10. The method of claim 1, further comprising executing a job associated with the policy, wherein the first portion of the insurance policy and the second portion of the insurance policy are determined by a job type of the job. 11. The method of claim 3, further comprising generating a policy change job when the versioned information changes. 12. The method of claim 1, wherein the versioned information comprises information that affects a contract specified by the policy. 13. The method of claim 1, wherein selectively indicating a first portion of the account information that includes versioned information and a second portion of the account information that includes non-versioned information comprises providing metadata information that identifies data fields as either versioned or non-versioned. 14. The method of claim 1, wherein automatically updating the second portion comprises, when the policy is accessed, querying the account information to provide updated non-versioned information. 15. A system for managing insurance information, comprising:
a processor configured to:
obtain account information associated with an insurance account;
selectively indicate a first portion of the account information that includes versioned information and a second portion of the account information that includes non-versioned information; and
obtain policy information of an insurance policy associated with, the insurance account, including copying at least some of the versioned information as a first portion of the insurance policy and establishing a link between at least some of the non-versioned information and a second portion of the insurance policy; wherein:
the second portion of the insurance policy that is linked with the non-versioned information is automatically updated to reflect changes to the non-versioned information; and
a memory coupled to the processor and configured to provide the processor with instructions. 16. The system of claim 15, the processor is further configured to save a stored version of the first portion of the insurance policy and update the first portion of the insurance policy to correspond to a modified versioned information. 17. The system of claim 15, wherein the processor is further configured save a stored version of the first portion of the insurance policy and update the first portion of the insurance policy to correspond to a modified versioned information of a bound insurance policy. 18. The system of claim 15, wherein obtaining the account information includes configuring an entity that includes versioned information and non-versioned information. 19. The system of claim 15, wherein the first portion of the account information is a first configurable field and the second portion of the account information is a second configurable field. 20. The system of claim 15, wherein configuring the account includes configuring a contact; and the processor is further configured to specify a role associated with the contact, said role determining whether information pertaining to the contact is versioned information or non-versioned information. 21. The system of claim 15, wherein the processor is further configured to execute a job associated with the policy, wherein the first portion of the insurance policy and the second portion of the insurance policy are determined by a job type of the job. 22. The system of claim 17, wherein the processor is further configured to generate a policy change job when the versioned information changes. 23. The system of claim 15, wherein the versioned information comprises information that affects a contract specified by the insurance policy. 24. The system of claim 15, wherein selectively indicating a first portion of the account information that includes versioned information and a second portion of the account information that includes non-versioned information comprises providing metadata information that identifies data fields as either versioned or non-versioned. 25. A computer program product for managing insurance information, the computer program product being embodied in a computer readable storage medium and comprising computer instructions for:
obtaining account information associated with an insurance account; selectively indicating a first portion of the account information that includes versioned information and a second portion of the account information that includes non-versioned information; and obtaining policy information of an insurance policy associated with the insurance account, including copying at least some of the versioned information as a first portion of the insurance policy and establishing a link between at least some of the non-versioned information and a second portion of the insurance policy; wherein: the second portion of the insurance policy that is linked with the non-versioned information is automatically updated to reflect changes to the non-versioned information. | Managing insurance information includes obtaining account information associated with an insurance account, selectively indicating a first portion of the account information that includes versioned information and a second portion of the account information that includes non-versioned information, obtaining policy information of an insurance policy associated with the insurance account, including copying at least some of the versioned information as a first portion of the insurance policy, and establishing a link between at least some of the non-versioned information and a second portion of the insurance policy. The second portion of the insurance policy that is linked with the non-versioned information is automatically updated to reflect changes to the non-versioned information.1. A method for managing insurance information, comprising:
obtaining account information associated with an insurance account; selectively indicating a first portion of the account information that includes versioned information and a second portion of the account information that includes non-versioned information; and obtaining policy information of an insurance policy associated with the insurance account, including copying at least some of the versioned'information as a first portion of the insurance policy and establishing a link between at least some of the non-versioned information and a second portion of the insurance policy; wherein: the second portion of the insurance policy that is linked with the non-versioned information is automatically updated to reflect changes to the non-versioned information. 2. The method of claim 1, further comprising saving a stored version of the first portion of the insurance policy and updating the first portion of the insurance policy to correspond to a modified versioned information. 3. The method of claim 1, further comprising saving a stored version of the first portion of the insurance policy and updating the first portion of the insurance policy to correspond to a modified versioned information of a bound insurance policy. 4. The method of claim 1, wherein obtaining the account information includes configuring an entity that includes versioned information and non-versioned information. 5. The method of claim 4, wherein the entity includes contact information. 6. The method of claim 4, wherein the entity includes location information. 7. The method of claim 4, wherein the entity includes address information. 8. The method of claim 1, wherein the first portion of the account information is a first configurable field and the second portion of the account information is a second configurable field. 9. The method of claim 1, wherein configuring the account includes configuring a contact; and
the method further comprises specifying a role associated with the contact, said role determining whether information pertaining to the contact is versioned information or non-versioned information. 10. The method of claim 1, further comprising executing a job associated with the policy, wherein the first portion of the insurance policy and the second portion of the insurance policy are determined by a job type of the job. 11. The method of claim 3, further comprising generating a policy change job when the versioned information changes. 12. The method of claim 1, wherein the versioned information comprises information that affects a contract specified by the policy. 13. The method of claim 1, wherein selectively indicating a first portion of the account information that includes versioned information and a second portion of the account information that includes non-versioned information comprises providing metadata information that identifies data fields as either versioned or non-versioned. 14. The method of claim 1, wherein automatically updating the second portion comprises, when the policy is accessed, querying the account information to provide updated non-versioned information. 15. A system for managing insurance information, comprising:
a processor configured to:
obtain account information associated with an insurance account;
selectively indicate a first portion of the account information that includes versioned information and a second portion of the account information that includes non-versioned information; and
obtain policy information of an insurance policy associated with, the insurance account, including copying at least some of the versioned information as a first portion of the insurance policy and establishing a link between at least some of the non-versioned information and a second portion of the insurance policy; wherein:
the second portion of the insurance policy that is linked with the non-versioned information is automatically updated to reflect changes to the non-versioned information; and
a memory coupled to the processor and configured to provide the processor with instructions. 16. The system of claim 15, the processor is further configured to save a stored version of the first portion of the insurance policy and update the first portion of the insurance policy to correspond to a modified versioned information. 17. The system of claim 15, wherein the processor is further configured save a stored version of the first portion of the insurance policy and update the first portion of the insurance policy to correspond to a modified versioned information of a bound insurance policy. 18. The system of claim 15, wherein obtaining the account information includes configuring an entity that includes versioned information and non-versioned information. 19. The system of claim 15, wherein the first portion of the account information is a first configurable field and the second portion of the account information is a second configurable field. 20. The system of claim 15, wherein configuring the account includes configuring a contact; and the processor is further configured to specify a role associated with the contact, said role determining whether information pertaining to the contact is versioned information or non-versioned information. 21. The system of claim 15, wherein the processor is further configured to execute a job associated with the policy, wherein the first portion of the insurance policy and the second portion of the insurance policy are determined by a job type of the job. 22. The system of claim 17, wherein the processor is further configured to generate a policy change job when the versioned information changes. 23. The system of claim 15, wherein the versioned information comprises information that affects a contract specified by the insurance policy. 24. The system of claim 15, wherein selectively indicating a first portion of the account information that includes versioned information and a second portion of the account information that includes non-versioned information comprises providing metadata information that identifies data fields as either versioned or non-versioned. 25. A computer program product for managing insurance information, the computer program product being embodied in a computer readable storage medium and comprising computer instructions for:
obtaining account information associated with an insurance account; selectively indicating a first portion of the account information that includes versioned information and a second portion of the account information that includes non-versioned information; and obtaining policy information of an insurance policy associated with the insurance account, including copying at least some of the versioned information as a first portion of the insurance policy and establishing a link between at least some of the non-versioned information and a second portion of the insurance policy; wherein: the second portion of the insurance policy that is linked with the non-versioned information is automatically updated to reflect changes to the non-versioned information. | 3,600 |
13,464 | 13,464 | 13,554,049 | 3,624 | Disclosed is a method, system and computer program product for deriving marketing strategy for at least one of a product and a service utility value from an associated utility value by collecting feedback from a user of at least one product or service, wherein the feedback provided by the user is available in multiple sources associated with the at least one product or service, computing a utility value for the at least one product or service based on the feedback of the user, and generating an appropriate marketing strategy for the at least one product or service based on the utility value. Other embodiments are also disclosed. | 1. A method for deriving marketing strategy for a product or a service utility value from an associated utility value, the method comprising:
collecting feedback from a user of at least one product or service over a period of time, wherein the feedback provided by the user is available in multiple sources associated with the at least one product or service, and wherein said collecting is carried out via a module executing on a hardware processor; computing a utility value for the at least one product or service based on (i) the feedback of the user expressed over the period of time and (ii) a model expressing decay of value of the at least one product or service over the period of time, wherein said computing is carried out via a module executing on a hardware processor; and generating a strategy for modifying the at least one product or service based on mapping the utility value to (i) performance of the at least one product or service in the market, (ii) one or more trends in the market, and (iii) information pertaining to at least one product or service of a competitor, wherein said generating is carried out via a module executing on a hardware processor. 2. The method as claimed in claim 1, wherein the sources comprise at least one metadata source. 3. The method as claimed in claim 2, wherein the at least one metadata source is selected from a structured data source, an unstructured data source and a repository. 4. The method as claimed in claim 2, wherein the at least one metadata source is at least one of the Internet and a data source on a world-wide-web source. 5. (canceled) 6. The method as claimed in claim 2, wherein the at least one metadata source comprises the user. 7. The method as claimed in claim 1, wherein computing the utility value comprises:
categorizing the feedback into a set of parameters based on a pre-defined set of rules, wherein the set of parameters is associated with the at least one product or service; comparing the set of parameters based on a pre-defined set of rules with a set of parameters associated with at least one product or service in a similar category; and determining a similarity index among users based on the feedback and the set of parameters associated with the at least one product or service. 8. The method as claimed in claim 1, wherein information associated with the user and corresponding feedback is stored in a repository. 9. The method as claimed in claim 1, wherein the utility value for the at least one product or service based on the feedback of the user is provided as a ranked list for deriving the marketing strategy. 10. The method as claimed in claim 1, wherein the utility values depend on at least one of a current market trend associated with the at least one product or service, a market acceptance of the at least one product or service, a product value, performance of the at least one product or service, pricing information and competitor information. 11. (canceled) 12. A system, comprising: a memory unit for storing a computer program for deriving marketing strategy for a product or a service from an associated utility value; and a processor coupled to said memory unit, wherein said processor, responsive to said computer program is configured to:
collecting feedback from a user of at least one product or service over a period of time, wherein the feedback provided by the user is available in multiple sources associated with the at least one product or service; computing a utility value for the at least one product or service based on (i) the feedback of the user expressed over the period of time and (ii) a model expressing decay of value of the at least one product or service over the period of time; and generating a strategy for modifying the at least one product or service based on mapping the utility value to (i) performance of the at least one product or service, in the market, one or mere trends in the market, and (iii) information pertaining to at least one product or service of a competitor. 13. The system as claimed in claim 12, wherein the sources comprise at least one metadata source. 14. The system as claimed in claim 13, wherein the at least one metadata source is selected from a structured data source, an unstructured data source and a repository. 15. The system as claimed in claim 13, wherein the at least one metadata source is at least one of the Internet and a data source on a world-wide-web source. 16. (canceled) 17. The system as claimed in claim 13, wherein the at least one metadata source comprises the user. 18. The system as claimed in claim 12, wherein computing the utility value comprises:
categorizing the feedback into a set of parameters based on a pre-defined set of rules, wherein the set of parameters is associated with the at least one product or service; comparing the set of parameters based on a pre-defined set of rules with a set of parameters associated with at least one product or service in a similar category; and determining a similarity index among users based on the feedback and the set of parameters associated with the at least one product or service. 19. The system as claimed in claim 12, wherein information associated with the user and corresponding feedback is stored in a repository. 20. The system as claimed in claim 12, wherein the utility value for the at least one product or service based on the feedback of the user is provided as a ranked list for deriving the marketing strategy. 21. The system as claimed in claim 12, wherein the utility values depend on at least one of a current market trend associated with the at least one product or service, a market acceptance of the at least one product or service, a product value or performance of the at least one product or service, pricing information and competitor information. 22. (canceled) 23. A computer program product embodied in a computer readable storage medium for deriving marketing strategy for at least one of a product or a service from an associated utility value, the computer program product comprising the programming instructions for:
collecting feedback from a user of at least one product or service over a period of time, wherein the feedback provided by the user is available in multiple sources associated with the at least one product or service; computing a utility value for the at least one product or service based on (i) the feedback of the user expressed over the period of time and (ii) a model expressing decay of value of the at least one product or service over the period of time; and generating a strategy for modifying the at least one product or service based on mapping the utility value to (i) performance of the at least one product or service in the market; (ii) one or more trends in the market, and (iii) information pertaining to at least one product or service of a competitor. | Disclosed is a method, system and computer program product for deriving marketing strategy for at least one of a product and a service utility value from an associated utility value by collecting feedback from a user of at least one product or service, wherein the feedback provided by the user is available in multiple sources associated with the at least one product or service, computing a utility value for the at least one product or service based on the feedback of the user, and generating an appropriate marketing strategy for the at least one product or service based on the utility value. Other embodiments are also disclosed.1. A method for deriving marketing strategy for a product or a service utility value from an associated utility value, the method comprising:
collecting feedback from a user of at least one product or service over a period of time, wherein the feedback provided by the user is available in multiple sources associated with the at least one product or service, and wherein said collecting is carried out via a module executing on a hardware processor; computing a utility value for the at least one product or service based on (i) the feedback of the user expressed over the period of time and (ii) a model expressing decay of value of the at least one product or service over the period of time, wherein said computing is carried out via a module executing on a hardware processor; and generating a strategy for modifying the at least one product or service based on mapping the utility value to (i) performance of the at least one product or service in the market, (ii) one or more trends in the market, and (iii) information pertaining to at least one product or service of a competitor, wherein said generating is carried out via a module executing on a hardware processor. 2. The method as claimed in claim 1, wherein the sources comprise at least one metadata source. 3. The method as claimed in claim 2, wherein the at least one metadata source is selected from a structured data source, an unstructured data source and a repository. 4. The method as claimed in claim 2, wherein the at least one metadata source is at least one of the Internet and a data source on a world-wide-web source. 5. (canceled) 6. The method as claimed in claim 2, wherein the at least one metadata source comprises the user. 7. The method as claimed in claim 1, wherein computing the utility value comprises:
categorizing the feedback into a set of parameters based on a pre-defined set of rules, wherein the set of parameters is associated with the at least one product or service; comparing the set of parameters based on a pre-defined set of rules with a set of parameters associated with at least one product or service in a similar category; and determining a similarity index among users based on the feedback and the set of parameters associated with the at least one product or service. 8. The method as claimed in claim 1, wherein information associated with the user and corresponding feedback is stored in a repository. 9. The method as claimed in claim 1, wherein the utility value for the at least one product or service based on the feedback of the user is provided as a ranked list for deriving the marketing strategy. 10. The method as claimed in claim 1, wherein the utility values depend on at least one of a current market trend associated with the at least one product or service, a market acceptance of the at least one product or service, a product value, performance of the at least one product or service, pricing information and competitor information. 11. (canceled) 12. A system, comprising: a memory unit for storing a computer program for deriving marketing strategy for a product or a service from an associated utility value; and a processor coupled to said memory unit, wherein said processor, responsive to said computer program is configured to:
collecting feedback from a user of at least one product or service over a period of time, wherein the feedback provided by the user is available in multiple sources associated with the at least one product or service; computing a utility value for the at least one product or service based on (i) the feedback of the user expressed over the period of time and (ii) a model expressing decay of value of the at least one product or service over the period of time; and generating a strategy for modifying the at least one product or service based on mapping the utility value to (i) performance of the at least one product or service, in the market, one or mere trends in the market, and (iii) information pertaining to at least one product or service of a competitor. 13. The system as claimed in claim 12, wherein the sources comprise at least one metadata source. 14. The system as claimed in claim 13, wherein the at least one metadata source is selected from a structured data source, an unstructured data source and a repository. 15. The system as claimed in claim 13, wherein the at least one metadata source is at least one of the Internet and a data source on a world-wide-web source. 16. (canceled) 17. The system as claimed in claim 13, wherein the at least one metadata source comprises the user. 18. The system as claimed in claim 12, wherein computing the utility value comprises:
categorizing the feedback into a set of parameters based on a pre-defined set of rules, wherein the set of parameters is associated with the at least one product or service; comparing the set of parameters based on a pre-defined set of rules with a set of parameters associated with at least one product or service in a similar category; and determining a similarity index among users based on the feedback and the set of parameters associated with the at least one product or service. 19. The system as claimed in claim 12, wherein information associated with the user and corresponding feedback is stored in a repository. 20. The system as claimed in claim 12, wherein the utility value for the at least one product or service based on the feedback of the user is provided as a ranked list for deriving the marketing strategy. 21. The system as claimed in claim 12, wherein the utility values depend on at least one of a current market trend associated with the at least one product or service, a market acceptance of the at least one product or service, a product value or performance of the at least one product or service, pricing information and competitor information. 22. (canceled) 23. A computer program product embodied in a computer readable storage medium for deriving marketing strategy for at least one of a product or a service from an associated utility value, the computer program product comprising the programming instructions for:
collecting feedback from a user of at least one product or service over a period of time, wherein the feedback provided by the user is available in multiple sources associated with the at least one product or service; computing a utility value for the at least one product or service based on (i) the feedback of the user expressed over the period of time and (ii) a model expressing decay of value of the at least one product or service over the period of time; and generating a strategy for modifying the at least one product or service based on mapping the utility value to (i) performance of the at least one product or service in the market; (ii) one or more trends in the market, and (iii) information pertaining to at least one product or service of a competitor. | 3,600 |
13,465 | 13,465 | 14,569,185 | 3,624 | In one illustrative embodiment, a method includes identifying workflows in a multi-workflow process, identifying an interdependency between a first workflow and a second workflow of the process, determining the severity in which the first workflow and the second workflow is impacted in response to a change in a state or value of the interdependency, quantifying the severity information, and presenting the quantified severity information. | 1. A method comprising:
identifying a plurality of workflows in a multi-workflow process; identifying an interdependency between a first workflow and a second workflow of the process; determining the severity in which the first workflow and the second workflow are impacted in response to a change in a state or value of the interdependency; quantifying the severity information; and presenting the quantified severity information. 2. The method of claim 1, wherein presenting the quantified severity information comprises presenting the quantified severity information in a risk matrix. 3. The method of claim 2, where quantifying the severity information comprises classifying the impact as high, medium, or low and presenting these values in the risk matrix. 4. The method of claim 1, wherein presenting the quantified severity information comprises presenting the quantified severity information in a graphical web diagram, wherein workflows relying on the interdependency are connected by arrows 5. The method of claim 4, wherein quantifying the severity information comprises adjusting the thickness or line weight of the arrows based on the degree of severity. 6. The method of claim 1, wherein the multi-workflow process is a drilling process. | In one illustrative embodiment, a method includes identifying workflows in a multi-workflow process, identifying an interdependency between a first workflow and a second workflow of the process, determining the severity in which the first workflow and the second workflow is impacted in response to a change in a state or value of the interdependency, quantifying the severity information, and presenting the quantified severity information.1. A method comprising:
identifying a plurality of workflows in a multi-workflow process; identifying an interdependency between a first workflow and a second workflow of the process; determining the severity in which the first workflow and the second workflow are impacted in response to a change in a state or value of the interdependency; quantifying the severity information; and presenting the quantified severity information. 2. The method of claim 1, wherein presenting the quantified severity information comprises presenting the quantified severity information in a risk matrix. 3. The method of claim 2, where quantifying the severity information comprises classifying the impact as high, medium, or low and presenting these values in the risk matrix. 4. The method of claim 1, wherein presenting the quantified severity information comprises presenting the quantified severity information in a graphical web diagram, wherein workflows relying on the interdependency are connected by arrows 5. The method of claim 4, wherein quantifying the severity information comprises adjusting the thickness or line weight of the arrows based on the degree of severity. 6. The method of claim 1, wherein the multi-workflow process is a drilling process. | 3,600 |
13,466 | 13,466 | 14,926,397 | 3,619 | Methods and systems for providing cardholder authentication services on-behalf-of (OBO) issuers utilizing a payment card authorization network to bridge cardholder authentication and transaction authorization processes. In some embodiments, the process includes an OBO issuer service computer receiving an authentication message, storing the authentication message in a transaction database and then receiving a purchase transaction authorization request message from a payment network. The OBO issuer service computer then determines that an authentication value of the received purchase transaction authorization request message matches the authentication value of the stored authentication message, stores a record of the match, and transmits the purchase transaction authorization request to the payment network for purchase authorization processing. | 1. A method for providing online cardholder authentication services on-behalf-of issuer financial institutions, comprising:
receiving, by an on-behalf-of (OBO) issuer service computer from one of a merchant server computer or an access control server (ACS) computer, an authentication message comprising an authentication value and transaction data; storing, by the OBO issuer service computer, the authentication message in a transaction database; receiving, by the OBO issuer service computer from a payment network, a purchase transaction authorization request message; determining, by the OBO issuer service computer, that an authentication value in an universal cardholder authentication field (UCAF) of the purchase transaction authorization request message matches the authentication value of the stored authentication message; storing, by the OBO issuer service computer in the transaction database, a record of the match; and transmitting, by the OBO issuer service computer, the purchase transaction authorization request to the payment network for purchase authorization processing. 2. The method of claim 1, wherein the authentication message comprises a positive Payer Authentication Response (PARes) message. 3. The method of claim 1, wherein the authentication message comprises fields comprising at least two of a cardholder's Primary Account Number (PAN), an acquirer identifier, a merchant identifier, a date and time of the transaction, the transaction amount, a Universal Cardholder Authentication Field (UCAF) and a transaction identifier. 4. The method of claim 1, wherein the authentication value is a Universal Cardholder Authentication Field (UCAF). 5. The method of claim 1, further comprising, subsequent to receiving the purchase transaction authorization request message from the payment network:
calculating, by the OBO issuer service computer, a time difference value between a time and date of an online purchase transaction stored in the transaction database and the time and date of the purchase transaction authorization request message; comparing, by the OBO issuer service computer, the time difference value to a predetermined time range; and declining, by the OBO issuer service computer, the purchase transaction authorization request when the time difference value falls outside the predetermined time range. 6. The method of claim 5, further comprising:
storing, by the 3-D Secure OBO issuer service computer in the transaction database, a response code that corresponds to a decline outcome for the purchase transaction authorization request message; and transmitting, by the OBO issuer service computer, a decline advice message to an issuer financial institution (FI) computer to notify the cardholder's issuer FI of the declined purchase transaction authorization request. 7. The method of claim 1, further comprising, subsequent to receiving the purchase transaction authorization request message:
determining, by the OBO issuer service computer, that an authentication value in the universal cardholder authentication field (UCAF) of the purchase transaction authorization request message does not match the authentication value of the stored authentication massage; and declining, by the OBO issuer service computer, the purchase transaction authorization request. 8. The method of claim 7, further comprising:
storing, by the 3-D Secure OBO issuer service computer in the transaction database, an indication of the decline outcome; and transmitting, by the OBO issuer service computer, a decline advice message to an issuer financial institution (FI) computer to notify the cardholder's issuer FI of the declined purchase transaction authorization request. 9. A system for providing online cardholder authentication services on-behalf-of issuer financial institutions, comprising:
an On-Behalf-Of (OBO) issuer service computer comprising a storage device and an OBO issuer service processor; a merchant server computer operably connected to the OBO issuer service computer; a access control server (ACS) computer operably connected to the OBO issuer service computer; and a payment network operably connected to the OBO issuer service computer; wherein the storage device stores instructions configured to cause the OBO issuer service processor to:
receive an authentication message comprising an authentication value and transaction data from one of the merchant server computer or the ACS computer;
store the authentication message in the storage device;
receive a purchase transaction authorization request message from the payment network;
determine that an authentication value in an universal cardholder authentication field (UCAF) of the purchase transaction authorization request message matches the authentication value of the stored authentication massage;
store a record of the match in the storage device; and
transmit the purchase transaction authorization request to the payment network for purchase authorization processing. 10. The system of claim 9, wherein the storage device stores further instructions, subsequent to the instructions for receiving the purchase transaction authorization request message from the payment network, configured to cause the OBO issuer service processor to:
calculate a time difference value between a time and date of an online purchase transaction stored in the transaction database and the time and date of the purchase transaction authorization request message; compare the time difference value to a predetermined time range provided by the cardholder's issuer financial institution; and decline the purchase transaction authorization request when the time difference value falls outside the predetermined time range. 11. The system of claim 10, wherein the storage device stores further instructions configured to cause the OBO issuer service processor to:
store a response code that corresponds to a decline outcome for the purchase transaction authorization request message in the storage device; and transmit a decline advice message to an issuer financial institution (FI) computer to notify the cardholder's issuer FI of the declined purchase transaction authorization request. 12. The system of claim 9, wherein the storage device stores further instructions, subsequent to the instructions for receiving the purchase transaction authorization request message from the payment network, configured to cause the OBO issuer service processor to:
determine that an authentication value in the universal cardholder authentication field (UCAF) of the purchase transaction authorization request message does not match the authentication value of the stored authentication massage; and decline the purchase transaction authorization request. 13. The system of claim 12, wherein the storage device stores further instructions configured to cause the OBO issuer service processor to:
store an indication of the decline outcome in the storage device; and transmit a decline advice message to an issuer financial institution (FI) computer to notify the cardholder's issuer FI of the declined purchase transaction authorization request. 14. A method for providing online cardholder authentication services on-behalf-of issuer financial institutions, comprising:
receiving, by an on-behalf-of (OBO) issuer service computer from a payment network, a purchase transaction authorization request message; transmitting, by the OBO issuer service computer to a directory service server computer, a request for an authentication result message associated with the purchase transaction that is the subject of the purchase transaction authorization request message; receiving, by the OBO issuer service computer from the directory service server computer, the authentication result message; matching, by the OBO issuer service computer, the authentication result message with data of the purchase transaction authorization request message; storing, by the OBO issuer service computer in a transaction database, a record of the match; and transmitting, by the OBO issuer service computer, the purchase transaction authorization request to the payment network for purchase transaction authorization processing. 15. The method of claim 14, wherein the authentication result message comprises a Payer Authentication Response (PARes) message. 16. The method of claim 14, wherein the OBO issuer service computer receives, along with the purchase transaction authorization request message, a request for 3-D secure processing. 17. The method of claim 14, wherein the authentication result message comprises fields comprising at least two of a cardholder's Primary Account Number (PAN), an acquirer identifier, a merchant identifier, a date and time of the transaction, the transaction amount, a Universal Cardholder Authentication Field (UCAF) and a transaction identifier. 18. The method of claim 14 further comprising, subsequent to receiving the authentication result message from the directory service server computer:
calculating, by the OBO issuer service computer, a time difference value between a time and date of an online purchase transaction contained within the purchase transaction authorization request message and the time and date contained within the authentication result message;
comparing, by the OBO issuer service computer, the time difference value to a predetermined time range; and
declining, by the OBO issuer service computer, the purchase transaction authorization request when the time difference value falls outside the predetermined time range. 19. The method of claim 18, further comprising:
storing, by the 3-D Secure OBO issuer service computer in the transaction database, a response code that corresponds to a decline outcome for the purchase transaction authorization request message; and transmitting, by the OBO issuer service computer, a decline advice message to an issuer financial institution (FI) computer to notify the cardholder's issuer FI of the declined purchase transaction authorization request. 20. The method of claim 14, further comprising, subsequent to receiving the authentication result message from the directory service server computer:
determining, by the OBO issuer service computer, that a mismatch occurred between data of the PARes message and data of the purchase transaction authorization request message; and declining, by the OBO issuer service computer, the purchase transaction authorization request. 21. The method of claim 20, further comprising:
storing, by the 3-D Secure OBO issuer service computer in the transaction database, a response code that corresponds to a decline outcome for the purchase transaction authorization request message; and transmitting, by the OBO issuer service computer, a decline advice message to an issuer financial institution (FI) computer to notify the cardholder's issuer FI of the declined purchase transaction authorization request. 22. A system for providing online cardholder authentication services on-behalf-of issuer financial institutions, comprising:
an On-Behalf-Of (OBO) issuer service computer comprising a storage device and an OBO issuer service processor; a directory service server computer operably connected to the OBO issuer service computer; and a payment network operably connected to the OBO issuer service computer; wherein the storage device stores instructions configured to cause the OBO issuer service processor to:
receive a purchase transaction authorization request message from the payment network;
transmit to a directory service server computer, a request for an authentication result message associated with the purchase transaction that is the subject of the purchase transaction authorization request message;
receive the authentication result message from the directory service server computer;
match the authentication result message with data of the purchase transaction authorization request message;
store a record of the match in the storage device; and
transmit the purchase transaction authorization request to the payment network for purchase authorization processing. 23. The system of claim 22, wherein the storage device stores further instructions, subsequent to the instructions for receiving the authentication result message from the directory service server computer configured to cause the OBO issuer service processor to:
calculate a time difference value between a time and date of an online purchase transaction contained within the purchase transaction authorization request message and the time and date contained within the authentication result message; compare the time difference value to a predetermined time range; and decline the purchase transaction authorization request when the time difference value falls outside the predetermined time range. 24. The system of claim 23, wherein the storage device stores further instructions configured to cause the OBO issuer service processor to:
store a response code that corresponds to a decline outcome for the purchase transaction authorization request message in the storage device; and transmit a decline advice message to an issuer financial institution (FI) computer to notify the cardholder's issuer FI of the declined purchase transaction authorization request. 25. The system of claim 22, wherein the storage device stores further instructions, subsequent to the instructions for receiving the authentication result message from the directory service server computer, configured to cause the OBO issuer service processor to:
determine that a mismatch occurred between data of the authentication result message and data of the purchase transaction authorization request message; and decline the purchase transaction authorization request. 26. The system of claim 25, wherein the storage device stores further instructions configured to cause the OBO issuer service processor to:
store a response code that corresponds to a decline outcome for the purchase transaction authorization request message; and transmit a decline advice message to an issuer financial institution (FI) computer to notify the cardholder's issuer FI of the declined purchase transaction authorization request. | Methods and systems for providing cardholder authentication services on-behalf-of (OBO) issuers utilizing a payment card authorization network to bridge cardholder authentication and transaction authorization processes. In some embodiments, the process includes an OBO issuer service computer receiving an authentication message, storing the authentication message in a transaction database and then receiving a purchase transaction authorization request message from a payment network. The OBO issuer service computer then determines that an authentication value of the received purchase transaction authorization request message matches the authentication value of the stored authentication message, stores a record of the match, and transmits the purchase transaction authorization request to the payment network for purchase authorization processing.1. A method for providing online cardholder authentication services on-behalf-of issuer financial institutions, comprising:
receiving, by an on-behalf-of (OBO) issuer service computer from one of a merchant server computer or an access control server (ACS) computer, an authentication message comprising an authentication value and transaction data; storing, by the OBO issuer service computer, the authentication message in a transaction database; receiving, by the OBO issuer service computer from a payment network, a purchase transaction authorization request message; determining, by the OBO issuer service computer, that an authentication value in an universal cardholder authentication field (UCAF) of the purchase transaction authorization request message matches the authentication value of the stored authentication message; storing, by the OBO issuer service computer in the transaction database, a record of the match; and transmitting, by the OBO issuer service computer, the purchase transaction authorization request to the payment network for purchase authorization processing. 2. The method of claim 1, wherein the authentication message comprises a positive Payer Authentication Response (PARes) message. 3. The method of claim 1, wherein the authentication message comprises fields comprising at least two of a cardholder's Primary Account Number (PAN), an acquirer identifier, a merchant identifier, a date and time of the transaction, the transaction amount, a Universal Cardholder Authentication Field (UCAF) and a transaction identifier. 4. The method of claim 1, wherein the authentication value is a Universal Cardholder Authentication Field (UCAF). 5. The method of claim 1, further comprising, subsequent to receiving the purchase transaction authorization request message from the payment network:
calculating, by the OBO issuer service computer, a time difference value between a time and date of an online purchase transaction stored in the transaction database and the time and date of the purchase transaction authorization request message; comparing, by the OBO issuer service computer, the time difference value to a predetermined time range; and declining, by the OBO issuer service computer, the purchase transaction authorization request when the time difference value falls outside the predetermined time range. 6. The method of claim 5, further comprising:
storing, by the 3-D Secure OBO issuer service computer in the transaction database, a response code that corresponds to a decline outcome for the purchase transaction authorization request message; and transmitting, by the OBO issuer service computer, a decline advice message to an issuer financial institution (FI) computer to notify the cardholder's issuer FI of the declined purchase transaction authorization request. 7. The method of claim 1, further comprising, subsequent to receiving the purchase transaction authorization request message:
determining, by the OBO issuer service computer, that an authentication value in the universal cardholder authentication field (UCAF) of the purchase transaction authorization request message does not match the authentication value of the stored authentication massage; and declining, by the OBO issuer service computer, the purchase transaction authorization request. 8. The method of claim 7, further comprising:
storing, by the 3-D Secure OBO issuer service computer in the transaction database, an indication of the decline outcome; and transmitting, by the OBO issuer service computer, a decline advice message to an issuer financial institution (FI) computer to notify the cardholder's issuer FI of the declined purchase transaction authorization request. 9. A system for providing online cardholder authentication services on-behalf-of issuer financial institutions, comprising:
an On-Behalf-Of (OBO) issuer service computer comprising a storage device and an OBO issuer service processor; a merchant server computer operably connected to the OBO issuer service computer; a access control server (ACS) computer operably connected to the OBO issuer service computer; and a payment network operably connected to the OBO issuer service computer; wherein the storage device stores instructions configured to cause the OBO issuer service processor to:
receive an authentication message comprising an authentication value and transaction data from one of the merchant server computer or the ACS computer;
store the authentication message in the storage device;
receive a purchase transaction authorization request message from the payment network;
determine that an authentication value in an universal cardholder authentication field (UCAF) of the purchase transaction authorization request message matches the authentication value of the stored authentication massage;
store a record of the match in the storage device; and
transmit the purchase transaction authorization request to the payment network for purchase authorization processing. 10. The system of claim 9, wherein the storage device stores further instructions, subsequent to the instructions for receiving the purchase transaction authorization request message from the payment network, configured to cause the OBO issuer service processor to:
calculate a time difference value between a time and date of an online purchase transaction stored in the transaction database and the time and date of the purchase transaction authorization request message; compare the time difference value to a predetermined time range provided by the cardholder's issuer financial institution; and decline the purchase transaction authorization request when the time difference value falls outside the predetermined time range. 11. The system of claim 10, wherein the storage device stores further instructions configured to cause the OBO issuer service processor to:
store a response code that corresponds to a decline outcome for the purchase transaction authorization request message in the storage device; and transmit a decline advice message to an issuer financial institution (FI) computer to notify the cardholder's issuer FI of the declined purchase transaction authorization request. 12. The system of claim 9, wherein the storage device stores further instructions, subsequent to the instructions for receiving the purchase transaction authorization request message from the payment network, configured to cause the OBO issuer service processor to:
determine that an authentication value in the universal cardholder authentication field (UCAF) of the purchase transaction authorization request message does not match the authentication value of the stored authentication massage; and decline the purchase transaction authorization request. 13. The system of claim 12, wherein the storage device stores further instructions configured to cause the OBO issuer service processor to:
store an indication of the decline outcome in the storage device; and transmit a decline advice message to an issuer financial institution (FI) computer to notify the cardholder's issuer FI of the declined purchase transaction authorization request. 14. A method for providing online cardholder authentication services on-behalf-of issuer financial institutions, comprising:
receiving, by an on-behalf-of (OBO) issuer service computer from a payment network, a purchase transaction authorization request message; transmitting, by the OBO issuer service computer to a directory service server computer, a request for an authentication result message associated with the purchase transaction that is the subject of the purchase transaction authorization request message; receiving, by the OBO issuer service computer from the directory service server computer, the authentication result message; matching, by the OBO issuer service computer, the authentication result message with data of the purchase transaction authorization request message; storing, by the OBO issuer service computer in a transaction database, a record of the match; and transmitting, by the OBO issuer service computer, the purchase transaction authorization request to the payment network for purchase transaction authorization processing. 15. The method of claim 14, wherein the authentication result message comprises a Payer Authentication Response (PARes) message. 16. The method of claim 14, wherein the OBO issuer service computer receives, along with the purchase transaction authorization request message, a request for 3-D secure processing. 17. The method of claim 14, wherein the authentication result message comprises fields comprising at least two of a cardholder's Primary Account Number (PAN), an acquirer identifier, a merchant identifier, a date and time of the transaction, the transaction amount, a Universal Cardholder Authentication Field (UCAF) and a transaction identifier. 18. The method of claim 14 further comprising, subsequent to receiving the authentication result message from the directory service server computer:
calculating, by the OBO issuer service computer, a time difference value between a time and date of an online purchase transaction contained within the purchase transaction authorization request message and the time and date contained within the authentication result message;
comparing, by the OBO issuer service computer, the time difference value to a predetermined time range; and
declining, by the OBO issuer service computer, the purchase transaction authorization request when the time difference value falls outside the predetermined time range. 19. The method of claim 18, further comprising:
storing, by the 3-D Secure OBO issuer service computer in the transaction database, a response code that corresponds to a decline outcome for the purchase transaction authorization request message; and transmitting, by the OBO issuer service computer, a decline advice message to an issuer financial institution (FI) computer to notify the cardholder's issuer FI of the declined purchase transaction authorization request. 20. The method of claim 14, further comprising, subsequent to receiving the authentication result message from the directory service server computer:
determining, by the OBO issuer service computer, that a mismatch occurred between data of the PARes message and data of the purchase transaction authorization request message; and declining, by the OBO issuer service computer, the purchase transaction authorization request. 21. The method of claim 20, further comprising:
storing, by the 3-D Secure OBO issuer service computer in the transaction database, a response code that corresponds to a decline outcome for the purchase transaction authorization request message; and transmitting, by the OBO issuer service computer, a decline advice message to an issuer financial institution (FI) computer to notify the cardholder's issuer FI of the declined purchase transaction authorization request. 22. A system for providing online cardholder authentication services on-behalf-of issuer financial institutions, comprising:
an On-Behalf-Of (OBO) issuer service computer comprising a storage device and an OBO issuer service processor; a directory service server computer operably connected to the OBO issuer service computer; and a payment network operably connected to the OBO issuer service computer; wherein the storage device stores instructions configured to cause the OBO issuer service processor to:
receive a purchase transaction authorization request message from the payment network;
transmit to a directory service server computer, a request for an authentication result message associated with the purchase transaction that is the subject of the purchase transaction authorization request message;
receive the authentication result message from the directory service server computer;
match the authentication result message with data of the purchase transaction authorization request message;
store a record of the match in the storage device; and
transmit the purchase transaction authorization request to the payment network for purchase authorization processing. 23. The system of claim 22, wherein the storage device stores further instructions, subsequent to the instructions for receiving the authentication result message from the directory service server computer configured to cause the OBO issuer service processor to:
calculate a time difference value between a time and date of an online purchase transaction contained within the purchase transaction authorization request message and the time and date contained within the authentication result message; compare the time difference value to a predetermined time range; and decline the purchase transaction authorization request when the time difference value falls outside the predetermined time range. 24. The system of claim 23, wherein the storage device stores further instructions configured to cause the OBO issuer service processor to:
store a response code that corresponds to a decline outcome for the purchase transaction authorization request message in the storage device; and transmit a decline advice message to an issuer financial institution (FI) computer to notify the cardholder's issuer FI of the declined purchase transaction authorization request. 25. The system of claim 22, wherein the storage device stores further instructions, subsequent to the instructions for receiving the authentication result message from the directory service server computer, configured to cause the OBO issuer service processor to:
determine that a mismatch occurred between data of the authentication result message and data of the purchase transaction authorization request message; and decline the purchase transaction authorization request. 26. The system of claim 25, wherein the storage device stores further instructions configured to cause the OBO issuer service processor to:
store a response code that corresponds to a decline outcome for the purchase transaction authorization request message; and transmit a decline advice message to an issuer financial institution (FI) computer to notify the cardholder's issuer FI of the declined purchase transaction authorization request. | 3,600 |
13,467 | 13,467 | 14,525,900 | 3,627 | A system, method, and computer-readable medium are disclosed for enabling a user to identify excess equipment inventory within a particular information handling system located within an enterprise environment such as via a management controller. In certain embodiments, the management controller comprises a remote access controller such as a Dell iDRAC type management controller. In certain embodiments, the management controller provides low level control for all hardware included within the enterprise environment. Also, in certain embodiments, the management controller comprises a Lifecycle controller which maintains hardware and software inventory. | 1. A computer-implementable method for identifying excess equipment inventory within an enterprise environment, comprising:
analyzing components within an information handling system contained in the enterprise environment perform an excess equipment identification, the excess equipment identification determine whether any of the components comprise excess equipment; storing information regarding whether any of the components are excess equipment within an excess equipment inventory record; and, informing a user of identified excess equipment via the excess equipment inventory record. 2. The method of claim 1, wherein:
the analyzing is performed by a management controller of the enterprise environment. 3. The method of claim 1, wherein:
the excess equipment inventory identification uses key configuration factors to determine whether a component comprises excess equipment. 4. The method of claim 1, further comprising:
the excess equipment inventory identification uses configuration data to determine whether certain equipment is enabled or disabled. 5. The method of claim 1, wherein
the excess equipment inventory identification tracks usage of a specific component to associate additional usage information with any identified excess equipment. 6. The method of claim 1, wherein:
the excess equipment inventory identification provides usage recommendations regarding whether and where any identified excess equipment may be used within the enterprise environment. 7. A system comprising:
a processor; a data bus coupled to the processor; and a non-transitory, computer-readable storage medium embodying computer program code, the non-transitory, computer-readable storage medium being coupled to the data bus, the computer program code interacting with a plurality of computer operations and comprising instructions executable by the processor and configured for:
analyzing components within an information handling system contained in the enterprise environment perform an excess equipment identification, the excess equipment identification determine whether any of the components comprise excess equipment;
storing information regarding whether any of the components are excess equipment within an excess equipment inventory record; and,
informing a user of identified excess equipment via the excess equipment inventory record. 8. The system of claim 7, wherein:
the analyzing is performed by a management controller of the enterprise environment. 9. The system of claim 7, wherein:
the excess equipment inventory identification uses key configuration factors to determine whether a component comprises excess equipment. 10. The system of claim 7, wherein:
the excess equipment inventory identification uses configuration data to determine whether certain equipment is enabled or disabled. 11. The system of claim 7, wherein
the excess equipment inventory identification tracks usage of a specific component to associate additional usage information with any identified excess equipment. 12. The system of claim 7, wherein:
the excess equipment inventory identification provides usage recommendations regarding whether and where any identified excess equipment may be used within the enterprise environment. 13. A non-transitory, computer-readable storage medium embodying computer program code, the computer program code comprising computer executable instructions configured for:
analyzing components within an information handling system contained in the enterprise environment perform an excess equipment identification, the excess equipment identification determine whether any of the components comprise excess equipment; storing information regarding whether any of the components are excess equipment within an excess equipment inventory record; and, informing a user of identified excess equipment via the excess equipment inventory record. 14. The non-transitory, computer-readable storage medium of claim 13, wherein:
the analyzing is performed by a management controller of the enterprise environment. 15. The non-transitory, computer-readable storage medium of claim 13, wherein:
the excess equipment inventory identification uses key configuration factors to determine whether a component comprises excess equipment. 16. The non-transitory, computer-readable storage medium of claim 13, wherein:
the excess equipment inventory identification uses configuration data to determine whether certain equipment is enabled or disabled. 17. The non-transitory, computer-readable storage medium of claim 13, wherein the excess equipment inventory identification tracks usage of a specific component to associate additional usage information with any identified excess equipment. 18. The non-transitory, computer-readable storage medium of claim 13, wherein:
the excess equipment inventory identification provides usage recommendations regarding whether and where any identified excess equipment may be used within the enterprise environment. | A system, method, and computer-readable medium are disclosed for enabling a user to identify excess equipment inventory within a particular information handling system located within an enterprise environment such as via a management controller. In certain embodiments, the management controller comprises a remote access controller such as a Dell iDRAC type management controller. In certain embodiments, the management controller provides low level control for all hardware included within the enterprise environment. Also, in certain embodiments, the management controller comprises a Lifecycle controller which maintains hardware and software inventory.1. A computer-implementable method for identifying excess equipment inventory within an enterprise environment, comprising:
analyzing components within an information handling system contained in the enterprise environment perform an excess equipment identification, the excess equipment identification determine whether any of the components comprise excess equipment; storing information regarding whether any of the components are excess equipment within an excess equipment inventory record; and, informing a user of identified excess equipment via the excess equipment inventory record. 2. The method of claim 1, wherein:
the analyzing is performed by a management controller of the enterprise environment. 3. The method of claim 1, wherein:
the excess equipment inventory identification uses key configuration factors to determine whether a component comprises excess equipment. 4. The method of claim 1, further comprising:
the excess equipment inventory identification uses configuration data to determine whether certain equipment is enabled or disabled. 5. The method of claim 1, wherein
the excess equipment inventory identification tracks usage of a specific component to associate additional usage information with any identified excess equipment. 6. The method of claim 1, wherein:
the excess equipment inventory identification provides usage recommendations regarding whether and where any identified excess equipment may be used within the enterprise environment. 7. A system comprising:
a processor; a data bus coupled to the processor; and a non-transitory, computer-readable storage medium embodying computer program code, the non-transitory, computer-readable storage medium being coupled to the data bus, the computer program code interacting with a plurality of computer operations and comprising instructions executable by the processor and configured for:
analyzing components within an information handling system contained in the enterprise environment perform an excess equipment identification, the excess equipment identification determine whether any of the components comprise excess equipment;
storing information regarding whether any of the components are excess equipment within an excess equipment inventory record; and,
informing a user of identified excess equipment via the excess equipment inventory record. 8. The system of claim 7, wherein:
the analyzing is performed by a management controller of the enterprise environment. 9. The system of claim 7, wherein:
the excess equipment inventory identification uses key configuration factors to determine whether a component comprises excess equipment. 10. The system of claim 7, wherein:
the excess equipment inventory identification uses configuration data to determine whether certain equipment is enabled or disabled. 11. The system of claim 7, wherein
the excess equipment inventory identification tracks usage of a specific component to associate additional usage information with any identified excess equipment. 12. The system of claim 7, wherein:
the excess equipment inventory identification provides usage recommendations regarding whether and where any identified excess equipment may be used within the enterprise environment. 13. A non-transitory, computer-readable storage medium embodying computer program code, the computer program code comprising computer executable instructions configured for:
analyzing components within an information handling system contained in the enterprise environment perform an excess equipment identification, the excess equipment identification determine whether any of the components comprise excess equipment; storing information regarding whether any of the components are excess equipment within an excess equipment inventory record; and, informing a user of identified excess equipment via the excess equipment inventory record. 14. The non-transitory, computer-readable storage medium of claim 13, wherein:
the analyzing is performed by a management controller of the enterprise environment. 15. The non-transitory, computer-readable storage medium of claim 13, wherein:
the excess equipment inventory identification uses key configuration factors to determine whether a component comprises excess equipment. 16. The non-transitory, computer-readable storage medium of claim 13, wherein:
the excess equipment inventory identification uses configuration data to determine whether certain equipment is enabled or disabled. 17. The non-transitory, computer-readable storage medium of claim 13, wherein the excess equipment inventory identification tracks usage of a specific component to associate additional usage information with any identified excess equipment. 18. The non-transitory, computer-readable storage medium of claim 13, wherein:
the excess equipment inventory identification provides usage recommendations regarding whether and where any identified excess equipment may be used within the enterprise environment. | 3,600 |
13,468 | 13,468 | 14,434,286 | 3,626 | The present invention relates to an apparatus and method for clinical decision support to identify patients at high risk of thrombosis based on a combination of clinical risk factors and molecular markers, e.g., protein concentrations. These clinical risk factors and molecular markers are combined in a machine learning based algorithm which returns an output value, relating to an estimated risk of a thrombosis event in the future. | 1. An apparatus for calculating an estimation value of thrombosis risk of a patient based on patient-specific input features, said apparatus comprising:
a data interface for receiving said input features; a processor for calculating said estimation value by applying a decision support algorithm as a function of numerical values derived from said received input features; and a user interface for outputting said estimation value;
wherein said input features include a combination of at least one clinical risk factor and at least one of said patient. 2. The apparatus according to claim 1, wherein said at least one is selected from a concentration of coagulation protein FVIII in blood, a concentration of coagulation protein FXI in blood, and a concentration of coagulation protein TFPI in blood. 3. The apparatus according to claim 1, wherein said at least one clinical risk factor is selected from immobilization within a first predetermined time period, surgery within a second predetermined time period, family history of venous thrombosis, pregnancy or puerperium within a third predetermined time period, current use of estrogens, and obesity. 4. The apparatus according to claim 3, wherein said first predetermined time period corresponds to at least three months, said second predetermined time period corresponds to one month, and said third predetermined time period corresponds to at least three months. 5. The apparatus according to claim 1, wherein said processor is adapted to compare said estimation value with a predetermined threshold value and to classify said estimation value based on the comparison result. 6. The apparatus according to claim 5, wherein said apparatus is adapted to allow a user to input or disable said predetermined threshold value. 7. The apparatus according to claim 1, further comprising an optimization unit for applying a learning process through an optimization procedure based on a dataset stored in a database so as to minimize a prediction error. 8. The apparatus according to claim 1, wherein said processor is adapted to calculate a deep vein thrombosis risk score based on clinical risk factors, single nucleotide polymorphisms and protein levels. 9. A method for calculating an estimation value of thrombosis risk of a patient based on patient-specific input features, said method comprising:
selecting said input features to include a combination of at least one clinical risk factor and at least one protein concentration of said patient; and calculating said estimation value by applying a decision support algorithm as a function of numerical values derived from said received input features. 10. The method according to claim 9, further comprising optimizing said input features by a learning process based on a stored dataset of a plurality patients so as to minimize a prediction error. 11. The method according to claim 10, further comprising dividing said dataset into a training set, a validation set and a test set, using said training set and said validation set to select a type of machine learning function and a set of model parameters used for optimizing classifiers, using the optimized classifiers for obtaining said patient-specific input features, and using said test set for calculating said estimation value for patients of said test set based on said obtained input features. 12. The method according to claim 9, further comprising selecting said at least one protein concentration from a concentration of coagulation protein FVIII in blood, a concentration of coagulation protein FXI in blood, and a concentration of coagulation protein TFPI in blood. 13. The method according to claim 9, further comprising selecting said at least one clinical risk factor from immobilization within a first predetermined time period, surgery within a second predetermined time period, family history of venous thrombosis, pregnancy or puerperium within a third predetermined time period, current use of estrogens, and obesity. 14. The method according to claim 13, further comprising setting said first predetermined time period to at least three months, said second predetermined time period to one month, and said third predetermined time period to at least three months. 15. A computer program product comprising program code means for causing a computer device to carry out the steps of claim 8 when said computer program is run on a computer device. | The present invention relates to an apparatus and method for clinical decision support to identify patients at high risk of thrombosis based on a combination of clinical risk factors and molecular markers, e.g., protein concentrations. These clinical risk factors and molecular markers are combined in a machine learning based algorithm which returns an output value, relating to an estimated risk of a thrombosis event in the future.1. An apparatus for calculating an estimation value of thrombosis risk of a patient based on patient-specific input features, said apparatus comprising:
a data interface for receiving said input features; a processor for calculating said estimation value by applying a decision support algorithm as a function of numerical values derived from said received input features; and a user interface for outputting said estimation value;
wherein said input features include a combination of at least one clinical risk factor and at least one of said patient. 2. The apparatus according to claim 1, wherein said at least one is selected from a concentration of coagulation protein FVIII in blood, a concentration of coagulation protein FXI in blood, and a concentration of coagulation protein TFPI in blood. 3. The apparatus according to claim 1, wherein said at least one clinical risk factor is selected from immobilization within a first predetermined time period, surgery within a second predetermined time period, family history of venous thrombosis, pregnancy or puerperium within a third predetermined time period, current use of estrogens, and obesity. 4. The apparatus according to claim 3, wherein said first predetermined time period corresponds to at least three months, said second predetermined time period corresponds to one month, and said third predetermined time period corresponds to at least three months. 5. The apparatus according to claim 1, wherein said processor is adapted to compare said estimation value with a predetermined threshold value and to classify said estimation value based on the comparison result. 6. The apparatus according to claim 5, wherein said apparatus is adapted to allow a user to input or disable said predetermined threshold value. 7. The apparatus according to claim 1, further comprising an optimization unit for applying a learning process through an optimization procedure based on a dataset stored in a database so as to minimize a prediction error. 8. The apparatus according to claim 1, wherein said processor is adapted to calculate a deep vein thrombosis risk score based on clinical risk factors, single nucleotide polymorphisms and protein levels. 9. A method for calculating an estimation value of thrombosis risk of a patient based on patient-specific input features, said method comprising:
selecting said input features to include a combination of at least one clinical risk factor and at least one protein concentration of said patient; and calculating said estimation value by applying a decision support algorithm as a function of numerical values derived from said received input features. 10. The method according to claim 9, further comprising optimizing said input features by a learning process based on a stored dataset of a plurality patients so as to minimize a prediction error. 11. The method according to claim 10, further comprising dividing said dataset into a training set, a validation set and a test set, using said training set and said validation set to select a type of machine learning function and a set of model parameters used for optimizing classifiers, using the optimized classifiers for obtaining said patient-specific input features, and using said test set for calculating said estimation value for patients of said test set based on said obtained input features. 12. The method according to claim 9, further comprising selecting said at least one protein concentration from a concentration of coagulation protein FVIII in blood, a concentration of coagulation protein FXI in blood, and a concentration of coagulation protein TFPI in blood. 13. The method according to claim 9, further comprising selecting said at least one clinical risk factor from immobilization within a first predetermined time period, surgery within a second predetermined time period, family history of venous thrombosis, pregnancy or puerperium within a third predetermined time period, current use of estrogens, and obesity. 14. The method according to claim 13, further comprising setting said first predetermined time period to at least three months, said second predetermined time period to one month, and said third predetermined time period to at least three months. 15. A computer program product comprising program code means for causing a computer device to carry out the steps of claim 8 when said computer program is run on a computer device. | 3,600 |
13,469 | 13,469 | 14,566,181 | 3,694 | Techniques for linguistic personalization of messages for targeted campaigns are described. In one or more implementations, dependencies between keywords and modifiers are extracted, from one or more segment-specific texts and a product-specific text, to build language models for the one or more segment specific texts and the product specific text. Modifiers with a desired sentiment are extracted from the product specific text and transformation points are identified in a message skeleton. Then one or more of the extracted modifiers are inserted to modify one or more identified keywords in the message skeleton to create a personalized message for a target segment of the targeted marketing campaign. | 1. A computer-implemented method for linguistically personalizing a textual message for one or more segments of a targeted campaign, the method comprising:
extracting word dependencies between keywords and modifiers in a segment-specific text and a product-specific text; building language models for the segment-specific text and the product-specific text; extracting the modifiers from the product-specific text, the extracted modifiers being associated with a desired sentiment; identifying transformation points in a message skeleton, the identified transformation points indicating the keywords that are candidates for modification; and inserting one or more of the extracted modifiers to modify one or more of the identified keywords in the message skeleton, the inserting being effective to personalize the message skeleton to produce the personalized textual message for the segment associated with the segment-specific text. 2. The method of claim 1, the extracting the word dependencies comprising:
tagging parts of speech (POS) in the segment-specific text and the product-specific text; identifying adjacent and non-adjacent dependencies in the tagged segment-specific text and the tagged product-specific text; and lemmatizing words in the tagged segment-specific text and the tagged product-specific text to normalize the words to lemmas. 3. The method of claim 1, the building the language models comprising:
extracting distinct n-grams from the segment-specific text and the product-specific text; calculating an occurrence probability for each extracted n-gram; and determining the occurrence probability for all distinct modifier-keyword pairs in the language models. 4. The method of claim 1, the extracting modifiers from the product-specific text comprising:
extracting sentences from the product specific text; determining, for each extracted sentence, an associated sentiment; for each extracted sentence associated with the desired sentiment:
tagging POS for each extracted sentence; and
extracting the modifiers from each extracted sentence. 5. The method of claim 1, the identifying transformation points in the message skeleton comprising:
tagging POS in the message skeleton to identify the keywords in the message skeleton; computing a term weight for each identified keyword; comparing the computed term weight for each identified keyword to a term-weight threshold; and marking each keyword that has a term weight greater than the term-weight threshold as a transformation point. 6. The method of claim 1, the inserting the one or more of the extracted modifiers comprising:
for each keyword associated with a transformation point, comparing a set of extracted modifiers to an appearance threshold; and inserting one of the extracted modifiers that exceeds the appearance threshold to modify the keyword. 7. The method of claim 6, the method further comprising:
ranking the extracted modifiers in the set of extracted modifiers according to pointwise mutual information associated with each extracted modifier, wherein the inserting one of the extracted modifiers inserts a highest ranked extracted modifier that exceeds the appearance threshold. 8. The method of claim 6, wherein the keywords comprise nouns, verbs, or noun phrases, and wherein for the nouns and the noun phrases the modifier is an adjective, and wherein for the verbs the modifier is an adverb. 9. The method of claim 8, wherein the keyword is the noun phrase, the inserting one or more of the extracted modifiers further comprising:
determining a head-word in the noun phrase, wherein the inserting one of the extracted modifiers inserts an adjective for the determined head-word in the noun phrase. 10. A system for linguistically personalizing a textual message for one or more segments of a targeted campaign, the system comprising:
one or more modules implemented at least partially in hardware, the one or more modules configured perform operations comprising:
extracting word dependencies between keywords and modifiers in a segment-specific text and a product-specific text;
building language models for the segment-specific text and the product-specific text;
extracting the modifiers from the product-specific text, the extracted modifiers being associated with a desired sentiment;
identifying transformation points in a message skeleton, the identified transformation points indicating the keywords that are candidates for modification; and
inserting one or more of the extracted modifiers to modify one or more of the identified keywords in the message skeleton, the inserting being effective to personalize the message skeleton to produce the personalized textual message for the segment associated with the segment-specific text. 11. The system of claim 10, the one or more modules further configured to:
receive a request to personalize the textual message for the one or more segments of the targeted campaign, the request identifying one or more target segments, and comprising the message skeleton and communicate a response to the request comprising one or more personalized messages for the target segments that are based on the received message skeleton. 12. The system of claim 10, the one or more modules configured to extract word dependencies between the keywords and the modifiers in the segment-specific text and the product-specific text are configured to:
tag parts of speech (POS) in the segment-specific text and the product-specific text; identify adjacent and non-adjacent dependencies in the tagged segment-specific text and the tagged product-specific text; and lemmatize words in the tagged segment-specific text and the tagged product-specific text to normalize the words to lemmas. 13. The system of claim 10, the one or more modules configured to build the language models are configured to:
extract distinct n-grams from the segment-specific text and the product-specific text; calculate an occurrence probability for each extracted n-gram; and determine the occurrence probability for all distinct modifier-keyword pairs in the language models. 14. The system of claim 10, the one or more modules configured to extract the modifiers from the product-specific text are configured to:
extract sentences from the product specific text; determine, for each extracted sentence, an associated sentiment; for each extracted sentence associated with the desired sentiment:
tag POS for each extracted sentence; and
extract the modifiers from each extracted sentence. 15. The system of claim 10, the one or more modules configured to identify the transformation points in the message skeleton are configured to:
tag POS in the message skeleton to identify the keywords in the message skeleton; compute a term weight for each identified keyword; compare the computed term weight for each identified keyword to a term-weight threshold; and mark each keyword that has a term weight greater than the term-weight threshold as a transformation point. 16. The system of claim 10, the one or more modules configured to insert the one or more of the extracted modifiers are configured to:
for each keyword associated with a transformation point, compare a set of extracted modifiers to an appearance threshold; rank the extracted modifiers in the set of extracted modifiers according to pointwise mutual information associated with each extracted modifier; and insert a highest ranked extracted modifier that exceeds the appearance threshold to modify the keyword. 17. A computing device comprising:
one or more processors; and a memory having instructions that are executable by the one or more processors to implement a message personalization module that is configured to:
extract word dependencies between keywords and modifiers in a segment-specific text and a product-specific text;
build language models for the segment-specific text and the product-specific text;
extract the modifiers from the product-specific text, the extracted modifiers being associated with a desired sentiment;
identify transformation points in a message skeleton, the identified transformation points indicating the keywords that are candidates for modification; and
insert one or more of the extracted modifiers to modify one or more of the identified keywords in the message skeleton, the inserting being effective to personalize the message skeleton to produce the personalized textual message for the segment associated with the segment-specific text. 18. The computing device of claim 17, the extracting the word dependencies comprising:
tagging parts of speech (POS) in the segment-specific text and the product-specific text; identifying adjacent and non-adjacent dependencies in the tagged segment-specific text and the tagged product-specific text; and lemmatizing words in the tagged segment-specific text and the tagged product-specific text to normalize the words to lemmas; and the building the language models comprising: extracting distinct n-grams from the segment-specific text and the product-specific text; calculating an occurrence probability for each extracted n-gram; and determining the occurrence probability for all distinct modifier-keyword pairs in the language models. 19. The computing device of claim 17, the extracting the modifiers from the product-specific text comprising:
extracting sentences from the product specific text; determining, for each extracted sentence, an associated sentiment; for each extracted sentence associated with the desired sentiment:
tagging POS for each extracted sentence; and
extracting the modifiers from each extracted sentence; and
the identifying the transformation points in the message skeleton comprising:
tagging POS in the message skeleton to identify the keywords in the message skeleton;
computing a term weight for each identified keyword;
comparing the computed term weight for each identified keyword to a term-weight threshold; and
marking each keyword that has a term weight greater than the term-weight threshold as a transformation point. 20. The computing device of claim 17, the inserting the one or more of the extracted modifiers comprising:
for each keyword associated with a transformation point, comparing a set of extracted modifiers to an appearance threshold; ranking the extracted modifiers in the set of extracted modifiers according to pointwise mutual information associated with each extracted modifier; and inserting a highest ranked extracted modifier that exceeds the appearance threshold to modify the keyword. | Techniques for linguistic personalization of messages for targeted campaigns are described. In one or more implementations, dependencies between keywords and modifiers are extracted, from one or more segment-specific texts and a product-specific text, to build language models for the one or more segment specific texts and the product specific text. Modifiers with a desired sentiment are extracted from the product specific text and transformation points are identified in a message skeleton. Then one or more of the extracted modifiers are inserted to modify one or more identified keywords in the message skeleton to create a personalized message for a target segment of the targeted marketing campaign.1. A computer-implemented method for linguistically personalizing a textual message for one or more segments of a targeted campaign, the method comprising:
extracting word dependencies between keywords and modifiers in a segment-specific text and a product-specific text; building language models for the segment-specific text and the product-specific text; extracting the modifiers from the product-specific text, the extracted modifiers being associated with a desired sentiment; identifying transformation points in a message skeleton, the identified transformation points indicating the keywords that are candidates for modification; and inserting one or more of the extracted modifiers to modify one or more of the identified keywords in the message skeleton, the inserting being effective to personalize the message skeleton to produce the personalized textual message for the segment associated with the segment-specific text. 2. The method of claim 1, the extracting the word dependencies comprising:
tagging parts of speech (POS) in the segment-specific text and the product-specific text; identifying adjacent and non-adjacent dependencies in the tagged segment-specific text and the tagged product-specific text; and lemmatizing words in the tagged segment-specific text and the tagged product-specific text to normalize the words to lemmas. 3. The method of claim 1, the building the language models comprising:
extracting distinct n-grams from the segment-specific text and the product-specific text; calculating an occurrence probability for each extracted n-gram; and determining the occurrence probability for all distinct modifier-keyword pairs in the language models. 4. The method of claim 1, the extracting modifiers from the product-specific text comprising:
extracting sentences from the product specific text; determining, for each extracted sentence, an associated sentiment; for each extracted sentence associated with the desired sentiment:
tagging POS for each extracted sentence; and
extracting the modifiers from each extracted sentence. 5. The method of claim 1, the identifying transformation points in the message skeleton comprising:
tagging POS in the message skeleton to identify the keywords in the message skeleton; computing a term weight for each identified keyword; comparing the computed term weight for each identified keyword to a term-weight threshold; and marking each keyword that has a term weight greater than the term-weight threshold as a transformation point. 6. The method of claim 1, the inserting the one or more of the extracted modifiers comprising:
for each keyword associated with a transformation point, comparing a set of extracted modifiers to an appearance threshold; and inserting one of the extracted modifiers that exceeds the appearance threshold to modify the keyword. 7. The method of claim 6, the method further comprising:
ranking the extracted modifiers in the set of extracted modifiers according to pointwise mutual information associated with each extracted modifier, wherein the inserting one of the extracted modifiers inserts a highest ranked extracted modifier that exceeds the appearance threshold. 8. The method of claim 6, wherein the keywords comprise nouns, verbs, or noun phrases, and wherein for the nouns and the noun phrases the modifier is an adjective, and wherein for the verbs the modifier is an adverb. 9. The method of claim 8, wherein the keyword is the noun phrase, the inserting one or more of the extracted modifiers further comprising:
determining a head-word in the noun phrase, wherein the inserting one of the extracted modifiers inserts an adjective for the determined head-word in the noun phrase. 10. A system for linguistically personalizing a textual message for one or more segments of a targeted campaign, the system comprising:
one or more modules implemented at least partially in hardware, the one or more modules configured perform operations comprising:
extracting word dependencies between keywords and modifiers in a segment-specific text and a product-specific text;
building language models for the segment-specific text and the product-specific text;
extracting the modifiers from the product-specific text, the extracted modifiers being associated with a desired sentiment;
identifying transformation points in a message skeleton, the identified transformation points indicating the keywords that are candidates for modification; and
inserting one or more of the extracted modifiers to modify one or more of the identified keywords in the message skeleton, the inserting being effective to personalize the message skeleton to produce the personalized textual message for the segment associated with the segment-specific text. 11. The system of claim 10, the one or more modules further configured to:
receive a request to personalize the textual message for the one or more segments of the targeted campaign, the request identifying one or more target segments, and comprising the message skeleton and communicate a response to the request comprising one or more personalized messages for the target segments that are based on the received message skeleton. 12. The system of claim 10, the one or more modules configured to extract word dependencies between the keywords and the modifiers in the segment-specific text and the product-specific text are configured to:
tag parts of speech (POS) in the segment-specific text and the product-specific text; identify adjacent and non-adjacent dependencies in the tagged segment-specific text and the tagged product-specific text; and lemmatize words in the tagged segment-specific text and the tagged product-specific text to normalize the words to lemmas. 13. The system of claim 10, the one or more modules configured to build the language models are configured to:
extract distinct n-grams from the segment-specific text and the product-specific text; calculate an occurrence probability for each extracted n-gram; and determine the occurrence probability for all distinct modifier-keyword pairs in the language models. 14. The system of claim 10, the one or more modules configured to extract the modifiers from the product-specific text are configured to:
extract sentences from the product specific text; determine, for each extracted sentence, an associated sentiment; for each extracted sentence associated with the desired sentiment:
tag POS for each extracted sentence; and
extract the modifiers from each extracted sentence. 15. The system of claim 10, the one or more modules configured to identify the transformation points in the message skeleton are configured to:
tag POS in the message skeleton to identify the keywords in the message skeleton; compute a term weight for each identified keyword; compare the computed term weight for each identified keyword to a term-weight threshold; and mark each keyword that has a term weight greater than the term-weight threshold as a transformation point. 16. The system of claim 10, the one or more modules configured to insert the one or more of the extracted modifiers are configured to:
for each keyword associated with a transformation point, compare a set of extracted modifiers to an appearance threshold; rank the extracted modifiers in the set of extracted modifiers according to pointwise mutual information associated with each extracted modifier; and insert a highest ranked extracted modifier that exceeds the appearance threshold to modify the keyword. 17. A computing device comprising:
one or more processors; and a memory having instructions that are executable by the one or more processors to implement a message personalization module that is configured to:
extract word dependencies between keywords and modifiers in a segment-specific text and a product-specific text;
build language models for the segment-specific text and the product-specific text;
extract the modifiers from the product-specific text, the extracted modifiers being associated with a desired sentiment;
identify transformation points in a message skeleton, the identified transformation points indicating the keywords that are candidates for modification; and
insert one or more of the extracted modifiers to modify one or more of the identified keywords in the message skeleton, the inserting being effective to personalize the message skeleton to produce the personalized textual message for the segment associated with the segment-specific text. 18. The computing device of claim 17, the extracting the word dependencies comprising:
tagging parts of speech (POS) in the segment-specific text and the product-specific text; identifying adjacent and non-adjacent dependencies in the tagged segment-specific text and the tagged product-specific text; and lemmatizing words in the tagged segment-specific text and the tagged product-specific text to normalize the words to lemmas; and the building the language models comprising: extracting distinct n-grams from the segment-specific text and the product-specific text; calculating an occurrence probability for each extracted n-gram; and determining the occurrence probability for all distinct modifier-keyword pairs in the language models. 19. The computing device of claim 17, the extracting the modifiers from the product-specific text comprising:
extracting sentences from the product specific text; determining, for each extracted sentence, an associated sentiment; for each extracted sentence associated with the desired sentiment:
tagging POS for each extracted sentence; and
extracting the modifiers from each extracted sentence; and
the identifying the transformation points in the message skeleton comprising:
tagging POS in the message skeleton to identify the keywords in the message skeleton;
computing a term weight for each identified keyword;
comparing the computed term weight for each identified keyword to a term-weight threshold; and
marking each keyword that has a term weight greater than the term-weight threshold as a transformation point. 20. The computing device of claim 17, the inserting the one or more of the extracted modifiers comprising:
for each keyword associated with a transformation point, comparing a set of extracted modifiers to an appearance threshold; ranking the extracted modifiers in the set of extracted modifiers according to pointwise mutual information associated with each extracted modifier; and inserting a highest ranked extracted modifier that exceeds the appearance threshold to modify the keyword. | 3,600 |
13,470 | 13,470 | 15,482,517 | 3,689 | A machine assistance platform for management, analysis, and transaction of intellectual property assets is described herein. In an example implementation, a system provides automated analysis of intellectual assets using machine learning techniques. In an example, a software program is provided to continuously manage and monitor government intellectual property office data. In the context of asset analysis, a virtual data room (or deal room) is provided to strategically organize assets. In an intellectual asset analysis example, a machine learning program is provided to interpret intellectual assets. The machine learning program provides insights into the innovation landscape, relevant organizations, products, research and the like. The machine learning program performs tasks analogous to a professional intellectual asset analysis. | 1-5. (canceled) 6. A machine learning engine to manage digital assets in a multi-phase management comprising:
a database to store digital assets, wherein the digital assets can be associated with one or more phases of an asset lifecycle, wherein the asset lifecycle comprises at least an asset generation phase, an asset examination phase, an asset diligence phase, and an asset transfer phase; a processing device operatively coupled to memory comprising instructions, wherein the processing device is configured to: generate a binary file for each digital asset based on a machine learning model comprising a vector representation based on paragraph vector classification using an unsupervised learning model and an asset similarity metric based on comparison of the vector representation with the other digital assets; and provide a multi-phase management interface to enable different analytical analysis for each phase of the asset lifecycle, wherein the analytical analysis for each phase comprises at least a ranked set of results. 7. The machine learning engine of claim 6, further comprising:
updating the binary file based on similarity and relevancy weightings in response to updates to one or more of the digital assets. 8. The machine learning engine of claim 6, wherein the plurality of binary files of the trained machine learning models re-trains in response to updates to one or more of the digital assets. 9. The machine learning engine of claim 6, wherein the multi-phase management interface enables a user to filter and visualize relationships between the digital assets based on the binary files. 10. The machine learning engine of claim 6, wherein the vector representation for each digital asset is adjusted based on a mean vector for the vector representation of the plurality of digital assets to denoise the vector representations. 11. The machine learning engine of claim 6, wherein the asset similarity metric for each digital asset comprises mapping the digital assets to a single real-valued number to determine a contextual relevancy score. 12. A method to manage digital assets comprising:
maintaining a repository of a plurality of digital assets wherein the repository comprise digital assets in different formats at least comprising textual content, wherein the plurality of digital assets can be associated with one or more phases of an asset lifecycle, wherein the asset lifecycle comprises at least an asset generation phase, an asset examination phase, an asset diligence phase, and an asset transfer phase; selecting a corpus of digital assets form the repository; generating a multi-phase management model using machine learning on at least the textual content of the corpus of digital assets from the repository, wherein the multi-phase management model is usable with at least the asset lifecycle, wherein the machine learning comprises a deep-learning neural network based on:
training an unsupervised learning model based at least on constituent text for a plurality of linguistic and descriptive scopes segments from the corpus of digital assets, wherein the unsupervised learning model comprises training a set of paragraph vector classifiers;
for each digital asset in the corpus, using the unsupervised learning model to determine a paragraph vectors for the textual content using the paragraph vector classifiers, and map each asset to a fixed length asset vector based at least on the paragraph vectors;
determining a mean vector for the corpus based on the asset vectors to denoise the vector representations produced by the unsupervised learning model;
adjusting the asset vector for each digital asset in the corpus based on the mean vector for the corpus; and
determining a similarity metric between each digital asset in the corpus based on the asset vector for each digital asset using vector similarity and contextual similarity analysis. 13. The method of claim 12, wherein the multi-phase management model is used to generate different analytical analysis for the at least the asset generation phase, the asset examination phase, the asset diligence phase, and the asset transfer phase, wherein the different analytical analysis for each phase of the asset lifecycle comprises a ranking of the digital asset 14. The method of claim 12, wherein generating the multi-phase management model further comprises training a deep-learning neural network using a center loss output layer in conjunction with the paragraph vector classifiers and an external classification standard. | A machine assistance platform for management, analysis, and transaction of intellectual property assets is described herein. In an example implementation, a system provides automated analysis of intellectual assets using machine learning techniques. In an example, a software program is provided to continuously manage and monitor government intellectual property office data. In the context of asset analysis, a virtual data room (or deal room) is provided to strategically organize assets. In an intellectual asset analysis example, a machine learning program is provided to interpret intellectual assets. The machine learning program provides insights into the innovation landscape, relevant organizations, products, research and the like. The machine learning program performs tasks analogous to a professional intellectual asset analysis.1-5. (canceled) 6. A machine learning engine to manage digital assets in a multi-phase management comprising:
a database to store digital assets, wherein the digital assets can be associated with one or more phases of an asset lifecycle, wherein the asset lifecycle comprises at least an asset generation phase, an asset examination phase, an asset diligence phase, and an asset transfer phase; a processing device operatively coupled to memory comprising instructions, wherein the processing device is configured to: generate a binary file for each digital asset based on a machine learning model comprising a vector representation based on paragraph vector classification using an unsupervised learning model and an asset similarity metric based on comparison of the vector representation with the other digital assets; and provide a multi-phase management interface to enable different analytical analysis for each phase of the asset lifecycle, wherein the analytical analysis for each phase comprises at least a ranked set of results. 7. The machine learning engine of claim 6, further comprising:
updating the binary file based on similarity and relevancy weightings in response to updates to one or more of the digital assets. 8. The machine learning engine of claim 6, wherein the plurality of binary files of the trained machine learning models re-trains in response to updates to one or more of the digital assets. 9. The machine learning engine of claim 6, wherein the multi-phase management interface enables a user to filter and visualize relationships between the digital assets based on the binary files. 10. The machine learning engine of claim 6, wherein the vector representation for each digital asset is adjusted based on a mean vector for the vector representation of the plurality of digital assets to denoise the vector representations. 11. The machine learning engine of claim 6, wherein the asset similarity metric for each digital asset comprises mapping the digital assets to a single real-valued number to determine a contextual relevancy score. 12. A method to manage digital assets comprising:
maintaining a repository of a plurality of digital assets wherein the repository comprise digital assets in different formats at least comprising textual content, wherein the plurality of digital assets can be associated with one or more phases of an asset lifecycle, wherein the asset lifecycle comprises at least an asset generation phase, an asset examination phase, an asset diligence phase, and an asset transfer phase; selecting a corpus of digital assets form the repository; generating a multi-phase management model using machine learning on at least the textual content of the corpus of digital assets from the repository, wherein the multi-phase management model is usable with at least the asset lifecycle, wherein the machine learning comprises a deep-learning neural network based on:
training an unsupervised learning model based at least on constituent text for a plurality of linguistic and descriptive scopes segments from the corpus of digital assets, wherein the unsupervised learning model comprises training a set of paragraph vector classifiers;
for each digital asset in the corpus, using the unsupervised learning model to determine a paragraph vectors for the textual content using the paragraph vector classifiers, and map each asset to a fixed length asset vector based at least on the paragraph vectors;
determining a mean vector for the corpus based on the asset vectors to denoise the vector representations produced by the unsupervised learning model;
adjusting the asset vector for each digital asset in the corpus based on the mean vector for the corpus; and
determining a similarity metric between each digital asset in the corpus based on the asset vector for each digital asset using vector similarity and contextual similarity analysis. 13. The method of claim 12, wherein the multi-phase management model is used to generate different analytical analysis for the at least the asset generation phase, the asset examination phase, the asset diligence phase, and the asset transfer phase, wherein the different analytical analysis for each phase of the asset lifecycle comprises a ranking of the digital asset 14. The method of claim 12, wherein generating the multi-phase management model further comprises training a deep-learning neural network using a center loss output layer in conjunction with the paragraph vector classifiers and an external classification standard. | 3,600 |
13,471 | 13,471 | 13,224,244 | 3,689 | In one embodiment, a system and method for monitoring lost items includes a lost item database including a first memory operable to store lost item information and a second memory operable to store recovery item information and a processor operable to (i) receive the lost item information and the recovery item information; (ii) associate a status indicator with the lost item associated with the lost item information and the forgotten item with the recovery item information; (iii) browse or search the lost item database to compare the lost item information and the recovery item information; (iv) determine whether there is a match between the lost item information and the recovery item information; (v) facilitating transmission of an electronic recovery notification to a patron device of an establishment if there is a match; and (vi) automatically update the status indicator to indicate the lost item and the forgotten item have been recovered. | 1. A system for monitoring lost items, the system comprising:
a lost item database including:
a first memory operable to store lost item information, the lost item information pertaining to lost items recovered at one or more establishments;
a second memory operable to store recovery item information, the recovery item information pertaining to a forgotten item at the one or more establishments;
a processor operable to:
receive the lost item information and the recovery item information;
associate a status indicator with the lost item associated with the lost item information and the forgotten item with the recovery item information;
browse or search the lost item database to compare the lost item information and the recovery item information;
determine whether there is a match between the lost item information and the recovery item information;
facilitating transmission of an electronic recovery notification to a patron device of one or more establishments if there is a match; and
automatically update the status indicator to indicate the lost item and the forgotten item have been recovered. 2. The system of claim 1, wherein the processor is operable to:
detect if the electronic recovery notification has been viewed by the patron; and automatically updating the status indicator to indicate the patron has been notified of the recovered item. 3. The system of claim 1, wherein the electronic recovery notification includes a plurality of return item options, the plurality of return item options include at least a hold item option, a return item to me option, and a do not return item option. 4. The system of claim 3, wherein the return item to me option includes at least one shipment option, the shipment options including links to initiate payment of shipment for return of the lost item to the current or prior patron. 5. The system of claim 1, wherein the lost item database includes a third memory to store at least one coupon, the coupon associated with the one or more establishments. 6. The system of claim 5, wherein the processor is operable to:
browse or search the lost item database for a coupon associated with the one or more establishments; facilitate transmission of the coupon to the patron device, wherein the coupon includes a coupon code to discount payment of the shipment for return of the lost item to the patron. 7. The system of claim 6, wherein the processor is operable to customize the coupon prior to facilitating transmission of the coupon to the patron device. 8. The system of claim 1, wherein the processor is operable to customize the electronic recovery notification prior to facilitating transmission of the electronic recovery notification to the patron device. 9. The system of claim 1, wherein the processor is further configured to automatically update the status indicator upon predetermined events. 10. A method for lost item notification to a customer, comprising:
receiving, from a customer device, a recovery item report concerning a lost item, the recovery item report including recovery item information concerning a lost item; receiving, from an establishment server, a lost item report concerning a lost item, the lost item report including lost item information concerning a lost item and a status indicator; comparing, the recovery item information and the lost item information to determine if there is a match; transmitting a recovery notification request to the customer device if there is a match; determining whether a request to return the lost item to the customer is received, the request to return the recovered item including a shipping selection; generating a request for shipping documents based upon the shipping selection if it is determined that a request to return the lost item is received; and transmitting, to a shipping server, the request for shipping documents. 11. The method of claim 10, further comprising:
receiving, from the shipping server, the requested shipping documents; and transmitting, to the establishment server, the received shipping documents. 12. The method of claim 10, wherein the transmitting a recovery notification further comprises automatically updating a status indicator to indicate the recovery notification is transmitted to the customer device. 13. The method of claim 10, wherein the transmitting the received shipping documents further comprises automatically updating a status indicator to indicate the customer has provided payment for shipping of the lost item. 14. The method of claim 10, wherein the lost item description includes at least a found location of the lost item, current storage location of the lost item, client information, and a graphical image of the lost item; and
wherein the recovery item description includes at least a found location of the lost item, current storage location of the lost item, client information, and a graphical image of the lost item. 15. The method of claim 10, further comprising:
generating, by a coupon manager, a shipping coupon; and transmitting the shipping coupon to the customer device. 16. The method of claim 10, wherein the determining further comprises:
receiving customer financial information; verifying the customer financial information; generating a payment receipt; and transmitting the payment receipt to the customer device and the establishment server. 17. The method of claim 10, further comprising:
receiving a request for a summary report of all lost item reports, the request including at least one filter criteria; and generating a summary report based upon the filter criteri. 18. The method of claim 17, wherein the filter criteria is based upon the status indicator. 19. The method of claim 17, wherein the filter criteria is at least one keyword. 20. The method of claim 10, wherein the transmitting a recovery notification request further includes detecting whether the recovery notification is viewed by the customer device; and
automatically updating the status indicator to indicate the customer has been contacted. | In one embodiment, a system and method for monitoring lost items includes a lost item database including a first memory operable to store lost item information and a second memory operable to store recovery item information and a processor operable to (i) receive the lost item information and the recovery item information; (ii) associate a status indicator with the lost item associated with the lost item information and the forgotten item with the recovery item information; (iii) browse or search the lost item database to compare the lost item information and the recovery item information; (iv) determine whether there is a match between the lost item information and the recovery item information; (v) facilitating transmission of an electronic recovery notification to a patron device of an establishment if there is a match; and (vi) automatically update the status indicator to indicate the lost item and the forgotten item have been recovered.1. A system for monitoring lost items, the system comprising:
a lost item database including:
a first memory operable to store lost item information, the lost item information pertaining to lost items recovered at one or more establishments;
a second memory operable to store recovery item information, the recovery item information pertaining to a forgotten item at the one or more establishments;
a processor operable to:
receive the lost item information and the recovery item information;
associate a status indicator with the lost item associated with the lost item information and the forgotten item with the recovery item information;
browse or search the lost item database to compare the lost item information and the recovery item information;
determine whether there is a match between the lost item information and the recovery item information;
facilitating transmission of an electronic recovery notification to a patron device of one or more establishments if there is a match; and
automatically update the status indicator to indicate the lost item and the forgotten item have been recovered. 2. The system of claim 1, wherein the processor is operable to:
detect if the electronic recovery notification has been viewed by the patron; and automatically updating the status indicator to indicate the patron has been notified of the recovered item. 3. The system of claim 1, wherein the electronic recovery notification includes a plurality of return item options, the plurality of return item options include at least a hold item option, a return item to me option, and a do not return item option. 4. The system of claim 3, wherein the return item to me option includes at least one shipment option, the shipment options including links to initiate payment of shipment for return of the lost item to the current or prior patron. 5. The system of claim 1, wherein the lost item database includes a third memory to store at least one coupon, the coupon associated with the one or more establishments. 6. The system of claim 5, wherein the processor is operable to:
browse or search the lost item database for a coupon associated with the one or more establishments; facilitate transmission of the coupon to the patron device, wherein the coupon includes a coupon code to discount payment of the shipment for return of the lost item to the patron. 7. The system of claim 6, wherein the processor is operable to customize the coupon prior to facilitating transmission of the coupon to the patron device. 8. The system of claim 1, wherein the processor is operable to customize the electronic recovery notification prior to facilitating transmission of the electronic recovery notification to the patron device. 9. The system of claim 1, wherein the processor is further configured to automatically update the status indicator upon predetermined events. 10. A method for lost item notification to a customer, comprising:
receiving, from a customer device, a recovery item report concerning a lost item, the recovery item report including recovery item information concerning a lost item; receiving, from an establishment server, a lost item report concerning a lost item, the lost item report including lost item information concerning a lost item and a status indicator; comparing, the recovery item information and the lost item information to determine if there is a match; transmitting a recovery notification request to the customer device if there is a match; determining whether a request to return the lost item to the customer is received, the request to return the recovered item including a shipping selection; generating a request for shipping documents based upon the shipping selection if it is determined that a request to return the lost item is received; and transmitting, to a shipping server, the request for shipping documents. 11. The method of claim 10, further comprising:
receiving, from the shipping server, the requested shipping documents; and transmitting, to the establishment server, the received shipping documents. 12. The method of claim 10, wherein the transmitting a recovery notification further comprises automatically updating a status indicator to indicate the recovery notification is transmitted to the customer device. 13. The method of claim 10, wherein the transmitting the received shipping documents further comprises automatically updating a status indicator to indicate the customer has provided payment for shipping of the lost item. 14. The method of claim 10, wherein the lost item description includes at least a found location of the lost item, current storage location of the lost item, client information, and a graphical image of the lost item; and
wherein the recovery item description includes at least a found location of the lost item, current storage location of the lost item, client information, and a graphical image of the lost item. 15. The method of claim 10, further comprising:
generating, by a coupon manager, a shipping coupon; and transmitting the shipping coupon to the customer device. 16. The method of claim 10, wherein the determining further comprises:
receiving customer financial information; verifying the customer financial information; generating a payment receipt; and transmitting the payment receipt to the customer device and the establishment server. 17. The method of claim 10, further comprising:
receiving a request for a summary report of all lost item reports, the request including at least one filter criteria; and generating a summary report based upon the filter criteri. 18. The method of claim 17, wherein the filter criteria is based upon the status indicator. 19. The method of claim 17, wherein the filter criteria is at least one keyword. 20. The method of claim 10, wherein the transmitting a recovery notification request further includes detecting whether the recovery notification is viewed by the customer device; and
automatically updating the status indicator to indicate the customer has been contacted. | 3,600 |
13,472 | 13,472 | 13,284,215 | 3,651 | A dispenser for dispensing cutlery may include a housing configured to contain a plurality of utensils for dispensing, a dispensing mechanism that includes at least one threaded separating member configured to be driven and separate a utensil from a stack of utensils, and at least one drive mechanism configured to drive the at least one threaded separating member. The dispenser may further include a receptacle configured to receive the utensil separated from the stack of utensils. | 1. A dispenser for dispensing cutlery, the dispenser comprising:
a housing configured to contain a plurality of utensils for dispensing; a dispensing mechanism comprising
at least one threaded separating member configured to separate a utensil from a stack of utensils, and
a drive mechanism associated with the at least one threaded separating member and configured to drive the at least one threaded separating member; and
a receptacle configured to receive the utensil separated from the stack of utensils. 2. The dispenser of claim 1, wherein the at least one threaded separating member comprises external threads, and wherein over at least a portion of the threaded separating member the external threads are equally spaced from one another. 3. The dispenser of claim 2, wherein the at least one threaded separating member comprises external threads, and wherein a distance between adjacent external threads is non-uniform over at least a portion of the threaded separating member. 4. The dispenser of claim 1, wherein the dispensing mechanism comprises a plurality of threaded separating members configured to separate a utensil from the stack of utensils. 5. The dispenser of claim 1, wherein the dispensing mechanism comprises at least one pair of threaded separating members configured to engage the stack of utensils via opposing sides of the stack of utensils. 6. The dispenser of claim 1, wherein the dispensing mechanism is configured to separate a utensil from the stack of separably coupled utensils. 7. The dispenser of claim 1, wherein the at least one threaded separating member is configured to extend along at least a portion of the extent of the stack of utensils. 8. The dispenser of claim 1, wherein the at least one threaded separating member is configured to extend along the entire extent of the stack of utensils. 9. The dispenser of claim 1, further comprising a utensil cartridge configured to be loaded into the dispenser, the utensil cartridge comprising at least a first portion of the at least one threaded separating member and being configured to be associated with at least one of the drive mechanism and a second portion of the at least one threaded separating member upon placement of the utensil cartridge in the dispenser. 10. A method for dispensing cutlery from a dispenser, the dispenser comprising at least one threaded separating member, the method comprising:
providing a plurality of utensils for dispensing; indexing at least one threaded separating member such that a utensil is separated from a stack of utensils; and providing access to the utensil separated from the stack of utensils. 11. The method of claim 10, wherein providing a plurality of utensils comprises providing a plurality of separably coupled utensils. 12. The method of claim 10, wherein indexing at least one of the threaded separating members is facilitated by a drive mechanism associated with the at least one threaded separating member and configured to drive the at least one threaded separating member. 13. The method of claim 12, wherein the drive mechanism is engaged by activating an actuator operably coupled to the drive mechanism. 14. The method of claim 10, wherein indexing at least one of the threaded separating members comprises rotating the at least one threaded separating member such that a utensil is separated from the stack of utensils. 15. The method of claim 10, wherein indexing at least one threaded separating member comprises indexing at least one pair of threaded separating members positioned on opposing sides of the stack of utensils. 16. The method of claim 10, wherein indexing at least one threaded separating member provides a separating force to at least one utensil and a retaining force to at least one other utensil. 17. The method of claim 10, wherein providing a plurality of utensils for dispensing comprises providing at least one of a cartridge of utensils, a stack of separably coupled utensils, and a stack of banded utensils. 18. The method of claim 10, wherein providing access to the utensil comprises providing a receptacle positioned to receive the utensil separated from the stack of utensils. | A dispenser for dispensing cutlery may include a housing configured to contain a plurality of utensils for dispensing, a dispensing mechanism that includes at least one threaded separating member configured to be driven and separate a utensil from a stack of utensils, and at least one drive mechanism configured to drive the at least one threaded separating member. The dispenser may further include a receptacle configured to receive the utensil separated from the stack of utensils.1. A dispenser for dispensing cutlery, the dispenser comprising:
a housing configured to contain a plurality of utensils for dispensing; a dispensing mechanism comprising
at least one threaded separating member configured to separate a utensil from a stack of utensils, and
a drive mechanism associated with the at least one threaded separating member and configured to drive the at least one threaded separating member; and
a receptacle configured to receive the utensil separated from the stack of utensils. 2. The dispenser of claim 1, wherein the at least one threaded separating member comprises external threads, and wherein over at least a portion of the threaded separating member the external threads are equally spaced from one another. 3. The dispenser of claim 2, wherein the at least one threaded separating member comprises external threads, and wherein a distance between adjacent external threads is non-uniform over at least a portion of the threaded separating member. 4. The dispenser of claim 1, wherein the dispensing mechanism comprises a plurality of threaded separating members configured to separate a utensil from the stack of utensils. 5. The dispenser of claim 1, wherein the dispensing mechanism comprises at least one pair of threaded separating members configured to engage the stack of utensils via opposing sides of the stack of utensils. 6. The dispenser of claim 1, wherein the dispensing mechanism is configured to separate a utensil from the stack of separably coupled utensils. 7. The dispenser of claim 1, wherein the at least one threaded separating member is configured to extend along at least a portion of the extent of the stack of utensils. 8. The dispenser of claim 1, wherein the at least one threaded separating member is configured to extend along the entire extent of the stack of utensils. 9. The dispenser of claim 1, further comprising a utensil cartridge configured to be loaded into the dispenser, the utensil cartridge comprising at least a first portion of the at least one threaded separating member and being configured to be associated with at least one of the drive mechanism and a second portion of the at least one threaded separating member upon placement of the utensil cartridge in the dispenser. 10. A method for dispensing cutlery from a dispenser, the dispenser comprising at least one threaded separating member, the method comprising:
providing a plurality of utensils for dispensing; indexing at least one threaded separating member such that a utensil is separated from a stack of utensils; and providing access to the utensil separated from the stack of utensils. 11. The method of claim 10, wherein providing a plurality of utensils comprises providing a plurality of separably coupled utensils. 12. The method of claim 10, wherein indexing at least one of the threaded separating members is facilitated by a drive mechanism associated with the at least one threaded separating member and configured to drive the at least one threaded separating member. 13. The method of claim 12, wherein the drive mechanism is engaged by activating an actuator operably coupled to the drive mechanism. 14. The method of claim 10, wherein indexing at least one of the threaded separating members comprises rotating the at least one threaded separating member such that a utensil is separated from the stack of utensils. 15. The method of claim 10, wherein indexing at least one threaded separating member comprises indexing at least one pair of threaded separating members positioned on opposing sides of the stack of utensils. 16. The method of claim 10, wherein indexing at least one threaded separating member provides a separating force to at least one utensil and a retaining force to at least one other utensil. 17. The method of claim 10, wherein providing a plurality of utensils for dispensing comprises providing at least one of a cartridge of utensils, a stack of separably coupled utensils, and a stack of banded utensils. 18. The method of claim 10, wherein providing access to the utensil comprises providing a receptacle positioned to receive the utensil separated from the stack of utensils. | 3,600 |
13,473 | 13,473 | 14,921,284 | 3,685 | According to some embodiments, a point of sale device may read a user's biometric information. The point of sale device may then execute an encryption algorithm on the biometric information read to create a token key value. The point of sale device may also receive a personal identification number value from the user and transmit the token key value and the personal identification number value to an authentication server. The authentication server may determine that the received token key value and the personal identification number value match a verified token key value and a verified personal identification number value in a registered user database. The authentication server may then transmit a signal to the point of sale device indicating that the received token key value and the personal identification number value match the verified token key value and the verified personal identification number value in the registered user database. | 1. A system to verify a user's identify in connection with a payment transaction, comprising:
(a) a point of sale device programmed to:
(i) read biometric information of the user,
(ii) execute an encryption algorithm on the biometric information read from the user to create a token key value,
(iii) receive from the user a personal identification number value, and
(iv) arrange for the token key value and the personal identification number value to be received at an authentication server;
(b) a registered user database storing, for each of a plurality of registered users, a verified token key value and an associated verified personal identification number value; and (c) an authentication server, coupled to the registered user database, programmed to:
(v) receive the token key value and the personal identification number value,
(vi) determine that the received token key value and the personal identification number value match a verified token key value and a verified personal identification number value in the registered user database, and
(vii) transmit a signal indicating that the received token key value and the personal identification number value match the verified token key value and the verified personal identification number value in the registered user database. 2. The system of claim 1, wherein the biometric information comprises a fingerprint of the user and the point of sale device comprises at least one of a merchant point of sale device and an automated teller machine device. 3. The system of claim 1, wherein the biometric information comprises a plurality of fingerprints of the user. 4. The system of claim 1, wherein the encryption algorithm is executed such that the biometric information read from the user cannot be determined from the token key value. 5. The system of claim 1, wherein the personal identification number value comprises 4 digits and the token key value comprises an alpha-numeric series associated with a tokenization algorithm. 6. The system of claim 1, wherein the biometric information comprises at least one of: facial information, retina information, DNA information, palm print data, hand geometry information, iris recognition data, and voice data. 7. The system of claim 1, wherein the point of sale device is associated with at least one of: (i) a touchscreen, (ii) a computer mouse, and (iii) a television controller. 8. The system of claim 1, wherein, prior to said receiving, the user is registered with the authentication server, including the establishment and storage of the verified token key value and the associated verified personal identification number value in connection with a payment account. 9. The system of claim 8, wherein the payment account is associated with at least one of: (i) a credit card account, (ii) a debit card account, (iii) an electronic wallet, and (iv) a pre-paid payment account. 10. The system of claim 8, wherein said establishment is performed via a smartphone application or any other device able to capture biometric data. 11. A computer-implemented method, comprising:
reading, by a point of sale device, biometric information of the user; executing, by the point of sale device, an encryption algorithm on the biometric information read from the user to create a token key value; receiving, by the point of sale device from the user, a personal identification number value; transmitting the token key value and the personal identification number value from the point of sale device to an authentication server; receiving the token key value and the personal identification number value at the authentication server; determining that the received token key value and the personal identification number value match a verified token key value and a verified personal identification number value in a registered user database; and transmitting a signal, from the authentication server to the point of sale device, indicating that the received token key value and the personal identification number value match the verified token key value and the verified personal identification number value in the registered user database. 12. The method of claim 11, wherein the biometric information comprises a fingerprint of the user and the point of sale device comprises at least one of a merchant point of sale device and an automated teller machine device. 13. The method of claim 11, wherein the biometric information comprises a plurality of fingerprints of the user. 14. The method of claim 11, wherein the encryption algorithm is executed such that the biometric information read from the user cannot be determined from the token key value. 15. The method of claim 11, wherein the personal identification number value comprises 4 digits and the token key value comprises an alpha-numeric series associated with a tokenization algorithm. 16. The method of claim 11, wherein the biometric information comprises at least one of: facial information, retina information, DNA information, palm print data, hand geometry information, iris recognition data, and voice data. 17. The method of claim 11, wherein the point of sale device is associated with at least one of: (i) a touchscreen, (ii) a computer mouse, and (iii) a television controller. 18. The method of claim 11, wherein, prior to said receiving, the user is registered with the authentication server, including the establishment and storage of the verified token key value and the associated verified personal identification number value in connection with a payment account. 19. The method of claim 18, wherein the payment account is associated with at least one of: (i) a credit card account, (ii) a debit card account, (iii) an electronic wallet, and (iv) a pre-paid payment account. 20. The method of claim 18, wherein said establishment is performed via a smartphone application or any other device able to capture biometric data. | According to some embodiments, a point of sale device may read a user's biometric information. The point of sale device may then execute an encryption algorithm on the biometric information read to create a token key value. The point of sale device may also receive a personal identification number value from the user and transmit the token key value and the personal identification number value to an authentication server. The authentication server may determine that the received token key value and the personal identification number value match a verified token key value and a verified personal identification number value in a registered user database. The authentication server may then transmit a signal to the point of sale device indicating that the received token key value and the personal identification number value match the verified token key value and the verified personal identification number value in the registered user database.1. A system to verify a user's identify in connection with a payment transaction, comprising:
(a) a point of sale device programmed to:
(i) read biometric information of the user,
(ii) execute an encryption algorithm on the biometric information read from the user to create a token key value,
(iii) receive from the user a personal identification number value, and
(iv) arrange for the token key value and the personal identification number value to be received at an authentication server;
(b) a registered user database storing, for each of a plurality of registered users, a verified token key value and an associated verified personal identification number value; and (c) an authentication server, coupled to the registered user database, programmed to:
(v) receive the token key value and the personal identification number value,
(vi) determine that the received token key value and the personal identification number value match a verified token key value and a verified personal identification number value in the registered user database, and
(vii) transmit a signal indicating that the received token key value and the personal identification number value match the verified token key value and the verified personal identification number value in the registered user database. 2. The system of claim 1, wherein the biometric information comprises a fingerprint of the user and the point of sale device comprises at least one of a merchant point of sale device and an automated teller machine device. 3. The system of claim 1, wherein the biometric information comprises a plurality of fingerprints of the user. 4. The system of claim 1, wherein the encryption algorithm is executed such that the biometric information read from the user cannot be determined from the token key value. 5. The system of claim 1, wherein the personal identification number value comprises 4 digits and the token key value comprises an alpha-numeric series associated with a tokenization algorithm. 6. The system of claim 1, wherein the biometric information comprises at least one of: facial information, retina information, DNA information, palm print data, hand geometry information, iris recognition data, and voice data. 7. The system of claim 1, wherein the point of sale device is associated with at least one of: (i) a touchscreen, (ii) a computer mouse, and (iii) a television controller. 8. The system of claim 1, wherein, prior to said receiving, the user is registered with the authentication server, including the establishment and storage of the verified token key value and the associated verified personal identification number value in connection with a payment account. 9. The system of claim 8, wherein the payment account is associated with at least one of: (i) a credit card account, (ii) a debit card account, (iii) an electronic wallet, and (iv) a pre-paid payment account. 10. The system of claim 8, wherein said establishment is performed via a smartphone application or any other device able to capture biometric data. 11. A computer-implemented method, comprising:
reading, by a point of sale device, biometric information of the user; executing, by the point of sale device, an encryption algorithm on the biometric information read from the user to create a token key value; receiving, by the point of sale device from the user, a personal identification number value; transmitting the token key value and the personal identification number value from the point of sale device to an authentication server; receiving the token key value and the personal identification number value at the authentication server; determining that the received token key value and the personal identification number value match a verified token key value and a verified personal identification number value in a registered user database; and transmitting a signal, from the authentication server to the point of sale device, indicating that the received token key value and the personal identification number value match the verified token key value and the verified personal identification number value in the registered user database. 12. The method of claim 11, wherein the biometric information comprises a fingerprint of the user and the point of sale device comprises at least one of a merchant point of sale device and an automated teller machine device. 13. The method of claim 11, wherein the biometric information comprises a plurality of fingerprints of the user. 14. The method of claim 11, wherein the encryption algorithm is executed such that the biometric information read from the user cannot be determined from the token key value. 15. The method of claim 11, wherein the personal identification number value comprises 4 digits and the token key value comprises an alpha-numeric series associated with a tokenization algorithm. 16. The method of claim 11, wherein the biometric information comprises at least one of: facial information, retina information, DNA information, palm print data, hand geometry information, iris recognition data, and voice data. 17. The method of claim 11, wherein the point of sale device is associated with at least one of: (i) a touchscreen, (ii) a computer mouse, and (iii) a television controller. 18. The method of claim 11, wherein, prior to said receiving, the user is registered with the authentication server, including the establishment and storage of the verified token key value and the associated verified personal identification number value in connection with a payment account. 19. The method of claim 18, wherein the payment account is associated with at least one of: (i) a credit card account, (ii) a debit card account, (iii) an electronic wallet, and (iv) a pre-paid payment account. 20. The method of claim 18, wherein said establishment is performed via a smartphone application or any other device able to capture biometric data. | 3,600 |
13,474 | 13,474 | 13,803,215 | 3,682 | A vehicle computer system comprising a receiver configured to wirelessly receive an advertisement, the advertisement including two or more ad components for output to a user, the receiver further configured to communicate the advertisement to a processor. The processor is configured to receive contextual data representative of a vehicle's environment from one or more data sources, output the advertisement and a first set of ad components to the user based on the contextual data, the first set of ad components including a request to interact with the user, receive an input from a user corresponding to the first set of ad components, and output a second set of ad components based on the input received from the user. | 1. A vehicle computer system comprising:
a receiver configured to wirelessly receive an advertisement, the advertisement including two or more ad components for output to a user, the receiver further configured to communicate the advertisement to a processor, the processor configured to: receive contextual data representative of a vehicle's environment from one or more data sources; output the advertisement and a first set of ad components to the user based on the contextual data, the first set of ad components including a request to interact with the user; receive an input from a user corresponding to the first set of ad components; and output a second set of ad components based on the input received from the user. 2. The vehicle computer system of claim 1, wherein the processor is further configured to send contextual data to a server via a transceiver. 3. The vehicle computer system of claim 2, wherein the transceiver is a wireless communication module connected to a mobile device. 4. The vehicle computer system of claim 2, wherein the contextual data is representative of the vehicle environment near a time the advertisement is output. 5. The vehicle computer system of claim 2, wherein the transceiver is further configured to send a user profile including information related to the user to a server, and receive the advertisement including one or more ad components based on the user profile. 6. The vehicle computer system of claim 1, wherein the input from a user corresponding to the one or more ad components is verbal. 7. The vehicle computer system of claim 1, wherein the input from a user corresponding to the one or more ad components is an electromechanical input. 8. The vehicle computer system of claim 1, wherein the advertisement including the one or more ad components includes sound, text, image, or video. 9. The vehicle computer system of claim 1, wherein the receiver is configured to receive the advertisement via an in-band on-channel broadcast. 10. The vehicle computer system of claim 1, wherein processor is further configured to output the advertisement and the first set of ad components to the user at a time determined based upon a workload value. 11. The vehicle computer system of claim 1, wherein processor is further configured to output the advertisement and the first set of ad components to the user based upon a user profile that includes information about the user. 12. The vehicle computer system of claim 11, wherein the user profile includes data indicating demographics information related to the user. 13. An advertisement server comprising:
a transceiver configured to receive vehicle contextual data from a vehicle, the contextual data including information related to a vehicle environment; and a processor configured to:
select an advertisement including one or more ad components based on the contextual data, wherein the one or more ad components include a request to interact with a user; and
transmit the advertisement to the vehicle using a wireless transmitter. 14. The advertisement server of claim 13, wherein the advertisement is transmitted to the vehicle using a broadcaster. 15. The advertisement server of claim 13, wherein the processor is further configured to select the advertisement including one or more ad components based on an analytics engine configured to determine a user's preference. 16. The advertisement server of claim 13, wherein the transceiver is further configured to receive user profile data from the vehicle, the user profile data including information related to demographic information of the user. 17. The advertisement server of claim 13, wherein the advertisement further includes one or more attributes related to a characteristic associated with the advertisement, wherein the attributes are configured to facilitate output of the advertisement during a driving scenario correlated to the attributes. 18. A method of vehicle advertising, comprising:
receiving an advertisement wirelessly including a plurality of ad components; receiving contextual data representative of a vehicle's environment; outputting based on the contextual data the advertisement and a first set of ad components including an input request; receiving a input from a user in response to the input request; and outputting a second set of ad components based on the input. 19. The method of claim 18, the method further including the step of sending contextual data to a server. 20. The method of claim 19, the sending of contextual data to a server is via a wireless communication module connected to a mobile device. | A vehicle computer system comprising a receiver configured to wirelessly receive an advertisement, the advertisement including two or more ad components for output to a user, the receiver further configured to communicate the advertisement to a processor. The processor is configured to receive contextual data representative of a vehicle's environment from one or more data sources, output the advertisement and a first set of ad components to the user based on the contextual data, the first set of ad components including a request to interact with the user, receive an input from a user corresponding to the first set of ad components, and output a second set of ad components based on the input received from the user.1. A vehicle computer system comprising:
a receiver configured to wirelessly receive an advertisement, the advertisement including two or more ad components for output to a user, the receiver further configured to communicate the advertisement to a processor, the processor configured to: receive contextual data representative of a vehicle's environment from one or more data sources; output the advertisement and a first set of ad components to the user based on the contextual data, the first set of ad components including a request to interact with the user; receive an input from a user corresponding to the first set of ad components; and output a second set of ad components based on the input received from the user. 2. The vehicle computer system of claim 1, wherein the processor is further configured to send contextual data to a server via a transceiver. 3. The vehicle computer system of claim 2, wherein the transceiver is a wireless communication module connected to a mobile device. 4. The vehicle computer system of claim 2, wherein the contextual data is representative of the vehicle environment near a time the advertisement is output. 5. The vehicle computer system of claim 2, wherein the transceiver is further configured to send a user profile including information related to the user to a server, and receive the advertisement including one or more ad components based on the user profile. 6. The vehicle computer system of claim 1, wherein the input from a user corresponding to the one or more ad components is verbal. 7. The vehicle computer system of claim 1, wherein the input from a user corresponding to the one or more ad components is an electromechanical input. 8. The vehicle computer system of claim 1, wherein the advertisement including the one or more ad components includes sound, text, image, or video. 9. The vehicle computer system of claim 1, wherein the receiver is configured to receive the advertisement via an in-band on-channel broadcast. 10. The vehicle computer system of claim 1, wherein processor is further configured to output the advertisement and the first set of ad components to the user at a time determined based upon a workload value. 11. The vehicle computer system of claim 1, wherein processor is further configured to output the advertisement and the first set of ad components to the user based upon a user profile that includes information about the user. 12. The vehicle computer system of claim 11, wherein the user profile includes data indicating demographics information related to the user. 13. An advertisement server comprising:
a transceiver configured to receive vehicle contextual data from a vehicle, the contextual data including information related to a vehicle environment; and a processor configured to:
select an advertisement including one or more ad components based on the contextual data, wherein the one or more ad components include a request to interact with a user; and
transmit the advertisement to the vehicle using a wireless transmitter. 14. The advertisement server of claim 13, wherein the advertisement is transmitted to the vehicle using a broadcaster. 15. The advertisement server of claim 13, wherein the processor is further configured to select the advertisement including one or more ad components based on an analytics engine configured to determine a user's preference. 16. The advertisement server of claim 13, wherein the transceiver is further configured to receive user profile data from the vehicle, the user profile data including information related to demographic information of the user. 17. The advertisement server of claim 13, wherein the advertisement further includes one or more attributes related to a characteristic associated with the advertisement, wherein the attributes are configured to facilitate output of the advertisement during a driving scenario correlated to the attributes. 18. A method of vehicle advertising, comprising:
receiving an advertisement wirelessly including a plurality of ad components; receiving contextual data representative of a vehicle's environment; outputting based on the contextual data the advertisement and a first set of ad components including an input request; receiving a input from a user in response to the input request; and outputting a second set of ad components based on the input. 19. The method of claim 18, the method further including the step of sending contextual data to a server. 20. The method of claim 19, the sending of contextual data to a server is via a wireless communication module connected to a mobile device. | 3,600 |
13,475 | 13,475 | 12,773,282 | 3,628 | A computer-implemented method and system for ancillary travel vendor fee expense management comprising: receiving, by at least one expense management application, travel expense transaction data, said travel expense transaction data further comprising at least one expense transaction attribute; generating, by the at least one expense management application, at least one travel expense transaction record, wherein said at least one travel expense transaction record includes said expense transaction data, and storing said at least one expense transaction record in an expense transaction database; determining, by at least one ancillary fee module which analyzes the at least one expense transaction attribute, whether the at least one expense transaction corresponds to a travel event, a fee for an ancillary good or service offered by a travel vendor, or a fee for an ancillary good or service offered by a travel agency; presenting the at least one expense transaction record on a computerized user interface contained within at least one expense management application, wherein it is indicated whether the at least one expense transaction is at least one ancillary fee; and, adding the at least one expense transaction record to an expense report. | 1. A computer-implemented method of ancillary travel vendor fee expense management comprising:
receiving, by at least one expense management application, travel expense transaction data, said travel expense transaction data further comprising at least one expense transaction attribute; generating, by the at least one expense management application, at least one travel expense transaction record, wherein said at least one travel expense transaction record includes said expense transaction data, and storing said at least one expense transaction record in an expense transaction database; determining, by at least one ancillary fee, module which analyzes the at least one expense transaction attribute, whether the at least one expense transaction corresponds to a travel event, a fee for an ancillary good or service offered by a travel vendor, or a fee for an ancillary good or service offered by a travel agency; presenting the at least one expense transaction record on a computerized user interface contained within at least one expense management application, wherein it is indicated whether the at least one expense transaction is at least one ancillary fee adding the at least one expense transaction record to an expense report. 2. The method of claim 1, wherein the travel expense transaction data comprises:
credit card data; transaction data obtained directly from a travel vendor; receipts obtained directly from a travel vendor; data manually entered into an expense reporting application; transaction data obtained from a travel agency; or transaction data obtained from an airline transaction settlement organization; 3. The method of claim 1, wherein the travel expense transaction attribute comprises:
merchant information; purchase date information; date of travel information; cost information; a travel event type; a description of an ancillary good or service purchased; a code identifying an ancillary good or service purchased; travel route, or other geographical information appropriate to the type of travel; or any combination thereof. 4. The method of claim 3, wherein the travel event type comprises:
air travel; rental transportation; limousine service; hotel; train service; a travel booking fee; or any combination thereof. 5. The method of claim 3, wherein the ancillary good or service purchased comprises:
checking baggage; seat assignment; frequent traveler miles or points; access to an airline club or lounge; use of a pillow or blanket during a flight; ability to store carry-on baggage in the overhead compartment in an airplane; or food or beverage; or any combination thereof. 6. The method of claim 3, wherein the merchant information comprises:
Merchant Category Code (MCC); Standard Industrial Classification (SIC) code; North American Industry Classification System (NAICS) code; merchant name; merchant address; merchant telephone number; merchant fax number; merchant web site address; an industry standard code identifying a type of merchant or a specific merchant; or any combination thereof. 7. The method of claim 1 wherein the at least one ancillary fee module determines that the at least one expense transaction is more likely to correspond to an ancillary good or service if the purchase amount of the at least one expense transaction is at or below a pre-determined threshold. 8. The method of claim 1 further comprising: comparing, by the at least one ancillary fee module, the amount and the vendor of the at least one expense transaction record to a list of vendors, the ancillary goods and services offered by the vendors, and the fees known to be charged for each ancillary good and service, to better determine the likelihood that the at least one expense transaction corresponds to an ancillary good or service. 9. The method of claim 1 wherein an entity is able to track:
total amount spent for each type of ancillary good or service;
total amount spent with travel vendor for each type of ancillary good or service;
or any combination thereof; 10. The method of claim 1 further comprising:
receiving, by at least one server module, travel request data and/or travel reservation data corresponding to at least one travel event type, said request and/or reservation data further including travel request and/or reservation attributes comprising at least one of: a travel event time, a travel event type, an identifier for a travel vendor, a frequent traveler affinity program code, cost information for the at least one travel event, ticket number information for the at least one travel event, confirmation number information for the at least one travel event, an identifier representing the traveler, or any combination thereof;
generating, by the at least one server module, at least one travel request record, wherein at least one travel record includes said travel request and/or travel reservation information and storing said at least one travel request record in a travel request database;
determining, by at least one matching module, that at least one expense transaction record corresponds to the purchase of the travel event requested in the at least one travel request record;
transmitting to the at least one ancillary fee module the at least one travel request record and the at least one expense record that were determined to match as at least one combined travel and expense data record;
wherein the at least one ancillary fee module utilizes the at least one combined travel and expense data record to improve the determination as to whether at least one additional expense transaction corresponds to a travel event, a fee for an ancillary good or service offered by a travel vendor, or a fee for an ancillary good or service offered by a travel agency. 11. The method of claim 10 further comprising:
presenting the at least one combined travel and expense data record on a computerized user interface contained within at least one expense management application;
receiving, by the at least one expense management application, a user selection confirming that the at least one travel request record and the at least one expense transaction record matched by the at least one matching module do in fact correspond; and
adding the at least one combined travel and expense data record to an expense report as an expense item which comprises both the travel and expense data; 12. The method of claim 10, wherein the at least one ancillary fee module determines that the at least one additional expense transaction is more likely to correspond to an ancillary good or service if the purchase date of the at least one additional expense transaction matches or nearly matches the date of travel of the at least one combined travel and expense data record. 13. The method of claim 10, wherein the at least one ancillary fee module determines that the at least one additional expense transaction is more likely to correspond to an ancillary good or service if the one or more attributes of the at least one additional expense transaction matches or nearly matches at least one attribute of the purchase date of the at least one additional expense transaction matches or nearly matches the date of travel of the at least one combined travel and expense data record. 14. The method of claim 10 wherein an entity is able to track:
total amount spent by geographic region for each type of ancillary good or service;
total amount spent by origination and destination city for each type of ancillary good or service;
or any combination thereof; 15. The method of claim 1 wherein an entity is able to configure the expense reporting system to have policies that determine the maximum amount that an individual traveler may spend on a specific type of ancillary good or services, and wherein the expense reporting system may require approval for an expense report, or prevent submission of an expense report, if a user creates an expense report that would be in violation of these policies. 16. A computerized system for ancillary travel vendor fee expense management comprising:
at least one application configured to operate on at least one computer, the at least one application capable of: receiving, by at least one expense management application, travel expense transaction data, said travel expense transaction data further comprising at least one expense transaction attribute; generating, by the at least one expense management application, at least one travel expense transaction record, wherein said at least one travel expense transaction record includes said expense transaction data, and storing said at least one expense transaction record in an expense transaction database; determining, by at least one ancillary fee module which analyzes the at least one expense transaction attribute, whether the at least one expense transaction corresponds to a travel event, a fee for an ancillary good or service offered by a travel vendor, or a fee for an ancillary good or service offered by a travel agency; wherein the at least one expense transaction indicates whether the at least one expense transaction is at least one ancillary fee; adding the at least one expense transaction record to an expense report. 17. The system of claim 16 wherein the application is further configured for:
receiving, by at least one expense management application, travel request data and/or travel reservation data corresponding to at least one travel event type, said request and/or reservation data further including travel request and/or reservation attributes comprising at least one of: a travel event time, a travel event type, an identifier for a travel vendor, a frequent traveler affinity program code, cost information for the at least one travel event, ticket number information for the at least one travel event, confirmation number information for the at least one travel event, an identifier representing the traveler, or any combination thereof;
generating, by the at least one expense management application, at least one travel request record, wherein at least one travel record includes said travel request and/or travel reservation information and storing said at least one travel request record in a travel request database;
determining, by at least one matching module, that at least one expense transaction record corresponds to the purchase of the travel event requested in the at least one travel request record;
transmitting to the at least one ancillary fee module the at least one travel request record and the at least one expense record that were determined to match as at least one combined travel and expense data record;
wherein the at least one ancillary fee module utilizes the at least one combined travel and expense data record to improve the determination as to whether at least one additional expense transaction corresponds to a travel event, a fee for an ancillary good or service offered by a travel vendor, or a fee for an ancillary good or service offered by a travel agency. 18. The system of claim 17 wherein the application is further configured for:
presenting the at least one combined travel and expense data record on a computerized user interface contained within at least one expense management application;
receiving, by the at least one expense management application, a user selection confirming that the at least one travel request record and the at least one expense transaction record matched by the at least one matching module do in fact correspond; and
adding the at least one combined travel and expense data record to an expense report as an expense item which comprises both the travel and expense data. 19. The method of claim 1, wherein a list of possible types of ancillary goods and services, with a specific type of ancillary good or service pre-selected if the ancillary fee module determines the most likely type of ancillary good or service. 20. The system of claim 16, wherein a list of possible types of ancillary goods and services, with a specific type of ancillary good or service pre-selected if the ancillary fee module determine the most likely type of ancillary good or service. 21. The method of claim 7, wherein the pre-determined threshold may vary by travel vendor and/or dates of travel. 22. The method of claim 1, wherein the ancillary fee module analyzes the expense records on submitted expense reports corresponding to fees for ancillary goods or services to determine when vendors change the fees or add new fees for ancillary goods or services, and then adjusts internal rules based on this data to improve the determination of whether expenses correspond to fees for ancillary goods or services. 23. The method of claim 1, wherein after adding the at least one expense transaction to an expense report; at least one policy module determines whether any of the expenses on the expense report which correspond to fees for ancillary goods or services are in violation of company policies. 24. The method of claim 23, wherein the at least one client module presents any violations of company policies on a computerized user interface. 25. The method of claim 23, wherein any violations of company policies are transmitted to the at least one server module for storage along with the expense report in an expense reporting database. | A computer-implemented method and system for ancillary travel vendor fee expense management comprising: receiving, by at least one expense management application, travel expense transaction data, said travel expense transaction data further comprising at least one expense transaction attribute; generating, by the at least one expense management application, at least one travel expense transaction record, wherein said at least one travel expense transaction record includes said expense transaction data, and storing said at least one expense transaction record in an expense transaction database; determining, by at least one ancillary fee module which analyzes the at least one expense transaction attribute, whether the at least one expense transaction corresponds to a travel event, a fee for an ancillary good or service offered by a travel vendor, or a fee for an ancillary good or service offered by a travel agency; presenting the at least one expense transaction record on a computerized user interface contained within at least one expense management application, wherein it is indicated whether the at least one expense transaction is at least one ancillary fee; and, adding the at least one expense transaction record to an expense report.1. A computer-implemented method of ancillary travel vendor fee expense management comprising:
receiving, by at least one expense management application, travel expense transaction data, said travel expense transaction data further comprising at least one expense transaction attribute; generating, by the at least one expense management application, at least one travel expense transaction record, wherein said at least one travel expense transaction record includes said expense transaction data, and storing said at least one expense transaction record in an expense transaction database; determining, by at least one ancillary fee, module which analyzes the at least one expense transaction attribute, whether the at least one expense transaction corresponds to a travel event, a fee for an ancillary good or service offered by a travel vendor, or a fee for an ancillary good or service offered by a travel agency; presenting the at least one expense transaction record on a computerized user interface contained within at least one expense management application, wherein it is indicated whether the at least one expense transaction is at least one ancillary fee adding the at least one expense transaction record to an expense report. 2. The method of claim 1, wherein the travel expense transaction data comprises:
credit card data; transaction data obtained directly from a travel vendor; receipts obtained directly from a travel vendor; data manually entered into an expense reporting application; transaction data obtained from a travel agency; or transaction data obtained from an airline transaction settlement organization; 3. The method of claim 1, wherein the travel expense transaction attribute comprises:
merchant information; purchase date information; date of travel information; cost information; a travel event type; a description of an ancillary good or service purchased; a code identifying an ancillary good or service purchased; travel route, or other geographical information appropriate to the type of travel; or any combination thereof. 4. The method of claim 3, wherein the travel event type comprises:
air travel; rental transportation; limousine service; hotel; train service; a travel booking fee; or any combination thereof. 5. The method of claim 3, wherein the ancillary good or service purchased comprises:
checking baggage; seat assignment; frequent traveler miles or points; access to an airline club or lounge; use of a pillow or blanket during a flight; ability to store carry-on baggage in the overhead compartment in an airplane; or food or beverage; or any combination thereof. 6. The method of claim 3, wherein the merchant information comprises:
Merchant Category Code (MCC); Standard Industrial Classification (SIC) code; North American Industry Classification System (NAICS) code; merchant name; merchant address; merchant telephone number; merchant fax number; merchant web site address; an industry standard code identifying a type of merchant or a specific merchant; or any combination thereof. 7. The method of claim 1 wherein the at least one ancillary fee module determines that the at least one expense transaction is more likely to correspond to an ancillary good or service if the purchase amount of the at least one expense transaction is at or below a pre-determined threshold. 8. The method of claim 1 further comprising: comparing, by the at least one ancillary fee module, the amount and the vendor of the at least one expense transaction record to a list of vendors, the ancillary goods and services offered by the vendors, and the fees known to be charged for each ancillary good and service, to better determine the likelihood that the at least one expense transaction corresponds to an ancillary good or service. 9. The method of claim 1 wherein an entity is able to track:
total amount spent for each type of ancillary good or service;
total amount spent with travel vendor for each type of ancillary good or service;
or any combination thereof; 10. The method of claim 1 further comprising:
receiving, by at least one server module, travel request data and/or travel reservation data corresponding to at least one travel event type, said request and/or reservation data further including travel request and/or reservation attributes comprising at least one of: a travel event time, a travel event type, an identifier for a travel vendor, a frequent traveler affinity program code, cost information for the at least one travel event, ticket number information for the at least one travel event, confirmation number information for the at least one travel event, an identifier representing the traveler, or any combination thereof;
generating, by the at least one server module, at least one travel request record, wherein at least one travel record includes said travel request and/or travel reservation information and storing said at least one travel request record in a travel request database;
determining, by at least one matching module, that at least one expense transaction record corresponds to the purchase of the travel event requested in the at least one travel request record;
transmitting to the at least one ancillary fee module the at least one travel request record and the at least one expense record that were determined to match as at least one combined travel and expense data record;
wherein the at least one ancillary fee module utilizes the at least one combined travel and expense data record to improve the determination as to whether at least one additional expense transaction corresponds to a travel event, a fee for an ancillary good or service offered by a travel vendor, or a fee for an ancillary good or service offered by a travel agency. 11. The method of claim 10 further comprising:
presenting the at least one combined travel and expense data record on a computerized user interface contained within at least one expense management application;
receiving, by the at least one expense management application, a user selection confirming that the at least one travel request record and the at least one expense transaction record matched by the at least one matching module do in fact correspond; and
adding the at least one combined travel and expense data record to an expense report as an expense item which comprises both the travel and expense data; 12. The method of claim 10, wherein the at least one ancillary fee module determines that the at least one additional expense transaction is more likely to correspond to an ancillary good or service if the purchase date of the at least one additional expense transaction matches or nearly matches the date of travel of the at least one combined travel and expense data record. 13. The method of claim 10, wherein the at least one ancillary fee module determines that the at least one additional expense transaction is more likely to correspond to an ancillary good or service if the one or more attributes of the at least one additional expense transaction matches or nearly matches at least one attribute of the purchase date of the at least one additional expense transaction matches or nearly matches the date of travel of the at least one combined travel and expense data record. 14. The method of claim 10 wherein an entity is able to track:
total amount spent by geographic region for each type of ancillary good or service;
total amount spent by origination and destination city for each type of ancillary good or service;
or any combination thereof; 15. The method of claim 1 wherein an entity is able to configure the expense reporting system to have policies that determine the maximum amount that an individual traveler may spend on a specific type of ancillary good or services, and wherein the expense reporting system may require approval for an expense report, or prevent submission of an expense report, if a user creates an expense report that would be in violation of these policies. 16. A computerized system for ancillary travel vendor fee expense management comprising:
at least one application configured to operate on at least one computer, the at least one application capable of: receiving, by at least one expense management application, travel expense transaction data, said travel expense transaction data further comprising at least one expense transaction attribute; generating, by the at least one expense management application, at least one travel expense transaction record, wherein said at least one travel expense transaction record includes said expense transaction data, and storing said at least one expense transaction record in an expense transaction database; determining, by at least one ancillary fee module which analyzes the at least one expense transaction attribute, whether the at least one expense transaction corresponds to a travel event, a fee for an ancillary good or service offered by a travel vendor, or a fee for an ancillary good or service offered by a travel agency; wherein the at least one expense transaction indicates whether the at least one expense transaction is at least one ancillary fee; adding the at least one expense transaction record to an expense report. 17. The system of claim 16 wherein the application is further configured for:
receiving, by at least one expense management application, travel request data and/or travel reservation data corresponding to at least one travel event type, said request and/or reservation data further including travel request and/or reservation attributes comprising at least one of: a travel event time, a travel event type, an identifier for a travel vendor, a frequent traveler affinity program code, cost information for the at least one travel event, ticket number information for the at least one travel event, confirmation number information for the at least one travel event, an identifier representing the traveler, or any combination thereof;
generating, by the at least one expense management application, at least one travel request record, wherein at least one travel record includes said travel request and/or travel reservation information and storing said at least one travel request record in a travel request database;
determining, by at least one matching module, that at least one expense transaction record corresponds to the purchase of the travel event requested in the at least one travel request record;
transmitting to the at least one ancillary fee module the at least one travel request record and the at least one expense record that were determined to match as at least one combined travel and expense data record;
wherein the at least one ancillary fee module utilizes the at least one combined travel and expense data record to improve the determination as to whether at least one additional expense transaction corresponds to a travel event, a fee for an ancillary good or service offered by a travel vendor, or a fee for an ancillary good or service offered by a travel agency. 18. The system of claim 17 wherein the application is further configured for:
presenting the at least one combined travel and expense data record on a computerized user interface contained within at least one expense management application;
receiving, by the at least one expense management application, a user selection confirming that the at least one travel request record and the at least one expense transaction record matched by the at least one matching module do in fact correspond; and
adding the at least one combined travel and expense data record to an expense report as an expense item which comprises both the travel and expense data. 19. The method of claim 1, wherein a list of possible types of ancillary goods and services, with a specific type of ancillary good or service pre-selected if the ancillary fee module determines the most likely type of ancillary good or service. 20. The system of claim 16, wherein a list of possible types of ancillary goods and services, with a specific type of ancillary good or service pre-selected if the ancillary fee module determine the most likely type of ancillary good or service. 21. The method of claim 7, wherein the pre-determined threshold may vary by travel vendor and/or dates of travel. 22. The method of claim 1, wherein the ancillary fee module analyzes the expense records on submitted expense reports corresponding to fees for ancillary goods or services to determine when vendors change the fees or add new fees for ancillary goods or services, and then adjusts internal rules based on this data to improve the determination of whether expenses correspond to fees for ancillary goods or services. 23. The method of claim 1, wherein after adding the at least one expense transaction to an expense report; at least one policy module determines whether any of the expenses on the expense report which correspond to fees for ancillary goods or services are in violation of company policies. 24. The method of claim 23, wherein the at least one client module presents any violations of company policies on a computerized user interface. 25. The method of claim 23, wherein any violations of company policies are transmitted to the at least one server module for storage along with the expense report in an expense reporting database. | 3,600 |
13,476 | 13,476 | 14,962,529 | 3,686 | To create a patient care plan for a target patient, inputs ( 66, 68, 70, 72 ) related to one or more social services ( 54 ) and one or more medical services ( 52 ) that are each associated with target data are received. One or more social and medical services ( 52, 54 ) are selected based on a target patient assessment. A net care benefit is calculated for each of the selected services ( 52, 54 ). An outcome patient care plan ( 106 ) is created from outcomes ( 92 ) including the selected services ( 52, 54 ) with a highest net care benefit. | 1. A method for creating a patient care plan for a target patient, the method including:
receiving inputs related to one or more social services and one or more medical services that are each associated with target patient data; selecting one or more social and medical services based on a target assessment; calculating a net care benefit for each of the selected services; creating a patient care plan from outcomes including the selected services with a highest net care benefit. 2. The method according to claim 1, further including:
selecting the most cost-effective services for the patient care plan. 3. The method according to claim 1, wherein calculating the net care benefit for each of the selected services includes:
calculating the net care benefit as a function of ability-to-pay, including indicating at least one service that results in a high net care benefit over a target's ability-to-pay. 4. The method according to claim 1, further including:
estimating at least one of medical benefits, resource consumption, and service costs for each of the selected medical and social services. 5. The method according to claim 1, wherein estimation at least one of medical effects, resource consumption, and service costs for each of the selected services further includes:
retrieving historical target data including medical outcomes and costs for a population of targets who underwent each service. 6. The method according to claim 1, further including:
translating the inputs into one or more profiles; and generating a general service plan from the one or more profiles that corresponds to the selected medical and social services of the population of target patients including one or more selected medical and social services outcomes. 7. The method according to claim 1, further including:
translating the general service plan into one or more statuses; generating a personalized service plan from one or more status vectors for the target patient including one or more medical and social services outcomes. 8. The method according to claim 1, further including:
continuously monitoring a profile and a status of the target during implementation of the patient care plan; and updating the patient care plan to achieve a highest net care benefit. 9. The method according to claim 1, further including:
translating each of the selected medical and social services into a service status; and creating the patient care plan from scores calculated from the service statuses of the medical services and the social services and a reference status of the medical services and the social services of the population of target patients. 10. The method according to claim 1, further including:
classifying each of the scores. 11. The method according to claim 1, wherein:
the medical services are selected from the group including inpatient clinic services, outpatient clinic services, primary care, rehabilitation services, mental medical services, and palliative care; and the social services are selected from a group including financial assistance services, housing services, personal care services, psychological support services, patient group services, social activities services, dietary support services, employment services, income services, legal services, transportation and mobility services, care management services, home care services, information and assistance services, long-term care services, nutrition and meals services, respite services, senior services, volunteer and intergenerational services, and wellness and well-being services. 12. A patient care plan system, including:
one or more processors programmed to perform the method according to claim 1; and a display for displaying the inputs and the created patient care plan. 13. The patient care plan system according to claim 12, wherein the at least one processor is further programmed to create a patient care plan with the highest net care benefit from each of the selected services; and wherein
the medical services are selected from the group including inpatient clinic services, specialized outpatient clinic services, rehabilitation services, mental medical services, and palliative care; and the social services are selected from the group including employment services, income services, legal services, transportation and mobility services, care management services, home care services, information and assistance services, long-term care services, nutrition and meals services, respite services, senior services, volunteer and intergenerational services, and wellness and well-being services. 14. The patient care plan system according to claim 12, wherein the one or more processors are further programmed to:
translate the inputs into one or more profiles; generate a general service plan from the one or more profiles that corresponds to the selected medical and social services of the population of target patients including one or more outcome medical and social services; translate the general service plan into one or more statuses; generate a personalized service plan from the one or more statuses for the target including one or more outcome medical and social services. 15. The patient care plan system according to claim 12, wherein the one or more processors are further programmed to:
continuously monitor a profile and a status of the target patient during implementation of the patient care plan; and update the patient care plan to achieve the highest net care benefit. 16. The patient care plan system according to claim 12, wherein the one or more processors are further programmed to:
translate each of the selected medical and social services into a service status; and create the patient care plan from scores calculated from the service statuses of the medical services and the social services and a reference status of the medical services and the social services of the population of target patients. 17. A patient care plan system including means for performing the method according to claim 1. 18. The patient care plan system according to claim 17, wherein the means further creates a patient care plan with the highest net care benefit from each of the selected services; and wherein
the medical services are selected from the group including inpatient clinic services, specialized outpatient clinic services, rehabilitation services, mental medical services, and palliative care; and the social services are selected from the group including employment services, income services, legal services, transportation and mobility services, care management services, home care services, information and assistance services, long-term care services, nutrition and meals services, respite services, senior services, volunteer and intergenerational services, and wellness and well-being services. 19. The patient care plan system according to claim 17, wherein the means further translates the inputs into one or more profile vectors;
generates a general service plan from the one or more profile vectors that corresponds to the selected medical and social services of the population of targets including one or more medical and social service outcomes; translate the general service plan into one or more status vectors; generate a personalized service plan from the one or more status vectors for the target including one or more medical and social service outcomes. 20. The patient care plan system according to claim 17, wherein the means is further programmed to:
translate each of the medical and social services into a service status; and create the patient care plan from scores calculated from the service statuses of the medical services and the social services and a reference status of the medical services and the social services of the population of target patients. | To create a patient care plan for a target patient, inputs ( 66, 68, 70, 72 ) related to one or more social services ( 54 ) and one or more medical services ( 52 ) that are each associated with target data are received. One or more social and medical services ( 52, 54 ) are selected based on a target patient assessment. A net care benefit is calculated for each of the selected services ( 52, 54 ). An outcome patient care plan ( 106 ) is created from outcomes ( 92 ) including the selected services ( 52, 54 ) with a highest net care benefit.1. A method for creating a patient care plan for a target patient, the method including:
receiving inputs related to one or more social services and one or more medical services that are each associated with target patient data; selecting one or more social and medical services based on a target assessment; calculating a net care benefit for each of the selected services; creating a patient care plan from outcomes including the selected services with a highest net care benefit. 2. The method according to claim 1, further including:
selecting the most cost-effective services for the patient care plan. 3. The method according to claim 1, wherein calculating the net care benefit for each of the selected services includes:
calculating the net care benefit as a function of ability-to-pay, including indicating at least one service that results in a high net care benefit over a target's ability-to-pay. 4. The method according to claim 1, further including:
estimating at least one of medical benefits, resource consumption, and service costs for each of the selected medical and social services. 5. The method according to claim 1, wherein estimation at least one of medical effects, resource consumption, and service costs for each of the selected services further includes:
retrieving historical target data including medical outcomes and costs for a population of targets who underwent each service. 6. The method according to claim 1, further including:
translating the inputs into one or more profiles; and generating a general service plan from the one or more profiles that corresponds to the selected medical and social services of the population of target patients including one or more selected medical and social services outcomes. 7. The method according to claim 1, further including:
translating the general service plan into one or more statuses; generating a personalized service plan from one or more status vectors for the target patient including one or more medical and social services outcomes. 8. The method according to claim 1, further including:
continuously monitoring a profile and a status of the target during implementation of the patient care plan; and updating the patient care plan to achieve a highest net care benefit. 9. The method according to claim 1, further including:
translating each of the selected medical and social services into a service status; and creating the patient care plan from scores calculated from the service statuses of the medical services and the social services and a reference status of the medical services and the social services of the population of target patients. 10. The method according to claim 1, further including:
classifying each of the scores. 11. The method according to claim 1, wherein:
the medical services are selected from the group including inpatient clinic services, outpatient clinic services, primary care, rehabilitation services, mental medical services, and palliative care; and the social services are selected from a group including financial assistance services, housing services, personal care services, psychological support services, patient group services, social activities services, dietary support services, employment services, income services, legal services, transportation and mobility services, care management services, home care services, information and assistance services, long-term care services, nutrition and meals services, respite services, senior services, volunteer and intergenerational services, and wellness and well-being services. 12. A patient care plan system, including:
one or more processors programmed to perform the method according to claim 1; and a display for displaying the inputs and the created patient care plan. 13. The patient care plan system according to claim 12, wherein the at least one processor is further programmed to create a patient care plan with the highest net care benefit from each of the selected services; and wherein
the medical services are selected from the group including inpatient clinic services, specialized outpatient clinic services, rehabilitation services, mental medical services, and palliative care; and the social services are selected from the group including employment services, income services, legal services, transportation and mobility services, care management services, home care services, information and assistance services, long-term care services, nutrition and meals services, respite services, senior services, volunteer and intergenerational services, and wellness and well-being services. 14. The patient care plan system according to claim 12, wherein the one or more processors are further programmed to:
translate the inputs into one or more profiles; generate a general service plan from the one or more profiles that corresponds to the selected medical and social services of the population of target patients including one or more outcome medical and social services; translate the general service plan into one or more statuses; generate a personalized service plan from the one or more statuses for the target including one or more outcome medical and social services. 15. The patient care plan system according to claim 12, wherein the one or more processors are further programmed to:
continuously monitor a profile and a status of the target patient during implementation of the patient care plan; and update the patient care plan to achieve the highest net care benefit. 16. The patient care plan system according to claim 12, wherein the one or more processors are further programmed to:
translate each of the selected medical and social services into a service status; and create the patient care plan from scores calculated from the service statuses of the medical services and the social services and a reference status of the medical services and the social services of the population of target patients. 17. A patient care plan system including means for performing the method according to claim 1. 18. The patient care plan system according to claim 17, wherein the means further creates a patient care plan with the highest net care benefit from each of the selected services; and wherein
the medical services are selected from the group including inpatient clinic services, specialized outpatient clinic services, rehabilitation services, mental medical services, and palliative care; and the social services are selected from the group including employment services, income services, legal services, transportation and mobility services, care management services, home care services, information and assistance services, long-term care services, nutrition and meals services, respite services, senior services, volunteer and intergenerational services, and wellness and well-being services. 19. The patient care plan system according to claim 17, wherein the means further translates the inputs into one or more profile vectors;
generates a general service plan from the one or more profile vectors that corresponds to the selected medical and social services of the population of targets including one or more medical and social service outcomes; translate the general service plan into one or more status vectors; generate a personalized service plan from the one or more status vectors for the target including one or more medical and social service outcomes. 20. The patient care plan system according to claim 17, wherein the means is further programmed to:
translate each of the medical and social services into a service status; and create the patient care plan from scores calculated from the service statuses of the medical services and the social services and a reference status of the medical services and the social services of the population of target patients. | 3,600 |
13,477 | 13,477 | 14,176,258 | 3,691 | A payment card that facilitates use of a plurality of bankcards of a customer, at a point of sale terminal has a payment card with a front side and a backside with a substrate, the substrate encodes a customer identifier as a payment card data that is without a bankcard data, and maps the customer to a plurality of bankcards data in a third party system database. The payment card is enabled to be used at a merchant point-of-sale (POS) terminal with a customer entered PIN, enabling the POS terminal to transfer a payment authorization request record incident to a sales transaction, from the POS to a merchant gateway for routing to a card-issuing banks, thereby enabling use of the payment card in lieu of the customer bankcards at the merchant POS terminal. | 1. A payment card system comprising:
a. a server system, that facilitates bankcard payment transactions to merchants, the system has a database server that stores pre-existing bankcard data of customers with at least one or more pre-stored bankcard data of the customer and the customer bankcard data in the database server is referenced by a unique customer identifier that does not identify a card-issuing bank; b. a payment card that is not a card-issuing bank issued bankcard and has an identification that references the unique customer identifier in the database server; c. the server is capable of receiving and receives merchant originated payment transaction request records identifying the unique customer identifier from the payment card; d. the server maps the unique customer identifier in the payment transaction record to the card-issuing bank's bankcard data from the database server and sends the payment transaction record for routing to a card-issuing bank for payment processing, thereby for merchants be able to process bankcard payment transactions without receiving bankcard data and thus avoid security risk inherent in safeguarding others' bankcard data. 2. The system as in claim 1 wherein:
the system owned and managed by third parties that are not merchants and card-issuing banks. 3. The system as in claim 1 wherein:
a. the server system receives the payment card originated records from a pre-existing router after the pre-existing router had received the payment transaction record from merchants; and
b. the pre-existing router had separated the payment card originated records from card-issuing-bank issued bankcards payment request records and forwards to the server system. 4. The system as in claim 1 wherein:
each customer has pre-stored in the database server at least one or more bankcard data. 5. The system as in claim 1 further comprising:
a. the database server associates a PIN with the unique customer identifier in the database server and thus the payment card;
b. the server system uses the PIN to verify a customer before mapping the unique customer identifier to the pre-existing bankcard data of the customer. 6. The system as in claim 5 further comprising:
the server system facilitates creation of the PIN and delivers the PIN to the customer. 7. The system as in claim 5 further comprising:
the PIN is required at the time of payment card use by the customer at the merchant sales transaction terminal and is used to verify the payment card owner to the server system, thus the system provides a PIN verification for bankcards that do not require a PIN. 8. The system as in claim 5 further comprising:
the server associates a different PIN for each bankcard and thus identifies which bankcard of the customer from a plurality of the bankcards including debit cards that is intended to be used for a specific sales transaction at the merchant by the customer. 9. The system as in claim 1 further comprising:
a. the server system aliases each bankcard data stored in the database server;
b. the server un-aliases each bankcard data retrieved from the database server when a payment card payment transaction record is received and deletes the un-aliased bankcard data when the payment transaction record with the bankcard data is sent to the card-issuing bank, thus providing added security for the protection of the bankcard data stored in the database server. 10. The system as in claim 9 further comprising:
the server system aliases each bankcard data when the bankcard data is received and before being stored in the database server. 11. A method for payment card system comprising the steps of:
a. facilitating by a server system, bankcard payment transactions to merchants, having by the system a database server that stores pre-existing bankcard data of customers with at least one or more pre-stored bankcard data of the customer and referencing the customer bankcard data in the database server by a unique customer identifier that does not identify a card-issuing bank; b. having a payment card that is not a card-issuing bank issued bankcard and having by the card an identification that references the unique customer identifier in the database server; c. receiving by the server merchant originated payment transaction request records identifying the unique customer identifier from the payment card; d. mapping by the server the unique customer identifier in the payment transaction record to the card-issuing bank's bankcard data from the database server and sending the payment transaction record for routing to a card-issuing bank for payment processing, thereby for merchants be able to process bankcard payment transactions without receiving bankcard data and thus avoid security risk inherent in safeguarding others' bankcard data. 12. The method as in claim 11 the steps of:
owning and managing the system owned by third parties that are not merchants and card-issuing banks. 13. The method as in claim 11 the steps of:
a. receiving by the server system the payment card originated records from a pre-existing router after the pre-existing router had received the payment transaction record from merchants; and
b. separating by the pre-existing router the payment card originated records from card-issuing-bank issued bankcards payment request records and forwards to the server system. 14. The method as in claim 11 the steps of:
pre-storing by each customer in the database server at least one or more bankcard data. 15. The method as in claim 11 further comprising the steps of:
a. associating by the database server a PIN with the unique customer identifier in the database server and thus the payment card;
b. using by the server system the PIN to verify a customer before mapping the unique customer identifier to the pre-existing bankcard data of the customer. 16. The method as in claim 15 further comprising the steps of:
facilitating by the server system creation of the PIN and delivers the PIN to the customer. 17. The method as in claim 15 further comprising the steps of:
requiring the PIN at the time of payment card use by the customer at the merchant sales transaction terminal and using to verify the payment card owner to the server system, thus the system provides a PIN verification for bankcards that do not require a PIN. 18. The method as in claim 15 further comprising the steps of:
associating by the server a different PIN for each bankcard and thus identifies which bankcard of the customer from a plurality of the bankcards including debit cards that is intended to be used for a specific sales transaction at the merchant by the customer. 19. The method as in claim 11 further comprising the steps of:
a. aliasing by the server system each bankcard data stored in the database server;
b. un-aliasing by the server each bankcard data retrieved from the database server when a payment card payment transaction record is received and deletes the un-aliased bankcard data when the payment transaction record with the bankcard data is sent to the card-issuing bank, thus providing added security for the protection of the bankcard data stored in the database server. 20. The method as in claim 17 further comprising the steps of:
aliasing by the server system each bankcard data when the bankcard data is received and before being stored in the database server. | A payment card that facilitates use of a plurality of bankcards of a customer, at a point of sale terminal has a payment card with a front side and a backside with a substrate, the substrate encodes a customer identifier as a payment card data that is without a bankcard data, and maps the customer to a plurality of bankcards data in a third party system database. The payment card is enabled to be used at a merchant point-of-sale (POS) terminal with a customer entered PIN, enabling the POS terminal to transfer a payment authorization request record incident to a sales transaction, from the POS to a merchant gateway for routing to a card-issuing banks, thereby enabling use of the payment card in lieu of the customer bankcards at the merchant POS terminal.1. A payment card system comprising:
a. a server system, that facilitates bankcard payment transactions to merchants, the system has a database server that stores pre-existing bankcard data of customers with at least one or more pre-stored bankcard data of the customer and the customer bankcard data in the database server is referenced by a unique customer identifier that does not identify a card-issuing bank; b. a payment card that is not a card-issuing bank issued bankcard and has an identification that references the unique customer identifier in the database server; c. the server is capable of receiving and receives merchant originated payment transaction request records identifying the unique customer identifier from the payment card; d. the server maps the unique customer identifier in the payment transaction record to the card-issuing bank's bankcard data from the database server and sends the payment transaction record for routing to a card-issuing bank for payment processing, thereby for merchants be able to process bankcard payment transactions without receiving bankcard data and thus avoid security risk inherent in safeguarding others' bankcard data. 2. The system as in claim 1 wherein:
the system owned and managed by third parties that are not merchants and card-issuing banks. 3. The system as in claim 1 wherein:
a. the server system receives the payment card originated records from a pre-existing router after the pre-existing router had received the payment transaction record from merchants; and
b. the pre-existing router had separated the payment card originated records from card-issuing-bank issued bankcards payment request records and forwards to the server system. 4. The system as in claim 1 wherein:
each customer has pre-stored in the database server at least one or more bankcard data. 5. The system as in claim 1 further comprising:
a. the database server associates a PIN with the unique customer identifier in the database server and thus the payment card;
b. the server system uses the PIN to verify a customer before mapping the unique customer identifier to the pre-existing bankcard data of the customer. 6. The system as in claim 5 further comprising:
the server system facilitates creation of the PIN and delivers the PIN to the customer. 7. The system as in claim 5 further comprising:
the PIN is required at the time of payment card use by the customer at the merchant sales transaction terminal and is used to verify the payment card owner to the server system, thus the system provides a PIN verification for bankcards that do not require a PIN. 8. The system as in claim 5 further comprising:
the server associates a different PIN for each bankcard and thus identifies which bankcard of the customer from a plurality of the bankcards including debit cards that is intended to be used for a specific sales transaction at the merchant by the customer. 9. The system as in claim 1 further comprising:
a. the server system aliases each bankcard data stored in the database server;
b. the server un-aliases each bankcard data retrieved from the database server when a payment card payment transaction record is received and deletes the un-aliased bankcard data when the payment transaction record with the bankcard data is sent to the card-issuing bank, thus providing added security for the protection of the bankcard data stored in the database server. 10. The system as in claim 9 further comprising:
the server system aliases each bankcard data when the bankcard data is received and before being stored in the database server. 11. A method for payment card system comprising the steps of:
a. facilitating by a server system, bankcard payment transactions to merchants, having by the system a database server that stores pre-existing bankcard data of customers with at least one or more pre-stored bankcard data of the customer and referencing the customer bankcard data in the database server by a unique customer identifier that does not identify a card-issuing bank; b. having a payment card that is not a card-issuing bank issued bankcard and having by the card an identification that references the unique customer identifier in the database server; c. receiving by the server merchant originated payment transaction request records identifying the unique customer identifier from the payment card; d. mapping by the server the unique customer identifier in the payment transaction record to the card-issuing bank's bankcard data from the database server and sending the payment transaction record for routing to a card-issuing bank for payment processing, thereby for merchants be able to process bankcard payment transactions without receiving bankcard data and thus avoid security risk inherent in safeguarding others' bankcard data. 12. The method as in claim 11 the steps of:
owning and managing the system owned by third parties that are not merchants and card-issuing banks. 13. The method as in claim 11 the steps of:
a. receiving by the server system the payment card originated records from a pre-existing router after the pre-existing router had received the payment transaction record from merchants; and
b. separating by the pre-existing router the payment card originated records from card-issuing-bank issued bankcards payment request records and forwards to the server system. 14. The method as in claim 11 the steps of:
pre-storing by each customer in the database server at least one or more bankcard data. 15. The method as in claim 11 further comprising the steps of:
a. associating by the database server a PIN with the unique customer identifier in the database server and thus the payment card;
b. using by the server system the PIN to verify a customer before mapping the unique customer identifier to the pre-existing bankcard data of the customer. 16. The method as in claim 15 further comprising the steps of:
facilitating by the server system creation of the PIN and delivers the PIN to the customer. 17. The method as in claim 15 further comprising the steps of:
requiring the PIN at the time of payment card use by the customer at the merchant sales transaction terminal and using to verify the payment card owner to the server system, thus the system provides a PIN verification for bankcards that do not require a PIN. 18. The method as in claim 15 further comprising the steps of:
associating by the server a different PIN for each bankcard and thus identifies which bankcard of the customer from a plurality of the bankcards including debit cards that is intended to be used for a specific sales transaction at the merchant by the customer. 19. The method as in claim 11 further comprising the steps of:
a. aliasing by the server system each bankcard data stored in the database server;
b. un-aliasing by the server each bankcard data retrieved from the database server when a payment card payment transaction record is received and deletes the un-aliased bankcard data when the payment transaction record with the bankcard data is sent to the card-issuing bank, thus providing added security for the protection of the bankcard data stored in the database server. 20. The method as in claim 17 further comprising the steps of:
aliasing by the server system each bankcard data when the bankcard data is received and before being stored in the database server. | 3,600 |
13,478 | 13,478 | 14,858,161 | 3,669 | A method is disclosed that is implemented by a computing device in a vehicle. Identifying information is obtained from an occupant of the vehicle via an input device operatively connected to the computing device. If the computing device has connectivity to a remote authentication server, the computing device transmits a request to the authentication server, and controls whether full operation of the vehicle is enabled or disabled based on a response from the remote authentication server. The request includes the identifying information and a vehicle identifier of the vehicle, and requests that the authentication server determine, based on the identifying information and the vehicle identifier, whether the occupant is authorized to operate the vehicle. If the computing device lacks connectivity to the remote authentication server, full operation of the vehicle is temporarily enabled until the computing device has connectivity to the remote authentication server. | 1. A method implemented by a computing device in a vehicle, comprising:
obtaining identifying information from an occupant of the vehicle, wherein the identifying information is received via an input device operatively connected to the computing device; if the computing device has connectivity to a remote authentication server:
transmitting a request to the authentication server, wherein the request includes the identifying information and a vehicle identifier of the vehicle, and requests that the authentication server determine, based on the identifying information and the vehicle identifier, whether the occupant is authorized to operate the vehicle; and
controlling whether full operation of the vehicle is enabled or disabled based on a response from the remote authentication server; and
if the computing device lacks connectivity to the remote authentication server, temporarily enabling full operation of the vehicle until the computing device has connectivity to the remote authentication server. 2. The method of claim 1, wherein the response is received at the computing device from the remote authentication server, and indicates whether the occupant is authorized to operate the vehicle. 3. The method of claim 2, wherein controlling whether full operation of the vehicle is enabled or disabled comprises disabling the vehicle if the response indicates that the occupant is not authorized to operate the vehicle. 4. The method of claim 3, wherein disabling full operation of the vehicle comprises transmitting a command on a vehicle bus of the vehicle to disable an ignition of the vehicle. 5. The method of claim 1:
wherein the response is sent from the remote authentication server to a mobile device of the occupant and includes an authentication code; and wherein controlling whether full operation of the vehicle is enabled or disabled based on the response comprises:
enabling full operation of the vehicle if the authentication code is correctly received from the occupant; and
disabling full operation of the vehicle if either of the following occurs:
an incorrect authentication code is received from the occupant;
no authentication code is received from the occupant within a predefined time period. 6. The method of claim 5:
wherein the authentication code is received from the occupant via the same or another input device that is operatively connected to the computing device; or wherein the authentication code is received from the occupant as a wireless transmission from the mobile device of the occupant. 7. The method of claim 1, wherein the identifying information comprises an authentication code entered by the occupant or received from a mobile device of the occupant. 8. The method of claim 1, wherein the identifying information comprises a signature of the occupant. 9. The method of claim 1, wherein the identifying information comprises biometric information of the occupant. 10. The method of claim 9, wherein the biometric information comprises one or more of a retinal scan, an iris scan, a fingerprint scan, and a photograph of the occupant's face. 11. The method of claim 1, wherein the identifying information comprises a photograph of an authenticating document of the occupant. 12. The method of claim 1, further comprising:
performing an initial determination, locally at the computing device and based on additional identifying information from the occupant, of whether the occupant is authorized to operate the vehicle; and disabling full operation of the vehicle if the initial determination indicates that the occupant is not authorized to operate the vehicle; wherein said transmitting the request to the remote server is only performed if the initial determination indicates that the occupant is authorized to operate the vehicle. 13. A computing device comprising:
a wireless transceiver configured to provide connectivity to a remote authentication server; an input device; and processing circuitry operatively connected to the wireless transceiver and the input device and configured to:
obtain identifying information from an occupant of a vehicle, wherein the identifying information is received via the input device;
if the computing device has connectivity to the remote authentication server:
transmit a request to the authentication server, wherein the request includes the identifying information and a vehicle identifier of the vehicle, and requests that the authentication server determine, based on the identifying information and the vehicle identifier, whether the occupant is authorized to operate the vehicle; and
control whether full operation of the vehicle is enabled or disabled based on a response from the remote authentication server; and
if the computing device lacks connectivity to the remote authentication server, temporarily enable full operation of the vehicle until the computing device has connectivity to the remote authentication server. 14. The computing device of claim 13, wherein the response is received at the computing device from the remote authentication server, and indicates whether the occupant is authorized to operate the vehicle. 15. The computing device of claim 14, wherein to control whether full operation of the vehicle is enabled or disabled, the processing circuitry is configured to disable the vehicle if the response indicates that the occupant is not authorized to operate the vehicle. 16. The computing device of claim 15, wherein to disable full operation of the vehicle, the processing circuitry is configured to transmit a command on a vehicle bus of the vehicle to disable an ignition of the vehicle. 17. The computing device of claim 13:
wherein the response is sent from the remote authentication server to a mobile device of the occupant and includes an authentication code; and wherein to control whether full operation of the vehicle is enabled or disabled based on the response, the processing circuitry is configured to:
enable full operation of the vehicle if the authentication code is correctly received from the occupant; and
disable full operation of the vehicle if either of the following occurs:
an incorrect authentication code is received from the occupant;
no authentication code is received from the occupant within a predefined time period. 18. The computing device of claim 17:
wherein the authentication code is received from the occupant via the same or another input device; or wherein the authentication code is received from the occupant as a wireless transmission from the mobile device of the occupant. 19. The computing device of claim 13, wherein the identifying information comprises an authentication code entered by the occupant or received from a mobile device of the occupant. 20. The computing device of claim 13, wherein the identifying information comprises a signature of the occupant. 21. The computing device of claim 13, wherein the identifying information comprises biometric information of the occupant. 22. The computing device of claim 21, wherein the biometric information comprises one or more of a retinal scan, an iris scan, a fingerprint scan, and a photograph of the occupant's face. 23. The computing device of claim 13, wherein the identifying information comprises a photograph of an authenticating document of the occupant. 24. The computing device of claim 13, wherein the processing circuitry is further configured to:
perform an initial determination, locally at the computing device and based on additional identifying information from the occupant, of whether the occupant is authorized to operate the vehicle; and disable full operation of the vehicle if the initial determination indicates that the occupant is not authorized to operate the vehicle; wherein the transmission of the request to the remote server is only performed if the initial determination indicates that the occupant is authorized to operate the vehicle. | A method is disclosed that is implemented by a computing device in a vehicle. Identifying information is obtained from an occupant of the vehicle via an input device operatively connected to the computing device. If the computing device has connectivity to a remote authentication server, the computing device transmits a request to the authentication server, and controls whether full operation of the vehicle is enabled or disabled based on a response from the remote authentication server. The request includes the identifying information and a vehicle identifier of the vehicle, and requests that the authentication server determine, based on the identifying information and the vehicle identifier, whether the occupant is authorized to operate the vehicle. If the computing device lacks connectivity to the remote authentication server, full operation of the vehicle is temporarily enabled until the computing device has connectivity to the remote authentication server.1. A method implemented by a computing device in a vehicle, comprising:
obtaining identifying information from an occupant of the vehicle, wherein the identifying information is received via an input device operatively connected to the computing device; if the computing device has connectivity to a remote authentication server:
transmitting a request to the authentication server, wherein the request includes the identifying information and a vehicle identifier of the vehicle, and requests that the authentication server determine, based on the identifying information and the vehicle identifier, whether the occupant is authorized to operate the vehicle; and
controlling whether full operation of the vehicle is enabled or disabled based on a response from the remote authentication server; and
if the computing device lacks connectivity to the remote authentication server, temporarily enabling full operation of the vehicle until the computing device has connectivity to the remote authentication server. 2. The method of claim 1, wherein the response is received at the computing device from the remote authentication server, and indicates whether the occupant is authorized to operate the vehicle. 3. The method of claim 2, wherein controlling whether full operation of the vehicle is enabled or disabled comprises disabling the vehicle if the response indicates that the occupant is not authorized to operate the vehicle. 4. The method of claim 3, wherein disabling full operation of the vehicle comprises transmitting a command on a vehicle bus of the vehicle to disable an ignition of the vehicle. 5. The method of claim 1:
wherein the response is sent from the remote authentication server to a mobile device of the occupant and includes an authentication code; and wherein controlling whether full operation of the vehicle is enabled or disabled based on the response comprises:
enabling full operation of the vehicle if the authentication code is correctly received from the occupant; and
disabling full operation of the vehicle if either of the following occurs:
an incorrect authentication code is received from the occupant;
no authentication code is received from the occupant within a predefined time period. 6. The method of claim 5:
wherein the authentication code is received from the occupant via the same or another input device that is operatively connected to the computing device; or wherein the authentication code is received from the occupant as a wireless transmission from the mobile device of the occupant. 7. The method of claim 1, wherein the identifying information comprises an authentication code entered by the occupant or received from a mobile device of the occupant. 8. The method of claim 1, wherein the identifying information comprises a signature of the occupant. 9. The method of claim 1, wherein the identifying information comprises biometric information of the occupant. 10. The method of claim 9, wherein the biometric information comprises one or more of a retinal scan, an iris scan, a fingerprint scan, and a photograph of the occupant's face. 11. The method of claim 1, wherein the identifying information comprises a photograph of an authenticating document of the occupant. 12. The method of claim 1, further comprising:
performing an initial determination, locally at the computing device and based on additional identifying information from the occupant, of whether the occupant is authorized to operate the vehicle; and disabling full operation of the vehicle if the initial determination indicates that the occupant is not authorized to operate the vehicle; wherein said transmitting the request to the remote server is only performed if the initial determination indicates that the occupant is authorized to operate the vehicle. 13. A computing device comprising:
a wireless transceiver configured to provide connectivity to a remote authentication server; an input device; and processing circuitry operatively connected to the wireless transceiver and the input device and configured to:
obtain identifying information from an occupant of a vehicle, wherein the identifying information is received via the input device;
if the computing device has connectivity to the remote authentication server:
transmit a request to the authentication server, wherein the request includes the identifying information and a vehicle identifier of the vehicle, and requests that the authentication server determine, based on the identifying information and the vehicle identifier, whether the occupant is authorized to operate the vehicle; and
control whether full operation of the vehicle is enabled or disabled based on a response from the remote authentication server; and
if the computing device lacks connectivity to the remote authentication server, temporarily enable full operation of the vehicle until the computing device has connectivity to the remote authentication server. 14. The computing device of claim 13, wherein the response is received at the computing device from the remote authentication server, and indicates whether the occupant is authorized to operate the vehicle. 15. The computing device of claim 14, wherein to control whether full operation of the vehicle is enabled or disabled, the processing circuitry is configured to disable the vehicle if the response indicates that the occupant is not authorized to operate the vehicle. 16. The computing device of claim 15, wherein to disable full operation of the vehicle, the processing circuitry is configured to transmit a command on a vehicle bus of the vehicle to disable an ignition of the vehicle. 17. The computing device of claim 13:
wherein the response is sent from the remote authentication server to a mobile device of the occupant and includes an authentication code; and wherein to control whether full operation of the vehicle is enabled or disabled based on the response, the processing circuitry is configured to:
enable full operation of the vehicle if the authentication code is correctly received from the occupant; and
disable full operation of the vehicle if either of the following occurs:
an incorrect authentication code is received from the occupant;
no authentication code is received from the occupant within a predefined time period. 18. The computing device of claim 17:
wherein the authentication code is received from the occupant via the same or another input device; or wherein the authentication code is received from the occupant as a wireless transmission from the mobile device of the occupant. 19. The computing device of claim 13, wherein the identifying information comprises an authentication code entered by the occupant or received from a mobile device of the occupant. 20. The computing device of claim 13, wherein the identifying information comprises a signature of the occupant. 21. The computing device of claim 13, wherein the identifying information comprises biometric information of the occupant. 22. The computing device of claim 21, wherein the biometric information comprises one or more of a retinal scan, an iris scan, a fingerprint scan, and a photograph of the occupant's face. 23. The computing device of claim 13, wherein the identifying information comprises a photograph of an authenticating document of the occupant. 24. The computing device of claim 13, wherein the processing circuitry is further configured to:
perform an initial determination, locally at the computing device and based on additional identifying information from the occupant, of whether the occupant is authorized to operate the vehicle; and disable full operation of the vehicle if the initial determination indicates that the occupant is not authorized to operate the vehicle; wherein the transmission of the request to the remote server is only performed if the initial determination indicates that the occupant is authorized to operate the vehicle. | 3,600 |
13,479 | 13,479 | 13,463,799 | 3,685 | A vehicle computer system including a processor and memory coupled to the processor is provided. The memory stores a plurality of vehicle applications and a vehicle application management program. The vehicle application management program, when executed by the processor, is configured to initiate restricted operations of the plurality of vehicle applications in accordance with a single digital rights payload received separately from the plurality of vehicle applications. The restricted operations of the plurality of vehicle applications comprise a multimedia operation and a remote access operation. | 1. A vehicle computer system, comprising:
a processor; a memory coupled to the processor, wherein the memory stores a plurality of vehicle applications and a vehicle application management program, wherein the vehicle application management program, when executed by the processor, is configured to initiate restricted operations of the plurality of vehicle applications in accordance with a single digital rights payload received separately from the plurality of vehicle applications, wherein the restricted operations of the plurality of vehicle applications comprise a multimedia operation and a remote access operation. 2. The vehicle computer system of claim 1, wherein the vehicle application management program is configured to respond to a digital rights management (DRM) sync event by retrieving a new single digital rights payload from a remote database. 3. The vehicle computer system of claim 1, wherein the vehicle application management program is configured to respond to a digital rights management (DRM) sync event by retrieving the single digital rights payload from a remote database. 4. The vehicle computer system of claim 3, wherein the DRM sync event is triggered by a user submitting a vehicle-specific purchase of a restricted operation feature via an online vehicle application storefront. 5. The vehicle computer system of claim 3, wherein the DRM sync event is triggered by a user submitting a vehicle-specific purchase of a restricted operation feature via a communication interface of the vehicle computer system. 6. The vehicle computer system of claim 3, wherein the DRM sync event is triggered by a vehicle manufacturer submitting a vehicle-specific request to update user accessibility to at least one restricted operation feature. 7. The vehicle computer system of claim 3, wherein the DRM sync event is triggered by a vehicle manufacturer submitting a request to update accessibility to at least one restricted operation feature. 8. The vehicle computer system of claim 3, wherein the DRM sync event is triggered for each of a plurality of predetermined vehicle life cycle events, wherein said plurality of predetermined vehicle life cycle events comprise a vehicle-to-dealer event and a vehicle-to-user event. 9. The vehicle computer system of claim 8, wherein the vehicle application management program disables restricted operations of the plurality of vehicle applications authorized by the single digital rights payload in response to detection that registration has not occurred within a predetermined time period of the vehicle-to-user event. 10. A method comprising:
processing, by a merchant transaction server, a request to purchase a restricted vehicle application or a restricted vehicle application feature; submitting, by the merchant transaction server, a digital rights management (DRM) sync request to a management database; forwarding a DRM package, by the management database, corresponding to the DRM sync request to a vehicle remote operations server; performing a DRM sync, by a vehicle head unit, based on a DRM sync message received from the vehicle remote operations server to enable use of the restricted vehicle application or the restricted vehicle application feature. 11. The method of claim 10, further comprising receiving, by the merchant transaction server, the request to purchase the restricted vehicle application or the restricted vehicle application feature from an online store front. 12. The method of claim 10, further comprising receiving, by the merchant transaction server, the request to purchase the restricted vehicle application or the restricted vehicle application feature from the vehicle head unit. 13. The method of claim 10, further comprising receiving, by the merchant transaction server, the DRM package from the management database and receiving a DRM sync completion confirmation corresponding to the DRM package from the vehicle head unit. 14. The method of claim 10, further comprising providing, by the vehicle remote operations server, the DMR sync message to the vehicle head unit as a SMS push message. 15. The method of claim 10, further comprising filtering, by the vehicle remote operations server, DRM information for remote operation services and filtering, by the vehicle head unit, DRM information for native in-vehicle operations and DRM information for Java in-vehicle operations. 16. A system, comprising:
a computing device that prepares a digital rights management (DRM) payload based on a vehicle identification number (VIN) and a subscriber identifier (ID); a vehicle head unit that receives the DRM payload from the computing device and that authorizes use of a restricted vehicle application or a restricted vehicle application feature received separately from the DRM payload in response to unwrapping the DRM payload using the VIN and the subscriber ID. 17. The system of claim 16, wherein the computing device prepares the DRM payload in response to a purchase request received from an online store front or from the vehicle head unit. 18. The system of claim 16, wherein the computing device prepares different DRM payloads in response to different vehicle life cycle events. 19. The system of claim 18, wherein the computing device initiates a settlement between a first company and a second company in response to at least one of the different vehicle life cycle events. 20. The system of claim 18, wherein the vehicle head unit stores a collection of restricted vehicle applications or restricted vehicle application features, and is configured to authorize use of different sub-sets of said collection in accordance with different DRM payloads. | A vehicle computer system including a processor and memory coupled to the processor is provided. The memory stores a plurality of vehicle applications and a vehicle application management program. The vehicle application management program, when executed by the processor, is configured to initiate restricted operations of the plurality of vehicle applications in accordance with a single digital rights payload received separately from the plurality of vehicle applications. The restricted operations of the plurality of vehicle applications comprise a multimedia operation and a remote access operation.1. A vehicle computer system, comprising:
a processor; a memory coupled to the processor, wherein the memory stores a plurality of vehicle applications and a vehicle application management program, wherein the vehicle application management program, when executed by the processor, is configured to initiate restricted operations of the plurality of vehicle applications in accordance with a single digital rights payload received separately from the plurality of vehicle applications, wherein the restricted operations of the plurality of vehicle applications comprise a multimedia operation and a remote access operation. 2. The vehicle computer system of claim 1, wherein the vehicle application management program is configured to respond to a digital rights management (DRM) sync event by retrieving a new single digital rights payload from a remote database. 3. The vehicle computer system of claim 1, wherein the vehicle application management program is configured to respond to a digital rights management (DRM) sync event by retrieving the single digital rights payload from a remote database. 4. The vehicle computer system of claim 3, wherein the DRM sync event is triggered by a user submitting a vehicle-specific purchase of a restricted operation feature via an online vehicle application storefront. 5. The vehicle computer system of claim 3, wherein the DRM sync event is triggered by a user submitting a vehicle-specific purchase of a restricted operation feature via a communication interface of the vehicle computer system. 6. The vehicle computer system of claim 3, wherein the DRM sync event is triggered by a vehicle manufacturer submitting a vehicle-specific request to update user accessibility to at least one restricted operation feature. 7. The vehicle computer system of claim 3, wherein the DRM sync event is triggered by a vehicle manufacturer submitting a request to update accessibility to at least one restricted operation feature. 8. The vehicle computer system of claim 3, wherein the DRM sync event is triggered for each of a plurality of predetermined vehicle life cycle events, wherein said plurality of predetermined vehicle life cycle events comprise a vehicle-to-dealer event and a vehicle-to-user event. 9. The vehicle computer system of claim 8, wherein the vehicle application management program disables restricted operations of the plurality of vehicle applications authorized by the single digital rights payload in response to detection that registration has not occurred within a predetermined time period of the vehicle-to-user event. 10. A method comprising:
processing, by a merchant transaction server, a request to purchase a restricted vehicle application or a restricted vehicle application feature; submitting, by the merchant transaction server, a digital rights management (DRM) sync request to a management database; forwarding a DRM package, by the management database, corresponding to the DRM sync request to a vehicle remote operations server; performing a DRM sync, by a vehicle head unit, based on a DRM sync message received from the vehicle remote operations server to enable use of the restricted vehicle application or the restricted vehicle application feature. 11. The method of claim 10, further comprising receiving, by the merchant transaction server, the request to purchase the restricted vehicle application or the restricted vehicle application feature from an online store front. 12. The method of claim 10, further comprising receiving, by the merchant transaction server, the request to purchase the restricted vehicle application or the restricted vehicle application feature from the vehicle head unit. 13. The method of claim 10, further comprising receiving, by the merchant transaction server, the DRM package from the management database and receiving a DRM sync completion confirmation corresponding to the DRM package from the vehicle head unit. 14. The method of claim 10, further comprising providing, by the vehicle remote operations server, the DMR sync message to the vehicle head unit as a SMS push message. 15. The method of claim 10, further comprising filtering, by the vehicle remote operations server, DRM information for remote operation services and filtering, by the vehicle head unit, DRM information for native in-vehicle operations and DRM information for Java in-vehicle operations. 16. A system, comprising:
a computing device that prepares a digital rights management (DRM) payload based on a vehicle identification number (VIN) and a subscriber identifier (ID); a vehicle head unit that receives the DRM payload from the computing device and that authorizes use of a restricted vehicle application or a restricted vehicle application feature received separately from the DRM payload in response to unwrapping the DRM payload using the VIN and the subscriber ID. 17. The system of claim 16, wherein the computing device prepares the DRM payload in response to a purchase request received from an online store front or from the vehicle head unit. 18. The system of claim 16, wherein the computing device prepares different DRM payloads in response to different vehicle life cycle events. 19. The system of claim 18, wherein the computing device initiates a settlement between a first company and a second company in response to at least one of the different vehicle life cycle events. 20. The system of claim 18, wherein the vehicle head unit stores a collection of restricted vehicle applications or restricted vehicle application features, and is configured to authorize use of different sub-sets of said collection in accordance with different DRM payloads. | 3,600 |
13,480 | 13,480 | 12,019,379 | 3,682 | A system and method for providing a targeting event marketplace is provided. Generally, the method contains the steps of: at least one targeted publisher and a targeting event marketplace entity agreeing to financial terms associated with revenues received from at least one buyer that obtains access to the Internet browser of an end-user; providing an end-user tag on a Web page of the Web site, wherein the end-user tag is capable of calling a Web server from an Internet browser of the end-user; analyzing an end-user action associated with the Web page, wherein the step of analyzing is performed to categorize the action into a category of targeting event; the Web server determining if at least one buyer has interest in at least one end-user taking an action that is categorized into at least one category of targeting event; and receiving bids from at least one buyer for providing access to the Internet browser of the end-user and selecting at least one buyer. | 1. A method for providing a targeting event marketplace, comprising the steps of:
at least one targeted publisher and a targeting event marketplace entity agreeing to financial terms associated with revenues received from at least one buyer that obtains access to the Internet browser of an end-user; providing an end-user tag on a Web page of the Web site, wherein the end-user tag is capable of calling a Web server from an Internet browser of the end-user; analyzing an end-user action associated with the Web page, wherein the step of analyzing is performed to categorize the action into a category of targeting event; the Web server determining if at least one buyer has interest in at least one end-user taking an action that is categorized into at least one category of targeting event; and receiving bids from at least one buyer for providing access to the Internet browser of the end-user and selecting at least one buyer. 2. The method of claim 1, further comprising the step of the targeting marketplace entity sharing a portion of ad revenue received from at least one buyer with the at least one targeted publisher. 3. The method of claim 1, wherein the step of determining if at least one buyer has interest is further defined by the step of the Web server checking with ad serving systems if the at least one buyer has interest. 4. The method of claim 1, wherein the step of receiving bids is performed by the Web server. 5. The method of claim 1, wherein the step of selecting at least one buyer is performed by automatically selecting a highest bidder. 6. The method of claim 1, further comprising the step of testing the at least one buyer to determine a level of performance with at least one ad campaign that is achieved by the at least one buyer. 7. The method of claim 6, further comprising the step of removing at least one targeted publisher from the targeting event marketplace if the at least one targeted publisher is not performing at a minimal performance level. 8. The method of claim 6, further comprising the step of using a statistical analysis to determine which parameter of a series of parameters has a better success rate in predicting ad campaign success. 9. The method of claim 1, wherein providing access to the Internet browser of the end-user is provided by writing back a pixel call to the end-user Internet browser. 10. The method of claim 1, further comprising the step of allowing the selected at least one buyer to use the access to the Internet browser of the end-user to place a delayed ad cookie in the Internet browser of the end-user, where the delayed ad cookie is specific to the category of the targeting event of the end-user. 11. The method of claim 1, further comprising the step of allowing the selected at least one buyer to use the access to the Internet browser of the end-user to read data from the Internet browser of the end-user, such that where the data that is read is attributed to the category of the targeting event of the end-user. 12. The method of claim 1, wherein a network allows at least one client of the network to show interest in the at least one end-user, by allowing the client of the network to provide bids for placing the delayed ad cookie in the Internet browser of the end-user. 13. The method of claim 12, wherein the at least one client of the network is at least one advertiser. 14. The method of claim 1, further comprising the step of rating each targeted publisher associated with the targeting event marketplace, wherein each targeted publisher is rated based on success of advertisements targeted according to targeting events that are based on that targeted publisher. 15. The method of claim 14, further comprising the step of manually or automatically setting a specific bid price to each targeted publisher based on rating of the targeted publisher. 16. The method of claim 1, further comprising the step of analyzing influence of various targeting parameters to better predict success of an advertisement campaign for the end-user. 17. The method of claim 1, wherein the end-user action is selected from the group consisting of viewing the Web page, searching via the Web page, clicking on an item in the Web page, and data entry. 18. The method of claim 1, wherein the targeted publisher is an owner of the Web site. 19. A method for interacting in a targeting event marketplace, comprising the steps of:
an end-user visiting a Web site; the Web site loading an end-user tag that calls a Web server from an Internet browser of the end-user; analyzing actions of the end-user associated with the Web page, wherein the step of analyzing is performed to categorize the action into a category of targeting event; the Web server determining if at least one buyer has interest in at least one end-user taking an action that is categorized into at least one category of targeting event; and the at least one buyer bidding for a right to obtain access to the Internet browser of the end-user. 20. The method of claim 19, wherein the end-user action is selected from the group consisting of viewing the Web page, searching via the Web page, clicking on an item in the Web page, and data entry. 21. The method of claim 19, further comprising the step of a targeted publisher sharing a portion of ad revenue received, with a targeting event marketplace entity. 22. The method of claim 19, wherein the step of determining if at least one buyer has interest is further defined by the step of the Web server checking with ad serving systems if the at least one buyer has interest. 23. The method of claim 19, wherein receiving bids is performed by the Web server. 24. The method of claim 19, further comprising the step of selecting at least one buyer. 25. The method of claim 24, wherein the step of selecting at least one buyer is performed by automatically selecting a highest bidder. 26. The method of claim 24, further comprising the step of testing the at least one buyer to determine a level of performance with at least one ad campaign that is achieved by the at least one buyer. 27. The method of claim 26, further comprising the step of using a statistical analysis to determine which parameter of a series of parameters has a better success rate in predicting ad campaign success. 28. The method of claim 19, wherein providing access to the Internet browser of the end-user is provided by writing back a pixel call to the end-user Internet browser. 29. The method of claim 24, further comprising the step of allowing the selected at least one buyer to use the access to the Internet browser of the end-user to place a delayed ad cookie in the Internet browser of the end-user, where the delayed ad cookie is specific to the category of the targeting event of the end-user. 30. The method of claim 24, further comprising the step of allowing the selected at least one buyer to use the access to the Internet browser of the end-user to read data from the Internet browser of the end-user, such that where the data that is read is attributed to the category of the targeting event of the end-user. 31. The method of claim 19, wherein a network allows at least one client of the network to show interest in the at least one end-user, by allowing the client of the network to provide bids for placing the delayed ad cookie in the Internet browser of the end-user. 32. The method of claim 31, wherein the at least one client of the network is at least one advertiser. 33. The method of claim 19, further comprising the step of analyzing influence of various targeting parameters to better predict success of an advertisement campaign for the end-user. 34. The method of claims 19, where the targeted publisher is an owner of the Web site. 35. A method for providing a targeting event marketplace, comprising the steps of:
at least one targeted publisher and a targeting event marketplace entity agreeing to financial terms associated with revenues received from at least one buyer that obtains access to the Internet browser of an end-user; providing an end-user tag on a Web page of the Web site, wherein the end-user tag is capable of calling a Web server from an Internet browser of the end-user; analyzing an end-user action associated with the Web page, wherein the step of analyzing is performed to categorize the action into a category of targeting event; the Web server determining if at least one buyer has interest in at least one end-user taking an action that is categorized into at least one category of targeting event; and providing the at least one buyer with access to the Internet browser of the end-user for a predefined fee. | A system and method for providing a targeting event marketplace is provided. Generally, the method contains the steps of: at least one targeted publisher and a targeting event marketplace entity agreeing to financial terms associated with revenues received from at least one buyer that obtains access to the Internet browser of an end-user; providing an end-user tag on a Web page of the Web site, wherein the end-user tag is capable of calling a Web server from an Internet browser of the end-user; analyzing an end-user action associated with the Web page, wherein the step of analyzing is performed to categorize the action into a category of targeting event; the Web server determining if at least one buyer has interest in at least one end-user taking an action that is categorized into at least one category of targeting event; and receiving bids from at least one buyer for providing access to the Internet browser of the end-user and selecting at least one buyer.1. A method for providing a targeting event marketplace, comprising the steps of:
at least one targeted publisher and a targeting event marketplace entity agreeing to financial terms associated with revenues received from at least one buyer that obtains access to the Internet browser of an end-user; providing an end-user tag on a Web page of the Web site, wherein the end-user tag is capable of calling a Web server from an Internet browser of the end-user; analyzing an end-user action associated with the Web page, wherein the step of analyzing is performed to categorize the action into a category of targeting event; the Web server determining if at least one buyer has interest in at least one end-user taking an action that is categorized into at least one category of targeting event; and receiving bids from at least one buyer for providing access to the Internet browser of the end-user and selecting at least one buyer. 2. The method of claim 1, further comprising the step of the targeting marketplace entity sharing a portion of ad revenue received from at least one buyer with the at least one targeted publisher. 3. The method of claim 1, wherein the step of determining if at least one buyer has interest is further defined by the step of the Web server checking with ad serving systems if the at least one buyer has interest. 4. The method of claim 1, wherein the step of receiving bids is performed by the Web server. 5. The method of claim 1, wherein the step of selecting at least one buyer is performed by automatically selecting a highest bidder. 6. The method of claim 1, further comprising the step of testing the at least one buyer to determine a level of performance with at least one ad campaign that is achieved by the at least one buyer. 7. The method of claim 6, further comprising the step of removing at least one targeted publisher from the targeting event marketplace if the at least one targeted publisher is not performing at a minimal performance level. 8. The method of claim 6, further comprising the step of using a statistical analysis to determine which parameter of a series of parameters has a better success rate in predicting ad campaign success. 9. The method of claim 1, wherein providing access to the Internet browser of the end-user is provided by writing back a pixel call to the end-user Internet browser. 10. The method of claim 1, further comprising the step of allowing the selected at least one buyer to use the access to the Internet browser of the end-user to place a delayed ad cookie in the Internet browser of the end-user, where the delayed ad cookie is specific to the category of the targeting event of the end-user. 11. The method of claim 1, further comprising the step of allowing the selected at least one buyer to use the access to the Internet browser of the end-user to read data from the Internet browser of the end-user, such that where the data that is read is attributed to the category of the targeting event of the end-user. 12. The method of claim 1, wherein a network allows at least one client of the network to show interest in the at least one end-user, by allowing the client of the network to provide bids for placing the delayed ad cookie in the Internet browser of the end-user. 13. The method of claim 12, wherein the at least one client of the network is at least one advertiser. 14. The method of claim 1, further comprising the step of rating each targeted publisher associated with the targeting event marketplace, wherein each targeted publisher is rated based on success of advertisements targeted according to targeting events that are based on that targeted publisher. 15. The method of claim 14, further comprising the step of manually or automatically setting a specific bid price to each targeted publisher based on rating of the targeted publisher. 16. The method of claim 1, further comprising the step of analyzing influence of various targeting parameters to better predict success of an advertisement campaign for the end-user. 17. The method of claim 1, wherein the end-user action is selected from the group consisting of viewing the Web page, searching via the Web page, clicking on an item in the Web page, and data entry. 18. The method of claim 1, wherein the targeted publisher is an owner of the Web site. 19. A method for interacting in a targeting event marketplace, comprising the steps of:
an end-user visiting a Web site; the Web site loading an end-user tag that calls a Web server from an Internet browser of the end-user; analyzing actions of the end-user associated with the Web page, wherein the step of analyzing is performed to categorize the action into a category of targeting event; the Web server determining if at least one buyer has interest in at least one end-user taking an action that is categorized into at least one category of targeting event; and the at least one buyer bidding for a right to obtain access to the Internet browser of the end-user. 20. The method of claim 19, wherein the end-user action is selected from the group consisting of viewing the Web page, searching via the Web page, clicking on an item in the Web page, and data entry. 21. The method of claim 19, further comprising the step of a targeted publisher sharing a portion of ad revenue received, with a targeting event marketplace entity. 22. The method of claim 19, wherein the step of determining if at least one buyer has interest is further defined by the step of the Web server checking with ad serving systems if the at least one buyer has interest. 23. The method of claim 19, wherein receiving bids is performed by the Web server. 24. The method of claim 19, further comprising the step of selecting at least one buyer. 25. The method of claim 24, wherein the step of selecting at least one buyer is performed by automatically selecting a highest bidder. 26. The method of claim 24, further comprising the step of testing the at least one buyer to determine a level of performance with at least one ad campaign that is achieved by the at least one buyer. 27. The method of claim 26, further comprising the step of using a statistical analysis to determine which parameter of a series of parameters has a better success rate in predicting ad campaign success. 28. The method of claim 19, wherein providing access to the Internet browser of the end-user is provided by writing back a pixel call to the end-user Internet browser. 29. The method of claim 24, further comprising the step of allowing the selected at least one buyer to use the access to the Internet browser of the end-user to place a delayed ad cookie in the Internet browser of the end-user, where the delayed ad cookie is specific to the category of the targeting event of the end-user. 30. The method of claim 24, further comprising the step of allowing the selected at least one buyer to use the access to the Internet browser of the end-user to read data from the Internet browser of the end-user, such that where the data that is read is attributed to the category of the targeting event of the end-user. 31. The method of claim 19, wherein a network allows at least one client of the network to show interest in the at least one end-user, by allowing the client of the network to provide bids for placing the delayed ad cookie in the Internet browser of the end-user. 32. The method of claim 31, wherein the at least one client of the network is at least one advertiser. 33. The method of claim 19, further comprising the step of analyzing influence of various targeting parameters to better predict success of an advertisement campaign for the end-user. 34. The method of claims 19, where the targeted publisher is an owner of the Web site. 35. A method for providing a targeting event marketplace, comprising the steps of:
at least one targeted publisher and a targeting event marketplace entity agreeing to financial terms associated with revenues received from at least one buyer that obtains access to the Internet browser of an end-user; providing an end-user tag on a Web page of the Web site, wherein the end-user tag is capable of calling a Web server from an Internet browser of the end-user; analyzing an end-user action associated with the Web page, wherein the step of analyzing is performed to categorize the action into a category of targeting event; the Web server determining if at least one buyer has interest in at least one end-user taking an action that is categorized into at least one category of targeting event; and providing the at least one buyer with access to the Internet browser of the end-user for a predefined fee. | 3,600 |
13,481 | 13,481 | 14,313,235 | 3,688 | An adaptive bit rate system uses adaptive streaming to deliver content to client devices capable of adaptive bit rate streaming. Techniques for advertisement management include monitoring ad skipping by an adaptive bit rate client device that receives media chunks from the adaptive bit rate system. Techniques include monitoring a client action or inaction as it relates to advertisement skipping for future advertisement selections. | 1. A network-based method for ad management in an adaptive bit rate network, the method comprising:
generating a manifest file referencing adaptive bit rate media segments that occur within a first programming content period of at least one of a plurality of differently encoded versions of the programming content for retrieval by a client's adaptive bit rate client device, identifying a start of an ad break that is associated with the manifest file; responsive to an indication that desired adaptive bit rate media segments during the first programming period have been retrieved:
selecting a first advertisement content for providing to the client's adaptive bit rate client device;
appending to the manifest file references to the first advertisement content, wherein the first advertisement is associated with a first playout time;
identifying whether the adaptive bit rate client device skips the first advertisement content during the playout time; and correlating the client or the client's adaptive bit rate client device with the first advertisement based on the skipping action or inaction in a subscriber history storage for reference for selecting future advertisements for the client. 2. The method of claim 1, wherein the start of the ad break associated with the manifest file is determined based on at least one of a request by the client device for additional programming content or a determination that desired adaptive bit rate media segments during the first programming content period have been retrieved. 3. The method of claim 2, wherein the indication that the adaptive bit rate client device has received the desired adaptive bit rate media segments from the first programming content comprises at least one of:
an indicator that the adaptive bit rate client device has played back all retrieved media segments in the first period, an indicator that the adaptive bit rate client device has fast-forwarded to an end of available media segments in the first period referenced in the manifest file, an indicator that the adaptive bit rate client device has initiated a fast-forward function or a rewind function to retrieve content from the second period where the second period occurs either after the first period or prior to the first period, receiving a request for an updated manifest file, or receiving a request for media segments from a second period in at least one of the plurality of differently encoded files of the on demand asset. 4. The method of claim 1, wherein identifying whether the adaptive bit rate client device skips the first advertisement content during the playout time is identified based on a request by the client device to receive additional programming or advertisement content media segments. 5. The method of claim 1, further comprising setting a timer upon making the appended manifest file available to the client, wherein the timer compares the time elapsed to the playout time for a respective advertisement. 6. The method of claim 1, further comprising identifying a non-skip action of the first advertisement if the playout time expires without a skip of the first advertisement. 7. The method of claim 5, wherein a non-skip action is correlated to the first advertisement. 8. The method of claim 1, wherein a non-skip action of an advertisement is stored with the respective non-skipped advertisement or information associated with the non-skipped advertisement in a subscriber history storage. 9. The method of claim 1, wherein the correlation stored in the subscriber history storage is an indicator of a client's preferences for advertising content, wherein the correlation links the subscriber to a non-skipped advertisement or information associated with the non-skipped advertisement. 10. The method of claim 1, wherein the correlation stored in the subscriber history links the client to information associated with one or more advertisements including at least one of a category of advertisements, a genre of advertisements, or a date range or age of advertisements. 11. The method of claim 1, wherein the correlation stored in the subscriber history links the programming content with one or more advertisements including at least one of a category of advertisements, a genre of advertisements, or a date range or age of advertisements. 12. The method of claim 1, further comprising appending to the manifest file references to a second advertisement content, wherein the second advertisement is associated with a second playout time; 13. The method of claim 11, wherein manifest file references to a second advertisement content are appended to the manifest file if at least one of the following:
the first advertisement is skipped, ad rules have not been satisfied, the ad break has time remaining, or the playout time is interrupted. 14. The method of claim 1, further comprising waiting for a playback duration of the ad break to expire before appending to the manifest file references to adaptive bit rate media segments that occur within a second programming content of the at least one of the plurality of differently encoded files of the asset. 15. The method of claim 1, wherein any future advertisement selections for a client or client device are made with reference to the history for the client or the client device compiled in the subscriber history storage. 16. The method of claim 1, wherein the manifest file and segmentation of the programming content into media segments occurs in a just-in-time packager for a unique copy or in a general packager separate from the playlist rebuilder for a common copy. 17. The method of claim 1, wherein upon a determination of a user action or the expiration of a playout time, identifying if ad rules have been satisfied. 18. The method of claim 1, wherein one or more advertisement contents are made available one at a time to the client during the ad break by appending media segments associated with a respective one of the one or more advertisement contents until the ad break has expired or until ad rules have been satisfied. 19. The method of claim 1, wherein an ad rule that must be satisfied before additional media segments are appended to the manifest file include at least one of:
a requirement that a playout time for a predetermined number of advertisements must expire, a requirement that a certain amount of time must lapse, or a predefined number of skips has occurred. 20. A network-based system for ad management in an adaptive bit rate network, the system comprising:
a playlist builder for generating a manifest file referencing adaptive bit rate media segments that occur within a first programming content period of at least one of a plurality of differently encoded versions of the programming content for retrieval by a client's adaptive bit rate client device, a packager for identifying a start of an ad break that is associated with the manifest file; an ad management system configured for, responsive to an indication that desired adaptive bit rate media segments during the first programming period have been retrieved, selecting a first advertisement content for providing to the client's adaptive bit rate client device, wherein the playlist builder is further configured for:
appending to the manifest file references to the first advertisement content, wherein the first advertisement is associated with a first playout time, and
identifying whether the adaptive bit rate client device skips the first advertisement content during the playout time; and
correlating the client or the client's adaptive bit rate client device with the first advertisement based on the skipping action or inaction in a subscriber history storage for reference for selecting future advertisements for the client. | An adaptive bit rate system uses adaptive streaming to deliver content to client devices capable of adaptive bit rate streaming. Techniques for advertisement management include monitoring ad skipping by an adaptive bit rate client device that receives media chunks from the adaptive bit rate system. Techniques include monitoring a client action or inaction as it relates to advertisement skipping for future advertisement selections.1. A network-based method for ad management in an adaptive bit rate network, the method comprising:
generating a manifest file referencing adaptive bit rate media segments that occur within a first programming content period of at least one of a plurality of differently encoded versions of the programming content for retrieval by a client's adaptive bit rate client device, identifying a start of an ad break that is associated with the manifest file; responsive to an indication that desired adaptive bit rate media segments during the first programming period have been retrieved:
selecting a first advertisement content for providing to the client's adaptive bit rate client device;
appending to the manifest file references to the first advertisement content, wherein the first advertisement is associated with a first playout time;
identifying whether the adaptive bit rate client device skips the first advertisement content during the playout time; and correlating the client or the client's adaptive bit rate client device with the first advertisement based on the skipping action or inaction in a subscriber history storage for reference for selecting future advertisements for the client. 2. The method of claim 1, wherein the start of the ad break associated with the manifest file is determined based on at least one of a request by the client device for additional programming content or a determination that desired adaptive bit rate media segments during the first programming content period have been retrieved. 3. The method of claim 2, wherein the indication that the adaptive bit rate client device has received the desired adaptive bit rate media segments from the first programming content comprises at least one of:
an indicator that the adaptive bit rate client device has played back all retrieved media segments in the first period, an indicator that the adaptive bit rate client device has fast-forwarded to an end of available media segments in the first period referenced in the manifest file, an indicator that the adaptive bit rate client device has initiated a fast-forward function or a rewind function to retrieve content from the second period where the second period occurs either after the first period or prior to the first period, receiving a request for an updated manifest file, or receiving a request for media segments from a second period in at least one of the plurality of differently encoded files of the on demand asset. 4. The method of claim 1, wherein identifying whether the adaptive bit rate client device skips the first advertisement content during the playout time is identified based on a request by the client device to receive additional programming or advertisement content media segments. 5. The method of claim 1, further comprising setting a timer upon making the appended manifest file available to the client, wherein the timer compares the time elapsed to the playout time for a respective advertisement. 6. The method of claim 1, further comprising identifying a non-skip action of the first advertisement if the playout time expires without a skip of the first advertisement. 7. The method of claim 5, wherein a non-skip action is correlated to the first advertisement. 8. The method of claim 1, wherein a non-skip action of an advertisement is stored with the respective non-skipped advertisement or information associated with the non-skipped advertisement in a subscriber history storage. 9. The method of claim 1, wherein the correlation stored in the subscriber history storage is an indicator of a client's preferences for advertising content, wherein the correlation links the subscriber to a non-skipped advertisement or information associated with the non-skipped advertisement. 10. The method of claim 1, wherein the correlation stored in the subscriber history links the client to information associated with one or more advertisements including at least one of a category of advertisements, a genre of advertisements, or a date range or age of advertisements. 11. The method of claim 1, wherein the correlation stored in the subscriber history links the programming content with one or more advertisements including at least one of a category of advertisements, a genre of advertisements, or a date range or age of advertisements. 12. The method of claim 1, further comprising appending to the manifest file references to a second advertisement content, wherein the second advertisement is associated with a second playout time; 13. The method of claim 11, wherein manifest file references to a second advertisement content are appended to the manifest file if at least one of the following:
the first advertisement is skipped, ad rules have not been satisfied, the ad break has time remaining, or the playout time is interrupted. 14. The method of claim 1, further comprising waiting for a playback duration of the ad break to expire before appending to the manifest file references to adaptive bit rate media segments that occur within a second programming content of the at least one of the plurality of differently encoded files of the asset. 15. The method of claim 1, wherein any future advertisement selections for a client or client device are made with reference to the history for the client or the client device compiled in the subscriber history storage. 16. The method of claim 1, wherein the manifest file and segmentation of the programming content into media segments occurs in a just-in-time packager for a unique copy or in a general packager separate from the playlist rebuilder for a common copy. 17. The method of claim 1, wherein upon a determination of a user action or the expiration of a playout time, identifying if ad rules have been satisfied. 18. The method of claim 1, wherein one or more advertisement contents are made available one at a time to the client during the ad break by appending media segments associated with a respective one of the one or more advertisement contents until the ad break has expired or until ad rules have been satisfied. 19. The method of claim 1, wherein an ad rule that must be satisfied before additional media segments are appended to the manifest file include at least one of:
a requirement that a playout time for a predetermined number of advertisements must expire, a requirement that a certain amount of time must lapse, or a predefined number of skips has occurred. 20. A network-based system for ad management in an adaptive bit rate network, the system comprising:
a playlist builder for generating a manifest file referencing adaptive bit rate media segments that occur within a first programming content period of at least one of a plurality of differently encoded versions of the programming content for retrieval by a client's adaptive bit rate client device, a packager for identifying a start of an ad break that is associated with the manifest file; an ad management system configured for, responsive to an indication that desired adaptive bit rate media segments during the first programming period have been retrieved, selecting a first advertisement content for providing to the client's adaptive bit rate client device, wherein the playlist builder is further configured for:
appending to the manifest file references to the first advertisement content, wherein the first advertisement is associated with a first playout time, and
identifying whether the adaptive bit rate client device skips the first advertisement content during the playout time; and
correlating the client or the client's adaptive bit rate client device with the first advertisement based on the skipping action or inaction in a subscriber history storage for reference for selecting future advertisements for the client. | 3,600 |
13,482 | 13,482 | 13,888,352 | 3,691 | Various embodiments are directed to a trading system and method for identifying interest and qualifying users to participate in an auction. The system may receive indicia indicating a first user's desire to trade a product or type. The system may determine that there is no matching counter-interest in the product or type. The system may qualify a subset of users to participate in an auction for the trading product based on each user's portfolio, order history, trade history, or specified interest. The system may determine an auction price for the trading product. Each user may view the trading product, the price, the auction start time, and fields for entering a bid or offer volume. The system may start the auction at the designated price for the subset of users. The system may match and execute all or portions of a bid and offer received before the end of the auction. | 1. A method of managing trading of a trading product of a first type, comprising:
receiving, by at least one processor, indicia indicating that a first user desires to trade one of (1) the trading product and (2) the type of trading product; determining, by the at least one processor, that there is no currently active matching contra interest to trade the one of (1) the trading product and (2) the type of trading product in an electronic market place; qualifying, by the at least one processor, each of a plurality of users to participate in an auction for the trading product based on at least one of (a) a portfolio of the user, (b) a trade history of the user, (c) an order history of the user, (d) one or more outstanding orders of the user, and (e) trading interest specified by the user, in which the plurality of users comprising the first user, the plurality of users consisting of a subset of users of the electronic marketplace; determining, by the at least one processor, a trading price for the auction for the trading product; causing, by the at least one processor, a display device of each of the plurality of users to display:
indicia identifying the trading product;
the price;
an auction start time;
an auction end time;
a bid quantity field for entering a quantity of the trading product offered to purchase; and
an offer quantity field for entering a quantity of the trading product offered for sale;
starting, by the at least one processor, an auction at the price for the plurality of users; prior to the auction end time, receiving, by the at least one processor, at least one bid to purchase the trading product and at least one offer to sell the trading product, the at least one bid comprising a first-received bid to purchase a first quantity of the trading product, the at least one offer comprising a first-received offer to sell a second quantity of the trading product; and matching and executing, by the at least one processor, at least a portion of the first quantity of the first-received bid with at least a portion of the second quantity of the first-received offer. 2. The method of claim 1, in which the act of determining a trading price comprises automatically determining a midpoint between a best bid price and a best offer price of the trading product. 3. The method of claim 1, in which the trading price comprises a price specified by the first user. 4. The method of claim 1, in which the trading price comprises a price determined by a non-trading third party. 5. The method of claim 1, in which the act of determining a trading price of the trading product comprises:
determining that the trading product is illiquid; transmitting a request for a human to determine a price for the trading product; and receiving from a human the trading price for the trading product. 6. The method of claim 1,
in which the first-received bid is from a first bidder and the first-received offer is from a first offeror, and in which an identity of the first bidder is not disclosed to the first offeror prior to the auction end time, and in which an identity of the first offeror is not disclosed to the first bidder prior to the auction end time. 7. The method of claim 1,
in which the first-received bid is from a first bidder and the first-received offer is from a first offeror, in which any existence of interest to purchase the trading product in the electronic marketplace is not disclosed to the first offeror prior to the auction end time, and in which any existence of interest to sell the trading product in the electronic marketplace is not disclosed to the first bidder prior to the auction end time. 8. The method of claim 1, in which the act of receiving indicia indicating that a first user desires to trade one of (1) the trading product and (2) the type of trading product comprises:
receiving from the first user an order to purchase or sell a quantity of the trading product. 9. The method of claim 8, in which the act of determining that there is no currently active matching contra interest to trade the one of (1) the trading product and (2) the type of trading product among in an electronic market place comprises:
after searching the electronic trading marketplace, determining that there is no order contra to the order from the first user in the electronic trading marketplace. 10. The method of claim 1, in which the act of receiving indicia indicating that a first user desires to trade one of (1) the trading product and (2) the type of trading product comprises:
receiving from the first user an indicia of interest in trading a type of trading product. 11. The method of claim 1, in which the act of receiving indicia indicating that a first user desires to trade one of (1) the trading product and (2) the type of trading product comprises:
receiving from the first user a request to initiate an auction for the first trading product, in which the act of starting the auction is based on the request to initiate the auction. 12. The method of claim 1, in which the act of qualifying each of the plurality of users to participate in an auction for the trading product comprises:
qualifying each of the plurality of users to participate in an auction for the trading product based on at least one of the user's portfolio, the user's trade history, the user's order history, the user's outstanding orders, and trading interest specified by the user. 13-16. (canceled) 17. The method of claim 1, further comprising:
prior to receiving indicia indicating that the first user desires to trade, qualifying the first user to view interest information in the one of (1) the trading product and (2) the type of trading product based on at least one of (a) a portfolio of the first user, (b) at least one prior trade by the first user in the one of (1) the trading product and (2) the type of trading product, (c) at least one prior order by the first user for a quantity of (1) the trading product or (2) a trading product of the type, (d) at least one current order by the first user for a quantity of the one of (1) the trading product and (2) a trading product of the type, and (e) trading interest specified by the first user in the one of (1) the trading product, (2) the type of trading product, and (3) another trading product of the type. 18. The method of claim 1, in which the act of qualifying each of a plurality of users to participate in an auction for the trading product comprises:
qualifying a second user of the plurality of users based on the second user previously submitting at least one order for the trading product that satisfies a predetermined minimum quantity threshold and a predetermined minimum duration threshold. 19. The method of claim 1, in which the act of qualifying each of a plurality of users to participate in an auction for the trading product comprises:
qualifying a second user of the plurality of users based on the second user transacting a trade for the trading product within a minimum period of time prior to one of (1) the time of qualifying, (2) the auction start time, (3) the auction end time, and (4) the day of the auction. 20. The method of claim 1, further comprising:
causing, by the at least one processor, a display device of each of the plurality of users to display:
indicia indicating each order submitted pursuant to the auction, in which the indicia does not indicate whether each order is a bid or offer. 21-23. (canceled) 24. The method of claim 1, in which the act of qualifying each of the plurality of users to participate in the auction is based on the act of determining that there is no currently active matching contra interest. 25. (canceled) 26. The method of claim 1, in which the act of receiving indicia indicating that a first user desires to trade is responsive to a failed negotiation between the first user and another user to trade the trading product, and in which the act of starting the auction is based on the failed negotiation. 27-28. (canceled) 29. An apparatus, comprising:
at least one processor; and at least one memory having instructions stored thereon which, when executed by the at least one processor, direct the at least one processor to:
receive indicia indicating that a first user desires to trade one of (1) a trading product and (2) a type of trading product comprising the trading product;
determine that there is no currently active matching contra interest to trade the one of (1) the trading product and (2) the type of trading product in an electronic market place;
qualify each of a plurality of users to participate in an auction for the trading product based on at least one of (a) a portfolio of the user, (b) a trade history of the user, (c) an order history of the user, (d) one or more outstanding orders of the user, and (e) trading interest specified by the user, in which the plurality of users comprising the first user, the plurality of users consisting of a subset of users of the electronic marketplace;
determine a trading price for the auction for the trading product;
cause a display device of the plurality of users to display:
indicia identifying the trading product;
the price;
an auction start time;
a bid quantity field for entering a quantity of the trading product offered to purchase; and
an offer quantity field for entering a quantity of the trading product offered for sale;
start an auction at the price for the plurality of users;
prior to an end time of the auction, receive at least one bid to purchase the trading product and at least one offer to sell the trading product, the at least one bid comprising a first-received bid to purchase a first quantity of the trading product, the at least one offer comprising a first-received offer to sell a second quantity of the trading product; and
match and execute at least a portion of the first quantity of the first-received bid with at least a portion of the second quantity of the first-received offer. 30. (canceled) 31. A machine-readable medium having instructions stored thereon and configured to cause at least one processor to:
receive indicia indicating that a first user desires to trade one of (1) a trading product and (2) a type of trading product comprising the trading product; determine that there is no currently active matching contra interest to trade the one of (1) the trading product and (2) the type of trading product in an electronic market place; qualify each of a plurality of users to participate in an auction for the trading product based on at least one of (a) a portfolio of the user, (b) a trade history of the user, (c) an order history of the user, (d) one or more outstanding orders of the user, and (e) trading interest specified by the user, in which the plurality of users comprising the first user, the plurality of users consisting of a subset of users of the electronic marketplace; determine a trading price for the auction for the trading product; cause a display device of the plurality of users to display:
indicia identifying the trading product;
the price;
an auction start time;
an auction end time;
a bid quantity field for entering a quantity of the trading product offered to purchase; and
an offer quantity field for entering a quantity of the trading product offered for sale;
start an auction at the price at the auction start time for the plurality of users; prior to the auction end time, receive at least one bid to purchase the trading product and at least one offer to sell the trading product, the at least one bid comprising a first-received bid to purchase a first quantity of the trading product, the at least one offer comprising a first-received offer to sell a second quantity of the trading product; and match and execute at least a portion of the first quantity of the first-received bid with at least a portion of the second quantity of the first-received offer. 32. (canceled) | Various embodiments are directed to a trading system and method for identifying interest and qualifying users to participate in an auction. The system may receive indicia indicating a first user's desire to trade a product or type. The system may determine that there is no matching counter-interest in the product or type. The system may qualify a subset of users to participate in an auction for the trading product based on each user's portfolio, order history, trade history, or specified interest. The system may determine an auction price for the trading product. Each user may view the trading product, the price, the auction start time, and fields for entering a bid or offer volume. The system may start the auction at the designated price for the subset of users. The system may match and execute all or portions of a bid and offer received before the end of the auction.1. A method of managing trading of a trading product of a first type, comprising:
receiving, by at least one processor, indicia indicating that a first user desires to trade one of (1) the trading product and (2) the type of trading product; determining, by the at least one processor, that there is no currently active matching contra interest to trade the one of (1) the trading product and (2) the type of trading product in an electronic market place; qualifying, by the at least one processor, each of a plurality of users to participate in an auction for the trading product based on at least one of (a) a portfolio of the user, (b) a trade history of the user, (c) an order history of the user, (d) one or more outstanding orders of the user, and (e) trading interest specified by the user, in which the plurality of users comprising the first user, the plurality of users consisting of a subset of users of the electronic marketplace; determining, by the at least one processor, a trading price for the auction for the trading product; causing, by the at least one processor, a display device of each of the plurality of users to display:
indicia identifying the trading product;
the price;
an auction start time;
an auction end time;
a bid quantity field for entering a quantity of the trading product offered to purchase; and
an offer quantity field for entering a quantity of the trading product offered for sale;
starting, by the at least one processor, an auction at the price for the plurality of users; prior to the auction end time, receiving, by the at least one processor, at least one bid to purchase the trading product and at least one offer to sell the trading product, the at least one bid comprising a first-received bid to purchase a first quantity of the trading product, the at least one offer comprising a first-received offer to sell a second quantity of the trading product; and matching and executing, by the at least one processor, at least a portion of the first quantity of the first-received bid with at least a portion of the second quantity of the first-received offer. 2. The method of claim 1, in which the act of determining a trading price comprises automatically determining a midpoint between a best bid price and a best offer price of the trading product. 3. The method of claim 1, in which the trading price comprises a price specified by the first user. 4. The method of claim 1, in which the trading price comprises a price determined by a non-trading third party. 5. The method of claim 1, in which the act of determining a trading price of the trading product comprises:
determining that the trading product is illiquid; transmitting a request for a human to determine a price for the trading product; and receiving from a human the trading price for the trading product. 6. The method of claim 1,
in which the first-received bid is from a first bidder and the first-received offer is from a first offeror, and in which an identity of the first bidder is not disclosed to the first offeror prior to the auction end time, and in which an identity of the first offeror is not disclosed to the first bidder prior to the auction end time. 7. The method of claim 1,
in which the first-received bid is from a first bidder and the first-received offer is from a first offeror, in which any existence of interest to purchase the trading product in the electronic marketplace is not disclosed to the first offeror prior to the auction end time, and in which any existence of interest to sell the trading product in the electronic marketplace is not disclosed to the first bidder prior to the auction end time. 8. The method of claim 1, in which the act of receiving indicia indicating that a first user desires to trade one of (1) the trading product and (2) the type of trading product comprises:
receiving from the first user an order to purchase or sell a quantity of the trading product. 9. The method of claim 8, in which the act of determining that there is no currently active matching contra interest to trade the one of (1) the trading product and (2) the type of trading product among in an electronic market place comprises:
after searching the electronic trading marketplace, determining that there is no order contra to the order from the first user in the electronic trading marketplace. 10. The method of claim 1, in which the act of receiving indicia indicating that a first user desires to trade one of (1) the trading product and (2) the type of trading product comprises:
receiving from the first user an indicia of interest in trading a type of trading product. 11. The method of claim 1, in which the act of receiving indicia indicating that a first user desires to trade one of (1) the trading product and (2) the type of trading product comprises:
receiving from the first user a request to initiate an auction for the first trading product, in which the act of starting the auction is based on the request to initiate the auction. 12. The method of claim 1, in which the act of qualifying each of the plurality of users to participate in an auction for the trading product comprises:
qualifying each of the plurality of users to participate in an auction for the trading product based on at least one of the user's portfolio, the user's trade history, the user's order history, the user's outstanding orders, and trading interest specified by the user. 13-16. (canceled) 17. The method of claim 1, further comprising:
prior to receiving indicia indicating that the first user desires to trade, qualifying the first user to view interest information in the one of (1) the trading product and (2) the type of trading product based on at least one of (a) a portfolio of the first user, (b) at least one prior trade by the first user in the one of (1) the trading product and (2) the type of trading product, (c) at least one prior order by the first user for a quantity of (1) the trading product or (2) a trading product of the type, (d) at least one current order by the first user for a quantity of the one of (1) the trading product and (2) a trading product of the type, and (e) trading interest specified by the first user in the one of (1) the trading product, (2) the type of trading product, and (3) another trading product of the type. 18. The method of claim 1, in which the act of qualifying each of a plurality of users to participate in an auction for the trading product comprises:
qualifying a second user of the plurality of users based on the second user previously submitting at least one order for the trading product that satisfies a predetermined minimum quantity threshold and a predetermined minimum duration threshold. 19. The method of claim 1, in which the act of qualifying each of a plurality of users to participate in an auction for the trading product comprises:
qualifying a second user of the plurality of users based on the second user transacting a trade for the trading product within a minimum period of time prior to one of (1) the time of qualifying, (2) the auction start time, (3) the auction end time, and (4) the day of the auction. 20. The method of claim 1, further comprising:
causing, by the at least one processor, a display device of each of the plurality of users to display:
indicia indicating each order submitted pursuant to the auction, in which the indicia does not indicate whether each order is a bid or offer. 21-23. (canceled) 24. The method of claim 1, in which the act of qualifying each of the plurality of users to participate in the auction is based on the act of determining that there is no currently active matching contra interest. 25. (canceled) 26. The method of claim 1, in which the act of receiving indicia indicating that a first user desires to trade is responsive to a failed negotiation between the first user and another user to trade the trading product, and in which the act of starting the auction is based on the failed negotiation. 27-28. (canceled) 29. An apparatus, comprising:
at least one processor; and at least one memory having instructions stored thereon which, when executed by the at least one processor, direct the at least one processor to:
receive indicia indicating that a first user desires to trade one of (1) a trading product and (2) a type of trading product comprising the trading product;
determine that there is no currently active matching contra interest to trade the one of (1) the trading product and (2) the type of trading product in an electronic market place;
qualify each of a plurality of users to participate in an auction for the trading product based on at least one of (a) a portfolio of the user, (b) a trade history of the user, (c) an order history of the user, (d) one or more outstanding orders of the user, and (e) trading interest specified by the user, in which the plurality of users comprising the first user, the plurality of users consisting of a subset of users of the electronic marketplace;
determine a trading price for the auction for the trading product;
cause a display device of the plurality of users to display:
indicia identifying the trading product;
the price;
an auction start time;
a bid quantity field for entering a quantity of the trading product offered to purchase; and
an offer quantity field for entering a quantity of the trading product offered for sale;
start an auction at the price for the plurality of users;
prior to an end time of the auction, receive at least one bid to purchase the trading product and at least one offer to sell the trading product, the at least one bid comprising a first-received bid to purchase a first quantity of the trading product, the at least one offer comprising a first-received offer to sell a second quantity of the trading product; and
match and execute at least a portion of the first quantity of the first-received bid with at least a portion of the second quantity of the first-received offer. 30. (canceled) 31. A machine-readable medium having instructions stored thereon and configured to cause at least one processor to:
receive indicia indicating that a first user desires to trade one of (1) a trading product and (2) a type of trading product comprising the trading product; determine that there is no currently active matching contra interest to trade the one of (1) the trading product and (2) the type of trading product in an electronic market place; qualify each of a plurality of users to participate in an auction for the trading product based on at least one of (a) a portfolio of the user, (b) a trade history of the user, (c) an order history of the user, (d) one or more outstanding orders of the user, and (e) trading interest specified by the user, in which the plurality of users comprising the first user, the plurality of users consisting of a subset of users of the electronic marketplace; determine a trading price for the auction for the trading product; cause a display device of the plurality of users to display:
indicia identifying the trading product;
the price;
an auction start time;
an auction end time;
a bid quantity field for entering a quantity of the trading product offered to purchase; and
an offer quantity field for entering a quantity of the trading product offered for sale;
start an auction at the price at the auction start time for the plurality of users; prior to the auction end time, receive at least one bid to purchase the trading product and at least one offer to sell the trading product, the at least one bid comprising a first-received bid to purchase a first quantity of the trading product, the at least one offer comprising a first-received offer to sell a second quantity of the trading product; and match and execute at least a portion of the first quantity of the first-received bid with at least a portion of the second quantity of the first-received offer. 32. (canceled) | 3,600 |
13,483 | 13,483 | 14,147,180 | 3,624 | The overall quality of a workforce is analyzed, scored and presented using an analysis engine that performs a multi-domain analysis on enterprise data. The analysis engine presents key information about the performance of a workforce across a range of hardware devices so as to inform different users in their unique contexts and roles within a business organization as to workforce performance. The analysis engine associates a customizable performance profile with each workforce member. Each performance profile is comprised of a plurality of performance measures. Each performance measure in turn, represents a performance metric that measures some aspect of the job duties performed by the associated workforce member, e.g., an industrial vehicle operator. The scores are aggregated into an overall performance profile score. To compute the scores, data is considered across multiple domains, e.g., by collecting and analyzing data from industrial vehicle data systems, warehouse management systems, labor management systems, etc. | 1. A method of aggregating measures of industrial vehicle operator performance, comprising:
coupling an analysis engine executing on a server computer to at least two independent and distinct electronic data sources including a first data source that collects information about industrial vehicles, and a second data source that collects information about a workforce, wherein the first data source receives electronic vehicle information including industrial vehicle usage data collected from industrial vehicles during operation thereof, which is wirelessly transmitted from the industrial vehicles; storing a performance profile having a plurality of performance measures, each performance measure characterizing a measure of performance of an industrial vehicle operator; assigning a specific industrial vehicle operator identification to a copy of the performance profile to define an operator-specific performance profile instance; and evaluating a current state of the operator-specific performance profile instance by:
processing each performance measure based upon the assigned industrial vehicle operator identification, using information from the first data source and the second data source, such that both the first data source and the second data source are queried to obtain information necessary to evaluate at least one performance measure of the performance profile instance;
computing at least one score for the operator identification based upon the evaluation of the performance profile instance; and
outputting a representation of the current state of the operator-specific performance profile instance. 2. The method of claim 1, wherein:
computing at least one score for the operator identification based upon the evaluation of the performance profile instance, comprises:
computing a performance measure score for each performance measure; and
assigning an associated performance measure threshold target to each performance measure;
outputting the current state of the operator-specific performance profile instance comprises displaying a representation of each computed performance measure score relative to the corresponding assigned performance measure threshold target. 3. The method according to claim 1, further comprising:
assigning a weight to each of the plurality of performance measures of the operator-specific performance profile instance; and computing a total score across the current state of the operator-specific performance profile instance based upon the weighted scores of each of the performance measures. 4. The method according to claim 1, further comprising:
assigning a group of industrial vehicle operator identifications to a team such that at least one unique team is defined; assigning each industrial vehicle operator identification to a copy of the performance profile to define an operator-specific performance profile instance; and performing an evaluation for each team by:
evaluating a current state of each operator-specific performance profile instance assigned to the team, by:
correlating information from at least one of the first data source and the second data source to evaluate each performance measure, based upon the assigned industrial vehicle operator identification, such that both the first data source and the second data source are queried to correlate information necessary to evaluate at least one performance measure of the performance profile instance; and
computing at least one score for the operator identification based upon the evaluation of the performance profile instance; and
computing at least one team score that represents an overall score for the group of industrial vehicle operator identifications assigned to the team based upon the evaluations of the corresponding performance profile instances; and
outputting a representation of the at least one team score. 5. The method according to claim 4, wherein:
performing an evaluation for each team comprises performing an evaluation for a plurality of teams; further comprising: outputting a representation of each team score in a manner that allows direct comparison of each computed team score. 6. The method according to claim 5, further comprising:
customizing a threshold target for at least one performance measure of each operator-specific performance profile instance to normalize the scores computed for each team. 7. The method according to claim 1, further comprising:
analyzing each computed score against an associated threshold target; selecting at least one computed score based upon the analysis of each computed score; analyzing underlying data evaluated to derive each selected score; and generating automatically, an indication of attribution that identifies a key indicator of the reason for the computed score. 8. The method according to claim 5, wherein:
selecting at least one computed score based upon the analysis of each computed score, comprises:
automatically selecting at least one computed score that falls below a corresponding threshold; and
automatically selecting at least one computed score that falls above a corresponding threshold; and
generating automatically, an indication of attribution that identifies a key indicator of the reason for the computed score, comprises:
generating automatically, an indication of a key indicator of a contributing factor for failing to meet the corresponding threshold; and
generating automatically, an affirmation identifying a contributing factor for meeting or exceeding the corresponding threshold. 9. The method according to claim 1, further comprising:
customizing at least one performance measure of the operator-specific performance profile instance according to the assigned industrial vehicle operator identification. 10. The method of claim 9, further comprising:
displaying a list of the plurality of performance measures in the performance profile; and providing a visual display configured to enable setting a weighting to each of the plurality of performance measures. 11. The method of claim 1, further comprising:
providing a user interface configured to enable a user to drill down into the underlying data used to evaluate the plurality of performance measures of the operator-specific performance profile instance. 12. The method of claim 1, wherein:
computing at least one score for the operator identification based upon the evaluation of the performance profile instance, comprises:
computing a performance measure score for each performance measure; and
assigning an associated performance measure threshold target to each performance measure;
further comprising:
defining a window that limits the scope of data from the first data source and second data source that can contribute to evaluating the current state of the operator-specific performance profile instance;
defining an overall target based upon each performance measure threshold target and the defined window;
comparing the computed performance measure score for each of the plurality of performance measures against its defined performance measure threshold target;
aggregating each computed performance measure score into an overall score; and
outputting a representation of the overall score relative to the overall target.
outputting a dashboard view characterizing the current state of the operator-specific performance profile instance by displaying a representation of the overall score relative to the overall target. 13. The method of claim 12, further comprising:
selecting at least one computed score; analyzing underlying data evaluated to derive the selected score; and generating automatically, an indication of attribution that identifies a key indicator of the reason for the computed score; outputting in the dashboard view, each computed performance measure score relative to the corresponding assigned performance measure threshold target, and the automatically generated indication of attribution. 14. The method of claim 12, further comprising:
providing a user interface configured to enable a user to drill down into the underlying data used to compute the scores of the plurality of performance measures of the operator-specific performance profile instance. 15. The method of claim 1, further comprising:
configuring teams of industrial vehicle operators by industrial vehicle operator identification; receiving hypothetical fleet upgrade data; calculating hypothetical average threshold values based at least in part on hypothetical fleet upgrade data and the data received from the fleet of industrial vehicles; performing a comparison of team performance measures and hypothetical average threshold values; and displaying the team performance measures based at least in part on the comparison so as to recommend whether it is better to upgrade to a new fleet vehicle or maintain the operator scores presently attained using current vehicles. 16. The method of claim 1, wherein:
outputting a representation of the current state of the operator-specific performance profile instance comprises: outputting to a vehicle operator display, a graphical representation of the current state of the operator-specific performance profile instance as a progress meter that identifies the progress of the operator in view of tasks to be completed, where the tasks are defined in the performance measures of the operator-specific performance profile instance. 17. The method of claim 16, further comprising:
providing an interface view on the vehicle operator display that allows the operator to zoom into a specific task; and the interface view further displays a second progress meter that graphically represents the progress of the operator relative to the specific task selected by the operator. 18. The method of claim 16, further comprising:
providing an interface view on the vehicle operator display that: displays information in a first window that is generated by a component of the an industrial vehicle to which the vehicle operator display is mounted; and displays information in a second window that is obtained from the second data source. | The overall quality of a workforce is analyzed, scored and presented using an analysis engine that performs a multi-domain analysis on enterprise data. The analysis engine presents key information about the performance of a workforce across a range of hardware devices so as to inform different users in their unique contexts and roles within a business organization as to workforce performance. The analysis engine associates a customizable performance profile with each workforce member. Each performance profile is comprised of a plurality of performance measures. Each performance measure in turn, represents a performance metric that measures some aspect of the job duties performed by the associated workforce member, e.g., an industrial vehicle operator. The scores are aggregated into an overall performance profile score. To compute the scores, data is considered across multiple domains, e.g., by collecting and analyzing data from industrial vehicle data systems, warehouse management systems, labor management systems, etc.1. A method of aggregating measures of industrial vehicle operator performance, comprising:
coupling an analysis engine executing on a server computer to at least two independent and distinct electronic data sources including a first data source that collects information about industrial vehicles, and a second data source that collects information about a workforce, wherein the first data source receives electronic vehicle information including industrial vehicle usage data collected from industrial vehicles during operation thereof, which is wirelessly transmitted from the industrial vehicles; storing a performance profile having a plurality of performance measures, each performance measure characterizing a measure of performance of an industrial vehicle operator; assigning a specific industrial vehicle operator identification to a copy of the performance profile to define an operator-specific performance profile instance; and evaluating a current state of the operator-specific performance profile instance by:
processing each performance measure based upon the assigned industrial vehicle operator identification, using information from the first data source and the second data source, such that both the first data source and the second data source are queried to obtain information necessary to evaluate at least one performance measure of the performance profile instance;
computing at least one score for the operator identification based upon the evaluation of the performance profile instance; and
outputting a representation of the current state of the operator-specific performance profile instance. 2. The method of claim 1, wherein:
computing at least one score for the operator identification based upon the evaluation of the performance profile instance, comprises:
computing a performance measure score for each performance measure; and
assigning an associated performance measure threshold target to each performance measure;
outputting the current state of the operator-specific performance profile instance comprises displaying a representation of each computed performance measure score relative to the corresponding assigned performance measure threshold target. 3. The method according to claim 1, further comprising:
assigning a weight to each of the plurality of performance measures of the operator-specific performance profile instance; and computing a total score across the current state of the operator-specific performance profile instance based upon the weighted scores of each of the performance measures. 4. The method according to claim 1, further comprising:
assigning a group of industrial vehicle operator identifications to a team such that at least one unique team is defined; assigning each industrial vehicle operator identification to a copy of the performance profile to define an operator-specific performance profile instance; and performing an evaluation for each team by:
evaluating a current state of each operator-specific performance profile instance assigned to the team, by:
correlating information from at least one of the first data source and the second data source to evaluate each performance measure, based upon the assigned industrial vehicle operator identification, such that both the first data source and the second data source are queried to correlate information necessary to evaluate at least one performance measure of the performance profile instance; and
computing at least one score for the operator identification based upon the evaluation of the performance profile instance; and
computing at least one team score that represents an overall score for the group of industrial vehicle operator identifications assigned to the team based upon the evaluations of the corresponding performance profile instances; and
outputting a representation of the at least one team score. 5. The method according to claim 4, wherein:
performing an evaluation for each team comprises performing an evaluation for a plurality of teams; further comprising: outputting a representation of each team score in a manner that allows direct comparison of each computed team score. 6. The method according to claim 5, further comprising:
customizing a threshold target for at least one performance measure of each operator-specific performance profile instance to normalize the scores computed for each team. 7. The method according to claim 1, further comprising:
analyzing each computed score against an associated threshold target; selecting at least one computed score based upon the analysis of each computed score; analyzing underlying data evaluated to derive each selected score; and generating automatically, an indication of attribution that identifies a key indicator of the reason for the computed score. 8. The method according to claim 5, wherein:
selecting at least one computed score based upon the analysis of each computed score, comprises:
automatically selecting at least one computed score that falls below a corresponding threshold; and
automatically selecting at least one computed score that falls above a corresponding threshold; and
generating automatically, an indication of attribution that identifies a key indicator of the reason for the computed score, comprises:
generating automatically, an indication of a key indicator of a contributing factor for failing to meet the corresponding threshold; and
generating automatically, an affirmation identifying a contributing factor for meeting or exceeding the corresponding threshold. 9. The method according to claim 1, further comprising:
customizing at least one performance measure of the operator-specific performance profile instance according to the assigned industrial vehicle operator identification. 10. The method of claim 9, further comprising:
displaying a list of the plurality of performance measures in the performance profile; and providing a visual display configured to enable setting a weighting to each of the plurality of performance measures. 11. The method of claim 1, further comprising:
providing a user interface configured to enable a user to drill down into the underlying data used to evaluate the plurality of performance measures of the operator-specific performance profile instance. 12. The method of claim 1, wherein:
computing at least one score for the operator identification based upon the evaluation of the performance profile instance, comprises:
computing a performance measure score for each performance measure; and
assigning an associated performance measure threshold target to each performance measure;
further comprising:
defining a window that limits the scope of data from the first data source and second data source that can contribute to evaluating the current state of the operator-specific performance profile instance;
defining an overall target based upon each performance measure threshold target and the defined window;
comparing the computed performance measure score for each of the plurality of performance measures against its defined performance measure threshold target;
aggregating each computed performance measure score into an overall score; and
outputting a representation of the overall score relative to the overall target.
outputting a dashboard view characterizing the current state of the operator-specific performance profile instance by displaying a representation of the overall score relative to the overall target. 13. The method of claim 12, further comprising:
selecting at least one computed score; analyzing underlying data evaluated to derive the selected score; and generating automatically, an indication of attribution that identifies a key indicator of the reason for the computed score; outputting in the dashboard view, each computed performance measure score relative to the corresponding assigned performance measure threshold target, and the automatically generated indication of attribution. 14. The method of claim 12, further comprising:
providing a user interface configured to enable a user to drill down into the underlying data used to compute the scores of the plurality of performance measures of the operator-specific performance profile instance. 15. The method of claim 1, further comprising:
configuring teams of industrial vehicle operators by industrial vehicle operator identification; receiving hypothetical fleet upgrade data; calculating hypothetical average threshold values based at least in part on hypothetical fleet upgrade data and the data received from the fleet of industrial vehicles; performing a comparison of team performance measures and hypothetical average threshold values; and displaying the team performance measures based at least in part on the comparison so as to recommend whether it is better to upgrade to a new fleet vehicle or maintain the operator scores presently attained using current vehicles. 16. The method of claim 1, wherein:
outputting a representation of the current state of the operator-specific performance profile instance comprises: outputting to a vehicle operator display, a graphical representation of the current state of the operator-specific performance profile instance as a progress meter that identifies the progress of the operator in view of tasks to be completed, where the tasks are defined in the performance measures of the operator-specific performance profile instance. 17. The method of claim 16, further comprising:
providing an interface view on the vehicle operator display that allows the operator to zoom into a specific task; and the interface view further displays a second progress meter that graphically represents the progress of the operator relative to the specific task selected by the operator. 18. The method of claim 16, further comprising:
providing an interface view on the vehicle operator display that: displays information in a first window that is generated by a component of the an industrial vehicle to which the vehicle operator display is mounted; and displays information in a second window that is obtained from the second data source. | 3,600 |
13,484 | 13,484 | 15,636,867 | 3,643 | The door system disclosed herein includes a frame and a door fabricated from a plurality of horizontal and vertical wire rods. The door may have an inverted hook which is aligned to a horizontal wire rod of the frame when the door is pivoted to the closed position. To close the door, the door is dropped so that the horizontal wire rod of the frame is traversed into the inverted hook. At this point, the animal inside of the pet crate cannot open the door by pushing the door. Rather, the door must be raised so that the inverted hook clears the horizontal wire rod of the frame to pivot the door to the opened position. | 1. An animal enclosure comprising:
a panel having a first horizontal wire, a second horizontal wire, a first vertical wire extending between the first and second horizontal wires and a second vertical wire extending between the first and second horizontal wires, the first and second wires and the first and second horizontal wires forming an opening sized and configured to enable an animal to pass therethrough; a door having a first horizontal wire, a second horizontal wire, and a vertical wire extending between the first and second horizontal wires of the door, each of the first horizontal wire and the second horizontal wire of the door being pivotally attached to the first vertical wire of the panel so that the door is pivotal between a closed position and an open position, and attached so that the door is vertically movable between a latched position and an unlatched position; a first hook attached to the first horizontal wire of the door and configured to engage the first horizontal wire of the panel adjacent the second vertical wire of the panel when the door is in the closed position and the latched position; a second hook attached to the first horizontal wire of the door and configured to engage the first horizontal wire of the panel adjacent the first vertical wire of the panel when the door is in the closed position and the latched position; a third hook attached to the second horizontal wire of the door and configured to engage the second horizontal wire of the panel adjacent the first vertical wire of the panel when the door is in the closed position and the latched position; a fourth hook attached to the second horizontal wire of the door and configured to engage the second horizontal wire of the panel adjacent the second vertical wire of the panel when the door is in the closed position and the latched position;
a latch attached to the door, the latch configured to move in a horizontal direction and engage the second horizontal wire of the panel. 2. The animal enclosure recited in claim 1, wherein
each of the first, second, third and fourth hooks are configured to disengage from a respective horizontal wire when the door is moved from the latched position to the unlatched position. 3. The animal enclosure recited in claim 1, wherein
the door has a perimeter that is greater than a perimeter of the opening in the panel. 4. The animal enclosure recited in claim 1, wherein
the door has a first side and a second side opposite the first side, the first side is disposed against the panel when the door is in the closed position, and each of the first, second, third and fourth hooks are attached to the door at the first side. 5. The animal enclosure recited in claim 1, wherein
the first horizontal wire of the door is configured to be disposed at least partly within the opening of the panel when the door is in the closed position, and the second horizontal wire of the door is configured to be disposed completely outside the opening of the panel when the door is in the closed position. 6. The animal enclosure recited in claim 1, wherein
the latch is disposed on a side of the door opposite a side in which each of the first horizontal wire and the second horizontal wire of the door are pivotally attached to the first vertical wire of the panel. 7. The animal enclosure recited in claim 1, wherein
each of the first, second, third and fourth hooks are an arcuate portion and a respective horizontal wire is disposed within the arcuate portion when the door is in the closed and latched position. 8. The animal enclosure recited in claim 1, wherein
each of the arcuate portions is disposed within a perimeter of the door. 9. The animal enclosure recited in claim 8, wherein
the perimeter of the door is greater than a perimeter of the opening in the panel. 10. The animal enclosure recited in claim 1, wherein
each of the first, second, third and fourth hooks has a first vertical portion and a second vertical portion, each of the first and second vertical portions being attached to the door. 11. The animal enclosure recited in claim 1, wherein
the latch is rotatable about a longitudinal axis. 12. The animal enclosure recited in claim 1, further comprising
a handle configured to enable the door to move in the vertical direction. 13. The animal enclosure recited in claim 12, wherein
the handle is attached to the latch, and is configured to enable the latch to rotate about a longitudinal axis. 14. The animal enclosure recited in claim 1, wherein
the first hook is disposed outside of a perimeter of the opening when the door I in the closed position and the latched position. | The door system disclosed herein includes a frame and a door fabricated from a plurality of horizontal and vertical wire rods. The door may have an inverted hook which is aligned to a horizontal wire rod of the frame when the door is pivoted to the closed position. To close the door, the door is dropped so that the horizontal wire rod of the frame is traversed into the inverted hook. At this point, the animal inside of the pet crate cannot open the door by pushing the door. Rather, the door must be raised so that the inverted hook clears the horizontal wire rod of the frame to pivot the door to the opened position.1. An animal enclosure comprising:
a panel having a first horizontal wire, a second horizontal wire, a first vertical wire extending between the first and second horizontal wires and a second vertical wire extending between the first and second horizontal wires, the first and second wires and the first and second horizontal wires forming an opening sized and configured to enable an animal to pass therethrough; a door having a first horizontal wire, a second horizontal wire, and a vertical wire extending between the first and second horizontal wires of the door, each of the first horizontal wire and the second horizontal wire of the door being pivotally attached to the first vertical wire of the panel so that the door is pivotal between a closed position and an open position, and attached so that the door is vertically movable between a latched position and an unlatched position; a first hook attached to the first horizontal wire of the door and configured to engage the first horizontal wire of the panel adjacent the second vertical wire of the panel when the door is in the closed position and the latched position; a second hook attached to the first horizontal wire of the door and configured to engage the first horizontal wire of the panel adjacent the first vertical wire of the panel when the door is in the closed position and the latched position; a third hook attached to the second horizontal wire of the door and configured to engage the second horizontal wire of the panel adjacent the first vertical wire of the panel when the door is in the closed position and the latched position; a fourth hook attached to the second horizontal wire of the door and configured to engage the second horizontal wire of the panel adjacent the second vertical wire of the panel when the door is in the closed position and the latched position;
a latch attached to the door, the latch configured to move in a horizontal direction and engage the second horizontal wire of the panel. 2. The animal enclosure recited in claim 1, wherein
each of the first, second, third and fourth hooks are configured to disengage from a respective horizontal wire when the door is moved from the latched position to the unlatched position. 3. The animal enclosure recited in claim 1, wherein
the door has a perimeter that is greater than a perimeter of the opening in the panel. 4. The animal enclosure recited in claim 1, wherein
the door has a first side and a second side opposite the first side, the first side is disposed against the panel when the door is in the closed position, and each of the first, second, third and fourth hooks are attached to the door at the first side. 5. The animal enclosure recited in claim 1, wherein
the first horizontal wire of the door is configured to be disposed at least partly within the opening of the panel when the door is in the closed position, and the second horizontal wire of the door is configured to be disposed completely outside the opening of the panel when the door is in the closed position. 6. The animal enclosure recited in claim 1, wherein
the latch is disposed on a side of the door opposite a side in which each of the first horizontal wire and the second horizontal wire of the door are pivotally attached to the first vertical wire of the panel. 7. The animal enclosure recited in claim 1, wherein
each of the first, second, third and fourth hooks are an arcuate portion and a respective horizontal wire is disposed within the arcuate portion when the door is in the closed and latched position. 8. The animal enclosure recited in claim 1, wherein
each of the arcuate portions is disposed within a perimeter of the door. 9. The animal enclosure recited in claim 8, wherein
the perimeter of the door is greater than a perimeter of the opening in the panel. 10. The animal enclosure recited in claim 1, wherein
each of the first, second, third and fourth hooks has a first vertical portion and a second vertical portion, each of the first and second vertical portions being attached to the door. 11. The animal enclosure recited in claim 1, wherein
the latch is rotatable about a longitudinal axis. 12. The animal enclosure recited in claim 1, further comprising
a handle configured to enable the door to move in the vertical direction. 13. The animal enclosure recited in claim 12, wherein
the handle is attached to the latch, and is configured to enable the latch to rotate about a longitudinal axis. 14. The animal enclosure recited in claim 1, wherein
the first hook is disposed outside of a perimeter of the opening when the door I in the closed position and the latched position. | 3,600 |
13,485 | 13,485 | 13,621,199 | 3,643 | A hoof boot has a base, a heel captivator, and a pivoting mechanism that disposes the heel captivator to pivot relative to the base, preferably in a manner that allows the heel captivator at least three degrees of freedom of movement relative to the base. The heel captivator is preferably low in the rearmost portion, which provides clearance for the pastern bones of the equine lower leg to descend upon weight bearing during movement at various gaits. To reduce the possibility for bruising and chaffing of soft tissue around the pastern bones, and to help eliminate accumulation of debris, preferred heel captivators have an open mesh architecture. Heel captivators can alternatively or additionally be designed with fabric covered neoprene or other liners. Boots are preferably tightened using mechanically advantages laces. | 1. A hoof boot for placement on a hoof, the hoof boot comprising:
a base including a bottom wherein the bottom covers the entire bottom surface of the hoof and wherein the base at least partially covers lateral and anterior surfaces of the hoof; a cupped heel captivator; and a coupling mechanism for coupling the base to the cupped heel captivator wherein the cupped heel captivator is coupled to the base and moves forward and upward relative to the base after coupling when said coupling mechanism is under tension. 2. The boot of claim 1 wherein the base comprises a polymeric substance. 3. The boot of claim 1 wherein the heel captivator includes a mesh with a plurality of holes. 4. The boot of claim 1 further comprising a lining underlying the heel captivator. 5. The boot of claim 1 wherein the coupling mechanism is a pivoting mechanism. 6. A hoof boot for placement on a hoof, the boot comprising:
a front and a rear; a longitudinal axis extending between the front and rear of the boot; a base wherein the base at least partially covers lateral and anterior surfaces of the hoof; wherein the base has sides and includes a bottom having a front and a back; a cupped heel captivator including front and rear portions; a coupling mechanism for coupling the base to the front portion of the cupped heel captivator wherein the coupling mechanism includes at least one tension element wherein the tension element passes through at least one restriction point; wherein the at least one restriction point is located between the front and back of the base and at a distance at least 40% of a distance between the front and the back thereof; wherein the rear portion of the heel captivator is unfastened to the base; and wherein when coupled under tension, the coupling mechanism provides forward and backward movement of the cupped heel captivator relative to the front and rear of the boot and allows lateral movement of the cupped heel captivator relative to the longitudinal axis. 7. The boot of claim 6 wherein the at least one restriction point is located a distance no more than 70% of the distance from the front to the back. 8. The boot of claim 6 wherein the at least one restriction point is located a distance 55% of the distance from the front to the back. 9. The boot of claim 6 wherein the at least one restriction point is coupled to the side of the base. 10. The boot of claim 6 wherein the base comprises a polymeric substance. 11. The boot of claim 6 wherein the heel captivator includes a mesh with a plurality of holes. 12. The boot of claim 6 further comprising a lining underlying the heel captivator. 13. The boot of claim 6 wherein the heel captivator can move forward and upward relative to the base after coupling. 14. The boot of claim 6 wherein the heel captivator can move forward and upward relative to the base after coupling when said coupling mechanism is under tension. 15. The boot of claim 6 wherein the coupling mechanism is a pivoting mechanism. 16. A hoof boot for placement on a hoof, the hoof boot comprising:
a base including a bottom wherein the bottom covers the entire bottom surface of the hoof and wherein the base at least partially covers lateral and anterior surfaces of the hoof; a cupped heel captivator having an edge, wherein the edge of the cupped heel captivator is disconnected from the base forming an interface of open nature to allow ejection of debris; and a coupling mechanism for coupling the base to the cupped heel captivator wherein the cupped heel captivator is coupled to the base and moves forward and upward relative to the base after coupling when said coupling mechanism is under tension. 17. The boot of claim 16 wherein the base comprises a polymeric substance. 18. The boot of claim 16 wherein the heel captivator includes a mesh with a plurality of holes, a top arch and strap holders portions wherein the top arch extends from one strap holder to the other strap holder. 19. The boot of claim 16 further comprising a lining underlying the heel captivator. 20. The boot of claim 16 wherein the coupling mechanism is a pivoting mechanism. | A hoof boot has a base, a heel captivator, and a pivoting mechanism that disposes the heel captivator to pivot relative to the base, preferably in a manner that allows the heel captivator at least three degrees of freedom of movement relative to the base. The heel captivator is preferably low in the rearmost portion, which provides clearance for the pastern bones of the equine lower leg to descend upon weight bearing during movement at various gaits. To reduce the possibility for bruising and chaffing of soft tissue around the pastern bones, and to help eliminate accumulation of debris, preferred heel captivators have an open mesh architecture. Heel captivators can alternatively or additionally be designed with fabric covered neoprene or other liners. Boots are preferably tightened using mechanically advantages laces.1. A hoof boot for placement on a hoof, the hoof boot comprising:
a base including a bottom wherein the bottom covers the entire bottom surface of the hoof and wherein the base at least partially covers lateral and anterior surfaces of the hoof; a cupped heel captivator; and a coupling mechanism for coupling the base to the cupped heel captivator wherein the cupped heel captivator is coupled to the base and moves forward and upward relative to the base after coupling when said coupling mechanism is under tension. 2. The boot of claim 1 wherein the base comprises a polymeric substance. 3. The boot of claim 1 wherein the heel captivator includes a mesh with a plurality of holes. 4. The boot of claim 1 further comprising a lining underlying the heel captivator. 5. The boot of claim 1 wherein the coupling mechanism is a pivoting mechanism. 6. A hoof boot for placement on a hoof, the boot comprising:
a front and a rear; a longitudinal axis extending between the front and rear of the boot; a base wherein the base at least partially covers lateral and anterior surfaces of the hoof; wherein the base has sides and includes a bottom having a front and a back; a cupped heel captivator including front and rear portions; a coupling mechanism for coupling the base to the front portion of the cupped heel captivator wherein the coupling mechanism includes at least one tension element wherein the tension element passes through at least one restriction point; wherein the at least one restriction point is located between the front and back of the base and at a distance at least 40% of a distance between the front and the back thereof; wherein the rear portion of the heel captivator is unfastened to the base; and wherein when coupled under tension, the coupling mechanism provides forward and backward movement of the cupped heel captivator relative to the front and rear of the boot and allows lateral movement of the cupped heel captivator relative to the longitudinal axis. 7. The boot of claim 6 wherein the at least one restriction point is located a distance no more than 70% of the distance from the front to the back. 8. The boot of claim 6 wherein the at least one restriction point is located a distance 55% of the distance from the front to the back. 9. The boot of claim 6 wherein the at least one restriction point is coupled to the side of the base. 10. The boot of claim 6 wherein the base comprises a polymeric substance. 11. The boot of claim 6 wherein the heel captivator includes a mesh with a plurality of holes. 12. The boot of claim 6 further comprising a lining underlying the heel captivator. 13. The boot of claim 6 wherein the heel captivator can move forward and upward relative to the base after coupling. 14. The boot of claim 6 wherein the heel captivator can move forward and upward relative to the base after coupling when said coupling mechanism is under tension. 15. The boot of claim 6 wherein the coupling mechanism is a pivoting mechanism. 16. A hoof boot for placement on a hoof, the hoof boot comprising:
a base including a bottom wherein the bottom covers the entire bottom surface of the hoof and wherein the base at least partially covers lateral and anterior surfaces of the hoof; a cupped heel captivator having an edge, wherein the edge of the cupped heel captivator is disconnected from the base forming an interface of open nature to allow ejection of debris; and a coupling mechanism for coupling the base to the cupped heel captivator wherein the cupped heel captivator is coupled to the base and moves forward and upward relative to the base after coupling when said coupling mechanism is under tension. 17. The boot of claim 16 wherein the base comprises a polymeric substance. 18. The boot of claim 16 wherein the heel captivator includes a mesh with a plurality of holes, a top arch and strap holders portions wherein the top arch extends from one strap holder to the other strap holder. 19. The boot of claim 16 further comprising a lining underlying the heel captivator. 20. The boot of claim 16 wherein the coupling mechanism is a pivoting mechanism. | 3,600 |
13,486 | 13,486 | 15,100,027 | 3,672 | A fluidic oscillator assembly can include at least one fluidic oscillator, and a closure that in one position prevents flow through the oscillator to an exterior of the assembly, and in another position permits flow through the oscillator to the exterior. A method can include flowing fluid longitudinally through a fluidic oscillator assembly in a well, then diverting the fluid to flow outward from the assembly via at least one fluidic oscillator, the fluid being prevented from flowing longitudinally through the assembly. A well system can include a drill string having a fluidic oscillator assembly, a drill bit, and a drilling motor disposed between the drill bit and the assembly. The assembly can include a closure that in one position prevents fluid flow through a fluidic oscillator to an annulus formed between the drill string and a wellbore, and in another position permits fluid flow through the oscillator. | 1. A fluidic oscillator assembly for use in a subterranean well, the assembly comprising:
at least one fluidic oscillator formed in a structure; and a closure that in a first position prevents fluid flow through the fluidic oscillator to an exterior of the assembly, and in a second position permits fluid flow through the fluidic oscillator to the exterior of the assembly. 2. The fluidic oscillator assembly of claim 1, wherein the structure has a longitudinal bore extending through the structure, wherein fluid flow through the bore is permitted in the first position of the closure, and wherein fluid flow through the bore is prevented in the second position of the closure. 3. The fluidic oscillator assembly of claim 1, wherein the structure has a longitudinal bore extending through the structure, and wherein the closure is sealingly and slidingly received in the bore. 4. The fluidic oscillator assembly of claim 1, wherein the closure has a longitudinal passage extending through the closure, and further comprising a plug received in the passage. 5. The fluidic oscillator assembly of claim 4, wherein the closure is releasably secured against displacement relative to the structure, and wherein a predetermined pressure differential across the plug releases the closure for displacement relative to the structure. 6. The fluidic oscillator assembly of claim 5, wherein the predetermined pressure differential across the plug displaces the closure from the first position to the second position. 7. The fluidic oscillator assembly of claim 1, wherein, in the second position of the closure, fluid flow passes through the fluidic oscillator between the structure and an outer generally tubular housing in which the structure is received. 8. A method, comprising:
flowing fluid longitudinally through a fluidic oscillator assembly in a well; then diverting the fluid to flow outward from the fluidic oscillator assembly via at least one fluidic oscillator of the fluidic oscillator assembly, the fluid being prevented from flowing longitudinally through the fluidic oscillator assembly. 9. The method of claim 8, wherein the diverting comprises installing a plug in a longitudinal passage of the fluidic oscillator assembly. 10. The method of claim 9, wherein the diverting further comprises applying a predetermined pressure differential across the plug, thereby displacing a closure from a first position in which the closure prevents flow of the fluid through the fluidic oscillator to a second position in which flow of the fluid through the fluidic oscillator is permitted. 11. The method of claim 10, wherein the passage is formed through the closure, and wherein the closure is sealingly and slidingly received in a structure, the fluidic oscillator being formed in the structure. 12. The method of claim 8, wherein the flowing further comprises flowing the fluid through a drilling motor connected between the fluidic oscillator assembly and a drill bit. 13. The method of claim 12, wherein the diverting further comprises preventing flow of the fluid through the drilling motor. 14. The method of claim 8, wherein the diverting further comprises the fluidic oscillator producing oscillations in the fluid flow, the fluid flow oscillations being communicated into the earth formation. 15. A well system, comprising:
a drill string including a fluidic oscillator assembly, a drilling motor, and a drill bit, the drilling motor being disposed between the drill bit and the fluidic oscillator assembly, and wherein the fluidic oscillator assembly includes a closure that in a first position prevents fluid flow through a fluidic oscillator to an annulus formed between the drill string and a wellbore, and in a second position permits fluid flow through the fluidic oscillator to the annulus. 16. The well system of claim 15, wherein fluid flow through the fluidic oscillator assembly to the drilling motor is permitted in the first position of the closure, and wherein fluid flow through the fluidic oscillator assembly to the drilling motor is prevented in the second position of the closure. 17. The well system of claim 15, wherein the fluidic oscillator is formed in a structure, wherein the structure has a longitudinal bore extending through the structure, and wherein the closure is sealingly and slidingly received in the bore. 18. The well system of claim 15, wherein the closure has a longitudinal passage extending through the closure, and further comprising a plug received in the passage. 19. The well system of claim 18, wherein the closure is releasably secured against displacement relative to the fluidic oscillator, and wherein a predetermined pressure differential across the plug releases the closure for displacement relative to the fluidic oscillator. 20. The fluidic oscillator assembly of claim 19, wherein the predetermined pressure differential across the plug displaces the closure from the first position to the second position. | A fluidic oscillator assembly can include at least one fluidic oscillator, and a closure that in one position prevents flow through the oscillator to an exterior of the assembly, and in another position permits flow through the oscillator to the exterior. A method can include flowing fluid longitudinally through a fluidic oscillator assembly in a well, then diverting the fluid to flow outward from the assembly via at least one fluidic oscillator, the fluid being prevented from flowing longitudinally through the assembly. A well system can include a drill string having a fluidic oscillator assembly, a drill bit, and a drilling motor disposed between the drill bit and the assembly. The assembly can include a closure that in one position prevents fluid flow through a fluidic oscillator to an annulus formed between the drill string and a wellbore, and in another position permits fluid flow through the oscillator.1. A fluidic oscillator assembly for use in a subterranean well, the assembly comprising:
at least one fluidic oscillator formed in a structure; and a closure that in a first position prevents fluid flow through the fluidic oscillator to an exterior of the assembly, and in a second position permits fluid flow through the fluidic oscillator to the exterior of the assembly. 2. The fluidic oscillator assembly of claim 1, wherein the structure has a longitudinal bore extending through the structure, wherein fluid flow through the bore is permitted in the first position of the closure, and wherein fluid flow through the bore is prevented in the second position of the closure. 3. The fluidic oscillator assembly of claim 1, wherein the structure has a longitudinal bore extending through the structure, and wherein the closure is sealingly and slidingly received in the bore. 4. The fluidic oscillator assembly of claim 1, wherein the closure has a longitudinal passage extending through the closure, and further comprising a plug received in the passage. 5. The fluidic oscillator assembly of claim 4, wherein the closure is releasably secured against displacement relative to the structure, and wherein a predetermined pressure differential across the plug releases the closure for displacement relative to the structure. 6. The fluidic oscillator assembly of claim 5, wherein the predetermined pressure differential across the plug displaces the closure from the first position to the second position. 7. The fluidic oscillator assembly of claim 1, wherein, in the second position of the closure, fluid flow passes through the fluidic oscillator between the structure and an outer generally tubular housing in which the structure is received. 8. A method, comprising:
flowing fluid longitudinally through a fluidic oscillator assembly in a well; then diverting the fluid to flow outward from the fluidic oscillator assembly via at least one fluidic oscillator of the fluidic oscillator assembly, the fluid being prevented from flowing longitudinally through the fluidic oscillator assembly. 9. The method of claim 8, wherein the diverting comprises installing a plug in a longitudinal passage of the fluidic oscillator assembly. 10. The method of claim 9, wherein the diverting further comprises applying a predetermined pressure differential across the plug, thereby displacing a closure from a first position in which the closure prevents flow of the fluid through the fluidic oscillator to a second position in which flow of the fluid through the fluidic oscillator is permitted. 11. The method of claim 10, wherein the passage is formed through the closure, and wherein the closure is sealingly and slidingly received in a structure, the fluidic oscillator being formed in the structure. 12. The method of claim 8, wherein the flowing further comprises flowing the fluid through a drilling motor connected between the fluidic oscillator assembly and a drill bit. 13. The method of claim 12, wherein the diverting further comprises preventing flow of the fluid through the drilling motor. 14. The method of claim 8, wherein the diverting further comprises the fluidic oscillator producing oscillations in the fluid flow, the fluid flow oscillations being communicated into the earth formation. 15. A well system, comprising:
a drill string including a fluidic oscillator assembly, a drilling motor, and a drill bit, the drilling motor being disposed between the drill bit and the fluidic oscillator assembly, and wherein the fluidic oscillator assembly includes a closure that in a first position prevents fluid flow through a fluidic oscillator to an annulus formed between the drill string and a wellbore, and in a second position permits fluid flow through the fluidic oscillator to the annulus. 16. The well system of claim 15, wherein fluid flow through the fluidic oscillator assembly to the drilling motor is permitted in the first position of the closure, and wherein fluid flow through the fluidic oscillator assembly to the drilling motor is prevented in the second position of the closure. 17. The well system of claim 15, wherein the fluidic oscillator is formed in a structure, wherein the structure has a longitudinal bore extending through the structure, and wherein the closure is sealingly and slidingly received in the bore. 18. The well system of claim 15, wherein the closure has a longitudinal passage extending through the closure, and further comprising a plug received in the passage. 19. The well system of claim 18, wherein the closure is releasably secured against displacement relative to the fluidic oscillator, and wherein a predetermined pressure differential across the plug releases the closure for displacement relative to the fluidic oscillator. 20. The fluidic oscillator assembly of claim 19, wherein the predetermined pressure differential across the plug displaces the closure from the first position to the second position. | 3,600 |
13,487 | 13,487 | 14,161,938 | 3,622 | A commerce system has retailers offering products for sale to consumers. A list including an item is provided. A set of products interchangeable with the item is determined. A product is selected from the set of products to maximize a value to a consumer. An activity within the commerce system is controlled in response to a consumer decision to purchase the selected product. A first attribute of the item is compared to a second attribute of an interchangeable product when determining the set of products. Data associated with a plurality of interchangeable products is accessed via an intelligent personal agent when determining the set of products. The selection of the product is based on a preference or a requirement defined by the consumer. The selection of the product is based on a discount associated with the product. A local retailer selling the selected product is identified when selecting the product. | 1. A method of controlling an activity within a commerce system, comprising:
providing a list including an item; determining a set of products interchangeable with the item; selecting a product from the set of products to maximize a value to a consumer; and controlling the activity within the commerce system in response to a decision by the consumer to purchase the selected product. 2. The method of claim 1, wherein determining the set of products includes comparing a first attribute of the item to a second attribute of an interchangeable product. 3. The method of claim 1, wherein determining the set of products includes accessing data associated with a plurality of interchangeable products via an intelligent personal agent. 4. The method of claim 1, further including selecting the product based on a preference or a requirement defined by the consumer. 5. The method of claim 1, further including selecting the product based on a discount associated with the product. 6. The method of claim 1, wherein selecting the product includes identifying a local retailer selling the selected product. 7. A method of controlling an activity within a commerce system, comprising:
providing an item; determining a set of products interchangeable with the item; selecting a product from the set of products to meet a consumer satisfaction threshold; and controlling the activity within the commerce system in response to a decision by the consumer to purchase the selected product. 8. The method of claim 7, wherein determining the set of products includes comparing a first attribute of the item to a second attribute of an interchangeable product. 9. The method of claim 7, wherein determining the set of products includes accessing an intelligent personal agent. 10. The method of claim 7, further including selecting the product based on a preference or a requirement defined by the consumer. 11. The method of claim 7, further including selecting the product based on a discount associated with the product. 12. The method of claim 7, wherein selecting the product includes selecting a local retailer selling the selected product. 13. The method of claim 7, further including providing a list wherein the list includes the item. 14. A method of controlling a purchasing activity, comprising:
determining a set of products interchangeable with an item; associating a discount with each product from the set of products to create a set of discounted products; and controlling the purchasing activity by selecting a discounted product from the set of discounted products for purchase by a consumer. 15. The method of claim 14, wherein determining the set of products includes comparing a first attribute of the item to a second attribute of an interchangeable product. 16. The method of claim 14, wherein determining the set of products includes accessing data associated with a plurality of interchangeable products via an intelligent personal agent. 17. The method of claim 14, further including selecting the discounted product based on a preference defined by the consumer. 18. The method of claim 14, further including selecting the discounted product based on a requirement defined by the consumer. 19. The method of claim 14, wherein selecting the discounted product includes selecting a local retailer selling the selected product. 20. A computer program product usable with a programmable computer processor having a computer readable program code embodied in a non-transitory computer usable medium for controlling an activity within a commerce system, comprising:
providing an item; determining a set of products interchangeable with the item; selecting a product from the set of products to meet a consumer satisfaction threshold; and controlling the activity within the commerce system in response to a decision by the consumer to purchase the selected product. 21. The computer program product of claim 20, wherein determining the set of products includes comparing a first attribute of the item to a second attribute of an interchangeable product. 22. The computer program product of claim 20, wherein determining the set of products includes accessing an intelligent personal agent. 23. The computer program product of claim 20, further including selecting the product based on a preference or a requirement defined by the consumer. 24. The computer program product of claim 20, further including selecting the product based on a discount associated with the product. 25. The computer program product of claim 20, wherein selecting the product includes identifying a local retailer selling the selected product. | A commerce system has retailers offering products for sale to consumers. A list including an item is provided. A set of products interchangeable with the item is determined. A product is selected from the set of products to maximize a value to a consumer. An activity within the commerce system is controlled in response to a consumer decision to purchase the selected product. A first attribute of the item is compared to a second attribute of an interchangeable product when determining the set of products. Data associated with a plurality of interchangeable products is accessed via an intelligent personal agent when determining the set of products. The selection of the product is based on a preference or a requirement defined by the consumer. The selection of the product is based on a discount associated with the product. A local retailer selling the selected product is identified when selecting the product.1. A method of controlling an activity within a commerce system, comprising:
providing a list including an item; determining a set of products interchangeable with the item; selecting a product from the set of products to maximize a value to a consumer; and controlling the activity within the commerce system in response to a decision by the consumer to purchase the selected product. 2. The method of claim 1, wherein determining the set of products includes comparing a first attribute of the item to a second attribute of an interchangeable product. 3. The method of claim 1, wherein determining the set of products includes accessing data associated with a plurality of interchangeable products via an intelligent personal agent. 4. The method of claim 1, further including selecting the product based on a preference or a requirement defined by the consumer. 5. The method of claim 1, further including selecting the product based on a discount associated with the product. 6. The method of claim 1, wherein selecting the product includes identifying a local retailer selling the selected product. 7. A method of controlling an activity within a commerce system, comprising:
providing an item; determining a set of products interchangeable with the item; selecting a product from the set of products to meet a consumer satisfaction threshold; and controlling the activity within the commerce system in response to a decision by the consumer to purchase the selected product. 8. The method of claim 7, wherein determining the set of products includes comparing a first attribute of the item to a second attribute of an interchangeable product. 9. The method of claim 7, wherein determining the set of products includes accessing an intelligent personal agent. 10. The method of claim 7, further including selecting the product based on a preference or a requirement defined by the consumer. 11. The method of claim 7, further including selecting the product based on a discount associated with the product. 12. The method of claim 7, wherein selecting the product includes selecting a local retailer selling the selected product. 13. The method of claim 7, further including providing a list wherein the list includes the item. 14. A method of controlling a purchasing activity, comprising:
determining a set of products interchangeable with an item; associating a discount with each product from the set of products to create a set of discounted products; and controlling the purchasing activity by selecting a discounted product from the set of discounted products for purchase by a consumer. 15. The method of claim 14, wherein determining the set of products includes comparing a first attribute of the item to a second attribute of an interchangeable product. 16. The method of claim 14, wherein determining the set of products includes accessing data associated with a plurality of interchangeable products via an intelligent personal agent. 17. The method of claim 14, further including selecting the discounted product based on a preference defined by the consumer. 18. The method of claim 14, further including selecting the discounted product based on a requirement defined by the consumer. 19. The method of claim 14, wherein selecting the discounted product includes selecting a local retailer selling the selected product. 20. A computer program product usable with a programmable computer processor having a computer readable program code embodied in a non-transitory computer usable medium for controlling an activity within a commerce system, comprising:
providing an item; determining a set of products interchangeable with the item; selecting a product from the set of products to meet a consumer satisfaction threshold; and controlling the activity within the commerce system in response to a decision by the consumer to purchase the selected product. 21. The computer program product of claim 20, wherein determining the set of products includes comparing a first attribute of the item to a second attribute of an interchangeable product. 22. The computer program product of claim 20, wherein determining the set of products includes accessing an intelligent personal agent. 23. The computer program product of claim 20, further including selecting the product based on a preference or a requirement defined by the consumer. 24. The computer program product of claim 20, further including selecting the product based on a discount associated with the product. 25. The computer program product of claim 20, wherein selecting the product includes identifying a local retailer selling the selected product. | 3,600 |
13,488 | 13,488 | 14,310,061 | 3,628 | At a remote server, an indication is obtained that a prospective transit rider has come into geographic proximity of a particular transit boarding area. At the remote server, an authorization request is dispatched to an issuer of a payment card account associated with the prospective transit rider, based on the remote server accessing a database based on the indication. At the remote server, a response to the authorization request is obtained from the issuer. If the response is affirmative, dispatch of an electronic ticket to a portable electronic device of the prospective transit rider is initiated. | 1. A method comprising the steps of:
obtaining, at a remote server, an indication that a prospective transit rider has come into geographic proximity of a particular transit boarding area; at the remote server, dispatching an authorization request to an issuer of a payment card account associated with said prospective transit rider, based on said remote server accessing a database based on said indication; obtaining, at said remote server, a response to said authorization request, from said issuer; if said response is affirmative, initiating dispatch of an electronic ticket to a portable electronic device of said prospective transit rider. 2. The method of claim 1, wherein, in said step of obtaining said indication, said indication is based on global positioning system-determined location of said portable electronic device of said prospective transit rider. 3. The method of claim 1, wherein, in said step of obtaining said indication, said indication is based on said portable electronic device of said prospective transit rider being in range of a Wi-Fi transceiver of said particular transit boarding area. 4. The method of claim 1, wherein, in said step of obtaining said indication, said indication is based on visible identifying indicia data dispatched to said remote server from said portable electronic device of said prospective transit rider. 5. The method of claim 4, wherein, in said step of obtaining said indication, said visible identifying indicia data comprises a number, uniquely identifying said particular transit boarding area, visually posted on said particular transit boarding area. 6. The method of claim 4, wherein, in said step of obtaining said indication, said visible identifying indicia data comprises a bar code, uniquely identifying said particular transit boarding area, visually posted on said particular transit boarding area. 7. The method of claim 1, wherein:
said particular transit boarding area comprises a rapid transit bus stop; said remote server accessing said database based on said indication comprises said remote server querying said database based on said indication to identify said rapid transit bus stop, an associated rapid transit bus route, an associated direction of travel, and a corresponding fare; and in said step of dispatching said authorization request, said authorization request includes an amount of said corresponding fare. 8. The method of claim 7, further comprising:
dispatching, from said remote server, to said portable electronic device of said prospective transit rider, a confirmatory query asking said prospective transit rider to confirm accuracy of said associated rapid transit bus route, said associated direction of travel, and said corresponding fare; and obtaining, at said remote server, an affirmative response to said confirmatory query; wherein said dispatch of said electronic ticket to said portable electronic device of said prospective transit rider is further responsive to said affirmative response to said confirmatory query. 9. The method of claim 1, further comprising:
obtaining, at said remote server, from a portable electronic device of an official, a validation query, said portable electronic device of said official being separate from said portable electronic device of said prospective transit rider; and responsive to said validation query, dispatching, from said remote server, to said portable electronic device of said official, a response to assist said official in assessing validity of said electronic ticket. 10. The method of claim 1, wherein:
said obtaining of said indication is carried out with a back office platform module, embodied on a non-transitory computer-readable storage medium, executing on at least one hardware processor of said remote server; said dispatching of said authorization request is carried out with said back office platform module, executing on said at least one hardware processor of said remote server, based on a query of said database with a back office database module embodied on said non-transitory computer-readable storage medium, executing on said at least one hardware processor of said remote server; said obtaining of said response to said authorization request is carried out with said back office platform module, executing on said at least one hardware processor of said remote server; and said initiating of said dispatch of said electronic ticket is carried out with said back office platform module, executing on said at least one hardware processor of said remote server. 11. A method comprising the steps of:
dispatching, from a portable electronic device of a prospective transit rider, to a remote server, an indication that said prospective transit rider has come into geographic proximity of a particular transit boarding area; obtaining, from said remote server, a confirmation query seeking to confirm whether said prospective transit rider seeks to board a certain transit mode, at a certain fare, said confirmation query having been determined based on said indication; dispatching, from said portable electronic device of said prospective transit rider, to said remote server, an affirmative response to said confirmation query; and obtaining, from said remote server, an electronic ticket. 12. The method of claim 11, further comprising developing said indication based on global positioning system-determined location of said portable electronic device of said prospective transit rider. 13. The method of claim 11, further comprising developing said indication based on said portable electronic device of said prospective transit rider being in range of a Wi-Fi transceiver of said particular transit boarding area. 14. The method of claim 11, wherein, in said dispatching step, said indication comprises visible identifying indicia data dispatched to said remote server from said portable electronic device of said prospective transit rider. 15. The method of claim 14, wherein, in said dispatching step, said visible identifying indicia data comprises a number, uniquely identifying said particular transit boarding area, visually posted on said particular transit boarding area. 16. The method of claim 14, wherein, in said dispatching step, said visible identifying indicia data comprises a bar code, uniquely identifying said particular transit boarding area, visually posted on said particular transit boarding area. 17. The method of claim 11, further comprising:
providing, by said portable electronic device of said prospective transit rider, to an official, at least one of a serial number and a bar code, with which said official can formulate a validation query, from a portable electronic device of said official to said remote server, said portable electronic device of said official being separate from said portable electronic device of said prospective transit rider. 18. The method of claim 11, wherein said particular transit boarding area comprises a first rapid transit bus stop for a first associated rapid transit bus route, further comprising displaying at least a portion of said electronic ticket, on a display device of said portable electronic device of said prospective transit rider, to a crew member of a bus on a second rapid transit bus route, to authorize transfer of said prospective transit rider from said first associated rapid transit bus route to said second rapid transit bus route. 19. The method of claim 11, wherein:
said dispatching of said indication, said obtaining of said confirmation query, said dispatching of said affirmative response, and said obtaining of said electronic ticket are carried out with a transit application module, embodied on a non-transitory computer-readable storage medium, executing on at least one hardware processor of said portable electronic device of said prospective transit rider, said transit application module communicating with said remote server via at least one of a cellular transceiver module and a Wi-Fi transceiver module of said portable electronic device of said prospective transit rider. 20. A transit back office server apparatus comprising:
a memory; at least one processor operatively coupled to said memory; and a persistent storage device operatively coupled to said memory and storing in a non-transitory manner instructions which when loaded into said memory cause said at least one processor to be operative to:
obtain an indication that a prospective transit rider has come into geographic proximity of a particular transit boarding area;
dispatch an authorization request to an issuer of a payment card account associated with said prospective transit rider, based on said back office server apparatus accessing a database based on said indication;
obtain a response to said authorization request, from said issuer; and
if said response is affirmative, initiate dispatch of an electronic ticket to a portable electronic device of said prospective transit rider. 21. The method of claim 20, wherein:
said particular transit boarding area comprises a rapid transit bus stop; said persistent storage device operatively coupled to said memory further stores in a non-transitory manner instructions which when loaded into said memory cause said at least one processor to be further operative to access said database based on said indication by querying said database based on said indication to identify said rapid transit bus stop, an associated rapid transit bus route, an associated direction of travel, and a corresponding fare; and said authorization request includes an amount of said corresponding fare. 22. A portable electronic device comprising:
a memory; at least one processor operatively coupled to said memory; and a persistent storage device operatively coupled to said memory and storing in a non-transitory manner instructions which when loaded into said memory cause said at least one processor to be operative to:
dispatch, to a remote server, an indication that a prospective transit rider using said portable electronic device has come into geographic proximity of a particular transit boarding area;
obtain, from said remote server, a confirmation query seeking to confirm whether said prospective transit rider seeks to board a certain transit mode, at a certain fare, said confirmation query having been determined based on said indication;
dispatch, to said remote server, an affirmative response to said confirmation query; and
obtaining, from said remote server, an electronic ticket. | At a remote server, an indication is obtained that a prospective transit rider has come into geographic proximity of a particular transit boarding area. At the remote server, an authorization request is dispatched to an issuer of a payment card account associated with the prospective transit rider, based on the remote server accessing a database based on the indication. At the remote server, a response to the authorization request is obtained from the issuer. If the response is affirmative, dispatch of an electronic ticket to a portable electronic device of the prospective transit rider is initiated.1. A method comprising the steps of:
obtaining, at a remote server, an indication that a prospective transit rider has come into geographic proximity of a particular transit boarding area; at the remote server, dispatching an authorization request to an issuer of a payment card account associated with said prospective transit rider, based on said remote server accessing a database based on said indication; obtaining, at said remote server, a response to said authorization request, from said issuer; if said response is affirmative, initiating dispatch of an electronic ticket to a portable electronic device of said prospective transit rider. 2. The method of claim 1, wherein, in said step of obtaining said indication, said indication is based on global positioning system-determined location of said portable electronic device of said prospective transit rider. 3. The method of claim 1, wherein, in said step of obtaining said indication, said indication is based on said portable electronic device of said prospective transit rider being in range of a Wi-Fi transceiver of said particular transit boarding area. 4. The method of claim 1, wherein, in said step of obtaining said indication, said indication is based on visible identifying indicia data dispatched to said remote server from said portable electronic device of said prospective transit rider. 5. The method of claim 4, wherein, in said step of obtaining said indication, said visible identifying indicia data comprises a number, uniquely identifying said particular transit boarding area, visually posted on said particular transit boarding area. 6. The method of claim 4, wherein, in said step of obtaining said indication, said visible identifying indicia data comprises a bar code, uniquely identifying said particular transit boarding area, visually posted on said particular transit boarding area. 7. The method of claim 1, wherein:
said particular transit boarding area comprises a rapid transit bus stop; said remote server accessing said database based on said indication comprises said remote server querying said database based on said indication to identify said rapid transit bus stop, an associated rapid transit bus route, an associated direction of travel, and a corresponding fare; and in said step of dispatching said authorization request, said authorization request includes an amount of said corresponding fare. 8. The method of claim 7, further comprising:
dispatching, from said remote server, to said portable electronic device of said prospective transit rider, a confirmatory query asking said prospective transit rider to confirm accuracy of said associated rapid transit bus route, said associated direction of travel, and said corresponding fare; and obtaining, at said remote server, an affirmative response to said confirmatory query; wherein said dispatch of said electronic ticket to said portable electronic device of said prospective transit rider is further responsive to said affirmative response to said confirmatory query. 9. The method of claim 1, further comprising:
obtaining, at said remote server, from a portable electronic device of an official, a validation query, said portable electronic device of said official being separate from said portable electronic device of said prospective transit rider; and responsive to said validation query, dispatching, from said remote server, to said portable electronic device of said official, a response to assist said official in assessing validity of said electronic ticket. 10. The method of claim 1, wherein:
said obtaining of said indication is carried out with a back office platform module, embodied on a non-transitory computer-readable storage medium, executing on at least one hardware processor of said remote server; said dispatching of said authorization request is carried out with said back office platform module, executing on said at least one hardware processor of said remote server, based on a query of said database with a back office database module embodied on said non-transitory computer-readable storage medium, executing on said at least one hardware processor of said remote server; said obtaining of said response to said authorization request is carried out with said back office platform module, executing on said at least one hardware processor of said remote server; and said initiating of said dispatch of said electronic ticket is carried out with said back office platform module, executing on said at least one hardware processor of said remote server. 11. A method comprising the steps of:
dispatching, from a portable electronic device of a prospective transit rider, to a remote server, an indication that said prospective transit rider has come into geographic proximity of a particular transit boarding area; obtaining, from said remote server, a confirmation query seeking to confirm whether said prospective transit rider seeks to board a certain transit mode, at a certain fare, said confirmation query having been determined based on said indication; dispatching, from said portable electronic device of said prospective transit rider, to said remote server, an affirmative response to said confirmation query; and obtaining, from said remote server, an electronic ticket. 12. The method of claim 11, further comprising developing said indication based on global positioning system-determined location of said portable electronic device of said prospective transit rider. 13. The method of claim 11, further comprising developing said indication based on said portable electronic device of said prospective transit rider being in range of a Wi-Fi transceiver of said particular transit boarding area. 14. The method of claim 11, wherein, in said dispatching step, said indication comprises visible identifying indicia data dispatched to said remote server from said portable electronic device of said prospective transit rider. 15. The method of claim 14, wherein, in said dispatching step, said visible identifying indicia data comprises a number, uniquely identifying said particular transit boarding area, visually posted on said particular transit boarding area. 16. The method of claim 14, wherein, in said dispatching step, said visible identifying indicia data comprises a bar code, uniquely identifying said particular transit boarding area, visually posted on said particular transit boarding area. 17. The method of claim 11, further comprising:
providing, by said portable electronic device of said prospective transit rider, to an official, at least one of a serial number and a bar code, with which said official can formulate a validation query, from a portable electronic device of said official to said remote server, said portable electronic device of said official being separate from said portable electronic device of said prospective transit rider. 18. The method of claim 11, wherein said particular transit boarding area comprises a first rapid transit bus stop for a first associated rapid transit bus route, further comprising displaying at least a portion of said electronic ticket, on a display device of said portable electronic device of said prospective transit rider, to a crew member of a bus on a second rapid transit bus route, to authorize transfer of said prospective transit rider from said first associated rapid transit bus route to said second rapid transit bus route. 19. The method of claim 11, wherein:
said dispatching of said indication, said obtaining of said confirmation query, said dispatching of said affirmative response, and said obtaining of said electronic ticket are carried out with a transit application module, embodied on a non-transitory computer-readable storage medium, executing on at least one hardware processor of said portable electronic device of said prospective transit rider, said transit application module communicating with said remote server via at least one of a cellular transceiver module and a Wi-Fi transceiver module of said portable electronic device of said prospective transit rider. 20. A transit back office server apparatus comprising:
a memory; at least one processor operatively coupled to said memory; and a persistent storage device operatively coupled to said memory and storing in a non-transitory manner instructions which when loaded into said memory cause said at least one processor to be operative to:
obtain an indication that a prospective transit rider has come into geographic proximity of a particular transit boarding area;
dispatch an authorization request to an issuer of a payment card account associated with said prospective transit rider, based on said back office server apparatus accessing a database based on said indication;
obtain a response to said authorization request, from said issuer; and
if said response is affirmative, initiate dispatch of an electronic ticket to a portable electronic device of said prospective transit rider. 21. The method of claim 20, wherein:
said particular transit boarding area comprises a rapid transit bus stop; said persistent storage device operatively coupled to said memory further stores in a non-transitory manner instructions which when loaded into said memory cause said at least one processor to be further operative to access said database based on said indication by querying said database based on said indication to identify said rapid transit bus stop, an associated rapid transit bus route, an associated direction of travel, and a corresponding fare; and said authorization request includes an amount of said corresponding fare. 22. A portable electronic device comprising:
a memory; at least one processor operatively coupled to said memory; and a persistent storage device operatively coupled to said memory and storing in a non-transitory manner instructions which when loaded into said memory cause said at least one processor to be operative to:
dispatch, to a remote server, an indication that a prospective transit rider using said portable electronic device has come into geographic proximity of a particular transit boarding area;
obtain, from said remote server, a confirmation query seeking to confirm whether said prospective transit rider seeks to board a certain transit mode, at a certain fare, said confirmation query having been determined based on said indication;
dispatch, to said remote server, an affirmative response to said confirmation query; and
obtaining, from said remote server, an electronic ticket. | 3,600 |
13,489 | 13,489 | 12,358,768 | 3,695 | A trading platform and trading method that allows access to additional pools of liquidity is described. Other embodiments are also described. | 1. A multi-computer system for distributed processing comprising:
a first computer configured to:
receive an instruction to accept orders without confirmation, in which the orders define a side of a trade for a financial instrument,
receive an indication of an order from a second computer, in which the order defines the side of the trade for the financial instrument;
process the indication to determine whether the order involve the side of the trade for the financial instrument, and
if a determination is made that the information and the order involve the side of the trade for the financial instrument, in response to the determination, transmit a request to facilitate execution of the trade to the second computer; and
the second computer configured to:
receive information defining the order,
transmit the indication of the order to the first computer,
receive the request to facilitate execution,
process the request to determine if the order is available for execution, and
if a determination is made that the order is available for execution, in response to the determination, facilitate execution of the order. 2. An apparatus comprising:
a machine readable medium; and a processor configured to:
receive an instruction to accept orders without confirmation, in which the orders define a side of a trade for a financial instrument,
store information identifying the side of the trade for the financial instrument on the machine readable medium,
receive an indication of an order from an alternative trading system, in which the order defines the side of the trade for the financial instrument;
determine whether the information and the order involve the side of the trade for the financial instrument, and
if a determination is made that the information and the order involve the side of the trade for the financial instrument, in response to the determination, transmit a request to facilitate execution of the trade to the alternative trading system. 3. The apparatus of claim 2, in which the processor is further configured to:
if a determination is made that the information and the order do not involve the side of the trade for the financial instrument:
determine whether a second order is stored in an order management system, in which the second order defines the opposite side of the trade for the financial instrument; and
if a determination is made that the second order is stored in the order management system, in response to the determination, transmitting a request for a binding acceptance to enter into the trade. 4. The apparatus of claim 2, in which the information includes a database entry. 5. The apparatus of claim 4, in which the database entry includes at least one of an entry of the side of the trade and an entry of the opposite side of the trade. 6. The apparatus of claim 2, in which determining whether the information and the order involve the side of the trade for the financial instrument includes comparing at least a portion of the information and the side of the trade. 7. The apparatus of claim 2, in which transmitting the request includes transmitting the request after a waiting period; and in which the processor is further configured to determine the waiting period between a minimum and maximum period of time. 8. A method comprising:
receiving an instruction to accept orders without confirmation, in which the orders define a side of a trade for a financial instrument; storing information identifying the side of the trade for the financial instrument in a data structure; receiving an indication of an order from an alternative trading system, in which the order defines the side of the trade for the financial instrument; determining, by a processor, that the information and the order involve the side of the trade for the financial instrument; and in response to the determination, transmitting a request to facilitate execution of the trade to the alternative trading system. 9. The method of claim 8, in which the information includes a database entry. 10. The method of claim 9, in which the database entry includes at least one of an entry of the side of the trade and an entry of the opposite side of the trade. 11. The method of claim 8, in which determining whether the information and the order involve the side of the trade for the financial instrument includes comparing at least a portion of the information and the side of the trade. 12. A method comprising:
receiving an instruction to enter into a side of a trade for a financial instrument from a first participant; storing information identifying the side of the trade and the first participant in a data structure such that participants may not obtain the information; receiving an indication of an order from a second participant, in which the order defines the opposite side of the trade for the financial instrument; determining, by a processor, that the information and the order involve opposite sides of the trade for the financial instrument; in response to the determination, facilitating execution of the trade; and in response to the determination, transmitting a notification to the first participant and a notification to the second participant identifying the execution of the trade. 13. The method of claim 12, in which the first participant includes an order management system. 14. A trading system comprising:
A processor configured to:
receive an indication of an order, in which the order defines a side of a trade for a quantity of a financial instrument;
transmit respective indications of respective portions of the order to each of a plurality of participants;
receive an indication of acceptance of a first portion from a first participant of the plurality of participants; and
in response to receiving the indication of acceptance, transmit an indication of a remainder of the order to the first participant. 15. The system of claim 14, in which the processor is further configured to:
determine that a period of time has passed after the transmission of the respective indications of the respective portions before transmitting the indication of the remainder. 16. The system of claim 15, in which the remainder includes a part of the order for which an acceptance has not been received at an end of the period of time. 17. The system of claim 15, in which the processor is further configured to:
receive a plurality of indications of respective acceptances of respective second portions from respective second participants of the plurality of participants before an end of the period of time. 18. The system of claim 17, in which the remainder includes a part of the order for which an acceptance has not been received at the end of the period of time. 19. The system of claim 17, in which the processor is further configured to facilitate execution of trades fulfilling each of the first portion and the second portions. 20. The system of claim 17, in which the processor is further configured to:
in response to receiving the indications of respective acceptances, transmit an indication of the remainder of the order to each participant from which a respective one of the indications of respective acceptances were received. 21. The apparatus of claim 14, in which transmitting the indication of the remainder includes transmitting the indication of the remainder after a waiting period, and in which the processor is further configured to determine the waiting period between a minimum and maximum period of time. 22. The system of claim 14, in which the processor is further configured to determine that the first participant is configured to automatically transmit the indication of acceptance without human intervention before transmitting the indication of the remainder of the order. 23. The system of claim 14, in which a sum of the respective portions of the order is less than the full order. 24. The system of claim 14, in which transmitting each respective indication includes:
transmitting a respective first query asking if a respective matching order to the order is stored in a respective order management system, and transmitting a respective second query asking if a respective offer to enter into a respective trade that fulfills at least a respective portion of each of the respective portion and the respective matching order is accepted. 25. A system comprising:
A processor configured to:
receive an indication of a trading intention, in which the trading intention identifies a side of a trade for a financial instrument;
receive an indication of a portion of an order from a remote processor through a communication network, in which the order if for the opposite side of the trade for the financial instrument;
determine that the order is for the opposite side of the trade;
in response to the determination, transmit an acceptance of the portion of the order;
receive an indication of a remainder of the order. 26. The system of claim 25, in which the processor is further configured to provide an interface through which the remainder may be accepted. 27. The system of claim 25, in which the processor is further configured to transmit the acceptance within a time period determined by the remote processor. 28. The system of claim 25, in which receiving the indication of the portion of the order includes:
receiving a first query asking if a matching order to the portion of the order is stored in an order management system, and receiving a second query asking if an offer to enter into a trade that fulfills at least a portion of each of the portion of the order and the matching order is accepted. | A trading platform and trading method that allows access to additional pools of liquidity is described. Other embodiments are also described.1. A multi-computer system for distributed processing comprising:
a first computer configured to:
receive an instruction to accept orders without confirmation, in which the orders define a side of a trade for a financial instrument,
receive an indication of an order from a second computer, in which the order defines the side of the trade for the financial instrument;
process the indication to determine whether the order involve the side of the trade for the financial instrument, and
if a determination is made that the information and the order involve the side of the trade for the financial instrument, in response to the determination, transmit a request to facilitate execution of the trade to the second computer; and
the second computer configured to:
receive information defining the order,
transmit the indication of the order to the first computer,
receive the request to facilitate execution,
process the request to determine if the order is available for execution, and
if a determination is made that the order is available for execution, in response to the determination, facilitate execution of the order. 2. An apparatus comprising:
a machine readable medium; and a processor configured to:
receive an instruction to accept orders without confirmation, in which the orders define a side of a trade for a financial instrument,
store information identifying the side of the trade for the financial instrument on the machine readable medium,
receive an indication of an order from an alternative trading system, in which the order defines the side of the trade for the financial instrument;
determine whether the information and the order involve the side of the trade for the financial instrument, and
if a determination is made that the information and the order involve the side of the trade for the financial instrument, in response to the determination, transmit a request to facilitate execution of the trade to the alternative trading system. 3. The apparatus of claim 2, in which the processor is further configured to:
if a determination is made that the information and the order do not involve the side of the trade for the financial instrument:
determine whether a second order is stored in an order management system, in which the second order defines the opposite side of the trade for the financial instrument; and
if a determination is made that the second order is stored in the order management system, in response to the determination, transmitting a request for a binding acceptance to enter into the trade. 4. The apparatus of claim 2, in which the information includes a database entry. 5. The apparatus of claim 4, in which the database entry includes at least one of an entry of the side of the trade and an entry of the opposite side of the trade. 6. The apparatus of claim 2, in which determining whether the information and the order involve the side of the trade for the financial instrument includes comparing at least a portion of the information and the side of the trade. 7. The apparatus of claim 2, in which transmitting the request includes transmitting the request after a waiting period; and in which the processor is further configured to determine the waiting period between a minimum and maximum period of time. 8. A method comprising:
receiving an instruction to accept orders without confirmation, in which the orders define a side of a trade for a financial instrument; storing information identifying the side of the trade for the financial instrument in a data structure; receiving an indication of an order from an alternative trading system, in which the order defines the side of the trade for the financial instrument; determining, by a processor, that the information and the order involve the side of the trade for the financial instrument; and in response to the determination, transmitting a request to facilitate execution of the trade to the alternative trading system. 9. The method of claim 8, in which the information includes a database entry. 10. The method of claim 9, in which the database entry includes at least one of an entry of the side of the trade and an entry of the opposite side of the trade. 11. The method of claim 8, in which determining whether the information and the order involve the side of the trade for the financial instrument includes comparing at least a portion of the information and the side of the trade. 12. A method comprising:
receiving an instruction to enter into a side of a trade for a financial instrument from a first participant; storing information identifying the side of the trade and the first participant in a data structure such that participants may not obtain the information; receiving an indication of an order from a second participant, in which the order defines the opposite side of the trade for the financial instrument; determining, by a processor, that the information and the order involve opposite sides of the trade for the financial instrument; in response to the determination, facilitating execution of the trade; and in response to the determination, transmitting a notification to the first participant and a notification to the second participant identifying the execution of the trade. 13. The method of claim 12, in which the first participant includes an order management system. 14. A trading system comprising:
A processor configured to:
receive an indication of an order, in which the order defines a side of a trade for a quantity of a financial instrument;
transmit respective indications of respective portions of the order to each of a plurality of participants;
receive an indication of acceptance of a first portion from a first participant of the plurality of participants; and
in response to receiving the indication of acceptance, transmit an indication of a remainder of the order to the first participant. 15. The system of claim 14, in which the processor is further configured to:
determine that a period of time has passed after the transmission of the respective indications of the respective portions before transmitting the indication of the remainder. 16. The system of claim 15, in which the remainder includes a part of the order for which an acceptance has not been received at an end of the period of time. 17. The system of claim 15, in which the processor is further configured to:
receive a plurality of indications of respective acceptances of respective second portions from respective second participants of the plurality of participants before an end of the period of time. 18. The system of claim 17, in which the remainder includes a part of the order for which an acceptance has not been received at the end of the period of time. 19. The system of claim 17, in which the processor is further configured to facilitate execution of trades fulfilling each of the first portion and the second portions. 20. The system of claim 17, in which the processor is further configured to:
in response to receiving the indications of respective acceptances, transmit an indication of the remainder of the order to each participant from which a respective one of the indications of respective acceptances were received. 21. The apparatus of claim 14, in which transmitting the indication of the remainder includes transmitting the indication of the remainder after a waiting period, and in which the processor is further configured to determine the waiting period between a minimum and maximum period of time. 22. The system of claim 14, in which the processor is further configured to determine that the first participant is configured to automatically transmit the indication of acceptance without human intervention before transmitting the indication of the remainder of the order. 23. The system of claim 14, in which a sum of the respective portions of the order is less than the full order. 24. The system of claim 14, in which transmitting each respective indication includes:
transmitting a respective first query asking if a respective matching order to the order is stored in a respective order management system, and transmitting a respective second query asking if a respective offer to enter into a respective trade that fulfills at least a respective portion of each of the respective portion and the respective matching order is accepted. 25. A system comprising:
A processor configured to:
receive an indication of a trading intention, in which the trading intention identifies a side of a trade for a financial instrument;
receive an indication of a portion of an order from a remote processor through a communication network, in which the order if for the opposite side of the trade for the financial instrument;
determine that the order is for the opposite side of the trade;
in response to the determination, transmit an acceptance of the portion of the order;
receive an indication of a remainder of the order. 26. The system of claim 25, in which the processor is further configured to provide an interface through which the remainder may be accepted. 27. The system of claim 25, in which the processor is further configured to transmit the acceptance within a time period determined by the remote processor. 28. The system of claim 25, in which receiving the indication of the portion of the order includes:
receiving a first query asking if a matching order to the portion of the order is stored in an order management system, and receiving a second query asking if an offer to enter into a trade that fulfills at least a portion of each of the portion of the order and the matching order is accepted. | 3,600 |
13,490 | 13,490 | 14,312,228 | 3,688 | System and method configured to store data defining merchant groups, data associating transaction terminals with merchant groups, and data associating offers with merchant groups. Each of the merchant has one or more transaction terminals configured to process payments via a payment processing network. When a transaction being processed in the payment processing network is detected to be relevant to offers, the transaction data is augmented/enriched with data identifying one or more merchant groups to which a transaction terminal that initiates the transaction is associated. Offer rules are applied to the transaction data that is augmented with merchant group data. | 1. A method, comprising:
storing, in a computing apparatus, merchant hierarchy data associating a plurality of transaction terminals with a plurality of merchants and associating the plurality of merchants with a plurality of merchant groups, wherein
each transaction terminal in the plurality of transaction terminals is associated with a single merchant in the plurality of merchants,
a first merchant in the plurality of merchants is associated with more than one merchant group in the plurality of merchant groups, and
a first merchant group in the plurality of merchant groups includes more than one merchant that includes the first merchant;
storing, in the computing apparatus, offer data associating a plurality of offers with the plurality of merchant groups; during processing of a payment transaction initiated on a first transaction terminal of the first merchant in a payment processing network, identifying, by the computing apparatus using the merchant hierarchy data, the more than one merchant group; combining, by the computing apparatus, transaction data of the payment transaction with information about the more than one merchant group to generate enriched transaction data; and applying rules of the plurality of offers to the enriched transaction data to identify one or more offers applicable to the payment transaction. 2. The method of claim 1, further comprising:
identifying the first merchant based on terminal information of the first transaction terminal identified in the payment transaction and a first portion of the merchant hierarchy data associating the plurality of transaction terminals with the plurality of merchants; wherein the more than one merchant group is identified for the payment transaction based on the first merchant identified via the payment transaction and a second portion of the merchant hierarchy data associating the plurality of merchants with a plurality of merchant groups. 3. The method of claim 2, wherein each of the plurality of offers is associated with one or more merchant groups in the plurality of merchant groups. 4. The method of claim 1, further comprising:
in response to a merchant joining an offer associated with a merchant group, adjusting the merchant hierarchy data without modifying the offer data. 5. The method of claim 4, wherein the offer data includes the offer rules. 6. The method of claim 1, further comprising:
in response to the first merchant exiting an offer associated with a merchant group, adjusting the merchant hierarchy data without modifying the offer data. 7. The method of claim 6, wherein the adjusting includes removing associating between the first merchant and the merchant group with which the offer is associated. 8. The method of claim 1, further comprising:
combining, by the computing apparatus, a plurality of offers from a second plurality of merchants into a group offer, by
generating a second merchant group to include the second plurality of merchants, and
associating the group offer with the second merchant group. 9. The method of claim 8, further comprising:
identifying, by the computing apparatus, differences in the plurality of offers; and implementing, by the computing apparatus, the differences via offer rules for the group offer. 10. The method of claim 1, wherein the first merchant group represents a franchise; and each merchant in the first merchant group represents a different store in the franchise. 11. The method of claim 1, wherein the first merchant group represents a peer group of merchants offering similar products or services. 12. The method of claim 11, further comprising:
in response to a determination that a first offer is applicable to the payment transaction between the first merchant and a user, transmitting the first offer to the user to identify a benefit offered by a second merchant different from the first merchant. 13. The method of claim 12, wherein the second merchant is not included in the first merchant group. 14. The method of claim 1, further comprising:
receiving a first offer from the second merchant, the first offer configured to provide a benefit to a user in response to a payment transaction between the user and the second merchant; identifying the first merchant group based on similarity in products or services provided by the second merchant and the first merchant group; and generating a second offer for associating with the first merchant group, the second offer configured to communicate the first offer from the second merchant to the user in response to a payment transaction between the user and a merchant in the first merchant group. 15. The method of claim 14, wherein the first merchant group is identified based automatically by the computing apparatus based on transaction data of payment transactions processed in the payment processing network. 16. The method of claim 14, wherein the first merchant group is identified based at least in part on merchants enrolling in the first merchant group to provide permission for respective offers from respective merchants in the first merchant group to be triggered for transmission to users in response to payment transactions of the users with merchants that are in the first merchant group but different from respective merchants of the respective offers. 17. The method of claim 14, wherein the first merchant group is identified based at least in part on inputs received from the second merchant. 18. The method of claim 14, further comprising:
communicating the first offer to the user via push notification to a communication reference associated with a payment account of the user, in response to a payment transaction of the user made in the payment account with any merchant in the first merchant group. 19. A computing apparatus, comprising:
at least one microprocessor; and memory storing instructions configured to instruct the at least one microprocessor to at least:
store, in the computing apparatus, merchant hierarchy data associating a plurality of transaction terminals with a plurality of merchants and associating the plurality of merchants with a plurality of merchant groups, wherein
each transaction terminal in the plurality of transaction terminals is associated with a single merchant in the plurality of merchants,
a first merchant in the plurality of merchants is associated with more than one merchant group in the plurality of merchant groups, and
a first merchant group in the plurality of merchant groups includes more than one merchant that includes the first merchant;
store, in the computing apparatus, offer data associating a plurality of offers with the plurality of merchant groups; during processing of a payment transaction initiated on a first transaction terminal of the first merchant in a payment processing network, identify, by the computing apparatus using the merchant hierarchy data, the more than one merchant group; combine, by the computing apparatus, transaction data of the payment transaction with information about the more than one merchant group to generate enriched transaction data; and apply rules of the plurality of offers to the enriched transaction data to identify one or more offers applicable to the payment transaction. 20. A non-transitory computer storage medium storing instructions configured to instruct a computing apparatus to at least:
store, in the computing apparatus, merchant hierarchy data associating a plurality of transaction terminals with a plurality of merchants and associating the plurality of merchants with a plurality of merchant groups, wherein
each transaction terminal in the plurality of transaction terminals is associated with a single merchant in the plurality of merchants,
a first merchant in the plurality of merchants is associated with more than one merchant group in the plurality of merchant groups, and
a first merchant group in the plurality of merchant groups includes more than one merchant that includes the first merchant;
store, in the computing apparatus, offer data associating a plurality of offers with the plurality of merchant groups; during processing of a payment transaction initiated on a first transaction terminal of the first merchant in a payment processing network, identify, by the computing apparatus using the merchant hierarchy data, the more than one merchant group; combine, by the computing apparatus, transaction data of the payment transaction with information about the more than one merchant group to generate enriched transaction data; and apply rules of the plurality of offers to the enriched transaction data to identify one or more offers applicable to the payment transaction. | System and method configured to store data defining merchant groups, data associating transaction terminals with merchant groups, and data associating offers with merchant groups. Each of the merchant has one or more transaction terminals configured to process payments via a payment processing network. When a transaction being processed in the payment processing network is detected to be relevant to offers, the transaction data is augmented/enriched with data identifying one or more merchant groups to which a transaction terminal that initiates the transaction is associated. Offer rules are applied to the transaction data that is augmented with merchant group data.1. A method, comprising:
storing, in a computing apparatus, merchant hierarchy data associating a plurality of transaction terminals with a plurality of merchants and associating the plurality of merchants with a plurality of merchant groups, wherein
each transaction terminal in the plurality of transaction terminals is associated with a single merchant in the plurality of merchants,
a first merchant in the plurality of merchants is associated with more than one merchant group in the plurality of merchant groups, and
a first merchant group in the plurality of merchant groups includes more than one merchant that includes the first merchant;
storing, in the computing apparatus, offer data associating a plurality of offers with the plurality of merchant groups; during processing of a payment transaction initiated on a first transaction terminal of the first merchant in a payment processing network, identifying, by the computing apparatus using the merchant hierarchy data, the more than one merchant group; combining, by the computing apparatus, transaction data of the payment transaction with information about the more than one merchant group to generate enriched transaction data; and applying rules of the plurality of offers to the enriched transaction data to identify one or more offers applicable to the payment transaction. 2. The method of claim 1, further comprising:
identifying the first merchant based on terminal information of the first transaction terminal identified in the payment transaction and a first portion of the merchant hierarchy data associating the plurality of transaction terminals with the plurality of merchants; wherein the more than one merchant group is identified for the payment transaction based on the first merchant identified via the payment transaction and a second portion of the merchant hierarchy data associating the plurality of merchants with a plurality of merchant groups. 3. The method of claim 2, wherein each of the plurality of offers is associated with one or more merchant groups in the plurality of merchant groups. 4. The method of claim 1, further comprising:
in response to a merchant joining an offer associated with a merchant group, adjusting the merchant hierarchy data without modifying the offer data. 5. The method of claim 4, wherein the offer data includes the offer rules. 6. The method of claim 1, further comprising:
in response to the first merchant exiting an offer associated with a merchant group, adjusting the merchant hierarchy data without modifying the offer data. 7. The method of claim 6, wherein the adjusting includes removing associating between the first merchant and the merchant group with which the offer is associated. 8. The method of claim 1, further comprising:
combining, by the computing apparatus, a plurality of offers from a second plurality of merchants into a group offer, by
generating a second merchant group to include the second plurality of merchants, and
associating the group offer with the second merchant group. 9. The method of claim 8, further comprising:
identifying, by the computing apparatus, differences in the plurality of offers; and implementing, by the computing apparatus, the differences via offer rules for the group offer. 10. The method of claim 1, wherein the first merchant group represents a franchise; and each merchant in the first merchant group represents a different store in the franchise. 11. The method of claim 1, wherein the first merchant group represents a peer group of merchants offering similar products or services. 12. The method of claim 11, further comprising:
in response to a determination that a first offer is applicable to the payment transaction between the first merchant and a user, transmitting the first offer to the user to identify a benefit offered by a second merchant different from the first merchant. 13. The method of claim 12, wherein the second merchant is not included in the first merchant group. 14. The method of claim 1, further comprising:
receiving a first offer from the second merchant, the first offer configured to provide a benefit to a user in response to a payment transaction between the user and the second merchant; identifying the first merchant group based on similarity in products or services provided by the second merchant and the first merchant group; and generating a second offer for associating with the first merchant group, the second offer configured to communicate the first offer from the second merchant to the user in response to a payment transaction between the user and a merchant in the first merchant group. 15. The method of claim 14, wherein the first merchant group is identified based automatically by the computing apparatus based on transaction data of payment transactions processed in the payment processing network. 16. The method of claim 14, wherein the first merchant group is identified based at least in part on merchants enrolling in the first merchant group to provide permission for respective offers from respective merchants in the first merchant group to be triggered for transmission to users in response to payment transactions of the users with merchants that are in the first merchant group but different from respective merchants of the respective offers. 17. The method of claim 14, wherein the first merchant group is identified based at least in part on inputs received from the second merchant. 18. The method of claim 14, further comprising:
communicating the first offer to the user via push notification to a communication reference associated with a payment account of the user, in response to a payment transaction of the user made in the payment account with any merchant in the first merchant group. 19. A computing apparatus, comprising:
at least one microprocessor; and memory storing instructions configured to instruct the at least one microprocessor to at least:
store, in the computing apparatus, merchant hierarchy data associating a plurality of transaction terminals with a plurality of merchants and associating the plurality of merchants with a plurality of merchant groups, wherein
each transaction terminal in the plurality of transaction terminals is associated with a single merchant in the plurality of merchants,
a first merchant in the plurality of merchants is associated with more than one merchant group in the plurality of merchant groups, and
a first merchant group in the plurality of merchant groups includes more than one merchant that includes the first merchant;
store, in the computing apparatus, offer data associating a plurality of offers with the plurality of merchant groups; during processing of a payment transaction initiated on a first transaction terminal of the first merchant in a payment processing network, identify, by the computing apparatus using the merchant hierarchy data, the more than one merchant group; combine, by the computing apparatus, transaction data of the payment transaction with information about the more than one merchant group to generate enriched transaction data; and apply rules of the plurality of offers to the enriched transaction data to identify one or more offers applicable to the payment transaction. 20. A non-transitory computer storage medium storing instructions configured to instruct a computing apparatus to at least:
store, in the computing apparatus, merchant hierarchy data associating a plurality of transaction terminals with a plurality of merchants and associating the plurality of merchants with a plurality of merchant groups, wherein
each transaction terminal in the plurality of transaction terminals is associated with a single merchant in the plurality of merchants,
a first merchant in the plurality of merchants is associated with more than one merchant group in the plurality of merchant groups, and
a first merchant group in the plurality of merchant groups includes more than one merchant that includes the first merchant;
store, in the computing apparatus, offer data associating a plurality of offers with the plurality of merchant groups; during processing of a payment transaction initiated on a first transaction terminal of the first merchant in a payment processing network, identify, by the computing apparatus using the merchant hierarchy data, the more than one merchant group; combine, by the computing apparatus, transaction data of the payment transaction with information about the more than one merchant group to generate enriched transaction data; and apply rules of the plurality of offers to the enriched transaction data to identify one or more offers applicable to the payment transaction. | 3,600 |
13,491 | 13,491 | 13,677,234 | 3,632 | A motor mount is reconfigurable between at least a first configuration adapted to accept a first arrangement of fasteners and a second configuration adapted to accept a second arrangement of fasteners, the first and second arrangements of fasteners being different from each other. | 1. A reconfigurable motor mount comprising:
at least one connection point that has at least a first configuration adapted to accept a first arrangement of fasteners and a second configuration adapted to accept a second arrangement of fasteners, the first and second arrangements of fasteners being different from each other. 2. The reconfigurable motor mount according to claim 1, wherein the at least one connection point comprises a plurality of connection points, and the plurality of connection points are disposed about the periphery of the motor mount. 3. The reconfigurable motor mount according to claim 1, wherein the motor mount has at least one motor mount foot, and the at least one connection point is defined on the at least one motor mount foot. 4. The reconfigurable motor mount according to claim 3, wherein the at least one connection point comprises a recess formed in the at least one motor mount foot and an invertible insert disposed in the recess, the invertible insert having a first orientation corresponding to the first configuration and a second orientation corresponding to the second configuration. 5. The reconfigurable motor mount according to claim 4, wherein the at least one connection point comprises two connection points disposed on either side of a longitudinal axis of the motor mount, the invertible inserts on either side disposed in the respective recesses in a first orientation to receive two fasteners separated by a first transverse distance and in a second orientation to receive two fasteners separated by a second transverse distance. 6. The reconfigurable motor mount according to claim 5, wherein:
the insert comprises a passage connecting a first opening in a top surface of the insert and a second opening in a bottom surface of the insert, the insert having a longitudinal axis and the passage centered along the longitudinal axis, and the recess has a first end and a second end, and the insert has a first end and a second end in the longitudinal direction, the passage disposed closer to the first end than the second end of the insert, with the insert disposed in the recess with the first end of the insert aligned with the first end of the recess in the first orientation and the insert disposed in the recess with the second end of the insert aligned with the first end of the recess in the second orientation. 7. The reconfigurable motor mount according to claim 4, wherein the at least one connection point comprises two connection points disposed on either end of the motor mount, the invertible inserts on either end disposed in the recesses in a first orientation to receive two fasteners separated by a first longitudinal distance and in a second orientation to receive two fasteners separated by a second longitudinal distance. 8. The reconfigurable motor mount according to claim 5, wherein the at least one connection point comprises two connection points disposed on either end of the motor mount, the invertible inserts on either end disposed in the recesses in a first orientation to receive two fasteners separated by a first longitudinal distance and in a second orientation to receive two fasteners separated by a second longitudinal distance. 9. The reconfigurable motor mount according to claim 8, wherein:
the insert comprises a passage connecting a first opening in a top surface of the insert and a second opening in a bottom surface of the insert, the insert having a longitudinal axis and the passage offset in a transverse direction relative to the longitudinal axis, and the recess has a first end and a second end, and the insert has a first end and a second end in the longitudinal direction, the passage disposed closer to the first end than the second end of the insert, with the insert disposed in the recess with the first end of the insert aligned with the first end of the recess in the first orientation and the insert disposed in the recess with the second end of the insert aligned with the first end of the recess in the second orientation. 10. The reconfigurable motor mount according to claim 4, wherein recess has an inwardly directed rim that defines a recess shoulder, and the invertible insert includes a body and a flange depending from the body to define an insert shoulder at a junction of the body and the flange, the flange cooperating with the rim to seat the insert within the recess with the insert shoulder abutting the recess shoulder. 11. The reconfigurable motor mount according to claim 10, wherein the insert comprises a passage connecting a first opening in a top surface of the insert and a second opening in a bottom surface of the insert, the insert having a longitudinal axis and the passage centered along the longitudinal axis. 12. The reconfigurable motor mount according to claim 11, wherein the recess has a first end and a second end, and the insert has a first end and a second end in the longitudinal direction, the passage disposed closer to the first end than the second end of the insert, with the insert disposed in the recess with the first end of the insert aligned with the first end of the recess in the first orientation and the insert disposed in the recess with the second end of the insert aligned with the first end of the recess in the second orientation. 13. The reconfigurable motor mount according to claim 10, wherein the insert comprises a passage connecting a first opening in a top surface of the insert and a second opening in a bottom surface of the insert, the insert having a longitudinal axis and the passage offset in a transverse direction relative to the longitudinal axis. 14. The reconfigurable motor mount according to claim 13, wherein the recess has a first end and a second end, and the insert has a first end and a second end in the longitudinal direction, the passage disposed closer to the first end than the second end of the insert, with the insert disposed in the recess with the first end of the insert aligned with the first end of the recess in the first orientation and the insert disposed in the recess with the second end of the insert aligned with the first end of the recess in the second orientation. 15. The reconfigurable motor mount according to claim 10, wherein the insert has a rectangular geometry, with the longitudinal axis of the insert aligned with the longer sides. 16. The reconfigurable motor mount according to claim 15, wherein the at least one connection point comprises a plurality of connection points, and the plurality of connection points are disposed about the periphery of the motor mount. 17. A motor mount that is reconfigurable between at least a first configuration adapted to accept a first arrangement of fasteners and a second configuration adapted to accept a second arrangement of fasteners, the first and second arrangements of fasteners being different from each other. | A motor mount is reconfigurable between at least a first configuration adapted to accept a first arrangement of fasteners and a second configuration adapted to accept a second arrangement of fasteners, the first and second arrangements of fasteners being different from each other.1. A reconfigurable motor mount comprising:
at least one connection point that has at least a first configuration adapted to accept a first arrangement of fasteners and a second configuration adapted to accept a second arrangement of fasteners, the first and second arrangements of fasteners being different from each other. 2. The reconfigurable motor mount according to claim 1, wherein the at least one connection point comprises a plurality of connection points, and the plurality of connection points are disposed about the periphery of the motor mount. 3. The reconfigurable motor mount according to claim 1, wherein the motor mount has at least one motor mount foot, and the at least one connection point is defined on the at least one motor mount foot. 4. The reconfigurable motor mount according to claim 3, wherein the at least one connection point comprises a recess formed in the at least one motor mount foot and an invertible insert disposed in the recess, the invertible insert having a first orientation corresponding to the first configuration and a second orientation corresponding to the second configuration. 5. The reconfigurable motor mount according to claim 4, wherein the at least one connection point comprises two connection points disposed on either side of a longitudinal axis of the motor mount, the invertible inserts on either side disposed in the respective recesses in a first orientation to receive two fasteners separated by a first transverse distance and in a second orientation to receive two fasteners separated by a second transverse distance. 6. The reconfigurable motor mount according to claim 5, wherein:
the insert comprises a passage connecting a first opening in a top surface of the insert and a second opening in a bottom surface of the insert, the insert having a longitudinal axis and the passage centered along the longitudinal axis, and the recess has a first end and a second end, and the insert has a first end and a second end in the longitudinal direction, the passage disposed closer to the first end than the second end of the insert, with the insert disposed in the recess with the first end of the insert aligned with the first end of the recess in the first orientation and the insert disposed in the recess with the second end of the insert aligned with the first end of the recess in the second orientation. 7. The reconfigurable motor mount according to claim 4, wherein the at least one connection point comprises two connection points disposed on either end of the motor mount, the invertible inserts on either end disposed in the recesses in a first orientation to receive two fasteners separated by a first longitudinal distance and in a second orientation to receive two fasteners separated by a second longitudinal distance. 8. The reconfigurable motor mount according to claim 5, wherein the at least one connection point comprises two connection points disposed on either end of the motor mount, the invertible inserts on either end disposed in the recesses in a first orientation to receive two fasteners separated by a first longitudinal distance and in a second orientation to receive two fasteners separated by a second longitudinal distance. 9. The reconfigurable motor mount according to claim 8, wherein:
the insert comprises a passage connecting a first opening in a top surface of the insert and a second opening in a bottom surface of the insert, the insert having a longitudinal axis and the passage offset in a transverse direction relative to the longitudinal axis, and the recess has a first end and a second end, and the insert has a first end and a second end in the longitudinal direction, the passage disposed closer to the first end than the second end of the insert, with the insert disposed in the recess with the first end of the insert aligned with the first end of the recess in the first orientation and the insert disposed in the recess with the second end of the insert aligned with the first end of the recess in the second orientation. 10. The reconfigurable motor mount according to claim 4, wherein recess has an inwardly directed rim that defines a recess shoulder, and the invertible insert includes a body and a flange depending from the body to define an insert shoulder at a junction of the body and the flange, the flange cooperating with the rim to seat the insert within the recess with the insert shoulder abutting the recess shoulder. 11. The reconfigurable motor mount according to claim 10, wherein the insert comprises a passage connecting a first opening in a top surface of the insert and a second opening in a bottom surface of the insert, the insert having a longitudinal axis and the passage centered along the longitudinal axis. 12. The reconfigurable motor mount according to claim 11, wherein the recess has a first end and a second end, and the insert has a first end and a second end in the longitudinal direction, the passage disposed closer to the first end than the second end of the insert, with the insert disposed in the recess with the first end of the insert aligned with the first end of the recess in the first orientation and the insert disposed in the recess with the second end of the insert aligned with the first end of the recess in the second orientation. 13. The reconfigurable motor mount according to claim 10, wherein the insert comprises a passage connecting a first opening in a top surface of the insert and a second opening in a bottom surface of the insert, the insert having a longitudinal axis and the passage offset in a transverse direction relative to the longitudinal axis. 14. The reconfigurable motor mount according to claim 13, wherein the recess has a first end and a second end, and the insert has a first end and a second end in the longitudinal direction, the passage disposed closer to the first end than the second end of the insert, with the insert disposed in the recess with the first end of the insert aligned with the first end of the recess in the first orientation and the insert disposed in the recess with the second end of the insert aligned with the first end of the recess in the second orientation. 15. The reconfigurable motor mount according to claim 10, wherein the insert has a rectangular geometry, with the longitudinal axis of the insert aligned with the longer sides. 16. The reconfigurable motor mount according to claim 15, wherein the at least one connection point comprises a plurality of connection points, and the plurality of connection points are disposed about the periphery of the motor mount. 17. A motor mount that is reconfigurable between at least a first configuration adapted to accept a first arrangement of fasteners and a second configuration adapted to accept a second arrangement of fasteners, the first and second arrangements of fasteners being different from each other. | 3,600 |
13,492 | 13,492 | 15,413,693 | 3,625 | A central computer system for a retail shopping facility automatically determines that a customer having a retail item available for pickup at the facility is currently proximal to the facility and automatically responds by sending the customer a message that includes an opportunity for the customer to indicate that they will now pick up the retail item. Upon receiving information indicating that the customer utilized the aforementioned opportunity to indicate that they will now pick up the retail item, the central computer system can instigate a transmission of a message to at least one associate of the retail shopping facility to prompt the associate to move the retail item from a first area of the retail shopping facility (such as a non-public storage area) to a second area of the retail shopping facility (such as a designated pick-up area). | 1. An apparatus comprising:
a retail shopping facility; a network interface; a central computer system operably coupled to the network interface and configured to:
automatically determine that a customer having a retail item available for pickup at the retail shopping facility is currently proximal to the retail shopping facility and automatically responding to that determination by sending the customer a message wherein the message includes an opportunity for the customer to indicate that they will now pick up the retail item at the retail shopping facility. 2. The apparatus of claim 1 wherein the central computer system is configured to automatically determine that the customer is currently proximal to the retail shopping facility by comparing a present location of the customer to a predetermined distance threshold. 3. The apparatus of claim 2 wherein the central computer system is configured to receive, via the network interface, the information regarding the present location of the customer from a mobile communications device associated with the customer. 4. The apparatus of claim 1 wherein the retail item available for pickup at the retail shopping facility was ordered on behalf of the customer. 5. The apparatus of claim 4 wherein the retail item available for pickup at the retail shopping facility was ordered via an online shopping service. 6. The apparatus of claim 1 wherein the opportunity for the customer to indicate that they will now pick up the retail item at the retail shopping facility comprises a touch-based user interface on a mobile communications device associated with the customer. 7. The apparatus of claim 1 wherein the central computer system is further configured to:
receive information indicating that the customer utilized the opportunity to indicate that they will now pick up the retail item at the retail shopping facility. 8. The apparatus of claim 7 wherein the central computer system is further configured to:
transmit a message to at least one associate of the retail shopping facility to prompt the associate to move the retail item from a first area of the retail shopping facility to a second area of the retail shopping facility. 9. The apparatus of claim 8 wherein the first area of the retail shopping facility comprises a non-public storage area. 10. The apparatus of claim 8 wherein the central computer system is further configured to:
maintain a history regarding at least one duration of time pertaining to making the retail item available for pickup by the customer at the retail shopping facility. 11. A method comprising:
by a central computer system for a retail shopping facility that is operably coupled to the network interface: automatically determining that a customer having a retail item available for pickup at the retail shopping facility is currently proximal to the retail shopping facility and automatically responding to that determination by sending the customer a message wherein the message includes an opportunity for the customer to indicate that they will now pick up the retail item at the retail shopping facility. 12. The method of claim 11 wherein automatically determining that the customer is currently proximal to the retail shopping facility comprises, at least in part, comparing a present location of the customer to a predetermined distance threshold. 13. The method of claim 12 wherein automatically determining that the customer is currently proximal to the retail shopping facility comprises, at least in part, receiving information regarding the present location of the customer from a mobile communications device associated with the customer. 14. The method of claim 11 wherein the retail item available for pickup at the retail shopping facility was ordered on behalf of the customer. 15. The method of claim 14 wherein the retail item available for pickup at the retail shopping facility was ordered via an online shopping service. 16. The method of claim 11 wherein the opportunity for the customer to indicate that they will now pick up the retail item at the retail shopping facility comprises a touch-based user interface on a mobile communications device associated with the customer. 17. The method of claim 11 further comprising:
receiving information indicating that the customer utilized the opportunity to indicate that they will now pick up the retail item at the retail shopping facility. 18. The method of claim 17 further comprising:
transmitting a message to at least one associate of the retail shopping facility to prompt the associate to move the retail item from a first area of the retail shopping facility to a second area of the retail shopping facility. 19. The method of claim 18 wherein the first area of the retail shopping facility comprises a non-public storage area. 20. The method of claim 18 further comprising:
maintaining a history regarding at least one duration of time pertaining to making the retail item available for pickup by the customer at the retail shopping facility. | A central computer system for a retail shopping facility automatically determines that a customer having a retail item available for pickup at the facility is currently proximal to the facility and automatically responds by sending the customer a message that includes an opportunity for the customer to indicate that they will now pick up the retail item. Upon receiving information indicating that the customer utilized the aforementioned opportunity to indicate that they will now pick up the retail item, the central computer system can instigate a transmission of a message to at least one associate of the retail shopping facility to prompt the associate to move the retail item from a first area of the retail shopping facility (such as a non-public storage area) to a second area of the retail shopping facility (such as a designated pick-up area).1. An apparatus comprising:
a retail shopping facility; a network interface; a central computer system operably coupled to the network interface and configured to:
automatically determine that a customer having a retail item available for pickup at the retail shopping facility is currently proximal to the retail shopping facility and automatically responding to that determination by sending the customer a message wherein the message includes an opportunity for the customer to indicate that they will now pick up the retail item at the retail shopping facility. 2. The apparatus of claim 1 wherein the central computer system is configured to automatically determine that the customer is currently proximal to the retail shopping facility by comparing a present location of the customer to a predetermined distance threshold. 3. The apparatus of claim 2 wherein the central computer system is configured to receive, via the network interface, the information regarding the present location of the customer from a mobile communications device associated with the customer. 4. The apparatus of claim 1 wherein the retail item available for pickup at the retail shopping facility was ordered on behalf of the customer. 5. The apparatus of claim 4 wherein the retail item available for pickup at the retail shopping facility was ordered via an online shopping service. 6. The apparatus of claim 1 wherein the opportunity for the customer to indicate that they will now pick up the retail item at the retail shopping facility comprises a touch-based user interface on a mobile communications device associated with the customer. 7. The apparatus of claim 1 wherein the central computer system is further configured to:
receive information indicating that the customer utilized the opportunity to indicate that they will now pick up the retail item at the retail shopping facility. 8. The apparatus of claim 7 wherein the central computer system is further configured to:
transmit a message to at least one associate of the retail shopping facility to prompt the associate to move the retail item from a first area of the retail shopping facility to a second area of the retail shopping facility. 9. The apparatus of claim 8 wherein the first area of the retail shopping facility comprises a non-public storage area. 10. The apparatus of claim 8 wherein the central computer system is further configured to:
maintain a history regarding at least one duration of time pertaining to making the retail item available for pickup by the customer at the retail shopping facility. 11. A method comprising:
by a central computer system for a retail shopping facility that is operably coupled to the network interface: automatically determining that a customer having a retail item available for pickup at the retail shopping facility is currently proximal to the retail shopping facility and automatically responding to that determination by sending the customer a message wherein the message includes an opportunity for the customer to indicate that they will now pick up the retail item at the retail shopping facility. 12. The method of claim 11 wherein automatically determining that the customer is currently proximal to the retail shopping facility comprises, at least in part, comparing a present location of the customer to a predetermined distance threshold. 13. The method of claim 12 wherein automatically determining that the customer is currently proximal to the retail shopping facility comprises, at least in part, receiving information regarding the present location of the customer from a mobile communications device associated with the customer. 14. The method of claim 11 wherein the retail item available for pickup at the retail shopping facility was ordered on behalf of the customer. 15. The method of claim 14 wherein the retail item available for pickup at the retail shopping facility was ordered via an online shopping service. 16. The method of claim 11 wherein the opportunity for the customer to indicate that they will now pick up the retail item at the retail shopping facility comprises a touch-based user interface on a mobile communications device associated with the customer. 17. The method of claim 11 further comprising:
receiving information indicating that the customer utilized the opportunity to indicate that they will now pick up the retail item at the retail shopping facility. 18. The method of claim 17 further comprising:
transmitting a message to at least one associate of the retail shopping facility to prompt the associate to move the retail item from a first area of the retail shopping facility to a second area of the retail shopping facility. 19. The method of claim 18 wherein the first area of the retail shopping facility comprises a non-public storage area. 20. The method of claim 18 further comprising:
maintaining a history regarding at least one duration of time pertaining to making the retail item available for pickup by the customer at the retail shopping facility. | 3,600 |
13,493 | 13,493 | 14,731,565 | 3,622 | A social networking system presents a content feed including organic content items and sponsored content items to a user. To maintain user interaction with the content feed, the social networking system determines probabilities of the user performing various types of interactions with a sponsored content item and accounts for the determined probabilities when selecting content items for presentation via the content feed. For example, the social networking system generates a value for the sponsored content item based on the determined probabilities and determines a score for the sponsored content item based on the value and a bid amount associated with the sponsored content item. When selecting content for the content feed, the social networking system evaluates the sponsored content item based on its associated score. Prior interactions between the user and previously presented content may be used when determining the score for the sponsored content item. | 1. A method comprising:
receiving one or more advertisement requests (“ad requests”) at a social networking system, each ad request including a bid amount and an advertisement; receiving a request to present a content feed to a user of the social networking system, the content feed including one or more content items and one or more advertisements included in one or more ad requests; retrieving prior interactions by the user with advertisements previously presented to the user by the social networking system; determining probabilities of the user performing one or more types of interactions from a set of types of interactions with an advertisement in a received ad request based at least in part on the prior interactions by the user with the advertisements and content items previously presented to the user; determining a value associated with the received ad request based at least in part on the determined probabilities; determining an expected amount of interaction by the user with the advertisement included in the received ad request based at least in part on the retrieved prior interactions; generating a score associated with the received ad request by combining the expected amount of interaction by the user with the advertisement included in the received ad request with the bid amount included in the received ad request and with the determined value; and including the received ad request and score associated with the received ad request in a selection process configured to select content for presentation to the user by the social networking system. 2. The method of claim 1, wherein determining probabilities of the user performing one or more types of interactions from the set of types of interactions with the advertisement in the received ad request based at least in part on the prior interactions by the user with the advertisements and content items previously presented to the user comprises:
identifying advertisements previously presented to the user having at least a threshold number of characteristics matching characteristics of the advertisement in the received ad request; retrieving types of interactions from the set of types of interactions by the user with the identified advertisements from the retrieved prior interactions by the user; and determining the probabilities of the user performing the one or more types of interactions form the set of types of interactions based at least in part on the types of interactions from the set of types of interactions by the user with the identified advertisements. 3. The method of claim 1, wherein determining the value associated with the received ad request based at least in part on the determined probabilities comprises:
obtaining a weight associated with each type of interaction in the set of types of interactions; applying the weights associated with each type of interaction in the set of types of interactions to the probabilities of the user performing each of the one or more types of interactions in the set of types of interactions with the advertisement in the received ad request, a weight associated with a type of interaction in the set applied to a probability of the user performing the type of interaction in the set; and generating the value by combining the probabilities of the user performing each of the one or more types of interactions in the set after application of the weights. 4. The method of claim 3, wherein a positive weight is associated with one or more types of interactions indicating interest. 5. The method of claim 4, wherein a type of interaction indicating interest is selected from a group consisting of: indicating a preference for a content item or an and request, sharing the content item or the ad request with an additional user of the social networking system, accessing the content item or the ad request, accessing additional content associated with the content item or the ad request, and any combination thereof. 6. The method of claim 3, wherein a negative weight is associated with one or more types of interactions indicating lack of interest. 7. The method of claim 6, wherein an interaction indicating lack of interest comprises hiding a content item or an ad request. 8. The method of claim 1, wherein generating the score associated with the received ad request by combining the expected amount of interaction by the user with the advertisement included in the received ad request with the bid amount included in the received ad request and with the determined value comprises:
applying a conversion factor to the expected amount of interaction by the user with the advertisement included in the received ad request determined value that results in a common unit of measurement for the bid amount and the determined value; and combining the bid amount, the determined value, and the expected amount of interaction after application of the conversion factor. 9. The method of claim 8, wherein the conversion factor is based at least in part on a difference between an estimated amount of interaction by the user with the content feed not including the advertisement from the received ad request and an estimated amount of interaction by the user with the content feed including the advertisement from the received ad request. 10. The method of claim 1, wherein generating the score associated with the received ad request by combining the expected amount of interaction by the user with the advertisement included in the received ad request with the bid amount included in the received ad request and with the determined value comprises:
determining a user-specific weight based at least in part on an average bid amount of advertisements previously presented to the user during a specific time interval and an amount of interaction by the user with content presented to the user by the social networking system during the specific time interval; applying the user specific-weight to the determined value; and generating the score associated with the received ad request by combining the bid amount included in the received ad request, the expected amount of interaction by the user with the advertisement included in the received ad request, and the determined value after application of the user-specific weight. 11. The method of claim 1, wherein generating the score associated with the received ad request by combining the expected amount of interaction by the user with the advertisement included in the received ad request with the bid amount included in the received ad request and with the determined value comprises:
determining a user-specific weight based at least in part on an average bid amount of advertisements previously presented to additional users having at least a threshold number of characteristics matching characteristics of the user the user during a specific time interval and an amount of interaction by the additional users having at least the threshold number of characteristics matching characteristics of the user with content presented to the additional users by the social networking system during the specific time interval; applying the user specific-weight to the determined value; and generating the score associated with the received ad request by combining the bid amount included in the received ad request, the expected amount of interaction by the user with the advertisement included in the received ad request, and the determined value after application of the user-specific weight. 12. The method of claim 1, wherein generating the score associated with the received ad request by combining the expected amount of interaction by the user with the advertisement included in the received ad request with the bid amount included in the received ad request and with the determined value comprises:
determining a user-specific weight based at least in part on an average bid amount of advertisements previously presented to the user during a specific time interval and an amount of interaction by the user with content presented to the user by the social networking system during the specific time interval; applying the user specific-weight and a scaling factor to the determined value; and generating the score associated with the received ad request by combining the bid amount included in the received ad request, the expected amount of interaction by the user with the advertisement included in the received ad request, and the determined value after application of the user-specific weight and the scaling factor. 13. A computer program product comprising a computer-readable storage medium having instructions encoded thereon that, when executed by a processor, cause the processor to:
receive one or more advertisement requests (“ad requests”) at a social networking system, each ad request including a bid amount and an advertisement; receive a request to present a content feed to a user of the social networking system, the content feed including one or more content items and one or more advertisements included in one or more ad requests; retrieve prior interactions by the user with advertisements previously presented to the user by the social networking system; determine probabilities of the user performing one or more types of interactions from a set of types of interactions with an advertisement in a received ad request based at least in part on the prior interactions by the user with the advertisements and content items previously presented to the user; determine a value associated with the received ad request based at least in part on the determined probabilities; determine an expected amount of interaction by the user with the advertisement included in the received ad request based at least in part on the retrieved prior interactions; generate a score associated with the received ad request by combining the expected amount of interaction by the user with the advertisement included in the received ad request with the bid amount included in the received ad request and with the determined value; and include the received ad request and score associated with the received ad request in a selection process configured to select content for presentation to the user by the social networking system. 14. The computer program product of claim 13, wherein determine probabilities of the user performing one or more types of interactions from the set of types of interactions with the advertisement in the received ad request based at least in part on the prior interactions by the user with the advertisements and content items previously presented to the user comprises:
identify advertisements previously presented to the user having at least a threshold number of characteristics matching characteristics of the advertisement in the received ad request; retrieve types of interactions from the set of types of interactions by the user with the identified advertisements from the retrieved prior interactions by the user; and determine the probabilities of the user performing the one or more types of interactions form the set of types of interactions based at least in part on the types of interactions from the set of types of interactions by the user with the identified advertisements. 15. The computer program product of claim 13, wherein determine the value associated with the received ad request based at least in part on the determined probabilities comprises:
obtain a weight associated with each type of interaction in the set of types of interactions; apply the weights associated with each type of interaction in the set of types of interactions to the probabilities of the user performing each of the one or more types of interactions in the set of types of interactions with the advertisement in the received ad request, a weight associated with a type of interaction in the set applied to a probability of the user performing the type of interaction in the set; and generate the value by combining the probabilities of the user performing each of the one or more types of interactions in the set after application of the weights. 16. The computer program product of claim 13, wherein generate the score associated with the received ad request by combining the expected amount of interaction by the user with the advertisement included in the received ad request with the bid amount included in the received ad request and with the determined value comprises:
apply a conversion factor to the expected amount of interaction by the user with the advertisement included in the received ad request determined value that results in a common unit of measurement for the bid amount and the determined value; and combine the bid amount, the determined value, and the expected amount of interaction after application of the conversion factor. 17. The computer program product of claim 16, wherein the conversion factor is based at least in part on a difference between an estimated amount of interaction by the user with the content feed not including the advertisement from the received ad request and an estimated amount of interaction by the user with the content feed including the advertisement from the received ad request. 18. The computer program product of claim 13, wherein generate the score associated with the received ad request by combining the expected amount of interaction by the user with the advertisement included in the received ad request with the bid amount included in the received ad request and with the determined value comprises:
determine a user-specific weight based at least in part on an average bid amount of advertisements previously presented to the user during a specific time interval and an amount of interaction by the user with content presented to the user by the social networking system during the specific time interval; apply the user specific-weight to the determined value; and generate the score associated with the received ad request by combining the bid amount included in the received ad request, the expected amount of interaction by the user with the advertisement included in the received ad request, and the determined value after application of the user-specific weight. 19. The computer program product of claim 13, wherein generate the score associated with the received ad request by combining the expected amount of interaction by the user with the advertisement included in the received ad request with the bid amount included in the received ad request and with the determined value comprises:
determine a user-specific weight based at least in part on an average bid amount of advertisements previously presented to additional users having at least a threshold number of characteristics matching characteristics of the user the user during a specific time interval and an amount of interaction by the additional users having at least the threshold number of characteristics matching characteristics of the user with content presented to the additional users by the social networking system during the specific time interval; apply the user specific-weight to the determined value; and generate the score associated with the received ad request by combining the bid amount included in the received ad request, the expected amount of interaction by the user with the advertisement included in the received ad request, and the determined value after application of the user-specific weight. 20. The computer program product of claim 13, wherein generating the score associated with the received ad request by combining the expected amount of interaction by the user with the advertisement included in the received ad request with the bid amount included in the received ad request and with the determined value comprises:
determine a user-specific weight based at least in part on an average bid amount of advertisements previously presented to the user during a specific time interval and an amount of interaction by the user with content presented to the user by the social networking system during the specific time interval; apply the user specific-weight and a scaling factor to the determined value; and generate the score associated with the received ad request by combining the bid amount included in the received ad request, the expected amount of interaction by the user with the advertisement included in the received ad request, and the determined value after application of the user-specific weight and the scaling factor. | A social networking system presents a content feed including organic content items and sponsored content items to a user. To maintain user interaction with the content feed, the social networking system determines probabilities of the user performing various types of interactions with a sponsored content item and accounts for the determined probabilities when selecting content items for presentation via the content feed. For example, the social networking system generates a value for the sponsored content item based on the determined probabilities and determines a score for the sponsored content item based on the value and a bid amount associated with the sponsored content item. When selecting content for the content feed, the social networking system evaluates the sponsored content item based on its associated score. Prior interactions between the user and previously presented content may be used when determining the score for the sponsored content item.1. A method comprising:
receiving one or more advertisement requests (“ad requests”) at a social networking system, each ad request including a bid amount and an advertisement; receiving a request to present a content feed to a user of the social networking system, the content feed including one or more content items and one or more advertisements included in one or more ad requests; retrieving prior interactions by the user with advertisements previously presented to the user by the social networking system; determining probabilities of the user performing one or more types of interactions from a set of types of interactions with an advertisement in a received ad request based at least in part on the prior interactions by the user with the advertisements and content items previously presented to the user; determining a value associated with the received ad request based at least in part on the determined probabilities; determining an expected amount of interaction by the user with the advertisement included in the received ad request based at least in part on the retrieved prior interactions; generating a score associated with the received ad request by combining the expected amount of interaction by the user with the advertisement included in the received ad request with the bid amount included in the received ad request and with the determined value; and including the received ad request and score associated with the received ad request in a selection process configured to select content for presentation to the user by the social networking system. 2. The method of claim 1, wherein determining probabilities of the user performing one or more types of interactions from the set of types of interactions with the advertisement in the received ad request based at least in part on the prior interactions by the user with the advertisements and content items previously presented to the user comprises:
identifying advertisements previously presented to the user having at least a threshold number of characteristics matching characteristics of the advertisement in the received ad request; retrieving types of interactions from the set of types of interactions by the user with the identified advertisements from the retrieved prior interactions by the user; and determining the probabilities of the user performing the one or more types of interactions form the set of types of interactions based at least in part on the types of interactions from the set of types of interactions by the user with the identified advertisements. 3. The method of claim 1, wherein determining the value associated with the received ad request based at least in part on the determined probabilities comprises:
obtaining a weight associated with each type of interaction in the set of types of interactions; applying the weights associated with each type of interaction in the set of types of interactions to the probabilities of the user performing each of the one or more types of interactions in the set of types of interactions with the advertisement in the received ad request, a weight associated with a type of interaction in the set applied to a probability of the user performing the type of interaction in the set; and generating the value by combining the probabilities of the user performing each of the one or more types of interactions in the set after application of the weights. 4. The method of claim 3, wherein a positive weight is associated with one or more types of interactions indicating interest. 5. The method of claim 4, wherein a type of interaction indicating interest is selected from a group consisting of: indicating a preference for a content item or an and request, sharing the content item or the ad request with an additional user of the social networking system, accessing the content item or the ad request, accessing additional content associated with the content item or the ad request, and any combination thereof. 6. The method of claim 3, wherein a negative weight is associated with one or more types of interactions indicating lack of interest. 7. The method of claim 6, wherein an interaction indicating lack of interest comprises hiding a content item or an ad request. 8. The method of claim 1, wherein generating the score associated with the received ad request by combining the expected amount of interaction by the user with the advertisement included in the received ad request with the bid amount included in the received ad request and with the determined value comprises:
applying a conversion factor to the expected amount of interaction by the user with the advertisement included in the received ad request determined value that results in a common unit of measurement for the bid amount and the determined value; and combining the bid amount, the determined value, and the expected amount of interaction after application of the conversion factor. 9. The method of claim 8, wherein the conversion factor is based at least in part on a difference between an estimated amount of interaction by the user with the content feed not including the advertisement from the received ad request and an estimated amount of interaction by the user with the content feed including the advertisement from the received ad request. 10. The method of claim 1, wherein generating the score associated with the received ad request by combining the expected amount of interaction by the user with the advertisement included in the received ad request with the bid amount included in the received ad request and with the determined value comprises:
determining a user-specific weight based at least in part on an average bid amount of advertisements previously presented to the user during a specific time interval and an amount of interaction by the user with content presented to the user by the social networking system during the specific time interval; applying the user specific-weight to the determined value; and generating the score associated with the received ad request by combining the bid amount included in the received ad request, the expected amount of interaction by the user with the advertisement included in the received ad request, and the determined value after application of the user-specific weight. 11. The method of claim 1, wherein generating the score associated with the received ad request by combining the expected amount of interaction by the user with the advertisement included in the received ad request with the bid amount included in the received ad request and with the determined value comprises:
determining a user-specific weight based at least in part on an average bid amount of advertisements previously presented to additional users having at least a threshold number of characteristics matching characteristics of the user the user during a specific time interval and an amount of interaction by the additional users having at least the threshold number of characteristics matching characteristics of the user with content presented to the additional users by the social networking system during the specific time interval; applying the user specific-weight to the determined value; and generating the score associated with the received ad request by combining the bid amount included in the received ad request, the expected amount of interaction by the user with the advertisement included in the received ad request, and the determined value after application of the user-specific weight. 12. The method of claim 1, wherein generating the score associated with the received ad request by combining the expected amount of interaction by the user with the advertisement included in the received ad request with the bid amount included in the received ad request and with the determined value comprises:
determining a user-specific weight based at least in part on an average bid amount of advertisements previously presented to the user during a specific time interval and an amount of interaction by the user with content presented to the user by the social networking system during the specific time interval; applying the user specific-weight and a scaling factor to the determined value; and generating the score associated with the received ad request by combining the bid amount included in the received ad request, the expected amount of interaction by the user with the advertisement included in the received ad request, and the determined value after application of the user-specific weight and the scaling factor. 13. A computer program product comprising a computer-readable storage medium having instructions encoded thereon that, when executed by a processor, cause the processor to:
receive one or more advertisement requests (“ad requests”) at a social networking system, each ad request including a bid amount and an advertisement; receive a request to present a content feed to a user of the social networking system, the content feed including one or more content items and one or more advertisements included in one or more ad requests; retrieve prior interactions by the user with advertisements previously presented to the user by the social networking system; determine probabilities of the user performing one or more types of interactions from a set of types of interactions with an advertisement in a received ad request based at least in part on the prior interactions by the user with the advertisements and content items previously presented to the user; determine a value associated with the received ad request based at least in part on the determined probabilities; determine an expected amount of interaction by the user with the advertisement included in the received ad request based at least in part on the retrieved prior interactions; generate a score associated with the received ad request by combining the expected amount of interaction by the user with the advertisement included in the received ad request with the bid amount included in the received ad request and with the determined value; and include the received ad request and score associated with the received ad request in a selection process configured to select content for presentation to the user by the social networking system. 14. The computer program product of claim 13, wherein determine probabilities of the user performing one or more types of interactions from the set of types of interactions with the advertisement in the received ad request based at least in part on the prior interactions by the user with the advertisements and content items previously presented to the user comprises:
identify advertisements previously presented to the user having at least a threshold number of characteristics matching characteristics of the advertisement in the received ad request; retrieve types of interactions from the set of types of interactions by the user with the identified advertisements from the retrieved prior interactions by the user; and determine the probabilities of the user performing the one or more types of interactions form the set of types of interactions based at least in part on the types of interactions from the set of types of interactions by the user with the identified advertisements. 15. The computer program product of claim 13, wherein determine the value associated with the received ad request based at least in part on the determined probabilities comprises:
obtain a weight associated with each type of interaction in the set of types of interactions; apply the weights associated with each type of interaction in the set of types of interactions to the probabilities of the user performing each of the one or more types of interactions in the set of types of interactions with the advertisement in the received ad request, a weight associated with a type of interaction in the set applied to a probability of the user performing the type of interaction in the set; and generate the value by combining the probabilities of the user performing each of the one or more types of interactions in the set after application of the weights. 16. The computer program product of claim 13, wherein generate the score associated with the received ad request by combining the expected amount of interaction by the user with the advertisement included in the received ad request with the bid amount included in the received ad request and with the determined value comprises:
apply a conversion factor to the expected amount of interaction by the user with the advertisement included in the received ad request determined value that results in a common unit of measurement for the bid amount and the determined value; and combine the bid amount, the determined value, and the expected amount of interaction after application of the conversion factor. 17. The computer program product of claim 16, wherein the conversion factor is based at least in part on a difference between an estimated amount of interaction by the user with the content feed not including the advertisement from the received ad request and an estimated amount of interaction by the user with the content feed including the advertisement from the received ad request. 18. The computer program product of claim 13, wherein generate the score associated with the received ad request by combining the expected amount of interaction by the user with the advertisement included in the received ad request with the bid amount included in the received ad request and with the determined value comprises:
determine a user-specific weight based at least in part on an average bid amount of advertisements previously presented to the user during a specific time interval and an amount of interaction by the user with content presented to the user by the social networking system during the specific time interval; apply the user specific-weight to the determined value; and generate the score associated with the received ad request by combining the bid amount included in the received ad request, the expected amount of interaction by the user with the advertisement included in the received ad request, and the determined value after application of the user-specific weight. 19. The computer program product of claim 13, wherein generate the score associated with the received ad request by combining the expected amount of interaction by the user with the advertisement included in the received ad request with the bid amount included in the received ad request and with the determined value comprises:
determine a user-specific weight based at least in part on an average bid amount of advertisements previously presented to additional users having at least a threshold number of characteristics matching characteristics of the user the user during a specific time interval and an amount of interaction by the additional users having at least the threshold number of characteristics matching characteristics of the user with content presented to the additional users by the social networking system during the specific time interval; apply the user specific-weight to the determined value; and generate the score associated with the received ad request by combining the bid amount included in the received ad request, the expected amount of interaction by the user with the advertisement included in the received ad request, and the determined value after application of the user-specific weight. 20. The computer program product of claim 13, wherein generating the score associated with the received ad request by combining the expected amount of interaction by the user with the advertisement included in the received ad request with the bid amount included in the received ad request and with the determined value comprises:
determine a user-specific weight based at least in part on an average bid amount of advertisements previously presented to the user during a specific time interval and an amount of interaction by the user with content presented to the user by the social networking system during the specific time interval; apply the user specific-weight and a scaling factor to the determined value; and generate the score associated with the received ad request by combining the bid amount included in the received ad request, the expected amount of interaction by the user with the advertisement included in the received ad request, and the determined value after application of the user-specific weight and the scaling factor. | 3,600 |
13,494 | 13,494 | 14,814,652 | 3,629 | A method for managing a plurality of financial documents using a financial management application (FMA). The method includes performing a plurality of activities of the FMA, recording, in an activity feed, the plurality of activities and metadata describing characteristics of performing the plurality of activities, selecting, in response to a user request to undo a first activity of the plurality of activities, the first activity from the activity feed, selecting, based on the metadata and from the plurality of financial documents, a first financial document that was accessed by the FMA when performing the first activity, identifying, based on the metadata, a first result of the first activity on the first financial document, and modifying the first financial document to remove the first result of the first activity. | 1. A method for managing a plurality of financial documents using a financial management application (FMA), comprising:
performing a plurality of activities of the FMA; recording, in an activity feed, the plurality of activities and metadata describing characteristics of performing the plurality of activities; selecting, in response to a user request to undo a first activity of the plurality of activities, the first activity from the activity feed; selecting, based on the metadata and from the plurality of financial documents, a first financial document that was accessed by the FMA when performing the first activity; identifying, based on the metadata, a first result of the first activity on the first financial document; and modifying the first financial document to remove the first result of the first activity. 2. The method of claim 1, further comprising:
displaying the activity feed without displaying any content of the first financial document; and receiving, in response to the displaying, the user request to undo the first activity, wherein the first activity comprises at least one selected from a group consisting of creating, editing, and deleting the first financial document. 3. The method of claim 1,
wherein performing the first activity comprises editing a previous version of the first financial document into an updated version of the first financial document, wherein the first result comprises an edit of the first financial document, wherein modifying the first financial document comprises:
replacing, without user intervention and without opening the first financial document, the updated version by the previous version of the financial document to remove the edit, and
wherein the metadata comprises a link between the updated version and the previous version. 4. The method of claim 1, further comprising:
selecting, from the activity feed and further in response to the user request to undo the first activity, a second activity of the plurality of activities, wherein the second activity is selected based on a parent-child relationship with the first activity as specified by the metadata; selecting, based on the metadata and from the plurality of financial documents, a second financial document that was accessed by the FMA when performing the second activity; identifying, based on the metadata, a second result of the second activity on the second financial document; and modifying the second financial document to remove the second result of the second activity. 5. The method of claim 4, wherein performing the second activity comprises:
generating the second financial document based on the updated version of the first financial document. 6. The method of claim 4, wherein modifying the second financial document comprises:
re-generating the second financial document based on the previous version of the first financial document. 7. The method of claim 4, wherein modifying the second financial document comprises:
deleting the second financial document; and generating an alert that the second financial document is deleted. 8. A system comprising:
a computer processor; memory storing instructions of a financial management application (FMA) that is executable by the computer processor for managing a plurality of financial documents, the instructions comprising:
an activity engine configured to perform a plurality of activities of the FMA, and
an undo engine configured to:
record, in an activity feed, the plurality of activities and metadata describing characteristics of performing the plurality of activities,
select, in response to a user request to undo a first activity of the plurality of activities, the first activity from the activity feed,
select, based on the metadata and from the plurality of financial documents, a first financial document that was accessed by the FMA when performing the first activity,
identify, based on the metadata, a first result of the first activity on the first financial document, and
modify the first financial document to remove the first result of the first activity; and
a repository configured to store the activity feed and the first financial document. 9. The system of claim 8, the instructions further comprising a user interface module configured to:
display the activity feed without displaying any content of the first financial document; and receive, in response to the displaying, the user request to undo the first activity, wherein the first activity comprises at least one selected from a group consisting of creating, editing, and deleting the first financial document. 10. The system of claim 8,
wherein performing the first activity comprises:
opening, in response to a first user input, the first financial document;
applying, in response to a second user input, an update to the first financial document, wherein the first result comprises the update; and
closing, in response to a third user input, the first financial document into an updated version comprising the update,
wherein modifying the first financial document comprises:
replacing, without user intervention and without opening the first financial document, the updated version by a previous version of the financial document to remove the first result, and
wherein the metadata comprises a link between the updated version and the previous version. 11. The system of claim 8, the undo engine further configured to:
select, from the activity feed and further in response to the user request to undo the first activity, a second activity of the plurality of activities, wherein the second activity is selected based on a parent-child relationship with the first activity as specified by the metadata; select, based on the metadata and from the plurality of financial documents, a second financial document that was accessed by the FMA when performing the second activity; identify, based on the metadata, a second result of the second activity on the second financial document; and modify the second financial document to remove the second result of the second activity. 12. The system of claim 11, wherein performing the second activity comprises:
generating the second financial document based on the updated version of the first financial document. 13. The system of claim 11, wherein modifying the second financial document comprises:
re-generating the second financial document based on the previous version of the first financial document. 14. The system of claim 11, wherein modifying the second financial document comprises:
deleting the second financial document; and generating an alert that the second financial document is deleted. 15. A non-transitory computer readable medium storing instructions for managing a plurality of financial documents using a financial management application (FMA), the instructions, when executed by a computer processor, comprising functionality for:
performing a plurality of activities of the FMA; recording, in an activity feed, the plurality of activities and metadata describing characteristics of performing the plurality of activities; selecting, in response to a user request to undo a first activity of the plurality of activities, the first activity from the activity feed; selecting, based on the metadata and from the plurality of financial documents, a first financial document that was accessed by the FMA when performing the first activity; identifying, based on the metadata, a first result of the first activity on the first financial document; and modifying the first financial document to remove the first result of the first activity. 16. The non-transitory computer readable medium of claim 15, the instructions, when executed by the computer processor, further comprising functionality for:
displaying the activity feed without displaying any content of the first financial document; and receiving, in response to the displaying, the user request to undo the first activity, wherein the first activity comprises at least one selected from a group consisting of creating, editing, and deleting the first financial document. 17. The non-transitory computer readable medium of claim 15,
wherein performing the first activity comprises editing a previous version of the first financial document into an updated version of the first financial document, wherein the first result comprises an edit of the first financial document, wherein modifying the first financial document comprises:
replacing, without user intervention and without opening the first financial document, the updated version by the previous version of the financial document to remove the edit, and
wherein the metadata comprises a link between the updated version and the previous version. 18. The non-transitory computer readable medium of claim 15, the instructions, when executed by the computer processor, further comprising functionality for:
selecting, from the activity feed and further in response to the user request to undo the first activity, a second activity of the plurality of activities, wherein the second activity is selected based on a parent-child relationship with the first activity as specified by the metadata; selecting, based on the metadata and from the plurality of financial documents, a second financial document that was accessed by the FMA when performing the second activity; identifying, based on the metadata, a second result of the second activity on the second financial document; and modifying the second financial document to remove the second result of the second activity. 19. The non-transitory computer readable medium of claim 18, wherein performing the second activity comprises:
generating the second financial document based on the updated version of the first financial document. 20. The non-transitory computer readable medium of claim 18, wherein modifying the second financial document comprises:
re-generating the second financial document based on the previous version of the first financial document. | A method for managing a plurality of financial documents using a financial management application (FMA). The method includes performing a plurality of activities of the FMA, recording, in an activity feed, the plurality of activities and metadata describing characteristics of performing the plurality of activities, selecting, in response to a user request to undo a first activity of the plurality of activities, the first activity from the activity feed, selecting, based on the metadata and from the plurality of financial documents, a first financial document that was accessed by the FMA when performing the first activity, identifying, based on the metadata, a first result of the first activity on the first financial document, and modifying the first financial document to remove the first result of the first activity.1. A method for managing a plurality of financial documents using a financial management application (FMA), comprising:
performing a plurality of activities of the FMA; recording, in an activity feed, the plurality of activities and metadata describing characteristics of performing the plurality of activities; selecting, in response to a user request to undo a first activity of the plurality of activities, the first activity from the activity feed; selecting, based on the metadata and from the plurality of financial documents, a first financial document that was accessed by the FMA when performing the first activity; identifying, based on the metadata, a first result of the first activity on the first financial document; and modifying the first financial document to remove the first result of the first activity. 2. The method of claim 1, further comprising:
displaying the activity feed without displaying any content of the first financial document; and receiving, in response to the displaying, the user request to undo the first activity, wherein the first activity comprises at least one selected from a group consisting of creating, editing, and deleting the first financial document. 3. The method of claim 1,
wherein performing the first activity comprises editing a previous version of the first financial document into an updated version of the first financial document, wherein the first result comprises an edit of the first financial document, wherein modifying the first financial document comprises:
replacing, without user intervention and without opening the first financial document, the updated version by the previous version of the financial document to remove the edit, and
wherein the metadata comprises a link between the updated version and the previous version. 4. The method of claim 1, further comprising:
selecting, from the activity feed and further in response to the user request to undo the first activity, a second activity of the plurality of activities, wherein the second activity is selected based on a parent-child relationship with the first activity as specified by the metadata; selecting, based on the metadata and from the plurality of financial documents, a second financial document that was accessed by the FMA when performing the second activity; identifying, based on the metadata, a second result of the second activity on the second financial document; and modifying the second financial document to remove the second result of the second activity. 5. The method of claim 4, wherein performing the second activity comprises:
generating the second financial document based on the updated version of the first financial document. 6. The method of claim 4, wherein modifying the second financial document comprises:
re-generating the second financial document based on the previous version of the first financial document. 7. The method of claim 4, wherein modifying the second financial document comprises:
deleting the second financial document; and generating an alert that the second financial document is deleted. 8. A system comprising:
a computer processor; memory storing instructions of a financial management application (FMA) that is executable by the computer processor for managing a plurality of financial documents, the instructions comprising:
an activity engine configured to perform a plurality of activities of the FMA, and
an undo engine configured to:
record, in an activity feed, the plurality of activities and metadata describing characteristics of performing the plurality of activities,
select, in response to a user request to undo a first activity of the plurality of activities, the first activity from the activity feed,
select, based on the metadata and from the plurality of financial documents, a first financial document that was accessed by the FMA when performing the first activity,
identify, based on the metadata, a first result of the first activity on the first financial document, and
modify the first financial document to remove the first result of the first activity; and
a repository configured to store the activity feed and the first financial document. 9. The system of claim 8, the instructions further comprising a user interface module configured to:
display the activity feed without displaying any content of the first financial document; and receive, in response to the displaying, the user request to undo the first activity, wherein the first activity comprises at least one selected from a group consisting of creating, editing, and deleting the first financial document. 10. The system of claim 8,
wherein performing the first activity comprises:
opening, in response to a first user input, the first financial document;
applying, in response to a second user input, an update to the first financial document, wherein the first result comprises the update; and
closing, in response to a third user input, the first financial document into an updated version comprising the update,
wherein modifying the first financial document comprises:
replacing, without user intervention and without opening the first financial document, the updated version by a previous version of the financial document to remove the first result, and
wherein the metadata comprises a link between the updated version and the previous version. 11. The system of claim 8, the undo engine further configured to:
select, from the activity feed and further in response to the user request to undo the first activity, a second activity of the plurality of activities, wherein the second activity is selected based on a parent-child relationship with the first activity as specified by the metadata; select, based on the metadata and from the plurality of financial documents, a second financial document that was accessed by the FMA when performing the second activity; identify, based on the metadata, a second result of the second activity on the second financial document; and modify the second financial document to remove the second result of the second activity. 12. The system of claim 11, wherein performing the second activity comprises:
generating the second financial document based on the updated version of the first financial document. 13. The system of claim 11, wherein modifying the second financial document comprises:
re-generating the second financial document based on the previous version of the first financial document. 14. The system of claim 11, wherein modifying the second financial document comprises:
deleting the second financial document; and generating an alert that the second financial document is deleted. 15. A non-transitory computer readable medium storing instructions for managing a plurality of financial documents using a financial management application (FMA), the instructions, when executed by a computer processor, comprising functionality for:
performing a plurality of activities of the FMA; recording, in an activity feed, the plurality of activities and metadata describing characteristics of performing the plurality of activities; selecting, in response to a user request to undo a first activity of the plurality of activities, the first activity from the activity feed; selecting, based on the metadata and from the plurality of financial documents, a first financial document that was accessed by the FMA when performing the first activity; identifying, based on the metadata, a first result of the first activity on the first financial document; and modifying the first financial document to remove the first result of the first activity. 16. The non-transitory computer readable medium of claim 15, the instructions, when executed by the computer processor, further comprising functionality for:
displaying the activity feed without displaying any content of the first financial document; and receiving, in response to the displaying, the user request to undo the first activity, wherein the first activity comprises at least one selected from a group consisting of creating, editing, and deleting the first financial document. 17. The non-transitory computer readable medium of claim 15,
wherein performing the first activity comprises editing a previous version of the first financial document into an updated version of the first financial document, wherein the first result comprises an edit of the first financial document, wherein modifying the first financial document comprises:
replacing, without user intervention and without opening the first financial document, the updated version by the previous version of the financial document to remove the edit, and
wherein the metadata comprises a link between the updated version and the previous version. 18. The non-transitory computer readable medium of claim 15, the instructions, when executed by the computer processor, further comprising functionality for:
selecting, from the activity feed and further in response to the user request to undo the first activity, a second activity of the plurality of activities, wherein the second activity is selected based on a parent-child relationship with the first activity as specified by the metadata; selecting, based on the metadata and from the plurality of financial documents, a second financial document that was accessed by the FMA when performing the second activity; identifying, based on the metadata, a second result of the second activity on the second financial document; and modifying the second financial document to remove the second result of the second activity. 19. The non-transitory computer readable medium of claim 18, wherein performing the second activity comprises:
generating the second financial document based on the updated version of the first financial document. 20. The non-transitory computer readable medium of claim 18, wherein modifying the second financial document comprises:
re-generating the second financial document based on the previous version of the first financial document. | 3,600 |
13,495 | 13,495 | 12,961,832 | 3,689 | Systems, methods, and other embodiments associated with providing an alert when alert criteria is met by monitored AE data analysis output. An alert criteria is specified that corresponds to desired results of at least two different instances of AE data analysis. The alert criteria is assessed on at least one data source. A case series that meets the alert criteria is output. | 1. A computer-implemented method, comprising:
specifying an alert criteria corresponding to desired results of at least two different instances of AE data analysis; assessing the alert criteria on at least one data source; and outputting a case series that meets the alert criteria. 2. The computer-implemented method of claim 1 where specifying the alert criteria comprises specifying desired results of multiple instances of quantitative data analysis. 3. The computer-implemented method of claim 1 where specifying the alert criteria comprises specifying desired results of multiple instances of qualitative data analysis. 4. The computer-implemented method of claim 1 where specifying the alert criteria comprises specifying desired results of multiple instances of quantitative data analysis and qualitative data analysis. 5. The computer-implemented method of claim 1 where specifying the alert criteria comprises constructing a Boolean combination of desired results from the at least two different instances of AE data analysis. 6. The computer-implemented method of claim 1 comprising:
specifying a trigger criteria corresponding to desired results of a first instance of AE data analysis; and
initiating a predetermined second instance of AE data analysis when the trigger criteria is met. 7. The computer-implemented method of claim 6 where the specifying a trigger criteria comprises specifying a qualitative data analysis and where initiating a predetermined second instance of AE data analysis comprises initiating a quantitative data analysis. 8. A computing system, comprising:
an alert tool interface configured to construct an alert criteria corresponding to desired results of at least two instances of AE data analysis; a criteria evaluation logic configured to assess the alert criteria on at least one data source; and an alert mechanism logic configured to output a case series that meets the alert criteria. 9. The computing system of claim 8 where the at least two instances of AE data analysis comprise quantitative data analysis. 10. The computing system of claim 8 where the at least two instances of AE data analysis comprise qualitative data analysis. 11. The computing system of claim 8 where the at least two instances of AE data analysis comprise quantitative and qualitative data analysis. 12. The computing system of claim 8 where the alert criteria comprises a Boolean combination of desired results from the least two instances of AE data analysis. 13. The computing system of claim 8 comprising:
a trigger interface that is configured to construct a trigger criteria that comprises a first instance of AE data analysis;
a trigger evaluation logic to compare results of the first instance of AE data analysis to the trigger criteria; and
a trigger mechanism configured to initiate a predetermined second instance of AE data analysis when the trigger criteria is met. 14. The computing system of claim 13 where the first instance of AE data analysis comprises qualitative data analysis and the predetermined second instance of AE data analysis comprises quantitative data analysis. 15. The computing system of claim 8 where:
the alert tool interface comprises means for allowing construction of an alert criteria that comprises desired results from at least two different instances of AE data analysis;
the criteria evaluation logic comprises means for comparing the results from the at least two instances of AE data analysis to the alert criteria; and
the alert mechanism logic comprises means for outputting a case series that meets the alert criteria. 16. A non-transitory computer-readable medium storing computer-executable instructions that when executed by a computer cause the computer to perform a method, the method comprising:
specifying an alert criteria corresponding to desired results of at least two different instances of AE data analysis; assessing the alert criteria on at least one data source; and outputting a case series that meets the alert criteria. 17. The non-transitory computer-readable medium of claim 16 where the specifying comprises constructing a Boolean combination of desired results from the at least two different instances of AE data analysis. 18. The non-transitory computer-readable medium of claim 16 comprising:
specifying a trigger criteria corresponding to desired results of at least a first instance of AE data analysis; and
initiating a predetermined second instance of AE data analysis when the trigger criteria is met. 19. The non-transitory computer-readable medium of claim 18 where specifying the trigger criteria comprises specifying a qualitative data analysis and where initiating a predetermined second instance of AE data analysis comprises initiating a quantitative data analysis. | Systems, methods, and other embodiments associated with providing an alert when alert criteria is met by monitored AE data analysis output. An alert criteria is specified that corresponds to desired results of at least two different instances of AE data analysis. The alert criteria is assessed on at least one data source. A case series that meets the alert criteria is output.1. A computer-implemented method, comprising:
specifying an alert criteria corresponding to desired results of at least two different instances of AE data analysis; assessing the alert criteria on at least one data source; and outputting a case series that meets the alert criteria. 2. The computer-implemented method of claim 1 where specifying the alert criteria comprises specifying desired results of multiple instances of quantitative data analysis. 3. The computer-implemented method of claim 1 where specifying the alert criteria comprises specifying desired results of multiple instances of qualitative data analysis. 4. The computer-implemented method of claim 1 where specifying the alert criteria comprises specifying desired results of multiple instances of quantitative data analysis and qualitative data analysis. 5. The computer-implemented method of claim 1 where specifying the alert criteria comprises constructing a Boolean combination of desired results from the at least two different instances of AE data analysis. 6. The computer-implemented method of claim 1 comprising:
specifying a trigger criteria corresponding to desired results of a first instance of AE data analysis; and
initiating a predetermined second instance of AE data analysis when the trigger criteria is met. 7. The computer-implemented method of claim 6 where the specifying a trigger criteria comprises specifying a qualitative data analysis and where initiating a predetermined second instance of AE data analysis comprises initiating a quantitative data analysis. 8. A computing system, comprising:
an alert tool interface configured to construct an alert criteria corresponding to desired results of at least two instances of AE data analysis; a criteria evaluation logic configured to assess the alert criteria on at least one data source; and an alert mechanism logic configured to output a case series that meets the alert criteria. 9. The computing system of claim 8 where the at least two instances of AE data analysis comprise quantitative data analysis. 10. The computing system of claim 8 where the at least two instances of AE data analysis comprise qualitative data analysis. 11. The computing system of claim 8 where the at least two instances of AE data analysis comprise quantitative and qualitative data analysis. 12. The computing system of claim 8 where the alert criteria comprises a Boolean combination of desired results from the least two instances of AE data analysis. 13. The computing system of claim 8 comprising:
a trigger interface that is configured to construct a trigger criteria that comprises a first instance of AE data analysis;
a trigger evaluation logic to compare results of the first instance of AE data analysis to the trigger criteria; and
a trigger mechanism configured to initiate a predetermined second instance of AE data analysis when the trigger criteria is met. 14. The computing system of claim 13 where the first instance of AE data analysis comprises qualitative data analysis and the predetermined second instance of AE data analysis comprises quantitative data analysis. 15. The computing system of claim 8 where:
the alert tool interface comprises means for allowing construction of an alert criteria that comprises desired results from at least two different instances of AE data analysis;
the criteria evaluation logic comprises means for comparing the results from the at least two instances of AE data analysis to the alert criteria; and
the alert mechanism logic comprises means for outputting a case series that meets the alert criteria. 16. A non-transitory computer-readable medium storing computer-executable instructions that when executed by a computer cause the computer to perform a method, the method comprising:
specifying an alert criteria corresponding to desired results of at least two different instances of AE data analysis; assessing the alert criteria on at least one data source; and outputting a case series that meets the alert criteria. 17. The non-transitory computer-readable medium of claim 16 where the specifying comprises constructing a Boolean combination of desired results from the at least two different instances of AE data analysis. 18. The non-transitory computer-readable medium of claim 16 comprising:
specifying a trigger criteria corresponding to desired results of at least a first instance of AE data analysis; and
initiating a predetermined second instance of AE data analysis when the trigger criteria is met. 19. The non-transitory computer-readable medium of claim 18 where specifying the trigger criteria comprises specifying a qualitative data analysis and where initiating a predetermined second instance of AE data analysis comprises initiating a quantitative data analysis. | 3,600 |
13,496 | 13,496 | 14,469,238 | 3,688 | A method, system, and computer readable medium for automatically selecting target consumers and delivering business-initiated messages to the selected target consumers, as well as automatically selecting target businesses and delivering consumer-initiated messages to the selected target businesses. In particular, financial management applications used by the businesses and consumers are employed in targeting and delivering the business-initiated messages and consumer-initiated messages. | 1. A system for targeted communication, comprising:
a computer processor; a commerce platform configured to perform a plurality of financial transactions, wherein the plurality of financial transactions comprise payments from a plurality of consumers in exchange for goods and services provided by a plurality of businesses; a financial management server separate from the commerce platform and comprising:
a personal financial management application (PFMA) used by the plurality of consumers, when executed causing the computer processor to:
generate a consumer user profile for each of the plurality of consumers,
access, based on a consumer user input from a consumer of the plurality of consumers, consumer transaction records representing a portion of the financial transactions associated with the consumer, and
display, to the consumer, a business-initiated message received from a targeted communication application (TCA);
a business financial management application (BFMA) used by the plurality of businesses, when executed causing the computer processor to:
generate a business user profile for each of the plurality of businesses, and
access, based on a business user input from a business of the plurality of businesses, business transaction records representing a portion of the financial transactions associated with the business,
wherein the TCA when executed causing the computer processor to:
receive, from the business, the business-initiated message that is generated by the business to selectively target the plurality of consumers;
determine a first match by comparing the business-initiated message with respect to the consumer user profile of the consumer and the consumer transaction records of the consumer;
send the business-initiated message to the consumer via the PFMA based on the first match, wherein the business-initiated message invites the consumer to engage in a first additional financial transaction with the business using the commerce platform; and
a repository for storing:
a plurality of business-initiated messages from the plurality of businesses. 2. The system of claim 1,
wherein the BFMA when executed further causes the computer processor to:
display, to the business, a consumer-initiated message received from the TCA,
wherein the TCA when executed further causes the computer processor to:
receive, from the consumer, the consumer-initiated message that is generated by the consumer to selectively target the plurality of businesses;
determine a second match by comparing the consumer-initiated message with respect to the business user profile of the business and the business transaction records of the business; and
send the consumer-initiated message to the business via the BFMA based on the second match, wherein the consumer-initiated message invites the business to engage in a second additional financial transaction with the consumer using the commerce platform, and
wherein the repository is further for storing:
a plurality of consumer-initiated messages from the plurality of consumers. 3. The system of claim 2,
wherein the business-initiated message is sent to the consumer via the PFMA within a pre-determined time period from the business generating the business-initiated message, and wherein the consumer-initiated message is sent to the business via the BFMA within the pre-determined time period from the consumer generating the consumer-initiated message. 4. The system of claim 2, the TCA when executed further causing the computer processor to:
analyze the consumer transaction records of the consumer to generate a first statistical measure; compare, based on a pre-determined criterion, the first statistical measure and the business-initiated message to determine the first match; analyze the business transaction records of the business to generate a second statistical measure; and compare, based on the pre-determined criterion, the second statistical measure and the consumer-initiated message to determine the second match. 5. The system of claim 2, the TCA when executed further causing the computer processor to:
compare, based on a pre-determined keyword matching criterion, the consumer user profile of the consumer and the business-initiated message to determine the first match; and compare, based on the pre-determined keyword matching criterion, the business user profile of the business and the consumer-initiated message to determine the second match. 6. The system of claim 2, the TCA when executed further causing the computer processor to:
analyze responses of the plurality of businesses to a portion of the plurality of consumer-initiated messages from the consumer to generate a consumer score of the consumer, wherein sending the business-initiated message to the consumer via the PFMA is further based on the consumer score. 7. The system of claim 2, the TCA when executed further causing the computer processor to:
analyze responses of the plurality of consumers to a portion of the plurality of business-initiated messages from the business to generate a business score of the business, wherein sending the consumer-initiated message to the business via the BFMA is further based on the business score. 8. The system of claim 2, TCA when executed further causing the computer processor to:
identify a portion of the plurality of consumer-initiated messages from the consumer, wherein determining the first match is further by comparing the business-initiated message and the portion of the plurality of consumer-initiated messages. 9. A method for targeted communication, comprising:
receiving, by a computer processor and from a business of a plurality of businesses, a business-initiated message that is generated by the business to selectively target a plurality of consumers, wherein the plurality of businesses and the plurality of consumers conduct a plurality of financial transactions using a commerce platform, wherein the plurality of financial transactions comprise payments from the plurality of consumers in exchange for goods and services provided by the plurality of businesses; obtaining, by the computer processor and from a personal financial management application (PFMA) used by the plurality of consumers to manage the plurality of financial transactions, a consumer user profile and consumer transaction records of a consumer of the plurality of consumers; determining a first match by the computer processor comparing the business-initiated message with respect to the consumer user profile of the consumer and the consumer transaction records of the consumer; and sending the business-initiated message to the consumer via the PFMA based on the first match, wherein the business-initiated message invites the consumer to engage in a first additional financial transaction with the business using the commerce platform. 10. The method of claim 9, further comprising:
receiving, from the consumer, a consumer-initiated message that is generated by the consumer to selectively target the plurality of businesses; obtaining, from a business financial management application (BFMA) used by the plurality of business to manage the financial transactions, a business user profile and business transaction records of a business of the plurality of businesses; determining a second match by comparing the consumer-initiated message with respect to the business user profile of the business and the business transaction records of the business; and sending the consumer-initiated message to the business via the BFMA based on the second match, wherein the consumer-initiated message invites the business to engage in a second additional financial transaction with the consumer using the commerce platform. 11. The method of claim 10, further comprising:
displaying, using the PFMA, the business-initiated message to the consumer; and displaying, using the BFMA, the consumer-initiated message to the business; wherein the business-initiated message is sent to the consumer via the PFMA within a pre-determined time period from the business generating the business-initiated message, and wherein the consumer-initiated message is sent to the business via the BFMA within the pre-determined time period from the consumer generating the consumer-initiated message. 12. The method of claim 10, further comprising:
analyzing the consumer transaction records of the consumer to generate a first statistical measure; comparing, based on a pre-determined criterion, the first statistical measure and the business-initiated message to determine the first match; analyzing the business transaction records of the business to generate a second statistical measure; and comparing, based on the pre-determined criterion, the second statistical measure and the consumer-initiated message to determine the second match. 13. The method of claim 10, further comprising:
comparing, based on a pre-determined keyword matching criterion, the consumer user profile of the consumer and the business-initiated message to determine the first match; and comparing, based on the pre-determined keyword matching criterion, the business user profile of the business and the consumer-initiated message to determine the second match. 14. The method of claim 10, further comprising:
analyzing responses of the plurality of businesses to historical consumer-initiated messages previously sent from the consumer to generate a consumer score of the consumer, wherein sending the business-initiated message to the consumer via the PFMA is further based on the consumer score. 15. The method of claim 10 further comprising:
analyzing responses of the plurality of consumers to historical business-initiated messages previously sent from the business to generate a business score of the business,
wherein sending the consumer-initiated message to the business via the BFMA is further based on the business score. 16. The method of claim 10, further comprising:
identifying historical consumer-initiated messages previously sent from the consumer, wherein determining the first match is further by comparing the business-initiated message and the historical consumer-initiated messages. 17. A non-transitory computer readable medium storing instructions for targeted communication, the instructions, when executed by a computer processor, comprising functionality for:
receiving, from a business of a plurality of businesses, a business-initiated message that is generated by the business to selectively target a plurality of consumers, wherein the plurality of businesses and the plurality of consumers conduct a plurality of financial transactions using a commerce platform, wherein the plurality of financial transactions comprise payments from the plurality of consumers in exchange for goods and services provided by the plurality of businesses; obtaining, from a personal financial management application (PFMA) used by the plurality of consumers to manage the plurality of financial transactions, a consumer user profile and consumer transaction records of a consumer of the plurality of consumers; determining a first match by comparing the business-initiated message with respect to the consumer user profile of the consumer and the consumer transaction records of the consumer; and sending the business-initiated message to the consumer via the PFMA based on the first match, wherein the business-initiated message invites the consumer to engage in a first additional financial transaction with the business using the commerce platform. 18. The non-transitory computer readable medium of claim 17, the instructions, when executed by the computer processor, further comprising functionality for:
receiving, from the consumer, a consumer-initiated message that is generated by the consumer to selectively target the plurality of businesses; obtaining, from a business financial management application (BFMA) used by the plurality of business to manage the financial transactions, a business user profile and business transaction records of a business of the plurality of businesses; determining a second match by comparing the consumer-initiated message with respect to the business user profile of the business and the business transaction records of the business; and sending the consumer-initiated message to the business via the BFMA based on the second match, wherein the consumer-initiated message invites the business to engage in a second additional financial transaction with the consumer using the commerce platform. 19. The non-transitory computer readable medium of claim 18, the instructions, when executed by the computer processor, further comprising functionality for:
displaying, using the PFMA, the business-initiated message to the consumer; and displaying, using the BFMA, the consumer-initiated message to the business; wherein the business-initiated message is sent to the consumer via the PFMA within a pre-determined time period from the business generating the business-initiated message, and wherein the consumer-initiated message is sent to the business via the BFMA within the pre-determined time period from the consumer generating the consumer-initiated message. 20. The non-transitory computer readable medium of claim 18, the instructions, when executed by the computer processor, further comprising functionality for:
analyzing the consumer transaction records of the consumer to generate a first statistical measure; comparing, based on a pre-determined criterion, the first statistical measure and the business-initiated message to determine the first match; analyzing the business transaction records of the business to generate a second statistical measure; and comparing, based on the pre-determined criterion, the second statistical measure and the consumer-initiated message to determine the second match. 21. The non-transitory computer readable medium of claim 18, the instructions, when executed by the computer processor, further comprising functionality for:
comparing, based on a pre-determined keyword matching criterion, the consumer user profile of the consumer and the business-initiated message to determine the first match; and comparing, based on the pre-determined keyword matching criterion, the business user profile of the business and the consumer-initiated message to determine the second match. 22. The non-transitory computer readable medium of claim 18, the instructions, when executed by the computer processor, further comprising functionality for:
analyzing responses of the plurality of businesses to historical consumer-initiated messages previously sent from the consumer to generate a consumer score of the consumer, wherein sending the business-initiated message to the consumer via the PFMA is further based on the consumer score. 23. The non-transitory computer readable medium of claim 18, the instructions, when executed by the computer processor, further comprising functionality for:
analyzing responses of the plurality of consumers to historical business-initiated messages previously sent from the business to generate a business score of the business, wherein sending the consumer-initiated message to the business via the BFMA is further based on the business score. 24. The non-transitory computer readable medium of claim 18, the instructions, when executed by the computer processor, further comprising functionality for:
identifying historical consumer-initiated messages previously sent from the consumer, wherein determining the first match is further by comparing the business-initiated message and the historical consumer-initiated messages. | A method, system, and computer readable medium for automatically selecting target consumers and delivering business-initiated messages to the selected target consumers, as well as automatically selecting target businesses and delivering consumer-initiated messages to the selected target businesses. In particular, financial management applications used by the businesses and consumers are employed in targeting and delivering the business-initiated messages and consumer-initiated messages.1. A system for targeted communication, comprising:
a computer processor; a commerce platform configured to perform a plurality of financial transactions, wherein the plurality of financial transactions comprise payments from a plurality of consumers in exchange for goods and services provided by a plurality of businesses; a financial management server separate from the commerce platform and comprising:
a personal financial management application (PFMA) used by the plurality of consumers, when executed causing the computer processor to:
generate a consumer user profile for each of the plurality of consumers,
access, based on a consumer user input from a consumer of the plurality of consumers, consumer transaction records representing a portion of the financial transactions associated with the consumer, and
display, to the consumer, a business-initiated message received from a targeted communication application (TCA);
a business financial management application (BFMA) used by the plurality of businesses, when executed causing the computer processor to:
generate a business user profile for each of the plurality of businesses, and
access, based on a business user input from a business of the plurality of businesses, business transaction records representing a portion of the financial transactions associated with the business,
wherein the TCA when executed causing the computer processor to:
receive, from the business, the business-initiated message that is generated by the business to selectively target the plurality of consumers;
determine a first match by comparing the business-initiated message with respect to the consumer user profile of the consumer and the consumer transaction records of the consumer;
send the business-initiated message to the consumer via the PFMA based on the first match, wherein the business-initiated message invites the consumer to engage in a first additional financial transaction with the business using the commerce platform; and
a repository for storing:
a plurality of business-initiated messages from the plurality of businesses. 2. The system of claim 1,
wherein the BFMA when executed further causes the computer processor to:
display, to the business, a consumer-initiated message received from the TCA,
wherein the TCA when executed further causes the computer processor to:
receive, from the consumer, the consumer-initiated message that is generated by the consumer to selectively target the plurality of businesses;
determine a second match by comparing the consumer-initiated message with respect to the business user profile of the business and the business transaction records of the business; and
send the consumer-initiated message to the business via the BFMA based on the second match, wherein the consumer-initiated message invites the business to engage in a second additional financial transaction with the consumer using the commerce platform, and
wherein the repository is further for storing:
a plurality of consumer-initiated messages from the plurality of consumers. 3. The system of claim 2,
wherein the business-initiated message is sent to the consumer via the PFMA within a pre-determined time period from the business generating the business-initiated message, and wherein the consumer-initiated message is sent to the business via the BFMA within the pre-determined time period from the consumer generating the consumer-initiated message. 4. The system of claim 2, the TCA when executed further causing the computer processor to:
analyze the consumer transaction records of the consumer to generate a first statistical measure; compare, based on a pre-determined criterion, the first statistical measure and the business-initiated message to determine the first match; analyze the business transaction records of the business to generate a second statistical measure; and compare, based on the pre-determined criterion, the second statistical measure and the consumer-initiated message to determine the second match. 5. The system of claim 2, the TCA when executed further causing the computer processor to:
compare, based on a pre-determined keyword matching criterion, the consumer user profile of the consumer and the business-initiated message to determine the first match; and compare, based on the pre-determined keyword matching criterion, the business user profile of the business and the consumer-initiated message to determine the second match. 6. The system of claim 2, the TCA when executed further causing the computer processor to:
analyze responses of the plurality of businesses to a portion of the plurality of consumer-initiated messages from the consumer to generate a consumer score of the consumer, wherein sending the business-initiated message to the consumer via the PFMA is further based on the consumer score. 7. The system of claim 2, the TCA when executed further causing the computer processor to:
analyze responses of the plurality of consumers to a portion of the plurality of business-initiated messages from the business to generate a business score of the business, wherein sending the consumer-initiated message to the business via the BFMA is further based on the business score. 8. The system of claim 2, TCA when executed further causing the computer processor to:
identify a portion of the plurality of consumer-initiated messages from the consumer, wherein determining the first match is further by comparing the business-initiated message and the portion of the plurality of consumer-initiated messages. 9. A method for targeted communication, comprising:
receiving, by a computer processor and from a business of a plurality of businesses, a business-initiated message that is generated by the business to selectively target a plurality of consumers, wherein the plurality of businesses and the plurality of consumers conduct a plurality of financial transactions using a commerce platform, wherein the plurality of financial transactions comprise payments from the plurality of consumers in exchange for goods and services provided by the plurality of businesses; obtaining, by the computer processor and from a personal financial management application (PFMA) used by the plurality of consumers to manage the plurality of financial transactions, a consumer user profile and consumer transaction records of a consumer of the plurality of consumers; determining a first match by the computer processor comparing the business-initiated message with respect to the consumer user profile of the consumer and the consumer transaction records of the consumer; and sending the business-initiated message to the consumer via the PFMA based on the first match, wherein the business-initiated message invites the consumer to engage in a first additional financial transaction with the business using the commerce platform. 10. The method of claim 9, further comprising:
receiving, from the consumer, a consumer-initiated message that is generated by the consumer to selectively target the plurality of businesses; obtaining, from a business financial management application (BFMA) used by the plurality of business to manage the financial transactions, a business user profile and business transaction records of a business of the plurality of businesses; determining a second match by comparing the consumer-initiated message with respect to the business user profile of the business and the business transaction records of the business; and sending the consumer-initiated message to the business via the BFMA based on the second match, wherein the consumer-initiated message invites the business to engage in a second additional financial transaction with the consumer using the commerce platform. 11. The method of claim 10, further comprising:
displaying, using the PFMA, the business-initiated message to the consumer; and displaying, using the BFMA, the consumer-initiated message to the business; wherein the business-initiated message is sent to the consumer via the PFMA within a pre-determined time period from the business generating the business-initiated message, and wherein the consumer-initiated message is sent to the business via the BFMA within the pre-determined time period from the consumer generating the consumer-initiated message. 12. The method of claim 10, further comprising:
analyzing the consumer transaction records of the consumer to generate a first statistical measure; comparing, based on a pre-determined criterion, the first statistical measure and the business-initiated message to determine the first match; analyzing the business transaction records of the business to generate a second statistical measure; and comparing, based on the pre-determined criterion, the second statistical measure and the consumer-initiated message to determine the second match. 13. The method of claim 10, further comprising:
comparing, based on a pre-determined keyword matching criterion, the consumer user profile of the consumer and the business-initiated message to determine the first match; and comparing, based on the pre-determined keyword matching criterion, the business user profile of the business and the consumer-initiated message to determine the second match. 14. The method of claim 10, further comprising:
analyzing responses of the plurality of businesses to historical consumer-initiated messages previously sent from the consumer to generate a consumer score of the consumer, wherein sending the business-initiated message to the consumer via the PFMA is further based on the consumer score. 15. The method of claim 10 further comprising:
analyzing responses of the plurality of consumers to historical business-initiated messages previously sent from the business to generate a business score of the business,
wherein sending the consumer-initiated message to the business via the BFMA is further based on the business score. 16. The method of claim 10, further comprising:
identifying historical consumer-initiated messages previously sent from the consumer, wherein determining the first match is further by comparing the business-initiated message and the historical consumer-initiated messages. 17. A non-transitory computer readable medium storing instructions for targeted communication, the instructions, when executed by a computer processor, comprising functionality for:
receiving, from a business of a plurality of businesses, a business-initiated message that is generated by the business to selectively target a plurality of consumers, wherein the plurality of businesses and the plurality of consumers conduct a plurality of financial transactions using a commerce platform, wherein the plurality of financial transactions comprise payments from the plurality of consumers in exchange for goods and services provided by the plurality of businesses; obtaining, from a personal financial management application (PFMA) used by the plurality of consumers to manage the plurality of financial transactions, a consumer user profile and consumer transaction records of a consumer of the plurality of consumers; determining a first match by comparing the business-initiated message with respect to the consumer user profile of the consumer and the consumer transaction records of the consumer; and sending the business-initiated message to the consumer via the PFMA based on the first match, wherein the business-initiated message invites the consumer to engage in a first additional financial transaction with the business using the commerce platform. 18. The non-transitory computer readable medium of claim 17, the instructions, when executed by the computer processor, further comprising functionality for:
receiving, from the consumer, a consumer-initiated message that is generated by the consumer to selectively target the plurality of businesses; obtaining, from a business financial management application (BFMA) used by the plurality of business to manage the financial transactions, a business user profile and business transaction records of a business of the plurality of businesses; determining a second match by comparing the consumer-initiated message with respect to the business user profile of the business and the business transaction records of the business; and sending the consumer-initiated message to the business via the BFMA based on the second match, wherein the consumer-initiated message invites the business to engage in a second additional financial transaction with the consumer using the commerce platform. 19. The non-transitory computer readable medium of claim 18, the instructions, when executed by the computer processor, further comprising functionality for:
displaying, using the PFMA, the business-initiated message to the consumer; and displaying, using the BFMA, the consumer-initiated message to the business; wherein the business-initiated message is sent to the consumer via the PFMA within a pre-determined time period from the business generating the business-initiated message, and wherein the consumer-initiated message is sent to the business via the BFMA within the pre-determined time period from the consumer generating the consumer-initiated message. 20. The non-transitory computer readable medium of claim 18, the instructions, when executed by the computer processor, further comprising functionality for:
analyzing the consumer transaction records of the consumer to generate a first statistical measure; comparing, based on a pre-determined criterion, the first statistical measure and the business-initiated message to determine the first match; analyzing the business transaction records of the business to generate a second statistical measure; and comparing, based on the pre-determined criterion, the second statistical measure and the consumer-initiated message to determine the second match. 21. The non-transitory computer readable medium of claim 18, the instructions, when executed by the computer processor, further comprising functionality for:
comparing, based on a pre-determined keyword matching criterion, the consumer user profile of the consumer and the business-initiated message to determine the first match; and comparing, based on the pre-determined keyword matching criterion, the business user profile of the business and the consumer-initiated message to determine the second match. 22. The non-transitory computer readable medium of claim 18, the instructions, when executed by the computer processor, further comprising functionality for:
analyzing responses of the plurality of businesses to historical consumer-initiated messages previously sent from the consumer to generate a consumer score of the consumer, wherein sending the business-initiated message to the consumer via the PFMA is further based on the consumer score. 23. The non-transitory computer readable medium of claim 18, the instructions, when executed by the computer processor, further comprising functionality for:
analyzing responses of the plurality of consumers to historical business-initiated messages previously sent from the business to generate a business score of the business, wherein sending the consumer-initiated message to the business via the BFMA is further based on the business score. 24. The non-transitory computer readable medium of claim 18, the instructions, when executed by the computer processor, further comprising functionality for:
identifying historical consumer-initiated messages previously sent from the consumer, wherein determining the first match is further by comparing the business-initiated message and the historical consumer-initiated messages. | 3,600 |
13,497 | 13,497 | 13,022,420 | 3,693 | A system and method to allow service consumers to access financial services deployed using various integration technologies with optimal latency through a technique of data-driven bus arbitration and the use of on-demand delivered bus integration plug-in components. | 1. A computer-implemented method for providing access to financial trading services, comprising:
identifying financial trading services that will be accessible to an end user; determining performance requirements for each financial trading service, wherein the performance requirements relate to at least one of latency and reliability for each financial trading service; creating, by a computer, at least a first service bus and a second service bus, wherein the first and second service buses have performance characteristics related to at least one of latency and reliability, and wherein a performance characteristic of the first service bus differs from a performance characteristic of the second service bus; determining a first group of financial trading services that will be accessible via the first service bus and a second group of financial trading services will be accessible via the second service bus; and attaching, by the computer, the first group of financial trading services to the first service bus and the second group of financial trading services to the second service bus. 2. The method of claim 1, wherein the financial trading services include at least one of trade order analytics, trade order routing, trade order processing, trade order clearance, and market data feeds. 3. The method of claim 1, wherein the first service bus is one of a broker-mediated service bus, a broker-mediated service bus with persistent data storage, and a peer-to-peer service bus. 4. The method of claim 1, wherein the first and second service buses are of a same service bus type. 5. The method of claim 1, wherein the first and second service buses are of a different service bus type. 6. The method of claim 1, wherein the step of determining which financial trading services will be accessible via the first service bus and which financial trading services will be accessible via the second service bus further includes:
assigning the financial trading services to the first and second service buses based at least in part on the performance requirements of each financial trading service and the performance characteristics of the first and second service buses. 7. The method of claim 1, further comprising a step of providing access to said financial trading services via the first and second service buses. 8. The method of claim 1, wherein the computer comprises one or more computers. 9. A method for accessing financial trading services, comprising the following steps:
receiving, by a computer, a first financial trading service request message via a first service bus with a first performance characteristic and a second financial trading service request message via a second service bus with a second performance characteristic that differs from the first performance characteristic, wherein the first and second financial trading service request messages were generated by a financial trading service consumer and routed via an interface component; and sending, by the computer, the received first financial trading service request message to a first financial trading service that is connected to the first service bus and the received second financial trading service request message to a second financial trading service that is connected to the second service bus. 10. The method of claim 9, wherein the interface component routed the financial trading service request message using information gained by accessing a service directory database. 11. The method of claim 9, wherein the interface component is connected to at least a second service bus. 12. The method of claim 11, wherein the service bus and the second service bus are of a same service bus type. 13. The method of claim 11, wherein the service bus and the second service bus are of a different service bus type. 14. The method of claim 11, wherein the service bus is a broker-mediated service bus, a broker-mediated service bus with persistent data storage, or a peer-to-peer service bus. 15. The method of claim 11, wherein the second service bus is a broker-mediated service bus, a broker-mediated service bus with persistent data storage, or a peer-to-peer service bus. 16. A computerized system for accessing financial trading services, comprising:
a first plurality of financial trading services; a second plurality of financial trading services; first and second service buses configured to receive financial trading service request messages; wherein the first plurality of financial trading services are attached to the first service bus and the second plurality of financial trading services are attached to the second service bus; wherein the first and second service buses have performance characteristics related to at least one of latency and reliability, and wherein a performance characteristic of the first service bus differs from a performance characteristic of the second service bus; and wherein the received financial trading service request messages are routed by an integration component configured to route the financial trading service request messages to one of the first and second service buses. 17. The system of claim 16, wherein the interface component is configured to route the financial trading service request message using information gained by accessing a service directory database. 18. The system of claim 16, wherein the two or more service buses are of a same service bus type. 19. The system of claim 16, wherein the two or more service buses are of a different service bus type. 20. The system of claim 17, wherein the two or more service buses are a broker-mediated service bus, a broker-mediated service bus with persistent data storage, or a peer-to-peer service bus. | A system and method to allow service consumers to access financial services deployed using various integration technologies with optimal latency through a technique of data-driven bus arbitration and the use of on-demand delivered bus integration plug-in components.1. A computer-implemented method for providing access to financial trading services, comprising:
identifying financial trading services that will be accessible to an end user; determining performance requirements for each financial trading service, wherein the performance requirements relate to at least one of latency and reliability for each financial trading service; creating, by a computer, at least a first service bus and a second service bus, wherein the first and second service buses have performance characteristics related to at least one of latency and reliability, and wherein a performance characteristic of the first service bus differs from a performance characteristic of the second service bus; determining a first group of financial trading services that will be accessible via the first service bus and a second group of financial trading services will be accessible via the second service bus; and attaching, by the computer, the first group of financial trading services to the first service bus and the second group of financial trading services to the second service bus. 2. The method of claim 1, wherein the financial trading services include at least one of trade order analytics, trade order routing, trade order processing, trade order clearance, and market data feeds. 3. The method of claim 1, wherein the first service bus is one of a broker-mediated service bus, a broker-mediated service bus with persistent data storage, and a peer-to-peer service bus. 4. The method of claim 1, wherein the first and second service buses are of a same service bus type. 5. The method of claim 1, wherein the first and second service buses are of a different service bus type. 6. The method of claim 1, wherein the step of determining which financial trading services will be accessible via the first service bus and which financial trading services will be accessible via the second service bus further includes:
assigning the financial trading services to the first and second service buses based at least in part on the performance requirements of each financial trading service and the performance characteristics of the first and second service buses. 7. The method of claim 1, further comprising a step of providing access to said financial trading services via the first and second service buses. 8. The method of claim 1, wherein the computer comprises one or more computers. 9. A method for accessing financial trading services, comprising the following steps:
receiving, by a computer, a first financial trading service request message via a first service bus with a first performance characteristic and a second financial trading service request message via a second service bus with a second performance characteristic that differs from the first performance characteristic, wherein the first and second financial trading service request messages were generated by a financial trading service consumer and routed via an interface component; and sending, by the computer, the received first financial trading service request message to a first financial trading service that is connected to the first service bus and the received second financial trading service request message to a second financial trading service that is connected to the second service bus. 10. The method of claim 9, wherein the interface component routed the financial trading service request message using information gained by accessing a service directory database. 11. The method of claim 9, wherein the interface component is connected to at least a second service bus. 12. The method of claim 11, wherein the service bus and the second service bus are of a same service bus type. 13. The method of claim 11, wherein the service bus and the second service bus are of a different service bus type. 14. The method of claim 11, wherein the service bus is a broker-mediated service bus, a broker-mediated service bus with persistent data storage, or a peer-to-peer service bus. 15. The method of claim 11, wherein the second service bus is a broker-mediated service bus, a broker-mediated service bus with persistent data storage, or a peer-to-peer service bus. 16. A computerized system for accessing financial trading services, comprising:
a first plurality of financial trading services; a second plurality of financial trading services; first and second service buses configured to receive financial trading service request messages; wherein the first plurality of financial trading services are attached to the first service bus and the second plurality of financial trading services are attached to the second service bus; wherein the first and second service buses have performance characteristics related to at least one of latency and reliability, and wherein a performance characteristic of the first service bus differs from a performance characteristic of the second service bus; and wherein the received financial trading service request messages are routed by an integration component configured to route the financial trading service request messages to one of the first and second service buses. 17. The system of claim 16, wherein the interface component is configured to route the financial trading service request message using information gained by accessing a service directory database. 18. The system of claim 16, wherein the two or more service buses are of a same service bus type. 19. The system of claim 16, wherein the two or more service buses are of a different service bus type. 20. The system of claim 17, wherein the two or more service buses are a broker-mediated service bus, a broker-mediated service bus with persistent data storage, or a peer-to-peer service bus. | 3,600 |
13,498 | 13,498 | 12,709,067 | 3,696 | A method for trading a securities bundle indexed to entertainment revenue includes identifying a securities bundle comprising a first and second security. The first security is associated with a first entertainment event and the second security is associated with a second entertainment event. The first security is offered in an after-market for a buying price and a market price is determined for the first security in the after-market. | 1. A method comprising:
transmitting to a remote device a request to purchase a securities bundle in exchange for a right to a percentage of a revenue that is generated by an entertainment event at a future date, in which the securities bundle is indexed to a plurality of entertainment events; transmitting to the remote device an indication of a desire to sell the right to the percentage of the revenue; receiving, via a processor, an indication that a futures contract based on the right to the percentage of the revenue has been generated, in which the processor and the remote device are in communication over a network; receiving, via the processor, an offer to purchase the futures contract at a purchase price; transmitting to the remote device an acceptance of the offer; and receiving, via the processor, an indication that the futures contract has been traded in an after-market at the purchase price. 2. The method of claim 1, in which the after-market comprises:
a futures exchange. 3. The method of claim 1, in which the plurality of entertainment events are produced by an entertainment company within a timeframe. 4. The method of claim 1, in which the timeframe comprises:
an opening date; and a closing date. 5. The method of claim 4, in which the futures contract is offered after the closing date of the plurality of entertainment events. 6. The method of claim 1, in which the percentage of the revenue is paid in accordance to a dividend schedule in which the dividend schedule is paid in accordance to:
a first dividend date, a second dividend date, and a third dividend date. 7. The method of claim 6, further comprising
determining a dividend after the second dividend date. 8. The method of claim 7, further comprising:
determining a return value for the securities bundle; determining a revenue that is generated for a period of time occurring between the first dividend date and the second dividend date; and calculating the dividend by multiplying the revenue and the return value. 9. The method of claim 1, in which the purchase price for the futures contract is based at least in part on a net profit of the entertainment industry. 10. The method of claim 1, in which the purchase price for the futures contract is based at least in part on a value of the securities bundle at an expiration of the futures contract. 11. The method of claim 1, in which one of the plurality of entertainment events comprises a movie, and
the revenue that is generated by the entertainment event is based on a sale of domestic tickets of the movie. 12. The method of claim 1, in which one of the plurality of entertainment events comprises a concert, and
the revenue that is generated by the entertainment event is based on a sale of tickets of the concert. 13. An apparatus comprising:
a processor; and a memory, in which the memory stores instructions which, when executed by the processor, direct the processor to perform the acts of: transmitting to a remote device a request to purchase a securities bundle in exchange for a right to a percentage of a revenue that is generated by an entertainment event at a future date, in which the securities bundle is indexed to a plurality of entertainment events; transmitting to the remote device an indication of a desire to sell the right to the percentage of the revenue; receiving, via a processor, an indication that a futures contract based on the right to the percentage of the revenue has been generated, in which the processor and the remote device are in communication over a network; receiving, via the processor, an offer to purchase the futures contract at a purchase price; transmitting to the remote device an acceptance of the offer; and receiving, via the processor, an indication that the futures contract has been traded in an after-market at the purchase price. 14. The apparatus of claim 13, in which the after-market comprises:
a futures exchange. 15. The apparatus of claim 13, in which the plurality of entertainment events are produced by an entertainment company within a timeframe. 16. The apparatus of claim 13, in which the timeframe comprises:
an opening date; and a closing date. 17. The apparatus of claim 16, in which the futures contract is offered after the closing date of the plurality of entertainment events. 18. The apparatus of claim 13, in which the percentage of the revenue is paid in accordance to a dividend schedule in which the dividend schedule is paid in accordance to:
a first dividend date, a second dividend date, and a third dividend date. 19. The apparatus of claim 18, in which the memory further stores instructions which, when executed by the processor, direct the processor to perform the acts of:
determining a dividend after the second dividend date. 20. The apparatus of claim 19, in which the memory further stores instructions which, when executed by the processor, direct the processor to perform the acts of:
determining a return value for the securities bundle; determining a revenue that is generated for a period of time occurring between the first dividend date and the second dividend date; and calculating the dividend by multiplying the revenue and the return value. 21. The apparatus of claim 13, in which the purchase price for the futures contract is based at least in part on a net profit of the entertainment industry. 22. The apparatus of claim 13, in which the purchase price for the futures contract is based at least in part on a value of the securities bundle at an expiration of the futures contract. 23. The apparatus of claim 13, in which one of the plurality of entertainment events comprises a movie, and
the revenue that is generated by the entertainment event is based on a sale of domestic tickets of the movie. 24. The apparatus of claim 13, in which one of the plurality of entertainment events comprises a concert, and
the revenue that is generated by the entertainment event is based on a sale of tickets of the concert. 25. An article of manufacture comprising:
a storage medium, in which the storage medium stores instructions which, when executed by a processor, direct the processor to perform the acts of: transmitting to a remote device a request to purchase a securities bundle in exchange for a right to a percentage of a revenue that is generated by an entertainment event at a future date, in which the securities bundle is indexed to a plurality of entertainment events; transmitting to the remote device an indication of a desire to sell the right to the percentage of the revenue; receiving, via a processor, an indication that a futures contract based on the right to the percentage of the revenue has been generated, in which the processor and the remote device are in communication over a network; receiving, via the processor, an offer to purchase the futures contract at a purchase price; transmitting to the remote device an acceptance of the offer; and receiving, via the processor, an indication that the futures contract has been traded in an after-market at the purchase price. 26. The article of manufacture of claim 25, in which the after-market comprises:
a futures exchange. 27. The article of manufacture of claim 25, in which the plurality of entertainment events are produced by an entertainment company within a timeframe. 28. The article of manufacture of claim 25, in which the timeframe comprises:
an opening date; and a closing date. 29. The article of manufacture of claim 28, in which the futures contract is offered after the closing date of the plurality of entertainment events. 30. The article of manufacture of claim 25, in which the percentage of the revenue is paid in accordance to a dividend schedule in which the dividend schedule is paid in accordance to:
a first dividend date, a second dividend date, and a third dividend date. 31. The article of manufacture of claim 30, in which the storage medium further stores instructions which, when executed by the processor, direct the processor to perform the acts of:
determining a dividend after the second dividend date. 32. The article of manufacture of claim 31, in which the storage medium further stores instructions which, when executed by the processor, direct the processor to perform the acts of:
determining a return value for the securities bundle; determining a revenue that is generated for a period of time occurring between the first dividend date and the second dividend date; and calculating the dividend by multiplying the revenue and the return value. 33. The article of manufacture of claim 25, in which the purchase price for the futures contract is based at least in part on a net profit of the entertainment industry. 34. The article of manufacture of claim 25, in which the purchase price for the futures contract is based at least in part on a value of the securities bundle at an expiration of the futures contract. 35. The article of manufacture of claim 25, in which one of the plurality of entertainment events comprises a movie, and
the revenue that is generated by the entertainment event is based on a sale of domestic tickets of the movie. 36. The article of manufacture of claim 25, in which one of the plurality of entertainment events comprises a concert, and
the revenue that is generated by the entertainment event is based on a sale of tickets of the concert. | A method for trading a securities bundle indexed to entertainment revenue includes identifying a securities bundle comprising a first and second security. The first security is associated with a first entertainment event and the second security is associated with a second entertainment event. The first security is offered in an after-market for a buying price and a market price is determined for the first security in the after-market.1. A method comprising:
transmitting to a remote device a request to purchase a securities bundle in exchange for a right to a percentage of a revenue that is generated by an entertainment event at a future date, in which the securities bundle is indexed to a plurality of entertainment events; transmitting to the remote device an indication of a desire to sell the right to the percentage of the revenue; receiving, via a processor, an indication that a futures contract based on the right to the percentage of the revenue has been generated, in which the processor and the remote device are in communication over a network; receiving, via the processor, an offer to purchase the futures contract at a purchase price; transmitting to the remote device an acceptance of the offer; and receiving, via the processor, an indication that the futures contract has been traded in an after-market at the purchase price. 2. The method of claim 1, in which the after-market comprises:
a futures exchange. 3. The method of claim 1, in which the plurality of entertainment events are produced by an entertainment company within a timeframe. 4. The method of claim 1, in which the timeframe comprises:
an opening date; and a closing date. 5. The method of claim 4, in which the futures contract is offered after the closing date of the plurality of entertainment events. 6. The method of claim 1, in which the percentage of the revenue is paid in accordance to a dividend schedule in which the dividend schedule is paid in accordance to:
a first dividend date, a second dividend date, and a third dividend date. 7. The method of claim 6, further comprising
determining a dividend after the second dividend date. 8. The method of claim 7, further comprising:
determining a return value for the securities bundle; determining a revenue that is generated for a period of time occurring between the first dividend date and the second dividend date; and calculating the dividend by multiplying the revenue and the return value. 9. The method of claim 1, in which the purchase price for the futures contract is based at least in part on a net profit of the entertainment industry. 10. The method of claim 1, in which the purchase price for the futures contract is based at least in part on a value of the securities bundle at an expiration of the futures contract. 11. The method of claim 1, in which one of the plurality of entertainment events comprises a movie, and
the revenue that is generated by the entertainment event is based on a sale of domestic tickets of the movie. 12. The method of claim 1, in which one of the plurality of entertainment events comprises a concert, and
the revenue that is generated by the entertainment event is based on a sale of tickets of the concert. 13. An apparatus comprising:
a processor; and a memory, in which the memory stores instructions which, when executed by the processor, direct the processor to perform the acts of: transmitting to a remote device a request to purchase a securities bundle in exchange for a right to a percentage of a revenue that is generated by an entertainment event at a future date, in which the securities bundle is indexed to a plurality of entertainment events; transmitting to the remote device an indication of a desire to sell the right to the percentage of the revenue; receiving, via a processor, an indication that a futures contract based on the right to the percentage of the revenue has been generated, in which the processor and the remote device are in communication over a network; receiving, via the processor, an offer to purchase the futures contract at a purchase price; transmitting to the remote device an acceptance of the offer; and receiving, via the processor, an indication that the futures contract has been traded in an after-market at the purchase price. 14. The apparatus of claim 13, in which the after-market comprises:
a futures exchange. 15. The apparatus of claim 13, in which the plurality of entertainment events are produced by an entertainment company within a timeframe. 16. The apparatus of claim 13, in which the timeframe comprises:
an opening date; and a closing date. 17. The apparatus of claim 16, in which the futures contract is offered after the closing date of the plurality of entertainment events. 18. The apparatus of claim 13, in which the percentage of the revenue is paid in accordance to a dividend schedule in which the dividend schedule is paid in accordance to:
a first dividend date, a second dividend date, and a third dividend date. 19. The apparatus of claim 18, in which the memory further stores instructions which, when executed by the processor, direct the processor to perform the acts of:
determining a dividend after the second dividend date. 20. The apparatus of claim 19, in which the memory further stores instructions which, when executed by the processor, direct the processor to perform the acts of:
determining a return value for the securities bundle; determining a revenue that is generated for a period of time occurring between the first dividend date and the second dividend date; and calculating the dividend by multiplying the revenue and the return value. 21. The apparatus of claim 13, in which the purchase price for the futures contract is based at least in part on a net profit of the entertainment industry. 22. The apparatus of claim 13, in which the purchase price for the futures contract is based at least in part on a value of the securities bundle at an expiration of the futures contract. 23. The apparatus of claim 13, in which one of the plurality of entertainment events comprises a movie, and
the revenue that is generated by the entertainment event is based on a sale of domestic tickets of the movie. 24. The apparatus of claim 13, in which one of the plurality of entertainment events comprises a concert, and
the revenue that is generated by the entertainment event is based on a sale of tickets of the concert. 25. An article of manufacture comprising:
a storage medium, in which the storage medium stores instructions which, when executed by a processor, direct the processor to perform the acts of: transmitting to a remote device a request to purchase a securities bundle in exchange for a right to a percentage of a revenue that is generated by an entertainment event at a future date, in which the securities bundle is indexed to a plurality of entertainment events; transmitting to the remote device an indication of a desire to sell the right to the percentage of the revenue; receiving, via a processor, an indication that a futures contract based on the right to the percentage of the revenue has been generated, in which the processor and the remote device are in communication over a network; receiving, via the processor, an offer to purchase the futures contract at a purchase price; transmitting to the remote device an acceptance of the offer; and receiving, via the processor, an indication that the futures contract has been traded in an after-market at the purchase price. 26. The article of manufacture of claim 25, in which the after-market comprises:
a futures exchange. 27. The article of manufacture of claim 25, in which the plurality of entertainment events are produced by an entertainment company within a timeframe. 28. The article of manufacture of claim 25, in which the timeframe comprises:
an opening date; and a closing date. 29. The article of manufacture of claim 28, in which the futures contract is offered after the closing date of the plurality of entertainment events. 30. The article of manufacture of claim 25, in which the percentage of the revenue is paid in accordance to a dividend schedule in which the dividend schedule is paid in accordance to:
a first dividend date, a second dividend date, and a third dividend date. 31. The article of manufacture of claim 30, in which the storage medium further stores instructions which, when executed by the processor, direct the processor to perform the acts of:
determining a dividend after the second dividend date. 32. The article of manufacture of claim 31, in which the storage medium further stores instructions which, when executed by the processor, direct the processor to perform the acts of:
determining a return value for the securities bundle; determining a revenue that is generated for a period of time occurring between the first dividend date and the second dividend date; and calculating the dividend by multiplying the revenue and the return value. 33. The article of manufacture of claim 25, in which the purchase price for the futures contract is based at least in part on a net profit of the entertainment industry. 34. The article of manufacture of claim 25, in which the purchase price for the futures contract is based at least in part on a value of the securities bundle at an expiration of the futures contract. 35. The article of manufacture of claim 25, in which one of the plurality of entertainment events comprises a movie, and
the revenue that is generated by the entertainment event is based on a sale of domestic tickets of the movie. 36. The article of manufacture of claim 25, in which one of the plurality of entertainment events comprises a concert, and
the revenue that is generated by the entertainment event is based on a sale of tickets of the concert. | 3,600 |
13,499 | 13,499 | 11,799,609 | 3,691 | Disclosed is an anonymous block trade matching system which allows users that wish to cross large blocks of stock to submit orders, or indications of interest, with the option of utilizing market peg benchmarks or future price cross benchmarks. Orders submitted may be subject to minimum thresholds, including a threshold requiring that the order represent ‘X’ % of average daily volume. After submission of a firm order in the system, an alert is generated to provide the order data to other users with potential to cross the order. Visibility of order data by other users may be restricted based upon a data interaction group to which the ordering user or the other user belongs. The system may provide users viewing order data with a capability of negotiating with the submitting user via a restricted two-way messaging interface. Flat rate and rebate/fee cost models may be utilized as a means for charging a user for access to the system. | 1. An anonymous block trade matching system, comprising:
at least one server configured to receive via a network order data for an order of a security, said order data comprising a user's specification of a price benchmark for said order, said price benchmark being selected from the group consisting of: a peg value with a hard limit, a peg value without a hard limit, or a future cross price; a core database having stored therein said order data, said order data including said price benchmark; and, an alert generator configured to use said order data to transmit to at least one prospective trading party an alert anonymously describing said order. 2. The anonymous block trade matching system in accordance with claim 1, wherein said at least one server is further configured to receive said order data via a private network. 3. The anonymous block trade matching system in accordance with claim 1, wherein said at least one server is further configured to receive said order data via a publicly accessible network. 4. The anonymous block trade matching system in accordance with claim 1, wherein said at least one server comprises a first server for receiving said order data via a publicly accessible network and a second server for receiving other order data via a private network. 5. The anonymous block trade matching system in accordance with claim 1, further comprising a matching engine for finding an opposite side order meeting said benchmark value. 6. The anonymous block trade matching system in accordance with claim 1, wherein said alert generator is further configured to generate said alert such that an alphabetic benchmark value, and not an actual price value, is displayed in said alert to said prospective trading party. 7. The anonymous block trade matching system in accordance with claim 6, wherein said price benchmark comprises a peg value and said alphabetic benchmark value is selected from the group consisting of: MID, BID, or ASK, said benchmark value referencing a primary market for the price of said security. 8. The anonymous block trade matching system in accordance with claim 6, wherein said price benchmark comprises a future cross price and said alphabetic benchmark value is selected from the group consisting of: VWAP, OPEN or CLOSE, said VWAP benchmark value referencing a price determined at the discretion of a proprietor of the system and said OPEN and CLOSE benchmark values referencing a primary market for the price of said security. 9. The anonymous block trade matching system in accordance with claim 1, wherein the system is further configured such that if an exchange on which said security is traded moves beyond said user's specified hard limit an order type associated with said order changes automatically from a price benchmark order type to a hard limit order type. 10. The anonymous block trade matching system in accordance with claim 9, wherein the system is further configured such that said alert displays a hard limit price in numeric format after said change from a price benchmark order type to a hard limit order type. 11. The anonymous block trade matching system in accordance with claim 9, wherein the system is further configured such that if, after said change in order type, the exchange moves below said user's specified hard limit said order type reverts automatically to said price benchmark order type. 12. The anonymous block trade matching system in accordance with claim 11, wherein the system is further configured such that said alert again displays an alphabetic benchmark after said change from a hard limit order type to a price benchmark order type. 13. The anonymous block trade matching system in accordance with claim 8, wherein the system is further configured such that after a primary exchange publishes an official price for the security ordered using a future cross benchmark, trade corrects are sent to both participants at the official cross price. 14. An anonymous block trade matching system, comprising:
a server configured to receive order data for an order of a security; a core database having stored therein said order data; and, an alert generator configured to use said order data to transmit to a plurality of prospective parties an alert anonymously describing said order, said alert generator being configured to selectively send said alert to said plurality of prospective parties based upon an indication in said order data of which type of users are to receive said alert. 15. The anonymous block trade matching system in accordance with claim 14, wherein said alert generator comprises a database. 16. The anonymous block trade matching system in accordance with claim 14, wherein said indication in said order data of which type of users are to receive said alert comprises an indication that the alert is to be hidden from a group of users. 17. The anonymous block trade matching system in accordance with claim 16, wherein said group of users comprises all users. 18. The anonymous block trade matching system in accordance with claim 16, wherein said group of users comprises less than all users. 19. The anonymous block trade matching system in accordance with claim 14, wherein said indication in said order data of which type of users are to receive said alert comprises an indication of whether sell-side users are to receive said alert. 20. The anonymous block trade matching system in accordance with claim 14, wherein said alert generator transmits said alert to buy side users by default, and wherein said indication in said order data of which type of users are to receive said alert comprises an indication of whether sell-side users are to receive said alert. 21. The anonymous block trade matching system in accordance with claim 14, wherein said indication in said order data of which type of users are to receive said alert comprises an indication of whether market maker users are to receive said alert. 22. The anonymous block trade matching system in accordance with claim 14, wherein said alert generator is configured to prevent a dark provider from viewing said order data. 23. An anonymous block trade matching system, comprising:
a server configured to receive order data for an order of a security; a core database having stored therein said order data; and, an alert generator configured to use said order data to transmit to a plurality of prospective parties an alert anonymously describing said order, said alert generator being configured to transmit said alert to a first subset of said plurality of prospective parties and subsequently to transmit said alert to a second subset of said plurality of prospective parties after the elapsing of a predetermined time period from said transmission of said alert to said first subset of said plurality of prospective parties. 24. The anonymous block trade matching system in accordance with claim 23, wherein said predetermined time period is one minute. 25. The anonymous block trade matching system in accordance with claim 23, wherein the system is further configured such that to be eligible to be included in said first subset a user must have utilized the system in the past to conduct a number of securities trades. 26. The anonymous block trade matching system in accordance with claim 25, wherein said number of securities trades is one. 27. The anonymous block trade matching system in accordance with claim 25, wherein said eligibility is conditioned upon said user having utilized the system within a predetermined past time period. 28. The anonymous block trade matching system in accordance with claim 27, wherein said predetermined past time period is one week. 29. The anonymous block trade matching system in accordance with claim 23, wherein said alert generator is configured to transmit said alert by the placement of a new order. 30. The anonymous block trade matching system in accordance with claim 23, wherein said alert generator is configured to transmit said alert by the placement of a firm order. 31. An anonymous block trade matching system, comprising:
a server configured to receive order data for an order of a security by a first user; a core database having stored therein said order data;
an alert generator configured to use said order data to transmit to at least a second user an alert anonymously describing said order; and,
a client configured to display to said second user a two-way messaging interface that provides for a negotiation conversation between said first user and said second user, said two-way messaging interface restricting communication from at least one of said first user and said second user to a finite set of phrases. 32. The anonymous block trade matching system in accordance with claim 31, wherein said two-way messaging interface is configured to restrict communication from both said first user and said second user to said finite set of phrases. 33. The anonymous block trade matching system in accordance with claim 31, wherein said two-way messaging interface is configured to translate a keystroke by said first user into a negotiating phrase and to transmit said negotiating phrase to said second user. 34. The anonymous block trade matching system in accordance with claim 31, wherein said two-way messaging interface is configured to translate a soft button press or mouse click by said first user into a negotiating phrase and to transmit said negotiating phrase to said second user. 35. The anonymous block trade matching system in accordance with claim 31, wherein the system is configured such that when a negotiation has been agreed upon between said first user and said second user using said two-way messaging interface, the system generates a negotiation ID that is attached to said order data and locks the order from trading with any party other than said first user and said second user. 36. An anonymous block trade matching system, comprising:
a server configured to receive order data for an order of a security, said order data consisting of an indication that a net price improvement will be provided to a liquidity provider placing said order; a core database having stored therein said order data; and, a matching engine for finding an opposite side order matching said order of a security. 37. The anonymous block trade matching system in accordance with claim 36, further comprising an alert generator configured to use said order data to transmit to at least one prospective trading party an alert anonymously describing said order. 38. An anonymous block trade matching system, comprising:
a server configured to receive order data for a user's order of a security; a core database having stored therein said order data; and, a matching engine for finding an opposite side order matching said order of a security, said matching engine being configured to reject said user's order if said order does not adhere to a minimum size threshold assigned to said security. 39. The anonymous block trade matching system in accordance with claim 38, wherein said minimum size threshold comprises liquidity of said security. 40. The anonymous block trade matching system in accordance with claim 38, wherein said minimum size threshold comprises a price level of said security. 41. The anonymous block trade matching system in accordance with claim 38, wherein said minimum size threshold comprises a share quantity of said security. 42. The anonymous block trade matching system in accordance with claim 38, wherein said minimum size threshold comprises an average daily volume of shares of said security traded on an exchange. 43. The anonymous block trade matching system in accordance with claim 38, further comprising an alert generator configured to use said order data to transmit to at least one prospective trading party an alert anonymously describing said order. | Disclosed is an anonymous block trade matching system which allows users that wish to cross large blocks of stock to submit orders, or indications of interest, with the option of utilizing market peg benchmarks or future price cross benchmarks. Orders submitted may be subject to minimum thresholds, including a threshold requiring that the order represent ‘X’ % of average daily volume. After submission of a firm order in the system, an alert is generated to provide the order data to other users with potential to cross the order. Visibility of order data by other users may be restricted based upon a data interaction group to which the ordering user or the other user belongs. The system may provide users viewing order data with a capability of negotiating with the submitting user via a restricted two-way messaging interface. Flat rate and rebate/fee cost models may be utilized as a means for charging a user for access to the system.1. An anonymous block trade matching system, comprising:
at least one server configured to receive via a network order data for an order of a security, said order data comprising a user's specification of a price benchmark for said order, said price benchmark being selected from the group consisting of: a peg value with a hard limit, a peg value without a hard limit, or a future cross price; a core database having stored therein said order data, said order data including said price benchmark; and, an alert generator configured to use said order data to transmit to at least one prospective trading party an alert anonymously describing said order. 2. The anonymous block trade matching system in accordance with claim 1, wherein said at least one server is further configured to receive said order data via a private network. 3. The anonymous block trade matching system in accordance with claim 1, wherein said at least one server is further configured to receive said order data via a publicly accessible network. 4. The anonymous block trade matching system in accordance with claim 1, wherein said at least one server comprises a first server for receiving said order data via a publicly accessible network and a second server for receiving other order data via a private network. 5. The anonymous block trade matching system in accordance with claim 1, further comprising a matching engine for finding an opposite side order meeting said benchmark value. 6. The anonymous block trade matching system in accordance with claim 1, wherein said alert generator is further configured to generate said alert such that an alphabetic benchmark value, and not an actual price value, is displayed in said alert to said prospective trading party. 7. The anonymous block trade matching system in accordance with claim 6, wherein said price benchmark comprises a peg value and said alphabetic benchmark value is selected from the group consisting of: MID, BID, or ASK, said benchmark value referencing a primary market for the price of said security. 8. The anonymous block trade matching system in accordance with claim 6, wherein said price benchmark comprises a future cross price and said alphabetic benchmark value is selected from the group consisting of: VWAP, OPEN or CLOSE, said VWAP benchmark value referencing a price determined at the discretion of a proprietor of the system and said OPEN and CLOSE benchmark values referencing a primary market for the price of said security. 9. The anonymous block trade matching system in accordance with claim 1, wherein the system is further configured such that if an exchange on which said security is traded moves beyond said user's specified hard limit an order type associated with said order changes automatically from a price benchmark order type to a hard limit order type. 10. The anonymous block trade matching system in accordance with claim 9, wherein the system is further configured such that said alert displays a hard limit price in numeric format after said change from a price benchmark order type to a hard limit order type. 11. The anonymous block trade matching system in accordance with claim 9, wherein the system is further configured such that if, after said change in order type, the exchange moves below said user's specified hard limit said order type reverts automatically to said price benchmark order type. 12. The anonymous block trade matching system in accordance with claim 11, wherein the system is further configured such that said alert again displays an alphabetic benchmark after said change from a hard limit order type to a price benchmark order type. 13. The anonymous block trade matching system in accordance with claim 8, wherein the system is further configured such that after a primary exchange publishes an official price for the security ordered using a future cross benchmark, trade corrects are sent to both participants at the official cross price. 14. An anonymous block trade matching system, comprising:
a server configured to receive order data for an order of a security; a core database having stored therein said order data; and, an alert generator configured to use said order data to transmit to a plurality of prospective parties an alert anonymously describing said order, said alert generator being configured to selectively send said alert to said plurality of prospective parties based upon an indication in said order data of which type of users are to receive said alert. 15. The anonymous block trade matching system in accordance with claim 14, wherein said alert generator comprises a database. 16. The anonymous block trade matching system in accordance with claim 14, wherein said indication in said order data of which type of users are to receive said alert comprises an indication that the alert is to be hidden from a group of users. 17. The anonymous block trade matching system in accordance with claim 16, wherein said group of users comprises all users. 18. The anonymous block trade matching system in accordance with claim 16, wherein said group of users comprises less than all users. 19. The anonymous block trade matching system in accordance with claim 14, wherein said indication in said order data of which type of users are to receive said alert comprises an indication of whether sell-side users are to receive said alert. 20. The anonymous block trade matching system in accordance with claim 14, wherein said alert generator transmits said alert to buy side users by default, and wherein said indication in said order data of which type of users are to receive said alert comprises an indication of whether sell-side users are to receive said alert. 21. The anonymous block trade matching system in accordance with claim 14, wherein said indication in said order data of which type of users are to receive said alert comprises an indication of whether market maker users are to receive said alert. 22. The anonymous block trade matching system in accordance with claim 14, wherein said alert generator is configured to prevent a dark provider from viewing said order data. 23. An anonymous block trade matching system, comprising:
a server configured to receive order data for an order of a security; a core database having stored therein said order data; and, an alert generator configured to use said order data to transmit to a plurality of prospective parties an alert anonymously describing said order, said alert generator being configured to transmit said alert to a first subset of said plurality of prospective parties and subsequently to transmit said alert to a second subset of said plurality of prospective parties after the elapsing of a predetermined time period from said transmission of said alert to said first subset of said plurality of prospective parties. 24. The anonymous block trade matching system in accordance with claim 23, wherein said predetermined time period is one minute. 25. The anonymous block trade matching system in accordance with claim 23, wherein the system is further configured such that to be eligible to be included in said first subset a user must have utilized the system in the past to conduct a number of securities trades. 26. The anonymous block trade matching system in accordance with claim 25, wherein said number of securities trades is one. 27. The anonymous block trade matching system in accordance with claim 25, wherein said eligibility is conditioned upon said user having utilized the system within a predetermined past time period. 28. The anonymous block trade matching system in accordance with claim 27, wherein said predetermined past time period is one week. 29. The anonymous block trade matching system in accordance with claim 23, wherein said alert generator is configured to transmit said alert by the placement of a new order. 30. The anonymous block trade matching system in accordance with claim 23, wherein said alert generator is configured to transmit said alert by the placement of a firm order. 31. An anonymous block trade matching system, comprising:
a server configured to receive order data for an order of a security by a first user; a core database having stored therein said order data;
an alert generator configured to use said order data to transmit to at least a second user an alert anonymously describing said order; and,
a client configured to display to said second user a two-way messaging interface that provides for a negotiation conversation between said first user and said second user, said two-way messaging interface restricting communication from at least one of said first user and said second user to a finite set of phrases. 32. The anonymous block trade matching system in accordance with claim 31, wherein said two-way messaging interface is configured to restrict communication from both said first user and said second user to said finite set of phrases. 33. The anonymous block trade matching system in accordance with claim 31, wherein said two-way messaging interface is configured to translate a keystroke by said first user into a negotiating phrase and to transmit said negotiating phrase to said second user. 34. The anonymous block trade matching system in accordance with claim 31, wherein said two-way messaging interface is configured to translate a soft button press or mouse click by said first user into a negotiating phrase and to transmit said negotiating phrase to said second user. 35. The anonymous block trade matching system in accordance with claim 31, wherein the system is configured such that when a negotiation has been agreed upon between said first user and said second user using said two-way messaging interface, the system generates a negotiation ID that is attached to said order data and locks the order from trading with any party other than said first user and said second user. 36. An anonymous block trade matching system, comprising:
a server configured to receive order data for an order of a security, said order data consisting of an indication that a net price improvement will be provided to a liquidity provider placing said order; a core database having stored therein said order data; and, a matching engine for finding an opposite side order matching said order of a security. 37. The anonymous block trade matching system in accordance with claim 36, further comprising an alert generator configured to use said order data to transmit to at least one prospective trading party an alert anonymously describing said order. 38. An anonymous block trade matching system, comprising:
a server configured to receive order data for a user's order of a security; a core database having stored therein said order data; and, a matching engine for finding an opposite side order matching said order of a security, said matching engine being configured to reject said user's order if said order does not adhere to a minimum size threshold assigned to said security. 39. The anonymous block trade matching system in accordance with claim 38, wherein said minimum size threshold comprises liquidity of said security. 40. The anonymous block trade matching system in accordance with claim 38, wherein said minimum size threshold comprises a price level of said security. 41. The anonymous block trade matching system in accordance with claim 38, wherein said minimum size threshold comprises a share quantity of said security. 42. The anonymous block trade matching system in accordance with claim 38, wherein said minimum size threshold comprises an average daily volume of shares of said security traded on an exchange. 43. The anonymous block trade matching system in accordance with claim 38, further comprising an alert generator configured to use said order data to transmit to at least one prospective trading party an alert anonymously describing said order. | 3,600 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.