A device, system and method for resolving errors between a client device, an intermediation server and a provider system. An error-resolving computing device, receives an error indication indicative of a type of an error between an intermediation server and a provider system, the error occurring in conjunction with the intermediation server acting as an intermediary between a client device and the provider system. The error-resolving computing device retrieves, from a memory, code associated with the type of the error, the code comprising one or more of programming code and machine learning code, which, when executed, instructs the error-resolving computing device to respond to the type of the error. The error-resolving computing device executes the code to respond to the type of the error. The error-resolving computing device provides, to the intermediation server, one or more status indications indicative of a state of responding to the error.
Disclosed is a method for controlling access for at least one tracked object, including: acquiring or receiving a series of two-dimensional images assumed to be taken of the at least one tracked object, and also position data in respect of the at least one tracked object; assigning a unique tracking identifier to the at least one tracked object; determining a trajectory of the at least one tracked object from the position data; determining if there is a discontinuity in the trajectory or data computed from the trajectory, and if a discontinuity is detected, acquiring or receiving one or more new images of the at least tracked object, and assigning a new unique tracking identifier to said at least one tracked object; and determining whether access should be allowed, on the basis of at least one of the one or more new images if discontinuity is detected, or on the basis of the at least one image from the series of two-dimensional images if discontinuity is not detected.
The present invention relates the detection of moire patterns in digital images, which is performed by processing a plurality of digital images of the captured subject and/or scene, each taken at a different image exposure and/or resolution. Furthermore, the present invention relates to a method and system for assessing liveness of captured biometric features based on the detection of moire patterns from the plurality of digital images.
A method for detecting a current attack in a computerized environment is automatically performed by one or more computerized hosts (50) of the computerized environment. The method comprises generating a signature (22) which is specific for a type of activity in the computerized environment based on historic data (20, 21) of the activity, the signature (22) specifying averaged normalized numbers of occurrences of the activity per time frame of a plurality of recurring time frames. The method further comprises determining a threshold value for the activity based on the historic data of the activity and a statistical measure. The method further comprises monitoring current data of the activity in the computerized environment, and generating an attack detection alert based on determining that the current data of the activity exceeds the threshold value for a current time frame.
G06F 21/55 - Detecting local intrusion or implementing counter-measures
G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
5.
DATA INTEGRITY MONITORING AND FEEDBACK CONTROL FOR CLOUD-BASED COMPUTING
The present specification provides data integrity monitoring and feedback in cloud-based computing platforms. While such platforms are ubiquitous and provide a means for globally scaled computing, the need for reliable data integrity also increases with scaling. A system in accordance with an embodiment includes a data integrity monitoring engine that integrates with existing cloud computing platforms and monitors events corresponding to receipt of files and checking the frequency and size of those files.
A method at an aggregator includes: storing previous search results resulting from previous client search requests, and for each previous search result, a previous handling indicator, indicating a relevance of the previous search result to the client; receiving, from the client, a search request containing search parameters; in response to the search request, selecting a subset of previous search results based on correspondence between attributes of the previous search results and the search parameters, and on the previous handling indicators; providing, to a supplier, the search request and auxiliary search parameters corresponding to the selected previous search results and indicating characteristics of the selected previous search results, for generation of current search results at the supplier employing the auxiliary search parameters as inputs; receiving, from the supplier, the current search results generated at the supplier; and returning at least one of the current search results to the client.
A device, system and method managing inventory of provider objects are provided. One or more computing devices: generate one or more associated provider objects representing one or more respective associated items provided by a provider system, the associated provider object(s) including respective prices for the associated respective item(s); store, at one or more memories, the associated provider object(s); push, to an external computing device, information identifying the associated provider object(s), the external computing device being external to the provider system and the one or more computing devices, the information identifying the associated provider object(s) including the respective prices; receive, from the external computing device, an indication that a transaction associated with a provider object of associated provider objects, has occurred; in response to receiving the indication: provide, to the external computing device, the provider object; and reduce, at the one or more memories, a number of the associated provider object(s).
A method of optimizing transmission of requests for updated content from external data sources includes: storing a data object containing initial content received from at least one of the external data sources and associated with an expiry time; storing a set of optimization parameters; obtaining an instruction to request updated content corresponding to the data object; in response to obtaining the instruction, determining, based on the optimization parameters and the expiry time, whether to request updated content from the external data sources; when the determination is affirmative, transmitting at least one update request to at least one of the external data sources based on the initial content and the optimization parameters; and in response to transmitting the at least one update request, receiving and storing respective sets of updated content from the external data sources.
Computer-implemented methods of automatically identifying, ranking, and processing information obtained from a document, and computerized systems and computer program products related thereto. The method involves identifying text clusters and identifying a visual layout structure of at least one part of the document, and ranking the text clusters according to visual properties of the text cluster. The method further involves identifying a semantic context of the identified text clusters and ranking the text clusters according to a similarity of the identified semantic context in relation to a given semantic context, to obtain a semantic context ranking, creating a total ranking of the text clusters based on a combination of a pair of rankings, and selecting text cluster(s) according to its position in the total ranking and providing the selected text cluster(s) to at least one downstream application.
Data is handled in a distributed computing environment comprising at least one server and a plurality of clients comprising at least a first client and a second client. The first client sends a first request for data to the second client, receives a first response from the second client as a response to the first quest, determines a probability of validity of the data requested based on a validity indication included in the first response indicating a probability that the data requested from the second client is invalid. The first client determines that the data requested by the first request and available from the second client is likely invalid, sends a second request to the server to obtain the data from the server and receives the data from the server.
A baggage identification/baggage reconciliation method for public transport is provided. The method involves passenger identification and capturing parameters of piece(s) of baggage at check-in to form a virtual baggage identity, including capturing multiple images of the piece of baggage and generating a check-in 3D point cloud to the piece of baggage therefrom, which involves extracting corner point positions of the piece(s) of baggage. The virtual baggage identity is mapped to the passenger/transport details. The method includes identifying the passenger at the check-out and identifying the piece(s) of baggage at the check-out using the virtual baggage identity, said identification including capturing image(s) of the piece(s) of baggage at the check-out and generating a check-out 3D point cloud/point pattern from said captured image(s) and comparing check-in 3D point clouds with check-out 3D point cloud/point pattern and delivering the identified piece of baggage to the identified passenger.
G06V 10/44 - Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersections; Connectivity analysis, e.g. of connected components
A device, system and method altering data containers to control communication devices are provided. A computing device: receives data associated with a data container, which defines given event associated with respective probabilities at the data container, the given events comprising respective criteria to control a communication device to perform respective given actions associated with the one or more given events; and alters the data container based on the data, by altering one or more of: a probability, a given action and criteria associated with a given event. When the probability meets a given threshold condition, the communication device is controlled to perform the given action based on the criteria. When the probability does not meet the given threshold condition the communication device is controlled to one or more of: decline to perform the given action; inquire as to whether the given event occurred; and perform a further given action.
A method of intermediating transactions includes, at an intermediation server: receiving invoice data defining a price payable to a vendor for supplying a product to a customer; extracting, from the invoice data, a vendor identifier corresponding to the vendor; determining, in association with the invoice data, a customer identifier corresponding to the customer; retrieving a payer identifier corresponding to a payer associated with the customer; retrieving, based on at least the payer identifier, a transaction policy; according to the retrieved transaction policy, allocating an eligible portion of the price to the payer identifier, and allocating a remaining portion of the price to the customer identifier; and generating and transmitting payment data for initiating a payment of the eligible portion from the payer to the vendor.
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/14 - Payment architectures specially adapted for billing systems
14.
Computational load mitigation with predictive search request enrichment
A method at an aggregator includes: storing previous search results resulting from previous client search requests, and for each previous search result, a previous handling indicator, indicating a relevance of the previous search result to the client; receiving, from the client, a search request containing search parameters; in response to the search request, selecting a subset of previous search results based on correspondence between attributes of the previous search results and the search parameters, and on the previous handling indicators; providing, to a supplier, the search request and auxiliary search parameters corresponding to the selected previous search results and indicating characteristics of the selected previous search results, for generation of current search results at the supplier employing the auxiliary search parameters as inputs; receiving, from the supplier, the current search results generated at the supplier; and returning at least one of the current search results to the client.
A controller in a distributed information technology system provides an end-of-batch indication for a batch of initial data to be processed by at least one first processing node. The controller receives a completion indication indicating that the at least one first processing node has completed processing the batch of initial data resulting in one or more batches of intermediate data. The controller provides an end-of-batch indication for each of the one or more batches of intermediate data to be processed by one or more second processing nodes of the plurality of processing nodes. The controller receives a completion indication indicating that the at least one second processing node has completed processing the batch of intermediate data resulting in a batch of final data and generates a control signal indicating that the batch processing has been completely processed.
Access control is performed in an information technology system comprising a normalized access control database and a denormalized access control database. In response to an update request from a client to change the access rights of a higher hierarchy level entity, the access rights of the higher hierarchy level entity are updated in the normalized database. Furthermore, updated access control rights for one or more corresponding lower hierarchy level entities related to the higher hierarchy level entity are computed and stored in a denormalized database. An access request from one of the one or more lower hierarchy level entities is served on the basis of the updated access rights at the lower hierarchy level stored in the denormalized database.
A proxy detection method includes: in response to receiving, from a client device, a first request to establish a transport-layer connection between the client device and the server, transmitting a first message to the client device according to a first handshake sequence, for establishing the transport-layer connection; determining a first time period associated with completion of the first handshake sequence; in response to receiving, from the client device over the transport-layer connection, a second request to establish a secure link between a client endpoint and the server, transmitting a second message to the client endpoint according to a second predefined handshake sequence, for establishing the secure link; determining a second time period associated with completion of the second handshake sequence; and generating, based on the first time period and the second time period, a score indicating a likelihood that the client device is a proxy for the client endpoint.
A method includes: at an aggregator, storing historical data representing: (i) a plurality of previous search requests received at the aggregator, and (ii) for each previous search request, an outcome indicator defining whether a supplier subsystem generated previous search results meeting a relevance threshold in response to the previous search request; receiving, at the aggregator from a client subsystem, a search request containing a set of client search parameters; in response to receiving the search request, determining, based on the search request and the historical data, a likelihood of the supplier subsystem generating search results meeting the relevance threshold; and selecting, according to the likelihood, a routing action for the search request, relative to the supplier subsystem.
Methods and systems for selecting fare paths. A machine learning model is trained on historical fare path data. An output of the machine learning model provides a fare path selection prediction for each fare path. In response to a request from a client device, flight paths fulfilling the request are determined, fare paths are determined by combining the set of flight paths with pricing units, the machine learning model is applied on the fare paths to determine a subset of fare paths for which the selection prediction is higher than a threshold, details of the subset of fare paths are queried, valid fare paths are determined, and details of a subset of the valid fare paths are returned to the client device. The details of the subset of the valid fare paths may be displayed on the client device for final selection of a fare path.
The present invention relates a system and method for monitoring and managing user identity data based on notification received at a client application from ID processing touchpoints and/or an ID sever. The client notification is configured to process the status notification and accordingly display user alerts to the user via a graphic user interface.
A method includes: maintaining, for a pool of items, an available quantity indicator; selecting a transferrable quantity associated with the pool of items; updating the available quantity indicator according to the transferrable quantity; obtaining a set of unique item identifiers equal in number to the transferrable quantity; publishing a set of transferrable item definitions equal in number to the transferrable quantity, each transferrable item definition including (i) a respective unique identifier, (ii) a cost, and (iii) an expiry time; receiving, prior to the expiry time, a conversion request including a unique identifier from a published transferrable item definition; and responsive to authentication of the conversion request, receiving purchaser identification data associated with the conversion request, and generating a purchase record corresponding to an item from the pool, the purchase record linking the purchaser identification data with the item.
G06Q 10/02 - Reservations, e.g. for tickets, services or events
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
Methods and systems of processing queries in a database system and adapting a polling decision in the database system. A piece of cached data is retrieved that matches a selected search query. A piece of original data is retrieved from an original data source that matches the selected search query. A determination is made whether the piece of cached data coincides with the piece of original data. For each of a plurality of modification queries to modify pieces of the original data in the original data source, a determination is made whether the selected modification query is associated with a search query for which the piece of the cached data does not coincide with the piece of the original data. A probabilistic model is adapted based on the results of the determinations with respect to the selected modification queries using a machine learning algorithm.
A device, system and method initiating remedial actions based on altered provider objects are provided. A device generates a provider object representing at least one item provided by a provider system, the provider object including data, the provider object associated with a request from a first client device. The device alters the data to identify the provider object as being associated with the first client device, to generate an altered provider object comprising altered data that identifies the first client device, and provides, the altered provider object to the first client device. The device receives the altered data of the altered provider object, and identifies the first client device from the altered data. In response to determining a lack of association between the first client device and the second client device, the device initiates a remedial action.
A system includes: a profile repository containing, for a client identifier, client attributes including an account balance defined in a first exchange medium, and an auxiliary classification attribute; a response generator to receive a request containing search parameters from a client device corresponding to the client identifier, and, synchronously with the request, to: obtain, based on the search parameters, an item identifier and an item cost in a second exchange medium; select, based on the auxiliary classification attribute, a conversion factor between the first and second exchange media; and send a response to the client device, the response containing the item identifier, the item cost, and a converted item cost in the first exchange medium, according to the conversion factor; and a classifier to, asynchronously with the request, generate an updated auxiliary classification attribute, and replace the auxiliary classification attribute in the repository with the updated auxiliary classification attribute.
A device, system and method controlling operation of a client device via an intermediation server are provided. The server maintains indications of possible steps associated with respective provider systems, the possible steps comprising a subset given possible steps of a computing-process flow implemented at a client device in conjunction with communicating with provider systems. The server provides to one or more of the provider systems, a communication from the client device received in conjunction with implementing a given step of the computing-process flow, and receives, from a given provider system, a response to the communication. The server provides to the client device: the response; and an indication of one or more respective possible steps associated with the given provider system in the indications, the one or more respective possible steps for implementation at the client device in conjunction with receiving the response and implementing the computing-process flow.
A device, system and method for synchronizing databases changes is provided. A computing node determines that a change has occurred, at a primary database, to a stored data-set comprising a data fields arranged in a predetermined layout defined by a data-set representation (DSR) defining a structure of the data fields associated with respective keys. The change comprises a changed data value at a given data field. The node generates a data-change bit-vector representing the changed data value at position(s) corresponding to a location of the data field at the stored data-set. The computing node generates a position-indication bit-vector indicating the position(s) of the changed data value at the data-change bit-vector. The computing node provides respective indications of the data-change and position-indication bit-vectors to a replication node. The replication node updates a respective stored data-set using the respective indications to change a corresponding given field to the changed data value.
G06F 16/30 - Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
27.
COMPUTERIZED DISRUPTION HANDLING IN AN ENVIRONMENT
Computing systems, methods, and computer programs for disruption handling in an environment are presented. The computing system is configured to receive live data, to process the live data, and to store the processed live data. The system is further configured to calculate a current operating indicator from the live data and to forecast a development of the operating indicator without interaction. The system is even further configured to create real-time alerts in response to determining a deviation of the current operating indicator and/or the forecasted operating indicator. Moreover, the system is configured to simulate a development of the operating indicator for at least one action, to determine at least one possible action, and to trigger an action selected from the determined at least one possible action. Finally, the system is configured to generate action data in response to a triggered action and to store the action data.
A device, system and method for synchronizing databases changes is provided. A change-indication bit-vector indicates a position of a change to a stored data-set and/or a respective key position defined by a data-set representation (DSR) that defines a data-set structure. When the change comprises a data-field deletion, an indication of the change-indication bit-vector is provided to a replication node managing a replica database storing a replica data-set; the replication node updates the replica and a respective DSR to show the deletion at the indicated position. When the change comprises a data-field addition, the indication of the change-indication bit-vector and a record of a key value of a new data field and a data value of the new data field, is provided to the replication database; the replication node updates the replica and the respective DSR to show the addition at the indicated position.
Methods, systems, and computer program products for implementing a payment orchestrator simulation process. A simulation initiation request including a user selected rules configuration is received at a simulation server via a simulation user interface on a user device. Rule events information associated with the simulation initiation request is obtained from a rule events server. A rule evaluation request is sent to a rules engine. Rule evaluation information associated with the rule evaluation request is obtained from the rules engine. Simulation results based on the rule evaluation information are determined. The simulation results are sent to the user device via the simulation user interface.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
30.
Device, system and method for mode-based synchronization of data records
A device, system and method for mode-based synchronization of data records is provided. Booking data is received, at one or more computing devices, from one of a first and second client device. When received from the first client device, in a first order mode for the booking data, the device(s): cause an order management system (OMS) to generate: order data at a first database; and cause a legacy system to generate a corresponding passenger name record (PNR) at a second database, the corresponding PNR being one-way synchronized to the order data. When received from the second client device, in a legacy mode for the booking data, the device(s): cause the legacy system to generate, a PNR and/or ticket data at the second database; and cause the OMS to generate corresponding order data at the first database, the corresponding order data being one-way synchronized to the PNR and/or the ticket data.
G06Q 10/02 - Reservations, e.g. for tickets, services or events
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
A database system, method, and computer program product of handling purchases of products is presented, in which the database system comprises a relational database storing relational data for a plurality of products, a key-value database storing a plurality of first files and a plurality of second files, an interface module connecting the relational database with the key-value database, and a shopping engine to communicate with the key-value database. The interface module converts relational data stored in the relational database into first files and second files. The shopping engine queries the key-value database to retrieve available products in response to an availability request.
Methods, systems, and computer program products for implementing a payment consolidation process for travel management systems. A payment request including a travel record identification is received at a payment consolidation server via a payment consolidation user interface. A payment identification is associated with the travel record identification, and the payment consolidation user interface provides access to a plurality of payment processor servers through a single interface. The payment consolidation server obtains eligible payment processor information associated with the travel record identification from a reservation system. The payment consolidation server accesses a first software development kit (SDK) from a first payment provider and a second SDK from a second payment provider based on the eligible payment processor information. The payment consolidation server then updates the payment consolidation user interface with a first interface element associated with the first SDK and a second interface element associated with the second SDK.
G06Q 10/02 - Reservations, e.g. for tickets, services or events
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
33.
DATA PROCESSING UTILIZING AN ASYNCHRONOUS COMMUNICATION REPOSITORY
Methods, systems, and computer program products for data processing utilizing an asynchronous communication repository. Instructions are received at a first event publisher to publish a first dataset. The instructions include a directive to retrieve a second dataset published by a second event publisher, a directive to determine a first metadata structure including attributes describing the first dataset, and a directive to send the first metadata structure to an asynchronous communication repository for storage. A second metadata structure describing the second dataset is received at the first event publisher from the asynchronous communication repository using an asynchronous communication protocol. The second dataset is retrieved at the first event publisher from the second event publisher. The first dataset is generated based on the second dataset. The first metadata structure is determined based on the first dataset. The first metadata structure is sent from the first event publisher to the asynchronous communication repository.
A device, system and method for changing a topology of a geographically distributed system is provided. One or more computing devices determine resource usage of an initial topology of a geographically distributed system that includes data stored at one or more initial locations and applications, that consume the data, being implemented at the one or more of initial locations. The computing device(s) determine projected resource usage of additional topologies of the geographically distributed system, the additional topologies defining respective locations, different from the one or more initial locations, where respective portions of the data and/or the applications are located. In response to an additional topology having a respective projected resource usage that is less than the resource usage of the initial topology, the computing device(s) control a respective portion of the data and/or the applications to move to the respective locations defined by the additional topology.
Authentication method and system using biometric data of a person. The method is flexibly usable on a plurality of distinct verification and authentication devices and comprises a verification process and an authentication process. First biometric data is captured by the verification device and compared to official biometric data. Captured and inputted data is certified and stored. At time of a required authentication of the person, live biometric data of the person is captured and compared to first biometric data. If the data is similar, the person is automatically authenticated.
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06V 40/70 - Multimodal biometrics, e.g. combining information from different biometric modalities
36.
A DISTRIBUTED EVENT-DRIVEN ORDER MANAGEMENT SYSTEM AND A DATA MODEL FOR STRUCTURING DATA THEREIN
The present invention relates to an order data model for structuring data records in an order management system. The order model is configured to decompose each order into its corresponding item data records and sub-item data records, which in turn are associated with fulfilment item data records containing information on the product and/or services to be fulfilled by an assigned provider. The order model may be configured to add, during the generation of data record, a number of placeholder data fields, which may be used by a range of systems and applications to add extra information on each data record.
The document describes systems and methods for handling local (legacy) devices. A local cloud gateway comprises a plurality of interface connectors of different types to physically connect a plurality of these legacy devices to the cloud, comprising a plurality of distant servers. Developments describe the step of extracting the functional messages out of messages stemming from local legacy devices (e.g. protocol translators), secure communications, logical representations of legacy devices in the cloud (“twins”), administration options, various user interfaces (e.g. buzzer) for seamless configuration and use, the use of one or more actuators (retroactions on the physical world), etc. Software and/or hardware embodiments are described.
The document describes systems and methods for handling local (legacy) devices. A local cloud gateway comprises a plurality of interface connectors of different types to physically connect a plurality of these legacy devices to the cloud, comprising a plurality of distant servers. Developments describe the step of extracting the functional messages out of messages stemming from local legacy devices (e.g. protocol translators), secure communications, logical representations of legacy devices in the cloud (“twins”), administration options, various user interfaces (e.g. buzzer) for seamless configuration and use, the use of one or more actuators (retroactions on the physical world), etc. Software and/or hardware embodiments are described.
A device, system and method controlling operation of a client device via an intermediation server are provided. The server maintains indications of predefined data descriptions, associated with respective provider systems, comprising a subset of given predefined data descriptions to be provided at a client device during implementation of a computing-process flow in conjunction with communicating with the respective provider systems. The server: provides, to the respective provider systems, a communication from the client device received in conjunction with implementing a given step of the computing-process flow; and receives, from a given provider system, a response to the communication. The server provides, to the client device: the response; and a predefined data description associated with the given provider system in the indications, the predefined data description provided at the client device in conjunction with the response causing the client device to implement the predefined data description, according to the computing-process flow.
H04L 67/5683 - Storage of data provided by user terminals, i.e. reverse caching
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Systems and methods for implementing a machine learning framework for demand shock detection for dynamic demand forecasting. A method includes generating predicted booking observations with a demand model trained using a training set of historical booking data. Transient booking observations are obtained from an active database. An observed likelihood score is computed from the transient booking observations based on the demand model trained on the historical booking data. A demand shock threshold is computed based on the statistical relationship between a time to detection of the demand shock event and at least one shock detection criterion. An occurrence of a demand shock event is determined by comparing the observed likelihood score to the demand shock threshold.
Systems and methods for implementing a reinforcement machine learning framework for dynamic demand forecasting. A method includes generating estimated booking data for an initial time with a demand model trained using a training set of historical booking data. A variance is detected between the estimated booking data and transient booking data observed at the initial time that exceeds a defined threshold. In response to detecting the variance, a reinforcement learning service is activated. An updated training set including enhanced booking data observed at a subsequent time is created after activating the reinforcement learning service. A parameter of the demand model is updated by training the demand model using the updated training set.
A computer-implemented method for testing a functionality of a computing platform, the computing platform comprising a first microservice, the method comprising: receiving, by an injector microservice, a test configuration file; determining from the test configuration file: a test input message; a test input communication mechanism; and a test output communication mechanism. The method further comprises: generating a test identifier for identifying that a message is being used for testing purposes; transmitting, by the injector microservice, the test input message to the first microservice using the test input communication mechanism, wherein the test input message comprises the test identifier; identifying, by the injector microservice, an output message transmitted via the test output communication mechanism that comprises the test identifier; and recording, by the injector microservice, the output message comprising the test identifier.
The present disclosure relates to database technology and in particular to dynamically updating and customizing database partitions. A computer-implemented engine is disclosed for identifying and retrieving a number of data records applicable to generate a response to a request, the engine having access to at least two partitions. Partition statistics are generated indicating correlations between the data records and, based on that partition statistics, the data records having the strongest correlation with each other are relocated to partitions so that the number of partitions which have to be queried in order to generate a response to a data request is minimized. Furthermore, the computational load caused when generating responses is more equally distributed across the partitions.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
A method of optimizing transmission of requests for updated content from external data sources includes: storing a data object containing initial content received from at least one of the external data sources and associated with an expiry time; storing a set of optimization parameters; obtaining an instruction to request updated content corresponding to the data object; in response to obtaining the instruction, determining, based on the optimization parameters and the expiry time, whether to request updated content from the external data sources; when the determination is affirmative, transmitting at least one update request to at least one of the external data sources based on the initial content and the optimization parameters; and in response to transmitting the at least one update request, receiving and storing respective sets of updated content from the external data sources.
A method includes: receiving, at a computing device implementing a first node of a plurality of nodes forming a decentralized content distribution system, an inbound content request from an entry one of the nodes, the inbound content request including inbound search parameters derived from a client request received at the entry node; selecting, at the computing device, based on the inbound content request and a set of node profiles corresponding to the plurality of nodes, a further one of the nodes; transmitting an outbound content request to the selected further node, the outbound content request containing outbound search parameters based on the inbound search parameters; receiving, from the further node, subsidiary content corresponding to the outbound search parameters; and generating and transmitting, to the entry node, a response to the inbound content request, the response including an offer identifier and at least a portion of the subsidiary content.
The present invention is directed to a system and a method for ensuring high availability and guarantee delivery of event streams to target consumer applications. The distributed event streaming platform of the present invention is provided with an event streaming layer comprising a plurality of independent and non-replicating event streaming clusters that are configured to process events received from a producer module. A monitoring module is provided to monitor the propagation and delivery of each propagated event based on event notifications received from an event producer module and a plurality of the consumer modules.
In a system including a plurality of computing subsystems executing a set of hosted applications, each of the computing subsystems maintains a copy of a common routing matrix defining, for each hosted application, an identifier of a computing subsystem configured to host the application. A first intra-subsystem routing component of a first one of the computing subsystems receives a message; determines a target one of the hosted applications to process the message; identifies, according to the common routing matrix, a second one of the computing subsystems that executes the target hosted application; and in response to the identifying, provides the message and a routing indicator to a first inter-subsystem routing component of the first computing subsystem. The first inter-subsystem routing component the transmits the message to the second computing subsystem.
The present invention is directed to a system and a method for facilitating the consistent update of routing tables across the routers of a routing layer in a distributed messaging system. The routers are configured to send together with the outbound message the routing table version used to route the outbound message, which is compared, at the level of the enqueue layer, with the latest deployed routing table version and/or the latest routing table version used to route messages to the requested message queue. If the routing table version of the outbound message is older than the latest deployed routing table version and/or the latest routing table version used to route messages to the requested message queue, then the outbound message is rejected, otherwise, the message is enqueued to the requested message queue.
A method includes: maintaining, at an integration computing device, a scheduling parameter corresponding to a source computing device maintaining a plurality of source data records with record identifiers; receiving, from the source computing device, a plurality of modification indicators, each modification indicator generated at the source computing device in response to modification of a source data record, and containing the record identifier of the source data record; storing the modification indicators in a repository; according to the scheduling parameter, periodically obtaining a subset of the source data records from the source computing device, by: retrieving the modification indicators from the repository; generating a bulk record request containing the plurality of record identifiers from the retrieved modification indicators; transmitting the bulk record request to the source computing device; and responsive to transmitting the bulk record request, receiving the subset of source data records from the source computing device.
Methods, systems, and computer program products for implementing a payment integration process for travel management systems. A payment integration request associated with a payment identification from a travel provider system is received. Payment transaction data associated with the payment identification from a payment gateway using the payment identification is obtained. Travel records data associated with the payment identification from a reservation system is obtained. Payment integration data associated with the payment identification is determined by performing a sanity check of the payment transaction data and the travel record data, validating the payment transaction data and the travel record data, and generating the payment integration data based on the sanity check and the validation of the payment transaction data and the travel record data. Payment integration data to be integrated into the travel record is provided.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 10/02 - Reservations, e.g. for tickets, services or events
51.
System and method for integrating message content into a target data processing device
Systems and methods of integrating message content into a target processing device configured to process input data having a predefined data structure. A messaging server is configured to receive a message from a messaging client device executing a messaging application. An orchestrator device is configured to integrate at least a part of the message content into a target data processing device, receive the part of the message content from the messaging server, and transmit a file derived from the part of the message content to a file processing device. The processing device is configured to transform each received file into a description file comprising a set of predefined keys. The orchestrator device is configured to derive an input file having the predefined data structure from the description file and transmit the input file to the target data processing device for processing of the input file by the target processing device.
A computer implemented method for controlling resources comprising is presented. The method comprises determining an evolution index for a second time period with respect to a first time period, determining a forecasting index for a first forecasting time period with respect to a starting forecasting time period by dividing the evolution index for the first forecasting time period with respect to the starting forecasting time period through the evolution index for a second forecasting time period with respect to the starting forecasting time period, determining at least one forecasting value of the requirement of the resources in a future time period by multiplying a starting value corresponding to the requirement for resources with the forecasting index for the future time period, and applying the at least one forecasting value to control the resources.
G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
53.
Device, system and method for providing descriptions to communication devices using machine learning generated templates
A device, system and method for providing descriptions to communication devices using machine learning generated templates is provided. A device replaces given word types in provided text files with corresponding tags to generate corresponding intermediate templates, the provided text files associated with a given topic. The device generates, for the given topic, one or more textual templates that include at least a portion of the corresponding tags, the textual templates in natural language sentences, the generating of the textual templates at least partially based on the corresponding intermediate templates. The device populate the corresponding tags in a textual template, of the textual templates, with corresponding words of a given data file associated with the given topic, to generate a respective description of a given item associated with the given topic, the given data file being specific to the given item. The device provides the respective description to a communication device
G06F 18/214 - Generating training patterns; Bootstrap methods, e.g. bagging or boosting
G06F 18/2113 - Selection of the most significant subset of features by ranking or filtering the set of features, e.g. using a measure of variance or of feature cross-correlation
54.
Maintaining consistency of data between computing nodes of a distributed computer architecture
The present invention relates to a method and a system for maintaining consistency of data between data-sets stored in a master database of a master computing node and corresponding data-sets stored in a replication database of at least one replication computing node. Each time an updated version of a stored data set is received, the master computing node is configured for updating a corresponding data-set stored in the master database and transmitting replication data relating to the updated data-set version to the at least one replication computing node for replication. The replication data comprising a bit-vector storing data values extracted from data fields of the data-set classified as volatile data fields. The data values stored in the bit-vector representing the changes in the data-set to be replicated in the at least one replication node.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
G06F 9/30 - Arrangements for executing machine instructions, e.g. instruction decode
A database server is communicatively coupled to a database storing multiple data records which are accessible by a number of data access systems communicatively coupled to the database server in order to claim exclusive access to a data record for a specifiable time period by one of the data access systems. The database server stores associations of the data records with the data access systems defining which data access system is generally allowed to access to which data record and an exclusive access times inventory defining which of the data access systems with allowed access has already been granted exclusive access to which data record for which time periods.
Method and system of automatically extracting information of a predefined type from a document is provided. The method includes identifying a location and classification of a segment of interest of a document that includes information associated with a predefined type. The method further includes identifying a location and classification of characters from the segment of interest based on characteristics associated with the predefined type. The method further includes extracting the identified characters from the segment of interested associated with the predefined type.
Methods, systems, and computer program products for software-defined database replication for a plurality of databases. Labels are applied to each of the plurality of databases and linking rules including conditions relating to the labels are used to define database replication links.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
A device, system and method for assigning portions of a global resource limit to application engines based on relative load is provided. A system comprises a plurality of application engines that share a global resource limit; and a plurality of operator engines. The plurality of operator engines are each configured to: monitor a respective metric representative of respective load at a respective application engine; share the respective metric with others of the plurality of operator engines; determine a relative load at the respective application engine based on the respective metric and respective metrics received from the others of the plurality of operator engines; and assign a portion of the global resource limit to the respective application engine based on the relative load.
A method in an orchestrator computing device includes: detecting a request to obtain updated data from a data source, for storage in a dataset corresponding to the data source; retrieving, from the dataset, a client identifier of the data source; generating a data collection message including (i) an input element to receive the updated data, (ii) a selectable submission element including a network identifier of the orchestrator computing device, and (iii) an authentication token; transmitting the data collection message for delivery to the data source using the client identifier; responsive to (i) entry of the updated data via the input element, and (ii) selection of the submission element at a client computing device associated with the data source, receiving, from the client computing device, the updated data and the authentication token; and updating the dataset to include the updated data.
A method of browser-based target data extraction includes: storing a browser application and a browser extension, the browser extension containing a predefined network identifier of a server; at a controller of the client computing device interconnected with the memory, executing the browser application to retrieve a web page containing target data; at the controller, responsive to retrieving the web page, executing the browser extension simultaneously with the browser application for: capturing a portion of the web page containing the target data; responsive to capturing the portion, automatically generating an overlay interface including the target data; controlling a display of the client computing device to present the overlay with the web page; receiving an operator command at the overlay via an input assembly of the client computing device; and when the operator command is a confirmation command, transmitting the target data to the server using the predefined network identifier.
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06F 40/143 - Markup, e.g. Standard Generalized Markup Language [SGML] or Document Type Definition [DTD]
Methods and distributed computer devices for automatically determining whether a document is genuine. The method involves generating an image of the document, pre-processing of the image to obtain at least one segment of the image with an area of interest and dividing the at least one segment into portions containing single characters and/or combinations of characters. A validation of at least two single characters and/or at least two combinations of characters is performed for each of the single character and/or character combinations for at least two different categories. Score values are created for each category for each validated single character and/or character combination. Feature vectors are created for each single character and/or character combination, with the respective score values for each category as components. The method involves classifying the feature vectors to determine whether the single character or character combination to which the feature vector is associated is genuine.
G06V 30/413 - Classification of content, e.g. text, photographs or tables
G06V 10/26 - Segmentation of patterns in the image field; Cutting or merging of image elements to establish the pattern region, e.g. clustering-based techniques; Detection of occlusion
G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
G06V 10/762 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using clustering, e.g. of similar faces in social networks
Distributed computer system with an application server and an auxiliary server for processing a group transaction with entities in the group. The group transaction, requiring a target value to be received, includes first and second transactions. The application server is configured to receive the first transaction including a first value, interface the auxiliary server to create and access a temporary file to store the first value in which temporary file is associated with the group transaction, receive the second transaction including a second value after the first transaction in which the second value to reach a target value when combined with the first value, and receive identification information associated with the group transaction for each group entity independently from the first and second transactions. In response to receiving the first and second values as well as the identification information for each group, designated files are issued for each entity.
The present invention describes a system and a method for dynamically optimising the computing resources allocated to a client application in different data regions of one or more service providers. A number of monitoring modules are provided in each data regions, which are configured to collect operational information from each data region, which is communicated to the other data regions. As such, all data regions are aware of the operational environment of the other data regions.
A method includes: receiving, from a client device, a data request containing a structured document; generating a set of numerical vectors representing the structured document; providing the set of numerical vectors to an auxiliary controller for generation of a predicted attribute of response data providing the search request to a primary response generator for generation of the response data; determining, at the auxiliary controller, whether the predicted attribute satisfies a modification criterion; and when the determination is affirmative, transmitting a modification command to the primary response generator to truncate the generation of the response data.
A method for legacy-based access to non-legacy data includes: receiving, at an intermediation server, a non-legacy data object containing non-legacy content; generating a legacy data object containing the non-legacy content, for storage in a repository; storing, in association with the legacy data object, a non-legacy distribution channel indicator; adjusting a legacy processing mechanism at the repository according to the non-legacy distribution channel indicator; receiving from a client subsystem, via a legacy interface, a request for the non-legacy content; and in response to the request, retrieving and sending the legacy data object containing the non-legacy content, via the legacy interface.
Data is processed in a distributed computing environment with at least one server and a plurality of clients comprising at least a first client and a second client. The first client sends a first request to the server to obtain result data, receives raw data from the server as a response to the first request, processes the raw data to obtain the result data and stores the result data, and sends the result data to the second client in response to receiving a third request to obtain the result data from the second client.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
Search requests are processed in a distributed database environment which includes a frontend module, one or more clients, a cache, a live data source, and multiple data records. Each data record includes at least one stable data piece stored in the cache and at least one volatile data piece. The frontend module receives a search request from a client and retrieves from the cache a set of data records. Each stable data piece in the set of data records corresponds to search criteria indicated in the search request. Current volatile data pieces, which correspond to the stable data pieces of the retrieved set of data records, are retrieved by the frontend module from the live data source for the retrieved set of data records. A completed set of data records is generated by combining the stable data pieces and the current volatile data pieces, and returned to the requesting client.
Methods and systems for selecting fare paths. A machine learning model is trained on historical fare path data. An output of the machine learning model provides a fare path selection prediction for each fare path. In response to a request from a client device, flight paths fulfilling the request are determined, fare paths are determined by combining the set of flight paths with pricing units, the machine learning model is applied on the fare paths to determine a subset of fare paths for which the selection prediction is higher than a threshold, details of the subset of fare paths are queried, valid fare paths are determined, and details of a subset of the valid fare paths are returned to the client device. The details of the subset of the valid fare paths may be displayed on the client device for final selection of a fare path.
Systems and methods for user experience prediction and mitigation. A notification that identifies a reported experience metric related to one or more user experiences associated with an event for a user is received. A predicted experience metric for the one or more user experiences associated with the event is obtained from a user profile for the user. A feedback delta is determined. The feedback delta is determined to be negative and exceed an experience threshold value. In response, at least one mitigation option among a plurality of mitigation options are identified in reaction to the feedback delta, and an instruction is triggered to a remote service that causes the remote service to effectuate the at least one mitigation option.
Methods, servers, and computer programs for processing multiple data records in response to a database request with search indications are provided. The server retrieves multiple data records with parameter values in the fields which correspond to the search indications indicated by the database request, determines weight values for at least two of the fields based on the corresponding parameter values of the at least two fields, calculates an aggregated score for at least a number of the retrieved data records based on the determined weight values, and returns at least a subset of the retrieved data records to the client based on the calculated aggregated scores.
The present disclosure relates to systems and methods for providing a virtual machine and for providing authentication of a user using the virtual machine. The disclosed systems and methods may perform operations including providing an application programming interface (API) to an electronic device; booting a virtual machine configured to emulate a type of electronic device based on a workstation to which the electronic device is connected; receiving input, using the API, from the electronic device; and providing output to the workstation using the virtual machine. In another example, the disclosed systems and methods may perform operations including connecting, via at least one network and through an application programming interface (API), to a remote server; providing to the remote server, via the at least one network and through the API, the captured biometric indicator; receiving, from a virtual machine executed on the remote server, at least one packet in a defined format based on the biometric indicator; and forwarding the received at least one packet to a workstation communicably connected to the electronic device.
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
72.
A METHOD AND A SYSTEM FOR MANAGING THE COMPUTING RESOURCES OF A CLOUD COMPUTING PLATFORM
The present invention relates to a system for managing the computing resources of a cloud computing platform comprising a plurality of Virtual Machine (VM) clusters each comprising a plurality of Virtual Machine (VM) instances, each configured to run at least one software application instance. The system comprises a monitoring module configured for determining a resource utilisation value for each VM instance and an elasticity module configured for adjusting the number of VM instances and/or software application instances in the VM cluster. The monitoring module is configured to determine, based on the user requests received at the communication interface, a cluster resource utilisation value, which is used by the elasticity module to adjust the number of VM instances and/or software application instances to maintain the resource utilisation value of each VM instance within the target value range.
A method in an aggregator server of synchronizing data records responsive to variable update notifications includes: receiving, from a provider system, an update notification corresponding to a master data object at the provider system; retrieving a record containing a local data object corresponding to the master data object; determining whether the update notification contains update definitions identifying changes to the master data object; selecting between a delta synchronization mode, when the determination is affirmative, and an object comparison synchronization mode, when the determination is negative; for the delta synchronization mode, updating the local data object according to the update definitions; for the object comparison synchronization mode, obtaining a copy of the master data object, and updating the local data object based on a comparison between the local data object and the copy of the master data object; and storing the updated local data object in the record at the aggregator.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
74.
System and method for real-time three-party transaction processing
A method of intermediating transactions includes, at an intermediation server: receiving invoice data defining a price payable to a vendor for supplying a product to a customer; extracting, from the invoice data, a vendor identifier corresponding to the vendor; determining, in association with the invoice data, a customer identifier corresponding to the customer; retrieving a payer identifier corresponding to a payer associated with the customer; retrieving, based on at least the payer identifier, a transaction policy; according to the retrieved transaction policy, allocating an eligible portion of the price to the payer identifier, and allocating a remaining portion of the price to the customer identifier; and generating and transmitting payment data for initiating a payment of the eligible portion from the payer to the vendor.
G06Q 20/00 - Payment architectures, schemes or protocols
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/14 - Payment architectures specially adapted for billing systems
Computation engines and methods for dynamically computing results in response to a database request indicating a search parameter. Based on an initial result database, an initial incomplete result set with a number of results which include static data pieces that correspond to the search parameter is determined. A dynamic data piece for each result in the initial incomplete result set is determined based on a number of dynamic computation rules, thereby obtaining an intermediate completed result set. Each result of the intermediate completed result set includes the static data piece and the computed dynamic data piece. An adjustment of the dynamic data piece is computed for a sub-set of the intermediate completed result set based on a number of adjustment computation rules, thereby obtaining a finalized completed result set, and at least a subset of the finalized completed result set is returned to the client.
Data is handled in a distributed computing environment comprising at least one server and a plurality of clients comprising at least a first client and a second client. The first client sends a first request for data to the second client, receives a first response from the second client as a response to the first quest, determines a probability of validity of the data requested based on a validity indication included in the first response indicating a probability that the data requested from the second client is invalid. The first client determines that the data requested by the first request and available from the second client is likely invalid, sends a second request to the server to obtain the data from the server and receives the data from the server.
Updating multiple data records in a database system with at least one database and a first server comprises creating a first session and loading, within the first session, the multiple data records stored by the database into a memory of the first server. Update at least a first and a second of the multiple data records during the first session in the memory of the first server. A database transaction mechanism writes back the multiple data records after updating the at least first and second data records to the database which insures that either all or none of the updated database records are committed. The database transaction mechanism includes a write lock over the first and second data records stored in the database.
The present invention relates to a method and a system for capping incoming transactions in inbound stateful conversations established between a client and a plurality of conversation servers of a service integrator. For each client, a group of conversation servers is allocated to handle the inbound stateful conversations initiated. Each conversation server in the group broadcasts a local traffic value periodically to the other conversation servers in the group. Each conversation server in the group calculates a transaction capping limit based on a client global transaction capping limit and the broadcasted local traffic values from the other conversation servers in the group. Each conversation server limits the rate of incoming transactions received by the client when exceeding the local transaction capping limit.
A method includes receiving, at an intermediation server, from a requesting device, a request for one or more items provided by a provider system; generating, at the intermediation server, an intermediate reply comprising data indicative of the one or more items provided by the provider system; determining, at the intermediation server, whether the request is eligible for direct distribution; in response to determining that the request is eligible for direct distribution, generating, at the intermediation server, an adjusted reply by: communicating with a hosted offer management system to receive instructions for adjusting the intermediate reply, the hosted offer management system providing hosted provider object services for the provider system; and adjusting, at the intermediation server, the intermediate reply based on the instructions; and providing, from the intermediation server, to the requesting device, the adjusted reply in response to the request.
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
G06Q 30/02 - Marketing; Price estimation or determination; Fundraising
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
H04L 67/1001 - Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
80.
REINFORCEMENT LEARNING SYSTEMS AND METHODS FOR INVENTORY CONTROL AND OPTIMIZATION
Methods of reinforcement learning for a resource management agent. Responsive to generated actions, corresponding observations are received. Each observation comprises a transition in a state associated with an inventory and an associated reward in the form of revenues generated from perishable resource sales. A randomized batch of observations is periodically sampled according to a prioritized replay sampling algorithm. A probability distribution for selection of observations within the batch is progressively adapted. Each batch of observations is used to update weight parameters of a neural network that comprises an approximator of the resource management agent, such that when provided with an input inventory state and an input action, an output of the neural network more closely approximates a true value of generating the input action while in the input inventory state. The neural network may be used to select each generated action depending upon a corresponding state associated with the inventory.
Methods and systems of assessing data inputs to detect and judge erroneous or fraudulent data inputs is provides. A machine learning system is based on training data to develop a model to assess future data inputs. The training data are based on historical data inputs. Based on the results of the assessment of the future data inputs, a set of predefined actions may be triggered in order to handle the erroneous or fraudulent data inputs.
An augmented reality computing device, hereinafter referred to as the AR device, comprising one or more processors configured to receive information relating to a moveable object, check whether a virtual representation of the object forms part of a virtual representation of the environment occupied by the AR device and display, in a user observable display portion of the AR device information relating to the object.
Multiple database queries forming a complex database request are processed. A first query and second query are answered by a first response and a second response based on a cache storing cached data. A third query which is related to the second query is answered based on a database storing current corresponding to the cached data. A selected subset of the cached data returned with the second response is validated by corresponding current data stored in the database.
Systems and methods for handling database transactions within a database session. A first client request to update a first data piece of a database session is received. A first response to the first client request indicates an update of the first data piece in accordance with the first request and publishes the update to enable further processing of the updated first data piece. An indication indicates that the updated first data piece is to be further updated and/or a second data piece of the database session is to be updated. A second client request is received to update a third data piece of the database session and a second response to the second client request indicates an update of the third data piece in accordance with the second request and an update of the updated first data piece in accordance with the indication.
A method of controlling updates to booking data corresponding to purchasable products includes, at an intermediate server connected with a booking server: obtaining and storing purchase initiation data including a transaction identifier and a client identifier; transmitting a request for product definitions to the booking server, according to the purchase initiation data; receiving and storing a product definition from the booking server in association with the purchase initiation data; generating an interactive message containing selectable product definition data, and transmitting the interactive message according to the client addressing identifier; receiving a product selection, responsive to selection of the product definition data in the interactive message at a client device; and generating a purchase instruction corresponding to the product definition and sending the purchase instruction to the booking server causing the booking server to update the booking data to reflect a purchase corresponding to the client addressing identifier.
G06Q 30/06 - Buying, selling or leasing transactions
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
A device, system and method for altering a memory using rule signatures and connected components for deduplication is provided. A server accesses a memory storing guest records identified by respective identifiers. The server generates, using one or more matching rules and the guest rules, a plurality of rule signatures associated with respective identifiers of a guest record from which a rule signature was generated. A rule signature comprises a string of values from a guest record substituted for corresponding information defined by a matching rule. A graph is generated comprising connected components of the rule signatures and respective identifiers, a connected component corresponding to a distinct guest of the guest records. An assigned identifier identifies a connected component. The server alters the memory to add the assigned identifiers to the guest records identified by respective identifiers associated with respective rule signatures of the connected components.
Computer-implemented systems and methods for dynamically building and adapting a search website hosted by a webserver. A learning module is coupled to the webserver and employs a reinforcement learning model for controlling appearance and/or functionality of the search website by generating actions to be output to the webserver. The actions relate to controlling an order of elements in an ordered list of travel recommendations obtained as a result from a search request to be displayed by the search website and/or arranging web-site controls on the search website. The reinforcement learning module receives rewards that are generated by the search website based on user input on the search website or by a website user simulator in response to one or more of the actions generated by the learning module based on state information provided by the user simulator. The rewards make the learning module to adapt the learning model.
G06F 16/953 - Querying, e.g. by the use of web search engines
G06F 30/27 - Design optimisation, verification or simulation using machine learning, e.g. artificial intelligence, neural networks, support vector machines [SVM] or training a model
A method of browser-based target data extraction includes: storing a browser application and a browser extension, the browser extension containing a predefined network identifier of a server; at a controller of the client computing device interconnected with the memory, executing the browser application to retrieve a web page containing target data; at the controller, responsive to retrieving the web page, executing the browser extension simultaneously with the browser application for: capturing a portion of the web page containing the target data; responsive to capturing the portion, automatically generating an overlay interface including the target data; controlling a display of the client computing device to present the overlay with the web page; receiving an operator command at the overlay via an input assembly of the client computing device; and when the operator command is a confirmation command, transmitting the target data to the server using the predefined network identifier.
G06F 3/00 - Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
G06F 16/957 - Browsing optimisation, e.g. caching or content distillation
G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
G06F 16/908 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06Q 30/06 - Buying, selling or leasing transactions
H04L 29/06 - Communication control; Communication processing characterised by a protocol
90.
METHOD AND SYSTEM FOR CAMERA ASSISTED MAP AND NAVIGATION
The subject disclosure provides a computer-implemented method and computer system for use in navigating in a facility. For example, the computer-implemented method comprises: receiving, from a camera, at least one image; estimating, by a processor, a current location of the camera in the facility based on the at least one image and model data of the facility; generating, by the processor, a virtual path from the current location of the camera to a destination location in the facility using the model data of the facility; and generating and outputting navigation information to the destination location according to the virtual path.
A method includes: receiving, at an intermediation server from a client subsystem, a data request including a set of request parameters; transmitting the set of request parameters from the intermediation server to a plurality of provider subsystems; receiving, at the intermediation server, respective initial responses each containing sets of initial response data corresponding to the request parameters; sending, from the intermediation server to at least one of the provider subsystems, a secondary request for updated response data, the secondary request including an indication of at least one set of initial response data; receiving, in response to the secondary request, the updated response data; and transmitting the updated response data to the client subsystem.
The present invention discloses a space allocation system and a method for allocating space to objects with multi-variate characteristics. In the present invention, intra-container allocation and/or inter-container allocation is performed to generate a combination in which the objects can be placed in one or more pre-defined storage spaces in a plurality of storage containers. The generated combination is further optimized for efficient space allocation to objects with multi-variate characteristics.
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
G06T 7/55 - Depth or shape recovery from multiple images
G06T 7/62 - Analysis of geometric attributes of area, perimeter, diameter or volume
G06Q 10/08 - Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
Systems and methods for managing an airport passenger processing system. The system includes a computing device and a peripheral device at an airport, a peripherals interface in communicative connection with the peripheral device and operable to execute a second client application, and a network outside the airport. The network includes a virtualization server for virtualizing an application for a first client application executed by the computing device and a peripherals manager in communication with the virtualization server. The first client application is configured to establish a first communication channel with the virtualization server for communication with an application virtualized on the virtualization server. The second client application is configured to establish a second communication channel with the peripherals manager. At least part of the network is configured to store an association between the first and second communication channels to associate the peripheral device with the computing device.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
A method for legacy-based access to non-legacy data includes: receiving, at an intermediation server, a non-legacy data object containing non-legacy content; generating a legacy data object containing the non-legacy content, for storage in a repository; storing, in association with the legacy data object, a non-legacy distribution channel indicator; adjusting a legacy processing mechanism at the repository according to the non-legacy distribution channel indicator; receiving from a client subsystem, via a legacy interface, a request for the non-legacy content; and in response to the request, retrieving and sending the legacy data object containing the non-legacy content, via the legacy interface.
A method of optimizing transmission of requests for updated content from external data sources includes: storing a data object containing initial content received from at least one of the external data sources and associated with an expiry time; storing a set of optimization parameters; obtaining an instruction to request updated content corresponding to the data object; in response to obtaining the instruction, determining, based on the optimization parameters and the expiry time, whether to request updated content from the external data sources; when the determination is affirmative, transmitting at least one update request to at least one of the external data sources based on the initial content and the optimization parameters; and in response to transmitting the at least one update request, receiving and storing respective sets of updated content from the external data sources.
A system and a method for handling and storing data records are provided. A software application is configured to process user requests and accordingly generate a master data record that is associated with at least one user and/or a user application. The software application further generates a partition token, which is used by a routing module to route the user request for storing a master data record to the master storage partition associated with the partition identifier indicated in the generated partition token.
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
Method and systems of collaborative content creation performed in a network. Selection data is received from a first computing device at a computing resource. The computing resource selects, based on the selection data, at least one data record of a plurality of data records stored in a database. The selected at least one data record has a first data size. The computing resource creates user interface information of the at least one data record and is configured to allow a second computing device of the plurality of computing devices to display a representation of the selected at least one data record in a user interface of the second computing device. The user interface information has a second data size that is smaller than the first size. The computing resource transmits the user interface information to the second computing device.
G06F 16/2457 - Query processing with adaptation to user needs
G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
A search engine is configured to determine a set of main products that match search criteria of a search request. A search binary mask is generated based on the search criteria indicated in the search request which identify one or more ancillary products. If the search binary mask matches a reference binary mask representing the requested ancillary products, the main products are selected for the response to the search request. The search engine also verifies a current availability of the ancillary products associated with the selected main products and returns at least one of the main products for which the current availability has been determined.
A device, system and method for providing ancillary objects from a cache and/or for providing categorized provider objects is provided. One or more servers receive a flight object representing a flight and search an ancillary object cache for predetermined ancillary objects associated with previous flights similar to the flight. When one or more of the predetermined ancillary objects, associated with at least one previous flight similar to the flight, are found at the ancillary object cache, a requesting device is provided with a response corresponding to the flight object and the one or more of the predetermined ancillary objects associated with the at least one previous flight similar to the flight. The flight objects and the ancillary objects may be assembled into provider objects which are provided to the requesting device. The provider objects may be categorized based on provider object categorization criteria associated with the requesting device.
A method of data access control in an intermediation server includes: storing a record containing: a record identifier; a plurality of sections each containing data; and in association with each section, an owner identifier selected from a set of requester identifiers corresponding to respective requester subsystems; storing access control data corresponding to each requester identifier; wherein the access control data for a given requester identifier indicates which other requester identifiers are permitted to access a section of the record having the given requester identifier associated therewith as the owner identifier; responsive to receiving, from one of the requester subsystems, a request containing the record identifier and an active one of the requester identifiers corresponding to the active requester subsystem: granting access to a subset of the sections according to the active requester identifier, the owner identifiers and the access control data.