![]() MASSIVE SCALE HETEROGENEOUS DATA INGESTION AND USER RESOLUTION
专利摘要:
this disclosure refers to the association of data, attribution, annotation, and interpretation systems and the respective methods of effectively organizing heterogeneous data on a massive scale. the input data is received and extracted for identification information ("information"). Multiple dimensionality reduction functions are applied to the information, and based on the function's results, the information is grouped into similar sets of information. filtering rules are applied to sets to exclude mismatch information in sets. the sets are then merged into groups of information based on whether the sets contain at least one common information. a common link can be associated with information in a group. if the input data includes the identifying information associated with the common link, the input data is assigned to the common link. in some embodiments, the input data is not changed, but assigned to the domains. 公开号:BR112019015920A2 申请号:R112019015920-7 申请日:2018-01-31 公开日:2020-03-31 发明作者:Rege Anukool;Kumar Sahay Prashant;Lally Mervyn;Kumar Shirish;Sahay Sansksar 申请人:Experian Information Solutions, Inc.; IPC主号:
专利说明:
MASSIVE-SCALE HETEROGENEOUS DATA INGESTION AND USER RESOLUTION FIELD [0001] This invention relates to data interpretation, annotation, attribution and association systems and related methods of efficient organization of heterogeneous data elements associated with users on a massive scale. Systems and methods can be implemented to provide real-time access to historical user data elements that were not previously available. FUNDAMENTALS [0002] Credit events can be collected, compiled, and analyzed to provide an individual's credibility in the form of a credit report, which typically includes multiple credit attributes, such as a credit score, credit account information , and other information related to the financial credibility of users. For example, a credit score is important as it can establish the necessary level of trust between transaction entities. For example, financial institutions such as lenders, credit card providers, banks, car dealers, brokers, or the like can more safely enter into a business transaction based on credit scores. SUMMARY [0003] Systems and methods are disclosed related to the system of interpretation, annotation, attribution and association of data and related methods of Petition 870190102926, of 10/14/2019, p. 8/118 2/96 efficient organization of heterogeneous data on a massive scale. [0004] A general aspect includes a computer system for determining account holder's identities for collected event information, the computer system including: one or more hardware computer processors; and one or more storage devices configured to store software instructions configured for execution by one or more hardware computer processors to cause the computer system to: receive, from a plurality of data sources, a plurality of event information associated with a corresponding plurality of events; for each event information: access a data store including associations between data sources and identifier parameters, the identifier parameters including at least one indication of one or more identifiers included in the event information from the corresponding data source; determine, based on at least the data source identifiers of the event information, identifiers included in the event information as indicated in the accessed data store; extract identifiers from event information based on at least the corresponding identifier parameters, where a combination of identifiers includes the unique identity associated with a unique user; access a plurality of hash functions, each associated with a combination of identifiers; for each unique identity, calculate a plurality of hashes by evaluating the plurality of functions Petition 870190102926, of 10/14/2019, p. 9/118 3/96 hash; based on whether unique identities share a common hash calculated with a common hash function, selectively group unique identities for sets of unique identities associated with common hashes; for each set of unique identities: apply one or more matching rules including criteria for comparing unique identities within the set; determine a corresponding set of unique identities such as those satisfying one or more of the matching rules; merge corresponding sets of unique identities each including at least one common unique identity to provide one or more fused sets that do not have a unique identity in common with other fused sets; for each merged set: determine an inverted personal identifier; associate the inverted personal identifier with each of the unique identities in the merged set; for each unique identity: identify event information associated with at least one of the combinations of identifiers associated with the unique identity, and associate the inverted personal identifier with the identified event information. Other embodiments of this aspect include corresponding computer systems, apparatus, and computer programs recorded on one or more computer storage devices, each configured to perform the actions of the methods. [0005] Implementations may include one or more of the following features. The computer system where hash functions include at least: a first hash function that evaluates a first combination of at least portions of Petition 870190102926, of 10/14/2019, p. 11/108 4/96 a first identifier and at least portions of a second identifier extracted from the event information; and a second hash function that evaluates a second combination of at least portions of the first identifier and at least portions of a third identifier extracted from the event information; The computer system where the first hash function is selected based on the identifier types of one or more of the first identifier or the second identifier. The computer system where the first identifier is a user's social security number and the second identifier is a user's last name, and the first combination is a concatenation less than all digits of the social security number and less than all the characters from the user's last name. The computer system where a first set of events includes a plurality of events associated with the first hash and a second set of events includes a plurality of events each associated with the second hash. The computer system where identifiers are selected from: first name, last name, middle name initial, middle name, date of birth, social security number, taxpayer ID, or national ID. The computer system where the computer system generates an inverted map by associating an inverted personal identifier with each of the remaining unique identities in the merged sets and stores the map in a data store. The computer system further including, based on the inverted personal identifier designated for the remaining unique identities, designating the personal identifier Petition 870190102926, of 10/14/2019, p. 11/118 5/96 inverted for each of the plurality of event information including the remaining unique identities. The computer system where hash functions include location-sensitive hashing. The computer system where one or more match rules include one or more identity resolution rules that compare one or more sets with account holder information in an external database or CRM system to identify matches with one or more more matching rules. The computer system where the identity resolution rules include criteria that indicate criteria of correspondence between the account holder information and the identifiers. The computer system where the fusion sets includes, for each of one or more sets, repeating the process of: matching each unique identity in a set with another unique identity in the set to create unique identity pairs; determine a single common identity in pairs; and in response to the determination of the common single identity, grouping non-common unique identities from peers with the common single identity until lists of unique identities contained within the resulting groups are mutually exclusive between resulting groups. The computer system where the determination of the common common identity in pairs further includes classifying the unique identities in pairs. Implementations of the techniques described may include hardware, a method or process, or computer software in a computer-accessible medium. [0006] Another general aspect includes a computer system including: one or more computer processors Petition 870190102926, of 10/14/2019, p. 11/12 6/96 hardware, and one or more storage devices configured to store software instructions configured for execution by one or more hardware computer processors to cause the computer system to: receive a plurality of events from one or more data sources, where at least some of the events have heterogeneous structures; store events in heterogeneous structures for access by external processes; for each of the data sources; identify a domain based at least in part on the data structure or data from the data source; access a vocabulary associated with the identified domain; and for each event; determine if the event matches part of a vocabulary or an entire vocabulary; associate the event with the corresponding domain or vocabulary; associate one or more labels with portions of the event based on the given domain. Other embodiments of this aspect include corresponding computer systems, apparatus, and computer programs recorded on one or more computer storage devices, each configured to perform the actions of the methods. [0007] Implementations may include one or more of the following features. The computer system including software instructions, when executed by one or more hardware processors, are configured to make the computer system: receive a request for information associated with a user in a first domain; run one or more domain analyzers configured to identify events associated with the Petition 870190102926, of 10/14/2019, p. 11/13 7/96 user having one or more bookmarks associated with the first domain; and provide at least part of the events identified to a requesting entity. The computer system where at least part of the identified events includes only those portions of the identified events associated with the one or more markers associated with the first domain. Implementations of the techniques described may include hardware, a method or process, or computer software in a computer-accessible medium. [0008] Another general aspect includes a computerized method including, through a computer system having one or more computer processors: receiving a plurality of event information from one or more data sources, where the plurality of event information it has heterogeneous data structures; determining a domain for each of the one or more data sources based at least in part on one or more of the data sources, a data structure associated with the data source, or event information from the data source; access a domain dictionary associated with the given domain including domain vocabulary, domain grammar, and / or annotation criteria; note one or more portions of event information from the given domain with domain vocabulary where it is based on the annotation criteria; receive a request for event information or data included in the event information; interpret the event information based on one or more annotated portions of the event information; and provide the requested data based on the interpretation. Others Petition 870190102926, of 10/14/2019, p. 11/148 Embodiments of this aspect include corresponding computer systems, apparatus, and computer programs recorded on one or more computer storage devices, each configured to carry out the actions of the methods. BRIEF DESCRIPTION OF THE DRAWINGS [0009] Certain embodiments will now be described with reference to the following drawings. Through the drawings, reference numbers can be reused to indicate the correspondence between referenced elements. The drawings are provided to illustrate example embodiments described here and are not intended to limit the scope of the invention or the claims. [00010] FIG. IA illustrates an example of a credit data system of the present invention, according to some embodiments. [00011] FIG. 1B illustrates an example of credit data generation, flow and storage, according to some embodiments. [00012] FIG. 2A illustrates an example of sequential processing of a collection of heterogeneous events, according to some embodiments, according to some embodiments. [00013] FIG. 2B illustrates an example of a credit data system interfacing with various applications or services, according to some embodiments. [00014] FIG. 3 illustrates an example of a credit data system structure for the simultaneous creation of the Petition 870190102926, of 10/14/2019, p. 11/15 9/96 credit status and credit associates for analysis, according to some embodiments. [00015] FIG. 4 illustrates an example of a batch indexing process, including identity extraction, identity matching, and identity stamping in this embodiment. [00016] FIG. 5 illustrates an example of identity extraction, according to some embodiments. [00017] FIG. 6 illustrates an example of a process for reducing the dimensionality of data using hashing algorithms, according to some embodiments. [00018] THE FIG. 7 illustrates a example of process in resolution ofachievements • identity, of wake up with some [00019] THE FIG. 8 illustrates a example of process in set fusion , in according to some embodiments.[00020] THE FIG. 9 illustrates a association example in inverted personal identifiers (inverted PIDs) with unique identities, according to some embodiments. [00021] FIG. 10 illustrates an example of stamping of inverted PIDs for credit events, according to some embodiments. [00022] FIGS. 11A-11D illustrate an example of implementing a sample identity matching process. [00023] FIG. 12 is a flowchart of an example method for efficiently organizing heterogeneous data on a massive scale, according to some embodiments. Petition 870190102926, of 10/14/2019, p. 11/168 10/96 [00024] FIGS. 13A-13C illustrates example data models showing probability of defect associated with data such as data flows from data ingestion to data consumption. [00025] FIG. 14 illustrates various types of data sources that can provide heterogeneous event information with respect to an individual, which can be accessed and analyzed in the various embodiments. [00026] FIG. 15 illustrates example domains and their associated vocabularies, according to some embodiments. [00027] FIG. 16 illustrates an example of a system for and marking event information and then uses the event information marked in the provision of data insights, according to some embodiments. [00028] FIG. 17 is a flowchart of an example method for interpreting input data in order to minimize the impact of a defect in the system, according to some embodiments. DETAILED DESCRIPTION OF THE CONCRETIZATIONS [00029] This invention presents several architectures and embodiments of systems and methods related to data interpretation, annotation, attribution and association systems and related methods of efficient organization of heterogeneous data on a massive scale. The systems and methods disclosed can be implemented to provide credit data based on intelligent and efficient architectural credit data. Petition 870190102926, of 10/14/2019, p. 11/178 11/96 [00030] More accurate and reliable credit-related information can further boost the confidence levels of entities that review credit-related information. For example, the accurate and reliable provision of credit reporting, cash flow, balance sheet reporting, credit scores, or other credit attributes can more accurately show an individual's credibility. Ideally, collecting all credit-related information related to an individual and updating the credit attributes of the individual whenever credit-related information is collected can provide such more accurate and reliable credit attributes. However, there are very real technical challenges that can make it difficult to have more timely, accurate and reliable credit attributes. The same or similar challenges can apply to other types of collection, storage, data analysis, etc. For example, systems may also suffer from timely resolution of large masses of event data associated with travel-related events, crime-related events, education-related events, etc. for private individuals. Thus, any discussion here of technical problems and solutions in the context of credit-related information is equally applicable to other types of information. [00031] A technical challenge refers to dealing with a large volume of credit events that need to be collected, analyzed, stored, and made accessible to requesting entities. For example, if there are 40 million people and each person has 20 accounts (for Petition 870190102926, of 10/14/2019, p. 11/188 12/96 example, bank accounts, mortgages, car rentals, credit cards), there are 800 million accounts that are constantly generating credit events. By a modest hypothesis, if each credit event contains 1000 bytes of data, a large volume of gross credit events for 12 months can be approximately 10 terabytes or more of data. If some internal guidelines or external regulations require 5 years of credit events to be archived, the volume can approach 50 terabytes. The challenge is further complicated by the tendency to increase digital transactions from both the growing population and the adoption of increased digital transactions. Traditional data collection models where data collection and analysis are treated as separate steps in a side process may fail to satisfy the demand for rapid analysis, declarations, and records. [00032] Another technical challenge concerns dealing with various formats of event data. Events can be received from various entities, such as lenders, credit card providers, banks, car dealers, brokers, or the like. Entities generally provide credit events in their ownership data structure or scheme. The collected data is usually stored in a database, such as a relational database, which, while providing benefits of structured organization with standard data structures, may be poorly equipped in data collection having heterogeneous structures. In addition, such databases may need heavy resource Petition 870190102926, of 10/14/2019, p. 11/198 13/96 extraction, transformation, and loading (ETL). ETL operations often also need extensive programming efforts to incorporate data structures from new data sources. [00033] Even when collected data are successfully transformed to conform to the database schemas provided by the databases, the database schemas are generally very rigid to accommodate the information. Expanding database schemas can quickly become a huge task as new data sources with different data structures continue to become available. Appropriately, database managers are pitted against decisions to (1) trim extra information that may become important at some point (essentially cutting to fit square data in a round scheme), or (2) disregard information not as available even though the future analysis will be inaccurate. Both approaches are less than ideal since both approaches introduce incompleteness or imprecision. [00034] In addition to the challenges in data collection, there are also technical challenges related to analysis. For example, such systems can be very slow to generate a credit report for an individual. From multiple terabytes of data (per year), the systems search for correspondence of records through individual request in order to generate the credit statement. Such systems can take days or weeks to calculate credit statements for 40 million people. Not only Petition 870190102926, of 10/14/2019, p. 11/20 14/96 makes the delayed generation of the statements not reflect the current state of the individual, but it also indicates that a significant amount of computing resources is linked with the task of generating the statements. This provides a non-optimal mechanism for detecting fraud through credit data, as data in credit reports can be several days late with the time provided to the user. Additionally, even when the fraudulent transaction has been removed, it can take multiple days, weeks, or more for the change to be indicated in an updated credit report. Appropriately, it is not an exaggeration to say that credit statements generated from these registration systems can be misleading in their reflections of an individual's real credibility. [00035] The delay in obtaining results is not the only challenge in the analysis. Generally, personally identifiable information from individuals is inaccurate or is not up to date. For example, someone can use a street address with 101 Main Street for a credit card, but use 101 Main St. for their mortgage account or, as is very common, change the phone number. Credit events from one financial institution may have an updated phone number while credit events from another financial institution may have an out-of-date phone number. Such irregularities and out-of-date personally identifiable information prove to be a unique challenge for a data analyst, such as how to precisely resolve a user's credit events from multiple sources based on information from Petition 870190102926, of 10/14/2019, p. 11/21 15/96 personal identification that does not correspond between these events. [00036] Credit data analysis and storage systems can implement data models where rigorous ETL processes are placed close to data ingestion in order to standardize input data, where ETL processes involve restructuring, transforming, and interpreting. As will be described, early interpretation can mean the early introduction of defects to the data flow, and the extended life cycle of each defect before data consumption provides ample opportunity for the defect to spread. In addition, as such systems update ETL processes for each new input data with new data structures, significant engineering and software efforts are spent to incorporate the new input data. Eventually, a marginal effort to keep the interpretation upstream can overload such a system. In addition, ETL processes can transform the original data or create a substantially similar copy of the original data. When a defect in the interpretation process is found after the original data has been transformed from a standard way, there can be a serious loss of information. Alternatively, when original event data is substantially copied, there is a waste of storage space and a severe impact on the processing capabilities of the largest data set. In various implementations of credit data systems, one or more of the following technical problems or challenges may be encountered: Petition 870190102926, of 10/14/2019, p. 11/22 16/96 • Data integration approaches, such as data warehouses and data centers, attempt to extract significant items of data from input data and transform them into a standardized target data structure; • When the number of data sources grow up, O software required to transform data The leave in multiple types of sources also grows in size and complexity;• 0 effort marginal to bring a new . source in data becomes increasingly large as incorporating new data sources and new formats requires that existing software be modified; • The incorporation of new data sources and types can cause the target data structure to be modified, requiring the conversion of existing data from one format to another; • The complexity of software modifications and data conversions can lead to defects. If defects go unnoticed for a long period of time, significant effort and cost must be spent to undo the effects of defects through additional software modifications and data conversions, and the cycle can continue; • These data integration approaches can have high defect leverage as they attempt to interpret and transform data closer to the point of ingestion. [00037] Therefore, such credit data systems (and other high-volume data analysis systems) are technically challenging at least in their lack of Petition 870190102926, of 10/14/2019, p. 11/23 17/96 agility, adaptability, precision, reliability, interoperability, defect management and storage optimization. Definitions [00038] In order to facilitate an understanding of the systems and methods discussed here, a number of terms are defined below. The terms defined below, as well as other terms used here, must be interpreted to include the definitions provided, the common and customary meaning of the terms, and / or any other meaning implied for the respective terms. Thus, the definitions below do not limit the meaning of these terms, but provide only exemplary definitions. [00039] The terms user, individual, consumer, and customer should be interpreted to include individuals alone, as well as groups of users, such as, for example, married couples or domestic partners, organizations, groups, and business entities. Additionally, the terms can be used interchangeably. In some embodiments, the terms refer to a user's computing device instead of, or in addition to, a real human operator of the computing device. [00040] Personally identifiable information (also referred to here as PII) includes any information regarding a user that alone can be used to uniquely identify a particular user for third parties. Depending on the implementation, and the combination of user data that must be provided to a third party, Petition 870190102926, of 10/14/2019, p. 11/24 18/96 PII can include first and / or last name, middle name, address, email address, social security number, IP address, passport number, vehicle registration plate number, credit card numbers , date of birth, and / or home / work / mobile phone number. In some embodiments, user IDs that can be very difficult to associate with private users should still be considered PII, just as if the IDs were unique to the corresponding users. For example, users' digital Facebook IDS can be considered PII for Facebook and third parties. [00041] User Input (also referred to as Input) generally refers to any type of input provided by a user that is intended to be received and / or stored by one or more computing devices, to cause an update to the data that are displayed, and / or to cause an update to the way the data is displayed. Non-limiting examples of such user input include keyboard inputs, mouse inputs, digital pen inputs, voice inputs, finger touch inputs (for example, via the touch sensitive display), gesture inputs (for example, hand movements, finger movements, arm movements, movements of any other appendix, and / or body movements), and / or the like. [00042] Credit data in general refers to user data that is collected and maintained by one or more credit agencies (for example, Experian, TransUnion, and Equifax), as well as data that affects the credibility of a Petition 870190102926, of 10/14/2019, p. 11/25 19/96 consumer. Credit data may include state or transaction data, including but not limited to, credit requests, mortgage payments, loan situations, bank accounts, daily transactions, number of credit cards, utility payments, etc. Depending on the implementation (and possibly regulations of the region in which credit data is stored and / or accessed), part of the data or all credit data may be subject to regulatory requirements that limit, for example, the division of credit data to requesting entities based on the Fair Credit Reporting Act (FCRA) regulations in the United States of America and / or other similar federal regulations. Regulated data, as used here, generally refers to credit data as an example of such regulated data. However, regulated data may include other types of data, such as medical data regulated by HIPPA. Credit data can describe each of the user data item associated with a user, for example, an account balance, account transactions, or any combination of the user data items. [00043] Each credit file and credit report in general refers to a collection of credit data associated with a user, as can be provided to the user, to a requesting entity that the user has authorized to access the user's credit data, or to a requesting entity that has a permissible purpose (for example, under the FCRA) to access users' credit data without the user's authorization. Petition 870190102926, of 10/14/2019, p. 11/26 20/96 [00044] Credit event (or event) generally refers to information associated with an event that is reported by an institution (including a bank, a credit card provider, or other financial institutions) to one or more credit bureaus and / or the credit data system discussed here. Credit events may include, for example, information associated with a payment, purchase, due date, invoice payment, bank transaction, credit requests, and / or any other event that can be reported to a credit agency. Typically a credit event is associated with a single user. For example, a credit event can be a specific transaction, such as details regarding the purchase of a particular product (for example, Target, $ 12.53, grocery, etc.) or a credit event can be information associated with a line of credit (for example, Citi credit card, $ 458 balance, $ 29 minimum payment, $ 1000 credit limit, etc. In general, a credit event is associated with one or more unique identities, where each unique identity includes one or more unique identifiers associated with a particular user (for example, a consumer). For example, each identifier can include one or more parts of the user's PIT, such as all or some part of a user name, physical address, social security number (SSN), bank account identifier, e-mail address, telephone number, national ID (for example, passports or driver's license), etc. [00045] Inverted PID refers to a unique identifier that is assigned to a particular user Petition 870190102926, of 10/14/2019, p. 11/278 21/96 to form a one-to-one relationship. An inverted PID can be associated with a user identifier, such as a private PII (for example, a 555-55-5555 SSN) or a combination of identifiers (for example, a John Smith name and a 100 Connecticut address Ave) to form a one-to-many relationship (between the PID and each of multiple combinations of identifiers associated with a user). When the event data includes an identifier or a combination of identifiers associated with the particular inverted PID, the particular inverted PID can be associated with (referred to as stamped here) the event data. Appropriately, a system can use inverted PIDs and their associated identity information to identify event data associated with a particular user based on multiple combinations of user identifiers included in the event data. Credit data systems [00046] Credit data associated with a user is generally requested and considered by entities such as lenders, credit card providers, banks, car dealers, brokers, etc. when determining whether to extend credit to the user, whether to allow the user to open an account, whether to rent the user, and / or in making decisions regarding many other relationships or transactions in which credit credibility can be a factor. An entity requesting credit data, which may include a request for a credit report or a credit score, can submit a credit request to a credit agency or credit reseller. O Petition 870190102926, of 10/14/2019, p. 11/28 22/96 credit report or a credit score can be determined at least based on the analysis and computation of credit data associated with bank accounts, daily transactions, number of credit cards, situations loan, etc. of user Additionally, a previous request from a different entity can also affect the report of credit or credit score user credit. [00047] Entities (for example, institutions may also wish to acquire more up-to-date credit data from a user (for example, credit score and / or credit report) in order to make a better decision as to whether to extend credit to the user. However, there may be a substantial delay in generating a new credit report or credit score. In some cases, the credit bureau may update only one credit report or user score once a month. As described above, the substantial delay can be caused by the large amount of data that a credit bureau needs to collect, analyze and compute in order to generate a credit report or credit score. The credit data collection process that can affect a user's credibility, such as a user's credit score, from credit events in general is referred to here as data ingestion. Credit data systems can perform data ingestion using lateral flow of data from system to system, such as using a batch ETL process (for example, as briefly discussed above). Petition 870190102926, of 10/14/2019, p. 11/29 23/96 [00048] In an ETL data intake system, credit events associated with multiple users can be transmitted from different data sources to a database (Online System), such as one or more databases relational data. The online system can extract, transform and load raw data associated with different users from different data sources. The online system can then normalize, edit, and write the raw data through multiple tables in the first relational database. As the online system inserts data into the database, it must match the credit data with the identification data about consumers in order to link the data with the correct consumer records. When new data enters, the online system needs to repeat the process and update the multiple tables in the first relational database. As input data, such as names, addresses, etc. they generally contain errors, they do not conform to established data structures, are incomplete, and / or have other data integrity or quality problems, it is possible that new data may initiate the reevaluation of certain previously determined data links. In such cases, the online system can unlink and reconnect credit data with new records and / or historical consumer records. [00049] In some cases, certain event data must be excluded from a credit data store, such as if there is an error detected in the data file provided by the data source, or a defect in the credit data system software that may have processed historical data Petition 870190102926, of 10/14/2019, p. 11/30 24/96 incorrectly. For example, a non-smart credit data system that stores data in the MM / DD / YYYY date format can accept input data from a data source that uses the DD / MM / YY date format, which it can enter error in a user credibility calculation. Alternatively, such data may cause the credit data system to reject the data all together, which may result in an incomplete and / or inaccurate calculation of a user's credibility. Worse yet, where the erroneous data has already been consumed by the credit data system to produce a user credibility metric (however inaccurate), the credit data system may need to address the complexities of not just deleting the erroneous data , but also unfolding all the effects of the erroneous data. Failure to do so can leave the online database in an inconsistent or inaccurate state. [00050] Such incremental processing logic makes the data ingestion process complex, prone to error, and slow. In ETL implementations, the online system can send data to a batch system including a second database. The batch system can then extract, transform and load the data associated with a user's credit attributes to generate credit scores and analytical reports for account review and promotional purposes. Due to the time it takes to extract, transform and load data into the batch system, credit scores and analytical reports can delay the online system for hours or even days. The batch system of delay, in the event of an update Petition 870190102926, of 10/14/2019, p. 11/318 25/96 for user identification data, may continue to reflect old and potentially inaccurate user identification data such that links between credit entry data and user data can be broken, thereby providing inaccurate credit data until connections are corrected and propagated to the batch system. Overview of the Enhanced Credit Data System [00051] The present invention describes a faster and more efficient credit data system addressing the technical problems noted above. The credit data system can perform sequential processing of a collection of heterogeneous events, simultaneous creation of a credit status and credit attributes for analysis, a batch indexing process, and / or real-time credit creation profiles merging credit status with real-time events, each of which is described in further detail below. [00052] A batch indexing process can more efficiently associate credit events to correct users on a massive scale by efficiently grouping unique identities by first reducing the dimensionality of original credit events, identifying false positives, and providing a whole validated set of unique identities that can be associated with a user. Using an inventive combination of processes in a particular order, the credit data system solves the particular problem of efficiently identifying credit events that belong to a particular user in Petition 870190102926, of 10/14/2019, p. 11/28 26/96 efficiency in power of magnitudes. Additionally, inverted PID designation allows for a new and more efficient data arrangement that the credit data system can use to provide requested credit data belonging to a faster user in magnitude powers. The improved credit data system can generate various analyzes of a user's status and activities (such as a credit report) based on updated credit events associated with that user. [00053] The credit data system can implement a slow data interpretation, in which the system does not alter the heterogeneous input data from multiple data sources, but annotates or marks the data without performing ETL processes on the data. By performing only minimal processing close to data ingestion, the credit system minimizes complexity and software size close to data ingestion, thereby greatly reducing defect formation and problems with defect management. Additionally, by ending ETL processing and preserving data in its original heterogeneous form, the system can accept any type of data without losing valuable information. Domain categorization and domain vocabulary annotation provides new data structures that allow for late positioning of interpretation components, such as analyzers. The late positioning of analyzers improves on existing systems by reducing the impact of a global defect in the system and allowing for easy addition or adaptation of analyzers. Petition 870190102926, of 10/14/2019, p. 11/338 27/96 [00054] While some embodiments of a credit data system or other similarly named systems are discussed here with reference to the various features and advantages, any of the features and advantages discussed can be combined or separated into the additional limitations of a credit system. credit data. [00055] FIG. IA illustrates an example of a credit data system 102 of the present invention, which can be implemented by a credit agency or authorized agent of a credit agency. In FIG. IA, the credit data system 102 receives credit events 122A-122C associated with different users 120A-120C. The credit data system 102 may include components such as an indexing engine 104, an identification engine 106, an event cache engine 108, a rating engine 110, and / or a credit data store 112. As will be further described in detail, the credit data system 102 can efficiently correspond to specific credit events with corresponding appropriate users. The credit data system 102 can store credit events 122A-122C, credit data 114, and / or associations between different users and credit events 122A122C or credit data 114 in the credit data store 112, which it can be a credit database of a credit agency. In some embodiments, the credit database can be spread across multiple databases and / or multiple credit data stores 112. Thus, the processes of ingesting and storing credit data, components, architecture, etc. discussed here Petition 870190102926, of 10/14/2019, p. 11/34 28/96 can be used to largely replace existing credit data storage systems, such as batch systems. In response to the receipt of a credit application from an external entity 116 (for example, the financial institution, lender, potential owner, etc.), the credit data system 102 can quickly generate any requested credit data 118 ( for example, a particular transaction, credit report, credit score, custom credit attributes for the particular requesting entity, etc.) based on updated credit event data from the target user. [00056] Additionally, the credit data system can implement a batch indexing process. Incorporating the batch indexing process can eliminate the need for ETL data from different credit events to conform to a particular database or data structure and therefore can reduce or even eliminate bottlenecks associated with ETL from events credit. The batch indexing process, as will be described in further detail through this application, uses the indexing engine 104, the identification engine 106, the event cache engine 108, the classification engine 110, and / or data storage credit cards 112, which are components of the credit data system 102. The indexing engine 104 can designate hash values for unique identities (further detailed with respect to FIGS. 4 to 10) to facilitate the grouping of similar unique identities. The identification engine 106 can apply rules of Petition 870190102926, of 10/14/2019, p. 11/35 29/96 correspondence to solve any problems with the grouped unique identities, thus generating a subset containing only the validated unique identities associated with a user. The classification engine 110 can fuse the subsets into groups of unique identities associated with the same user. The event cache engine 108 can generate an inverted personal identifier (inverted PID) and associate each unique identity in a group with the inverted PID. The credit data system 102 can store the association between inverted PIDs and unique identities as an inverted PID map in the credit data store 112 or any other accessible data store. Using the inverted PID map, the credit data system 102 can then stamp credit events containing any of the unique identities in a group with the inverted PID associated with the user. The credit data system 102 can store pattern associations 140 related to credit events 122A-122N belonging to a user in a flat file or a database. Each component and its internal work will be further detailed with respect to FIGs. 4 to 10. Unchanged Processing of Heterogeneous Credit Events [00057] FIG. 1B illustrates an example of heterogeneous credit event generation, flow and storage, according to some embodiments. A user 120 conducts transactions with one or more business entities 124A-124N (such as merchants). Transactions may include buying, selling, lending, renting, or the like and transactions may generate Petition 870190102926, of 10/14/2019, p. 36/118 30/96 credit events. For example, a user 120 who purchases an item on credit using a credit card generates the credit transaction data that is collected by financial institutions 126A-126B (such as VISA, MasterCard, American Express, banks, mortgage collectors, etc. .). Financial institutions 126A-B can share such transactions with a credit data store 112 as credit events 122A-122N. [00058] Each 122A-122N credit event can contain one or more unique identities that associate the 122A-122N credit event with a private user 120 who generated the 122A-122N credit event. The unique identity can include various user identification information, such as a name (first, middle, last, and / or full name), address, social security number (SSN), bank account information, email address, mail, phone number, national ID (passport or driver's license), etc. Unique identities can also include partial names, partial address, partial phone number, partial national ID, etc. When financial institutions 126A-126B provide credit events 122A-122N for collection and analysis by a credit data system, credit events can generally be recognized as being associated with a particular user through a combination of identifying information user. For example, there may be multiple people who share the same first name and last name (consider James Smith) and so first name and last name may be excessively inclusive of other user credit events. However, combinations of Petition 870190102926, of 10/14/2019, p. 37/118 31/96 user identification information, such as full name plus phone number, can provide satisfactory identification. While each financial institution 126 can provide credit events 122A-122N in different formats, credit events are likely to include user identification information or combinations of user identification information that can be used to associate with which user the credit event credit must be associated. Such user identification information or combinations of user identification information form the user's unique identity. Appropriately, multiple unique identities can be associated with a particular user. [00059] The credit data system can work with heterogeneous credit events 122A-122N having different data structures and provide different unique identities together with credit events 122A122N. For example, a credit event from a mortgage financial institution may include SSN and national ID, where a VISA credit event may include name and address, but not SSN or national ID. The credit data system, instead of performing ETL on credit events 122A-122N to standardize credit events 122A122N for storage in credit data storage 112, can perform a batch indexing process (as described later in detail with respect to Figures 4 to 10) to arrive with an inverted PID for a set of unique identities likely to be Petition 870190102926, of 10/14/2019, p. 11/38 32/96 associated with user 120. in Inverted PID can be assigned for credit events 122A-122N. [00060] As will be described in further detail, the batch indexing process reduces or eliminates significant computing resource overhead associated with heterogeneous formats ETL, significantly cutting through processing overhead. In addition, assigning an inverted PID to a credit event is beneficial in that, since the correct inverted PID is assigned to a credit event, the credit data system 120 no longer needs to manage credit events based on unique identities contained. In other words, once the credit data system 120 has identified a user associated with a credit event, he does not need to perform the search operation to find unique identities in credit events 122A-122N but simply look for credit events 122A-122N designated inverted user PID. For example, in response to receiving a request for credit data 118 from an external entity 116 (such as the financial institution, the creditor, potential owner, etc.), the credit data system with the indexing process by batch you can quickly compile a list of a user's credit events 120 with the user's inverted PID and provide any requested credit data 114 almost instantly. Example Processing Sequential Collect in Heterogeneous Events[00061] FIGS. 2A-2B illustrates a example in processing sequential a collection of events Petition 870190102926, of 10/14/2019, p. 39/118 33/96 heterogeneous. The credit data system can receive raw credit events from high yield data sources 202 through a high yield intake process 204. The credit data system can then store raw credit events in storage 206. The credit data system can conduct a high-yield clearing process 208 on gross credit events. The credit data system can then generate and store canonical cleaning events in a 210 data store. The credit data system can conduct a high-throughput identity and key-stamping process 212. The credit data system credit can store events identified with key stamping in a 214 data store. The credit events identified can then be classified in process 216 and stored in an event collection data store 218. [00062] The credit data system can also generate agency views in process 220. In process 220, the credit data system can load a user event collection (events identified in data store 214 that may optionally have been sorted by sorting process 216) associated with a user in memory in process 222 from storing event collections data 218. The system can then calculate attributes 224, score models 226, and generate nested agency views 228. The system credit data can then store the allocation calculation in an analytical (columnar) 230 data store. The analytical data can Petition 870190102926, of 10/14/2019, p. 11/40 34/96 be used in 234 applications to generate a credit score for the user. The nested branch view can be stored in the credit status data store 232 (KV Container). Data in the state of credit data storage can be used in the data administrator application process 236 and credit request service 238. [00063] During sequential processing, credit events can remain in the same state as they are transmitted to the credit data system by financial institutions. Financial data can also remain the same. Example of Simultaneous Creation of a Credit Status and Credit Attributes for Analysis [00064] FIG. 3 illustrates an example of a credit data structure for simultaneous creation of credit status and credit attributes for analysis. The data structure 300 can be virtually divided into three interactive layers: a batch layer 302, a service layer 320, and a speed layer 340. In the batch layer 302, high-throughput data sources 304 can transmit events from raw credit for a 310 data store through a high yield 306 ingestion process. The credit data system can cure and stamp PID 312 raw credit events and store cured credit events in a 314 data store The credit data system can then pre-comput 316 the cured credit events associated with each user to generate a credit status and store Petition 870190102926, of 10/14/2019, p. 41/118 35/96 each user's credit status in a 322 data store. The credit data system can store all the credit attributes associated with each user in a 324 data store. The credit attributes associated with a user can then be accessed by multiple 326 credit applications. [00065] In the speed layer 340, several high frequency data sources 342 can transmit new credit events to the credit data system through a high frequency 344 ingestion process. The credit data system can conduct a low latency curation process 348 and then store the new credit events associated with multiple users in a 350 data store. The new credit events associated with a user can cause changes in the user's credit status. The new credit status can be stored in a 328 data store. The credit data system can then conduct a credit profile observation service process 330 to fetch a watermark to find the associated stored credit status. with the user. In some embodiments, the event cache engine is configured to allow even very recent credit events that have not yet been recorded for the user's full credit status to be included in the credit attributes that are provided for third party borrowers. For example, while event data is being added for credit data storage (for example, which can take hours or even days to complete), the event stored in the new storage events for Petition 870190102926, of 10/14/2019, p. 42/118 36/96 credit data 350 can store the most recent credit events and be accessed when credit applications are received. Thus, requested reports / scores may include credit events within milliseconds of receiving the event from a creditor. [00066] The credit data system can use several 332 branch applications to calculate a credit score or generate a credit report for the user based on the new credit status. In addition, the credit data system can send instructions for the high frequency ingestion process 344 through a high frequency message channel 352. The new credit events can be transmitted by the high frequency ingestion process 344 to a file writing process 346. The credit data system can then store the new credit events for a batch of event 308. The new credit events can then be stored for data storage 310 through the high intake process. yield 306. [00067] The credit data system can store credit events in their original form, generate a credit status based on the credit events and calculate attributes for a user. When a new credit event is transmitted from the financial institution, or an error is detected in an existing credit event by the financial institution, the credit data system can conduct a credit profile search service to make changes to the state credit or merge the credit status with real-time events. The credit data system Petition 870190102926, of 10/14/2019, p. 43/118 37/96 can generate an updated credit profile based on the updated credit status. [00068] Simultaneous creation of credit status and credit attributes can monitor changes in a user's credit status and update credit attributes when changes are detected. Changes in the user's credit status can be caused by a new credit event or an error detected in an existing credit event. Credit events can remain at least partially the same as the credit data system does not extract, transform and load data into the database. If there is an invalid event detected later by the credit data system, the credit data system can simply exclude the invalid event from future creation. Thus, real-time reporting of events can be reflected in a user profile within minutes with the help of the credit data system. Batch Indexing Process Example [00069] FIG. 4 illustrates a batch indexing process, which includes processes for: identity extraction 402, identity correspondence 410, and identity stamping 440, according to some embodiments. The batch indexing process can be an especially powerful process in identifying and grouping different user unique identities (for example, a credit event from VISA with an outdated phone number can be grouped with a credit event to American Express with an updated phone number). A benefit of grouping Petition 870190102926, of 10/14/2019, p. 44/118 38/96 different identities is that a user's credit data can be accurate and complete. The batch indexing process can make the credit data system much more efficient and responsive. [00070] The identity extraction process 402 extracts identity fields (for example, SSN, national ID, phone number, email, etc.) from credit events. The credit data system can partition 404 credit events by different financial institutions (for example, credit card providers or creditors) and / or accounts. The credit data system can then extract 406 identity fields from partitioned credit events without modifying credit events. The identity extraction process 402 may include a specialized extraction process for each different credit event format provided by different financial institutions. In some embodiments, the identity extraction process 402 may conduct a deduplication process 406 to remove the same or substantially similar identity fields before generating the unique identity, which may be a combination of identity fields, associated with the credit event. This process will be further detailed with respect to FIG. 5. [00071] In the identity matching process 410, the credit data system can perform a process that reduces the dimensionality of the unique identities determined in the identity extraction process 402. For example, the location-sensitive hash process 412 can be such a process. The locale-sensitive hash process, Petition 870190102926, of 10/14/2019, p. 45/118 39/96 depending on the hash process design, you can calculate hash values (for example, 414 identity hashes) that increased or decreased the likelihood of collision based on similarity of the original hash keys (for example, 408 unique identities) . For example, a well-designed hash process can take different but similar unique identifiers, such as John Smith, 1983/08/24, 928332983 and Jonathan Smith, 1983/08/24, 92833 (full name, date of birth, and Codes and digest the different but similar unique identifiers for the same hash value. Based on the division of the common hash value, the two unique identities can be grouped into a set as potentially corresponding matching unique identities for a user (the details of the hash-based grouping process will be further detailed with respect to FIG. 6) . [00072] However, because hash functions can result in unintended collisions, hash-based sets can contain false positives (for example, wrongly associating some credit events not associated with a user with the user. For example, a of John's unique identities can have the same hash value with one of Jane's unique identity and, after hashing value association, can be grouped into the same set of unique identities associated with Jane). The credit data system may apply a matching rule application 416 on the sets of unique identities to remove the false-positive unique identities from the sets. Various matching rules can be Petition 870190102926, of 10/14/2019, p. 46/118 40/96 designed to optimize the chance of detecting false positives. An example of a matching rule might be just exact match of national ID, which can remove, from a set of unique identities associated with a user, unique identities that do not include the national ID in the file. Another matching rule can be a minimum match in both name and postal code, where the minimum can be determined based on a calculated score of correspondence in both name and postal code compared to the minimum threshold score. Once false positives are removed from each set, the resulting matched identity subsets 418 contain only the unique identities that are validated. [00073] In some embodiments, the matching rules can be designed with the reliability of each user identifier in mind. For example, a driver's license number from the Department of Motor Vehicles may be associated with a high level of confidence and you may not need to inspect the driver's license numbers much more for an exact match. On the other hand, a postal code provides a lower level of trust. In addition, the matching rules can be designed to take into account the history associated with a particular record. If the registration comes from an established bank account with a long history, the correspondence rule need not apply strict scrutiny. On the other hand, if the record comes from a newly opened account, a stricter matching rule may be Petition 870190102926, of 10/14/2019, p. 47/118 41/96 required to remove false positives (for example, identifying records in a set that are likely to be associated with another user). This process will be further detailed with reference to FIG. 7. Matching rules can be applied to part or all sets. Similarly, part of the rules or all the matching rules can be applied to a set. [00074] Subsets 418 of unique identities can then be merged with other subsets containing other unique identities of the user. Each subset 418 contains only the unique identities that correctly identify a user. However, subsets 418, due to possible false negatives from the dimensionality reduction process, are not guaranteed to digest to the same hash value. Appropriately, some unique identity associated with a user can, when grouped based on hash values, be placed in different subsets 418. With the pool merging process 420, when common subset unique identities, the data system of credit can merge the two subsets into one group (for example, 422 matched identities) containing all the unique identities associated with a particular user. [00075] The credit data system can then assign an inverted PID to each unique identity in the merged group. From the designations, the credit data system can then create 424 an inverted PID map 426 where each inverted PID is associated with multiple identities Petition 870190102926, of 10/14/2019, p. 48/118 42/96 unique in the group associated with a particular user. This process will be further detailed with respect to FIG. 9. [00076] In the example of identity stamping process 440, the inverted PID map 426 can be used to stamp partitioned credit events 404 to generate PID stamped credit events 430. In some embodiments, the inverted PID stamping leaves the credit events associated with the reversed PID unchanged. This process will be further detailed with respect to FIG. 10. Identity Extraction Example [00077] FIG. 5 illustrates an example of an identity extraction process, according to some embodiments. In some embodiments, the credit data system can curate heterogeneous credit events 510 (for example, el, e2, e3, e4, e5, ...) received from various financial institutions. Curation can be considered as a process of repairing obvious problems of equality. For example, a street address can be 100 Main Street or 1059 St. The credit data system can recognize the obvious quality problem of not having a space between the street number and the street name, and / or modifying St. To read Street, or vice versa. The curation process can intelligently correct some identified quality problems while not repairing some other identified quality problems. For example, while an address above may be a candidate for curation, curating usernames may be less than ideal. Petition 870190102926, of 10/14/2019, p. 11/49 43/96 Truncating, replacing, or otherwise modifying usernames can cause more problems than leaving the information complete. Appropriately, in some embodiments, the credit data system can selectively curate 502 credit events. [00078] The credit data system can partition 504 credit events by different financial institutions and / or accounts. The credit data system can extract 406 identity fields from credit events and can optionally conduct a deduplication process to eliminate redundant identity fields. The credit data system can then generate unique identities based on the extracted identity fields. The identity extraction process starts with credit events 510 and extracts unique identities 512. In the example of FIG. 5, credit events el, e2, e3, e4, e5. . . 510 can contain the records: rl, r2, r3, r4. . . . 512. Records, in turn, may contain part of or all of the unique identity. [00079] FIG. 5 describes the benefits of an identity extraction process. Where there are 40 million people each having 20 accounts that generate credit events (each occupying 1000 bytes per event) over 10 years, there are approximately 96 terabytes of credit event data. On the other hand, where there are the same number of people having the same number of accounts, only approximately 3.2 terabytes is occupied by the identity attributes of the credit events. Whether the correct association between credit events and a particular user can be made with the naked unique identities 408 (which include 1/30 of the credit data Petition 870190102926, of 10/14/2019, p. 50/118 44/96), a credit data system has a significantly narrowed universe of data that needs to be analyzed for association with the particular user. Therefore, the credit data system already has significantly reduced computational overhead from the next identity matching process. Identity Matching Example: Hash sensitive to location [00080] FIG. 6 illustrates an example of a process for reducing the dimensionality of data using hashing algorithms, according to some embodiments. Records containing unique identities (rl-rl6) from the identity extraction process are listed in the rows and different hash functions (hl-hk) are listed in the columns. The tabular presentation having rows and columns is for illustrative purposes only and the process can be implemented in any reasonably applicable methods. In addition, the collision rate (that is, application of the hash function on different records resulting in the same hash values) in the illustration does not reflect the collision propensity when real credit events are referred to. [00081] Multiple hash functions (for example, hl 602, h5 604, etc.) can be applied to each record (for example, rl-rl6) to generate hash values (for example, hl '606, h5' 608, hl '610, hl 612, etc.). Here, each row-column combination re-presents the column hash function being applied to a row record to generate a row-column combination hash value. For example, Petition 870190102926, of 10/14/2019, p. 51/118 45/96 has the function hl 602 applied to the unique identity r2 620 generates hash value hi '610. [00082] In some embodiments, each hash function can be designed to control a collision probability for a given record. For example, hl 602 may be the hash function that focuses on finding similar first names causing collision with other records having similar first names. On the other hand, h5 604 may be the hash function focusing on SSN, where the propensity of collision is less than the hash function focusing on finding similar first names hl. Various hash functions can be designed to better control the propensity of collision. One of the benefits of the disclosed credit data system is its ability to replace or supplement various hash functions. The credit data system does not require a particular type of hash function, but allows the user (for example, a data engineer) to experiment with and build to improve the overall system by simply interfacing different hash functions. This advantage can be significant. For example, when the data engineer wants to migrate the credit data system to another country using another character set, say Chinese or Korean, the data engineer can substitute hash functions directed at the English alphabet for hash functions that provide best results for Chinese or Korean characters. In addition, where national ID is of different format, such as Korea using 12 digit numbers for SSN as opposed to 9 digit SSN in US, the best suited hash function for 12 digit numbers can replace the 9 digit hash function . Petition 870190102926, of 10/14/2019, p. 11/118 46/96 [00083] While FIG. 6 illustrates rl-rl6 records without modification, some embodiments may pre-process the records to invent modified records that are better suited for a given hash function. For example, a first name in a record can be concatenated with a last name in the record to form a temporary record for use by the hash function that specializes in such a modified record. Another example may be truncating the SSN number 9 to the last 4 digits before applying the hash function. Similarly, a user can modify records to better control collision propensity and results. [00084] FIG. 6 illustrates the hash function hi that generates two different hash values, hi '606 and 610 and hl 612. The records {rl, r2, r3, r4, and r5] are associated with the hash value hl' 606 while records {rl2, rl3, rl4, rl5, and rl6] are associated with the hash value hl 612. Based on the association with a particular hash value, records can be grouped into sets. For example, the illustration shows hash value group 630 hl 'and hash value group 632 hl containing the associated records. Similarly, FIG. 6 identifies and presents a total of six sets of records based on common hash values associated with the records. The hash values hl '606 and h5' 608 show for the rl record, each record can be associated with multiple hash values each for each hash function. [00085] As described with reference to FIG. 4, records having a common hash value can be grouped (grouped) together. For example, the records {rl, r2, r3, r4, Petition 870190102926, of 10/14/2019, p. 53/118 47/96 r5} share a common hash value hl 'and are grouped for a set 630. Similarly, records {r2, r7, rl5} share a common hash value of h4' and are grouped for a set 632. As the two groups show, part of the records (for example, r2) can be grouped for more than one set, while some records are grouped for one set. [00086] Such hashing value-based grouping can be an incredibly fast grouping process that doesn't require a lot of computing resources to perform. The hash function has low operational complexity and the calculation of hash values for a massive amount of data can be performed in a relatively short time. By grouping similar records into sets, the process of identifying which records are associated with a particular user is greatly simplified. In a sense, the universe of all credit events that requires membership for the user has been narrowed to just the records in the sets. [00087] However, as briefly mentioned with reference to FIG. 4, using hash functions and resulting hash values to group records may be less than ideal since they may contain false positives. In some embodiments, the resulting sets can perform potential matches, but the sets may contain records that have not yet been rigorously validated in their association with the user. For example, the 630 set of records having a particular hi 'hash value, which are {rl, r2, r3, r4, r5] may contain records that are contained Petition 870190102926, of 10/14/2019, p. 54/118 48/96 in set 630 not because of the virtue of having a similar unique identity, but because of the virtue of having a common hash value. [00088] The credit data system then uses a rigorous identity resolution process (application of matching rules) to remove such false positives from each set. Example of Identity Matching: Matching Rules [00089] FIG. 7 illustrates an example of an identity resolution process, according to some embodiments. After the grouping process described with reference to FIG. 6, the credit data system can apply as one or more identity resolution rules (matching rules) in the record sets remove false positive records from the sets. Several matching rules can be designed to optimize the chance of detecting false positives. An example of a matching rule might be just exact match of national ID, which you can remove from a set of potentially matching records associated with a user, such as records that had the same hash value that assigned them to the same set, but with the intersection by the correspondence rule, they are found to have different national ID. Matching rules can be based on exact match or similar match. For example, match rules can also include a perfect match in the national ID, the minimum match in the national ID and surname, a Petition 870190102926, of 10/14/2019, p. 55/118 49/96 perfect match in national ID and similar match in surname. [00090] In some embodiments, the matching rules can compute one or more confidence scores and compare against one or more associated thresholds. For example, a minimum match rule in both name and zip code may have a threshold score that determines the minimum match, and the match rule may discard a record having a score computed below the threshold value. Matching rules can inspect record identifiers (for example, names, national IDs, age, date of birth, etc.), format, length, or other record properties and / or attributes. Some examples include: • Content: reject unless the national ID provides an exact match. • Content: accept when there is a minimum match in the national ID and last name. • Content: accept when there is an exact match in the national ID and similar match in the first name. • Format: reject when user identification information (for example, SSN) does not contain 9 digits. • Length: reject when user identification information does not match length of user identification information in the associated file. Petition 870190102926, of 10/14/2019, p. 56/118 50/96 • Content, format, and length: reject when driver's license does not start with CA and followed by X number of digits. Matching rules can also be any other combinations of such criteria. [00091] The resulting subsets 418 after the application of the matching rules contain the same or less records if compared with the original sets. FIG. 7 illustrates the original sets (e.g. 702 and 704) after the hash value grouping process of FIG. 6 and the resulting subsets (for example, 712 and 714) after applying the matching rules. For example, in their respective order, sets associated with hl ', h2', h3 ', h4', hl, h2 'originally contained, respectively, 5, 6, 4, 3, 5, and 3 records. After applying the matching rules, the resulting subsets contain, respectively, 3, 3, 2, 2, 2, and 2 records, all of which were previously contained in the original sets. The use of matching rules boosts confidence that all remaining records are associated with the user. Identity Matching Example: Pool Fusion [00092] FIG. 8 illustrates an example of an assembly fusion process, according to some embodiments. As discussed with respect to existing systems, users sometimes change their personally identifiable information. An example has been provided for a user who has not updated his phone number associated with a Petition 870190102926, of 10/14/2019, p. 57/118 51/96 mortgage. When the user updated his phone number with a credit card provider, such as VISA, the credit events reported from the mortgage and VISA will contain different phone numbers while other information is the same. Such irregularities are a unique challenge for a data analyst since, while both credit events must be associated with a particular user, the associated unique identities can be different and thus the hash function may not group them together in the same set. When the records containing the unique identities are not grouped for the same set, the matching rules cannot fix the false negative (the records must be placed in the same set but they have not been). Thus, there is a need to identify such irregular records generated by the same user and correctly associate the records for the user. Assembly fusion process provides a solution that efficiently addresses the problem. [00093] After the process of matching FIG. 7, each resulting subset contains records that can be associated with a user with high confidence. In FIG. 8, there are 6 such subsets. The first subset 802 contains {rl, r3, r5} and the second subset 804 contains {r3, r5, rl5}. The two subsets may have become separate subsets since all hashing functions do not result in a common hash value. [00094] A closer inspection of the first subset and the second subset reveals that both subsets contain at least one common record, r3. As Petition 870190102926, of 10/14/2019, p. 11 588 52/96 each subset is associated with a single user, all records in the same subset can also be associated with the same single user. Logic dictates that if at least one common record exists in two different subsets that is associated with a single user, the two different subsets must both be associated with the single user and the two different subsets can be merged into a single group containing all records in the two subsets. Therefore, based on the common record, r3, the first subset 802 and the second subset 804 are combined to produce an expanded group containing the records (i.e., {rl, r3, r5, rl5} of the two subsets after the merger process) Similarly, another subset 808 containing {r2, rl5} can be merged into the expanded group based on the common register rl5 to form an additional expanded group 820 containing {rl, r2, r3, r5, rl5}. similarly, another group 822 containing {rlO, rl2, rl6} can be formed based on other subsets 806 and 810. After the set fusion process is complete, all resulting groups will be records that are mutually exclusive. can contain all records containing unique identities associated with a user. Pool Fusion Process Example [00095] Pool fusion illustrated above can use several methods. The speed of fusion sets can be important when large volumes of records count millions or even billions. Here, an efficient grouping method is described. Petition 870190102926, of 10/14/2019, p. 59/118 53/96 [00096] The first group algorithm reduces each set to grade 2 relationships (that is, pairs). The algorithm then groups the grade 2 relationship by the leftmost register. The algorithm then reverses or rotates grade 2 relationships to generate additional pairs. Then, the algorithm groups the grade 2 relations again by the leftmost register. Similarly, the algorithm repeats these processes until all subsets are merged into final groups. Each end group can be associated with a user. [00097] For illustrative purposes, subsets in FIG. 7 after the matching rules are put through the algorithm. The subsets are: {rl, r3, r5], {r3, r5, rl5], {rlO, rl2], {r2, rl5], {rl2, rl6], and {rl, r3}. [00098] Starting with the subsets, pairs of records (that is, reducing each group to grade 2 relationships) are generated from the subsets. For example, the first subset containing {rl, r3, r5] can generate the pairs: (rl, r3) (r3, r5) (rl, r5) [00099] The second subset containing {r3, r5, rl5] can generate the pairs: (r3, r5) (r5, rl5) (r3, rl5) [000100] The third subset containing {rlO, rl2] can generate the pair: Petition 870190102926, of 10/14/2019, p. 60/118 54/96 (rlO, r! 2) [000101] 0 room subset containing {r2, rl5] can generate the pair:(r2, rl5)[000102] 0 fifth subset containing {rl2, rl6] can generate the pair:(rl2, rl6 [[000103] 0 sixth subset containing {rl, r3] can generate the pair: (rl, r3) [000104] The merger process example can list all pairs. Since duplicates do not contain any additional information, the duplicates have been removed: rl, r3) r3, r5) rl, r5) r5, rl5) r3, rl5) rl 0, rl2 r2, rl5) r! 2, rl 6 [000105] Rotate or reverse each pair: rl, r3) r3, rl) r3, r5) r5, r3) rl, r5) r5, rl) r5, r! 5 Petition 870190102926, of 10/14/2019, p. 61/118 55/96 (rl5, r5) (r3, rl5) (rl5, r3) (rlO, rl2) (rl2, rlO) (r2, rl5) (rl5, r2) (rl2, rl6) (rl6, rl2) [000106 ] Group by the first record where the first record is common among the pairs: {rl, r3, r5} {r3, rl, r5, rl5] {r5, r3, rl, rl5] - duplicate {rl5, r5, r3, r2 } {rlO, rl2] {rl2, rlO, rl6] {r2, rl5] {rl6, rl2] [000107] Another round of pair generation. Duplicates are not shown: (rl, r3) (r3, r5) (rl, r5) (r3, rl5) (rl, rl5) (r5, rl5) (rl5, r5) (r! 5, r3) Petition 870190102926, of 10/14/2019, p. 62/118 56/96 (r! 5, r2) (r5, r2) (r3, r2) (rlO, rl2) (rl2, rlO) (rl2, rl6) (rlO, r! 6) (r2, rl5) (rl6, rl2) [000108] Rotate or reverse each pair. Duplicates are not shown: (rl, r3) (r3, r5) (rl, r5) (r3, rl5) (rl, rl5) (rl5, rl) (r5, rl5) (r5, r3) (r5, rl) (r3, rl) (rl5, r5) (rl5, r3) (rl5, r2) (r5, r2) (r2, r5) (r3, r2) (r2, r3) (rlO, r! 2) Petition 870190102926, of 10/14/2019, p. 63/118 57/96 (rl2, rlO) (rl2, rl6) (rlO, rl6) (rl6, rlO) (r2, rl5) (rl6, rl2) [000109] Group by the leftmost register where the first record is common among pairs: {rl, r3, r5, rl5] {r2, r3, r5, rl5] {r3, rl, r2, r5, rl5] {r5, rl, r2, r3, rl5] - duplicate {rlO, rl2, rl6 ] {rl2, rlO, rl6] - duplicate {rl5, rl, r2, r3, r5] - duplicate {rl6, rlO, rl2] - duplicate [000110] Another round of pair generation. Duplicates are not shown: (rl, r3) (rl, r5) (rl, rl5) (r2, r3) (r2, r5) (r2, r5) (r3, r5) (r3, rl5) (r5, rl5) (rl, r2) (r2, rl) Petition 870190102926, of 10/14/2019, p. 64/118 58/96 (rlO, rl2) (rlO, rl6) (r! 2, r! 6) [OOOlll] Rotate or reverse each pair. Duplicates are not shown: (rl, r3) (r3, rl) (rl, r5) (r5, rl) (rl, rl5) (rl6, rl) (r2, r3) (r3, r2) (r2, r5) (r5, r2) (r2, rl5) (rl5, r2) (r3, r5) (r5, r3) (r3, rl5) (rl5, r3) (r5, rl5) (rl5, r5) (rl, r2) (r2, rl) (rlO, rl2) (rl2, rlO) (rlO, rl6) (r! 6, rlO) Petition 870190102926, of 10/14/2019, p. 65/118 59/96 (r! 2, r! 6) (rl6, rl2) [000112] Group by the leftmost register where the first record is common among the pairs: {rl, r2, r3, r5, r! 5] {r3, rl, r2, r5, rl5] - duplicate {r5, rl, r2, r3, r! 5] - duplicate {rlO, rl2, rl6]{rl2, rl 0, rl6] - duplicate {r! 6, rl 0, r! 2} - duplicate [000113] By repeating the example process (1) creating pairs, (2) rotating or reversing each pair, (3) grouping by the leftmost register, the subsets merge into the resulting groups illustrated in FIG. 8, which are {rl, r2, r3, r5, rl5], and {rlO, rl2, rl6}. Example of Creation of inverted PID and Event Identity Stamping [000114] FIG. 9 illustrates an example of a process for associating inverted PIDs with identifiers, according to some embodiments. For each final group that is associated with a user, the credit data system can designate an inverted PID. The inverted PID can be generated by the credit data system in a sequential order. FIG. 9 provides two final groups, a first group 902 containing {rl, r2, r3, r5, rl5] and a second group 904 containing {rlO, rl2, rl6}. The first group is called an inverted PID of pl where the second group is called an inverted PID of p2. Each inverted PID is associated with all records contained within the designated group. Petition 870190102926, of 10/14/2019, p. 66/118 60/96 [000115] The credit data system can create an inverted PID map 426 containing associations between records and inverted PIDs. The inverted PID map 426 can be stored as a flat file or in a structured database. The credit data system can, once an inverted PID map is generated, update map 426 in an enhanced manner. As noted with respect to FIG. 8, each group presents a collection of all records (and unique identities contained within the records) that are associated with a particular user. Therefore, whenever two records have the same inverted PID, the credit data system can determine which records to associate with a particular user regardless of the disparity in the records. Inverted PIDs can be used to stamp credit events. [000116] FIG. 10 illustrates an example of an identity stamping process. The credit data process can access and provide creditor and / or account 404 partitioned events and the inverted PID map 426 as inputs to a stamping process 428 to generate PID 430 stamped events based on one or more unique identities contained within the associated records. The stamped credit events 430 can be stored in a data store. [000117] From the hash functions that group similar records in potential correspondences for merging the set to stamp inverted PID for credit events, the credit data system maximizes the grouping. Grouping is used to narrow the universe Petition 870190102926, of 10/14/2019, p. 67/118 61/96 analyzed credit events, and to quickly access credit events in the future. By using smart grouping instead of performing computationally cumbersome searches, the credit data system is enhanced by orders of magnitude. For example, retrieving credit events associated with a user with an inverted PID and generating a credit statement improves efficiency 100 times. [000118] FIGS. 11A-11D illustrate, to facilitate the invention, the example of the identity matching process of FIG. 6 to FIG. 8 with hard data. FIG. 11A provides the example process of reducing the dimensionality of data using hashing algorithms applied to concrete values in a tabular form. The leftmost record column 11102 of the table in FIG. 11A lists rlrl6 records contained within credit events. For example, the rl record may be {John Smith, 111-22-3443, 10/06/1970, 100 Connecticut Ave, Washington DC, 20036} and the r2 record may be {Jonah Smith, 221-114343, 06/10 / 1984, 100 Connecticut Ave, YourTown DC, 20036} and so on. [000119] These records contain user identification information (for example, record rl 654 contains user identification information John Smith (name), 111-22-3443 (SSN), 10/06/1970 (date of birth) , 100 Connecticut Ave (street address), YourTown DC (city and state), 20036 (postal code). User identification information was extracted from credit events (FIG. 4, 406) and optionally Petition 870190102926, of 10/14/2019, p. 68/118 62/96 deduplicated. User identification information can, alone or in combination, provide the unique identity, which can associate the record, and the associated credit event, for a particular user. As illustrated, records can include unique identities. [000120] Several financial institutions may provide more or less different user identification information. For example, VISA can provide only the first name and the last name (see, for example, rl) while American Express can provide the middle name in addition to the first name and the last name (see, for example, rl5). Some financial institutions may provide credit events that are missing one or more user identification information all together, such as not providing a driver's license number (for example, rl-rl6 does not include a driver's license number). [000121] Although there is no limit on how many hash functions can be applied to the records, FIG. 11A illustrates three example hash functions, hi 11104, h2 11106, and h3 11108. As described, each hash function can be designed to focus (i.e., increase or decrease collision rates) on different personal identifiers or combinations of personal identifiers. Additionally, although not necessary, personal identifiers can be pre-processed to generate hash keys that facilitate the purpose of each of the hash functions. For example, the hi 11104 hash function uses the preprocessed hash key that adds SSN digits, uses last name, month of birth, day of birth in the month. The rl record can be pre-processed Petition 870190102926, of 10/14/2019, p. 69/118 63/96 to provide a 2ISmithO610 hash key. Using preprocessing hl 11104, records r2, r3, r4, and r5 will also provide the same hash key 2ISmithO610. However, for the hl 11104 hash function, the rl4 register will provide a different hash key of 47Smith0610. Different hash keys are likely to result in different hash values. For example, the same hash key 2ISmithO610 from rl, r2, r3, r4, and r5 results in KN00NKL while the hash key 47Smith0610 results in some other hash value. Thus, according to the hash function hl 11104, the records share the same hash value KN00NKL (ie, rl, r2, r3, r4, and r5) are grouped as potential matches. [000122] The hash function h2 11106 uses a different preprocessing, ie SSN, month of birth, day of birth in the month. Records r3, r5, and rl5, according to the h2 11106 preprocessing, produce a hash key of 111-22-34340610. Using the h2 11106 hash function, the hash keys calculate for VB556NB. However, hash functions can result in unintended collisions (in other words, false positives). Unintended collisions result in unintended registration in a set of potential matches. For example, record rl4, according to the preprocessing of a hash function h2 11106, results in a hash key of 766-8716420610, which is different with the hash key 111-2234340610 associated with r3, r5, and rl5 , but still computes for the same VB556NB hash value. Thus, when records are associated based on the division of the same Petition 870190102926, of 10/14/2019, p. 70/118 64/96 hash value from the hash function, the potential set of records that belongs to a certain user may have unintentionally included a record that belongs to a different user. As described, and will also be illustrated with concrete samples in FIG. 7B, matching rules can help to resolve the identity of the false positive records in each set. [000123] Each hash function can result in more than one set of potential match records. For example, FIG. 11A illustrates the hash function by computing two sets of hash values VB556NB and NH1772TT. Each set of hash values is a set of potentially corresponding records. According to the example, the hash function h2 11106 produces VB556NB hash value has a potentially corresponding record set {r3, r5, rl4, rl6] and NH1772TT hash value has a potentially corresponding record set {r8, r9, rlO , rl2}. [000124] FIG. 11B illustrates sets 11202, 11204, 11206, 11208 of potentially corresponding records according to their common hash values. Based on FIG. 11A, the potentially corresponding record set 11202 associated with the hash value KN00NKL includes {rl, r2, r3, r4, r5}. Similarly, the potentially corresponding record set 11204 associated with the hash value VB556NB includes {r3, r5, rl4, rl6}. The potentially matching record set 11206 associated with the NH1772TT hash value includes {r8, r9, rlO, rl2}. Similarly, the record set potentially Petition 870190102926, of 10/14/2019, p. 71/118 65/96 corresponding 11208 associated with the BBGT77TG hash value includes {rl2, rl3, rl4, rl5, rl6}. [000125] Each set can include false positives. For example, although the potentially matching record set 11202 associated with the hash value KN00NKL includes {rl, r2, r3, r4, r5], r2 and r4 does not appear to belong to the record set that should be associated with John (Frederick ) Smith since r2 has different SSN and year of birth and r4 has different first name, SSN, year of birth, address, city, state, and postal code. Determining whether any of rl, r3, or r5 are false positives is more complicated since there are only slight variations in SSN and year of birth (alternating two digits in SSN or year of birth which is just a year apart). Therefore, records r2 and r4 are likely to be false positives while rl, r3, r5 are true positives. Similarly, other sets can contain true positives and false positives. [000126] FIG. 11C illustrates the application of one or more matching rules to resolve identity (i.e., remove such false positives) from the sets in FIG. 11B. The variety of matching rules has been disclosed with respect to FIG. 7. For example, applying such an exact match rule to the last name, rotations of up to two digits in SSN and year of birth less than 2 years apart can successfully remove possible false positives from the 11302 set, thus providing a subset containing only {rl, r3, r5}. In some embodiments, records in a set may Petition 870190102926, of 10/14/2019, p. 72/118 6/96 be compared against the data in the user's file (for example, verified user identification information). In some embodiments, the records in a set itself can be compared with each other to determine the highly probable true positive personal identifiers first then apply the matching rules against the determined personal identifiers. [000127] In some embodiments, the matching rules can calculate confidentiality scores and compare with limits for accepting or rejecting a record in a set. For example, set 11304 with hash value VB556NB can use a rule that calculates character match score in the name. The rl4 record has a full name Eric Frederick which in the best case, among other records in the 11304 set, corresponds to 9 characters of 18 characters of John Frederick Smith and / or John Smith Frederick. Therefore, a score of 50% can be calculated and compared against a minimum match limit of, say 70%, and the credit data system can reject rl4 from set 11304. Other match rules can be designed and applied to sets 11302, 11304, 11306, 11308 to remove rejected records and generate subsets. In some embodiments, some or all of these matching rules can be applied to different sets 11302, 11304, 11306, 11308. FIG. 11C illustrates, subsets containing {rl, r3, r5], {r3, r5, r! 5], {rlO, r! 2], and {r! 2, r! 6}. Petition 870190102926, of 10/14/2019, p. 73/118 67/96 [000128] FIG. 11D illustrates the application of pool merging rules in subsets 11302, 11304, 11306, 11308 identified in FIG. 11C, thereby providing fused groups 11402, 11404. Each of the subsets 11302, 11304, 11306, 11308 from FIG. 11C contain records that can be associated with a user with high confidence. FIG. 11C, after applying the matching rules, provides 4 such subsets. The first subset 11302 contains {rl, r3, r5} and the second subset 11304 contains {r3, r5, rl5}. [000129] A closer inspection of the first subset and the second subset reveals that both subsets contain at least one common record, r3. Since each subset is associated with a single user, all records in the same subset can also be associated with the same single user. Logic dictates that if at least one common record exists in two different subsets that are associated with a single user, the two different subsets must both be associated with the single user and the two different subsets can be merged into a single group containing all records in the two subsets. Therefore, based on the common record, r3, the first subset 11302 and the second subset 11304 are combined to produce a group 11402 containing all records (that is, {rl, r3, r5, rl5} of the two subsets after the Similarly, another 11404 group containing {rlO, rl2, rl6} can be formed based on other subsets 11306 and 11308. After the set fusion process is complete, Petition 870190102926, of 10/14/2019, p. 74/118 68/96 all resulting groups will have mutually exclusive records. Each merged group can contain all records containing unique identities associated with a user. [000130] When the algorithm described with respect to FIG. 8 is applied to the original subsets: {rl, r3, r5], {r3, r5, rl5], {rlO, rl2], and, {rl2, rl6] [000131] Starting with subsets, pairs of records (that is, reducing each group to relationships of grade 2) are generated from the subsets. For example, the first subset containing {rl, r3, r5] can generate the pairs: (rl, r3) (rl, r5) (r3, r5) [000132] The second subset containing {r3, r5, rl5] can generate the pairs: (r3, r5) (r3, rl5) (r5, rl5) [000133] The third subset containing {rlO, rl2] can generate the pair: (rlO, rl2) [000134] The fourth subset containing {rl2, rl6] can generate the pair: (rl2, rl6) [000135] The merger process example can list all pairs. Since duplicates do not contain any additional information, the duplicates have been removed: (rl, r3) Petition 870190102926, of 10/14/2019, p. 75/118 69/96 (rl, r5) (r3, r5) (r3, rl5) (r5, rl5) (rlO, rl2) (rl2, rl6) [000136] Rotate or reverse each pair: (rl, r3) (r3, rl) (rl, r5) (r5, rl) (r3, r5) (r5, r3) (r3, rl5) (rl5, r3) (r5, rl5) (rl5, r5) (rlO, rl2) (rl2, rlO) (rl2, rl6) (rl6, rl2) [000137] Group by the first record where the first record is common between pairs: {rl, r3, r5} {r3, rl, r5, rl5} {r5, rl, r3, rl5} {rlO, rl2} {rl2, rlO, rl6} {r! 5, r3, r5} Petition 870190102926, of 10/14/2019, p. 76/118 70/96 {rl6, rl2] [000138] Another round of pair generation. Duplicates are not shown: (r3, rl) (r3, r5) (r3, rl5) (rl, r5) (rl, rl5) (r5, rl5) (rlO, rl2) (rl6, rl2) (rlO, rl6) [000139] Rotate or reverse each pair. Duplicates are not shown: (r3, rl) (rl, r3) (r3, r5) (r5, r3) (r3, rl5) (rl5, r3) (rl, r5) (r5, rl) (rl, rl5) (rl5, rl) (r5, rl5) (rl5, r5) (rlO, rl2) (rl2, rlO) (r! 6, r! 2) Petition 870190102926, of 10/14/2019, p. 77/118 71/96 (rl2, rl6) (rlO, rl6) (rl6, rlO) [000140] Group by the leftmost register where the first record is common among the pairs: {rl, r3, r5, rl5] {r3, rl, r5, rl5] - duplicata {r5, rl, r3, rl5] - duplicata {rlO, rl2, rl6] {rl2, rlO, rl6] - duplicata {rl5, rl, r3, r5] - duplicate {rl6, rl2, rlO] - duplicate [000141] After applying the set fusion algorithm, two groups {rl, r3, r5, rl5] and {rlO, rl2, rl6] each one containing mutually exclusive records remains. [000142] FIG. 12 is a flowchart 1200 of an illustrative method for efficiently organizing heterogeneous data on a massive scale. The illustrated method is implemented through a computer system, which can be a credit data system. Method 1200 begins at block 1202, where the computing system receives a plurality of event information from one or more data sources. The source of event information data can be the financial institution. In some embodiments, event information may have heterogeneous data structures between event information from the same financial institution and / or from multiple financial institutions. The event information contains at least one personally identifiable information (field of Petition 870190102926, of 10/14/2019, p. 78/118 72/96 identity or identifier) that associates the event information with an account holder who is associated with an account that generated the credit event. For example, credit event information (or for short, credit event) can contain one or more identity fields that event credit common private user that generated O eventcredit credit through the execution of a transaction in [0 00143] 0 system computer can Access The plurali of information accessing event directly a memory or data storage device where pre-existing event information from data sources is stored, or event information can be obtained in real time over a network. [000144] In block 1204, the computer system can extract identity fields from account holders included in the event information. Extracting the identity field may involve formatting, transformation, correspondence, analysis or the like. Identity fields can include SSN, name, address, postal code, phone number, e-mail address, or anything that can be, alone or in combination, used to assign event information to an account holder. For example, name and address may be sufficient to identify an account holder. In addition, an SSN can be used to identify an account holder. When the event information account in the billions and is received from many data sources using heterogeneous formats, some accounts do not provide certain fields of identity and some fields of Petition 870190102926, of 10/14/2019, p. 79/118 73/96 identity may contain incorrectly typed or incorrect information. Therefore, when working with a massive amount of event information, it is important to consider combinations of identity fields. For example, relying only on SSN to distinguish account holders can result in misidentification of associated account holders where SSN is misspelled. Trusting the other available identity fields, such as names and addresses, an intelligent computer system can correctly assign event information to the same user. Combinations of identity fields can form unique identities used to assign event information to users who are associated with the events. [000145] In block 1206, the computer system can optionally deduplicate the unique identities to remove the same unique identities. For example, event information can provide, when extracted, John Smith, 555-555555 (SSN), jsmith@email.com (email), and 333-3333-3333 phone number. Another event can also provide John Smith, 555-55-5555 (SSN), jsmith@email.com (email), and 333-3333-3333 phone number. The unique identities of two event information are the same, so they can be candidates for deduplication. One of the unique identities can be removed in such a way that only non-duplicated unique identities are subject to operations in block 1208. [000146] In block 1208, the computer system can reduce the dimensionality of unique identities with a plurality of dimensionality reduction processes. The objective of this block is to group unique identities based on Petition 870190102926, of 10/14/2019, p. 80/118 in some similarities contained in the unique identities. An example of a process that can be used to reduce the dimensionality of unique identities based on contained similarities could be the location-sensitive hash function. The computer system can provide a plurality of such dimensionality reduction processes, each process focusing on an aspect of similarity contained within the unique identities, to provide multiple groupings of similar (and potentially attributable to a particular user) unique identities. When location-sensitive hash functions are used, unique identities are associated with hash values, where each applied hash function generates a hash value for a given unique identity. Appropriately, each unique identity can be associated with a hash value for each hash function. [000147] In block 1210, the computer system groups the unique identities into sets based at least in part on the results of the dimensionality reduction functions having a common value. Grouping in sets is extensively detailed at an abstract level with FIG. 6 and with concrete sample values with FIG. 11B. As described with reference to FIG. 6 and FIG. 11B, the resulting sets contain potential matches and may also contain false positives. [000148] In block 1212, the computer system, for each set of unique identities, applies one or more matching rules with criteria to remove false positives. After the application of the rules of Petition 870190102926, of 10/14/2019, p. 81/118 75/96 matching resulting in the removal of false positives, sets can become subsets of their previous sets before applying matching rules including only verified unique identities. [000149] In block 1214, the computer system merges the subsets to arrive in groups of unique identities. The pooling process includes identifying common unique identities in subsets, and when the computer system encounters at least one common single identity, it merges the subsets that contain the common single identity. The fusion of the set is extensively detailed at an abstract level with FIG. 8 and with concrete sample values with FIG. 11D. In addition, an example of an efficient method of pooling has been disclosed above. After the merger of the set, the merged groups include unique mutually exclusive identities. [000150] In block 1216, the computer system provides a unique inverted PID for each of the groups. In a sense, this process is recognizing that each group represents a single account holder. In block 1218, the computer system designates the inverted PID provided for each group with all the unique identities contained within each associated group. In a sense, this process is recognizing that each of the unique identifiers, when found in the event information, can identify the event information to belong to the private account holder associated with the inverted PID. [000151] In block 1220, the computer system inspects event information to find a single Petition 870190102926, of 10/14/2019, p. 82/118 76/96 identifier and, when a single identifier is found, stamp the event information with an inverted PID associated with the unique identifier. Ingestion and Consumption of Heterogeneous Data Collections (HDC) [000152] When a system is collecting and analyzing a massive amount of heterogeneous data, there is a possibility that some of the input data contains or leads to a defect. The defect can be broadly defined as any factor that leads to software modification or data conversion. For example, some financial institutions that report credit events may provide non-standard data that requires extensive ETL processing as part of data ingestion, in the ETL process, some defects can be introduced. An example could be phone numbers that use the format (###) ### - #### as opposed to the format ###. ###. ####. Another example is the date in the European format versus the date in the USA format. Another example may be the defects introduced as a result of the adoption of daylight saving time. In an appropriate manner, these defects can be introduced due to a software problem in the ETL process or lack of generalization of the project. Sometimes, human errors can also be a factor and can cause some forms of defects. Therefore, there is scope to improve existing systems that are inadequately prepared to address defect formation and manipulation. [000153] Existing data integration approaches, such as data warehouses and data centers, attempt to Petition 870190102926, of 10/14/2019, p. 83/118 77/96 extract significant items of data from input data and transform them into a standardized target data structure. Generally, when the number of data sources that provide heterogeneous data grows, software and engineering efforts needed to transform or otherwise address the growing number of heterogeneous data the collection also grows in size and complexity. Such system requirements and human requirements can grow to the point where marginal effort to modify an existing system and maintain the modified system can lead to further defects. For example, the incorporation of new data sources and formats may require that existing system data structures be modified, which may sometimes require the conversion of existing data from the old data format to a new data format. The conversion process can introduce new defects. If defects go unnoticed for a long period of time, significant effort and money must be spent to undo the effects of defects through software modifications and data conversions. Ironically, such additional software modifications and data conversions can also lead to defects. [000154] The credit data systems described here address the problem of defect management by implementing what can be called a late data interpretation, which is additionally detailed with respect to the defect models of FIGS. 13A-13C below. Defect Models Petition 870190102926, of 10/14/2019, p. 84/118 78/96 [000155] FIG. 13A is a general defect model 13100 showing probability of defect associated with data such as data flows from data ingestion to data consumption (that is, from left to right) across multiple system states. A system can have an associated defect surface 13102, which can be defined as the probability distribution of defects for a given software component based on its functional scope and design complexity. The height of the surface defect 13102 may reflect the probability of defect P (D) for a combination of functional scope and design complexity. In other words, where the functional scope and design complexity of the software are high, the height of the surface defect 13102 will be high. Where the functional scope and design complexity of the software are low, the height of the surface defect 13102 will be low. The surface defect 13102 is mostly flat, indicating that the functional scope and design complexity of the software do not change across states. [000156] FIG. 13A also illustrates a related concept of defect leverage. A defect leverage can be defined as the amount (or, distance) of downstream software components that can be impacted by a given defect. A defect close to 13104 data ingestion has a greater distance downstream and thus has greater defect leverage than a defect close to 13106 data consumption. From the probability of defect and defect leverage, a defect moment can be calculated, which is defined as: Petition 870190102926, of 10/14/2019, p. 85/118 79/96 Defect Moment = Defect Probability * Defect Leverage. [000157] The moment of defect can be understood as a probable impact of a defect in the system. An integrated sum of the defect moment can quantify the expected value of the defect quantity for the system. Therefore, minimizing the sum of the defect moment is desirable. [000158] FIG. 13B illustrates a 13200 surface defect model for a system using ETL Processes. Restructuring, transformation, and standardization (all of which can be a part of ETL Processes) are provided for early data ingestion. In addition, interpretation occurs in the early ingestion as well as in order to assist the ETL process. The collection of ideas as part of analysis and reporting at the end of the data flow, close to data consumption. [000159] As described, ETL processes can increase in complexity when dealing with heterogeneous data sources. Suitably, FIG. 13B illustrates a defect surface 13202 that is high (indicating high functional scope and software complexity) close to data ingestion and lower close to data consumption. The system displays the highest defect surface 13202 where the defect leverage is the highest (close to data intake) and the lowest defect surface 13202 where the defect leverage is the lowest (close to data consumption) . [000160] This type of surface from high to low defect 13202 causes problems when the moment of defect is considered. Defect moment was defined as a product Petition 870190102926, of 10/14/2019, p. 86/118 80/96 defect probability and defect leverage, where the integrated sum of the defect moment quantifies the expected value of the defect quantity for the system. In this existing system, as high values are multiplied with high values and low values with low values, the integrated sum of the products can be quite large. Appropriately, the expected value of the amount of defects can be quite large. [000161] FIG. 13C illustrates a surface defect model for the credit data system. Unlike existing systems, the credit data system does not perform ETL processes (for example, restructuring, transformation, standardization, registration, etc.) but can limit its processing for validation, curation (for example, carrying out control quality), and corresponding / linking the input data. The validation, curation, and correspondence / linking processes are not as complex as the software components for the ETL process and have a low probability of defect. Thus, FIG. 13C illustrates the defect surface 13302 of the credit data system low near data intake and high near data consumption. Appropriately, the credit data system displays the lowest defect surface 13302 where the defect leverage is the highest (close to data ingestion) and the highest defect surface 13302 where the defect leverage is the most low (close to data consumption). [000162] This type of low to high defect surface 13302 is quite beneficial when the moment of defect Petition 870190102926, of 10/14/2019, p. 87/118 81/96 is considered. In the credit data system, as low defect probabilities are multiplied with high defect leverage and high defect probabilities are multiplied with low defect leverage, the integrated sum of products can be much less than in existing systems. Therefore, the credit data system provides improved defect management with respect to data ingestion and data consumption. Late Data Interpretation [000163] A late interpretation system, instead of interpreting input data close to data ingestion (as the data model 13200 for traditional systems in FIG. 3B illustrates), delays interpretation as much as possible in the line of knowledge of data in order to minimize the moment of integrated defect. FIG. 13C illustrates an example of defect model 13300 of such a late interpretation system according to an implementation. [000164] The late interpretation system can accept any type of event data, such as from data sources that have various types of data, formats, structures, meanings, etc. For example, FIG. 14 illustrates various types of event data related to an anchoring entity 1402, shown as a particular user in this example. An anchor entity can be any other entity for which event data resolution is provided. For example, an anchoring entity can be a private user and multiple data sources can provide heterogeneous event data, such as vehicle rental records 1404, mortgage records 1406, Petition 870190102926, of 10/14/2019, p. 88/118 82/96 credit card records 1408, utility records 1410, DMV records 1412, court records 1414, tax records 1416, employment records 1418, etc., associated with the particular user. [000165] In some embodiments, as new event data is accessed, the system identifies only the minimum information necessary to attach the data with a correct anchoring entity. For example, an anchoring entity can be a private user and the minimum information needed to attach the new data for the private user can be identifying information such as name, national ID, or address. When new data is received, the system can retrieve this minimal set of identifying information for the particular user from the data and attach the data with one or more user association markers (for example, where the anchoring entity is a user associated with credit, an inverted PID is an example of a marker associated with the user). For a given piece of data, the late interpretation system can later use the markers to identify a correct anchoring entity. The process of attaching a bookmark can be the matching / linking process in FIG. 13C. In some embodiments, the matching / linking process does not change the input data or data structure. [000166] The dialing / correspondence / connection process can be similar to cataloging a book. For example, based on an International Standard Book Number (ISBN), book title, and / or Petition 870190102926, of 10/14/2019, p. 89/118 83/96 author of a book, a librarian can place the book in a correct section and shelf. The content or plot of the book is not necessary in the cataloging process. Similarly, based on minimal information that identifies an anchoring entity, a vehicle rental record 1404 may be associated with a particular anchoring entity. In some embodiments, each record and / or data source can be associated with a domain (further described with reference to FIG. 15). For example, a vehicle rental record 1404 or the vehicle rental data source can be associated with a vehicle rental domain, a credit card record 1408 or the credit card data source can be associated with a credit domain, and a 1406 mortgage record or mortgage data source can be associated with a mortgage domain. [000167] In some embodiments, the late interpretation system may include an anchor entity resolution (AER) process that corrects tags attached with the data received previously to be associated with the best anchor entity. The best known anchor entity can change dynamically based on information contained in the new input data, such as based on analysis of previously received data, or based on improvements in the anchor entity resolution itself. In some embodiments, the anchor entity resolution may update the previously attached markers. The docking entity resolution process can run periodically or Petition 870190102926, of 10/14/2019, p. 90/118 84/96 continuously in the background or in the foreground, can be automatically triggered by the occurrence of a predefined event, and / or initiated by a system supervisor, requesting entity, or other user. [000168] The late interpretation system limits the probability of a defect for the interpretation and manipulation of identification information. By doing this with traditional systems' ETL processes, the delayed interpretation system reduces the software and engineering efforts required to transform or otherwise address the growing size and complexity of the heterogeneous data collection. As FIG. 13C illustrates, the surface defect 13302 is reduced for states that are additionally upstream of states close to data consumption, thereby reducing the moments of defect. Domain and Vocabulary Dictionary [000169] The late interpretation system may include one or more analyzers (FIG. 13C, 13304) for data interpretation. Unlike existing systems with the interpretation component (FIG. 13B, 13204) positioned close to data ingestion, the late interpretation system has an interpretation component (for example, analyzers) positioned further away for data consumption (FIG. 13C, 13304). Analyzers can be associated with domains, such as credit domain 1502, utility domain 1504, and / or mortgage domain 1506. [000170] The late interpretation system can associate input data or data sources with one or more Petition 870190102926, of 10/14/2019, p. 91/118 85/96 domains. For example, a 1408 credit card record or its data source may have been associated with the credit domain. Each domain includes a dictionary that includes vocabulary for the domain. FIG. 15 illustrates the domains and their associated vocabularies. For example, a 1502 credit domain can have an associated dictionary including vocabulary from @credit_limit, @current_balance, and @past_due_balance. Similarly, a 1504 utility domain can have an associated dictionary including vocabulary from @current_balance, and @past_due_balance As illustrated, vocabularies can be repeated across different domains, such as @current_balance and past_due_balance. However, each domain has its own sets of rules for interpretation and analyzers associated with a particular domain can properly interpret identical vocabulary in one domain differently from vocabulary in another domain based on each respective registration domain. [000171] Based on the dictionary and the vocabularies contained within, the one or more analyzers inspect the contents of the records and mark fields or values with the corresponding vocabulary. The analysis process can be similar to scanning through books to identify / interpret relevant content. Similar to scanning history books for content relevant to George Washington and tagging content describing George Washington's place of birth, date of birth, age, or similar with @george_washington, a 1508 credit analyzer can scan records at Petition 870190102926, of 10/14/2019, p. 92/118 86/96 from a credit data source or records in the credit domain and identify / interpret content that may be relevant to the credit limit and mark the content interpreted / identified with the @credit_limit marker (FIG. 16 illustrates examples tagging content identified with @credit_limit). Similarly, a 1510 utility domain analyzer can scan records, such as a utility invoice, from a data source or utility records in the utility domain and identify content that may be relevant to the past due to the balance and mark the contents identified with the @past_due_balance marker. [000172] Once marked, downstream components including consistency check, insight, and / or reporting in FIG. 13C can analyze the contents of a record using the vocabulary for the record's domain. In some embodiments, a downstream component (for example, any 1512 insight calculation component) can interpret records from more than one domain for its use. For example, a mortgage scoring component may search for @credit_limit in the data from the credit domain before making a determination of a potential credibility of the mortgagee. [000173] Advantageously, late interpretation provides the benefit of reducing the effects of defects. The interpretation described above by the analyzers is, like FIG. 13C, 13304 illustrates, closer to data consumption than existing interpretation systems offer. Therefore, defects in the late interpretation system Petition 870190102926, of 10/14/2019, p. 93/118 87/96 have leverage limited, and so have impact reduced.[000174] Other benefit that the system late interpretation provides is that the system does not need change the original or existing heterogeneous event data. Instead of ETL processing to standardize data for storage and interpretation, the system marks and defer interpretation for the analyzers. If one or more analyzers are found to introduce defects in a domain, a data engineer can simply update the one or more domain analyzers. Since the original or existing event data has not been changed, re-run analyzers can quickly eliminate defects without losing data. Additionally, in some embodiments, as the data is not copied through the data stream, a data engineer can cure, delete, or delete any data without having to update other databases. [000175] Therefore, data intake from the late interpretation system does not need ETL processes and, therefore, the late interpretation system allows new data sources to be brought in quickly and at low cost. [000176] FIG. 16 illustrates an example of a late interpretation process 1600 that uses some sample content, according to some embodiments. A domain 1602 dictionary can include a vocabulary from domain 1604 and grammar from domain 1606. The vocabulary from domain 1604 can include keyboard definitions for annotation (for example, markup as described with reference to FIG. 15) of Petition 870190102926, of 10/14/2019, p. 94/118 88/96 data. The vocabulary of domain 1604 can include primary words and compound words. In some embodiments, the primary words are markers that are directly associated (or annotated) with some portion of the heterogeneous data. For example, the delayed interpretation system marks some portion of the 1610 input data with @CreditLimit and @Balance. Compound words are synthesized from one or more primary words or other variables with 1606 domain grammar. An example of 1606 domain grammar may be that an average balance for N records is equal to the sum of each account balance and dividing by N , which can be expressed in domain grammar 1606 with two primary words @Balance like @AverageBalance [n] = Sum (@Balance) / n). [000177] The domain dictionary 1602 can also include predefined font templates 1608 for heterogeneous data sources. The 1608 font models act as a lens to expose important fields. For example, a simple example of model source can be for input data from source 1610 VISA data, the data field 6 is a @CreditLimit 7 and the data field is a @Balance. The annotation contributor 1612 can use one or more such source models 1608 to mark / annotate input data in a domain to generate annotated data 1614. In some embodiments, machine-learned models and / or other artificial intelligence can be used to supplement or replace 1608 font models in determining and exposing important fields. Petition 870190102926, of 10/14/2019, p. 95/118 89/96 [000178] The late interpretation system may also include one or more 1616 domain analyzers. The 1616 domain analyzer can use annotations / bookmarks and rules incorporated in its software to present fully annotated data for applications. In some embodiments, the domain analyzer may, in addition to or in place of the annotations / markers that the annotation contributor 1612 provides, provide some annotations / markers to generate the fully annotated data. The domain analyzer 1616 can refer to the domain dictionary 1602 its presentation of the data fully annotated for the applications or in its own annotation / markup. [000179] A 1618 score calculation application and a 1620 insight calculation application are provided as sample applications that can use the fully annotated data. The 1618 score calculation application, based on the annotated data, can calculate a credit score (or other sources) from one or more users and provide it to a requesting entity. Similarly, the 1620 Insight Calculation application can provide analysis or reports including balance sheet statements, cash flow statements, consumption habits, possible savings tips, etc. In some embodiments, a number of applications, including the 1618 score calculation application and the 1620 insight calculation application, can use the fully annotated data in conjunction with the inverted PID from the batch indexing process to quickly identify all records Petition 870190102926, of 10/14/2019, p. 96/118 90/96 annotated that belong to a particular user and generate a record or analysis with respect to the user. [000180] FIG. 17 is a flowchart 1700 of an illustrative method for interpreting input data in order to minimize defect impact on the system, according to some embodiments. Depending on the embodiment, the method of Figure 17 can include fewer or more blocks and the blocks can be made in any order that is different from that illustrated. [000181] Starting at block 1702, the system interpretation (for example, one or more components of the credit data system discussed elsewhere here) receives a plurality of event information (see, FIG. 14) from one or more more data sources. A data source can be a mortgage, credit card provider, utility company, vehicle dealer who provides vehicle rental records, DMV, courts, IRS, employer, banks, or any other source of information that can be associated with entities for which entity resolution is desired. In some embodiments, the data sources provide the plurality of event information in the heterogeneous data formats or structures. [000182] In block 1704, the late interpretation system determines a category or type of information (also referred to here as a domain) associated with the data sources. The determination of a domain for a data source can be based on information provided by the data source. In some embodiments, the system may be able to determine (or confirm in situations where the data source Petition 870190102926, of 10/14/2019, p. 97/118 91/96 provides domain information) the associated domain from the inspection of the data structure of the data source. In some embodiments, the event information may include some hints indicative of the domain of a particular data source and the system may be able to determine a domain for the data source based on the hints. For example, if event information (or a large portion of event information) includes the terms water or gas, the system can automatically determine that the data source must be associated with a utility domain. [000183] In block 1706, the system accesses a domain dictionary for the given domain. The domain dictionary can include a domain vocabulary, domain grammar, and / or annotation criteria, examples that are described above with reference to FIG. 16. [000184] In block 1708, the system notes event information from the domain determined with the domain dictionary. For example, based on the annotation criteria, the system evaluates the event information and identifies one or more portions that can be annotated with domain vocabulary. FIG. 16 illustrates the example of event information 1610 before annotation and then annotated event information 1614 with annotations associated with certain event information. In some embodiments, the event information is updated only with the domain annotations (as in the example of annotated event information 1614) and are otherwise unchanged. In some embodiments, once event information is noted, it is left undisturbed until the system receives a data request Petition 870190102926, of 10/14/2019, p. 98/118 92/96 for event information, such as information associated with particular annotations (for example, requests for event information @Creditlimit data can be requested to calculate an overall credit limit across multiple consumer accounts, which can included in a credit report or similar consumer risk analysis report). [000185] In block 1710, the system receives data requests for event information. Requests can be for event information (for example, all event information that includes a particular note or combination of notes) or for particular data included in the event information (for example, portions of event information specifically associated with a annotation). For example, with respect to the annotated event information 1614 of FIG. 16, a request can be for all the credit event information annotated or just @Balance data in the credit event information. The data request can be from another component of the system, such as scoring calculation application, discernment calculation application, or the like, or it can be from other requesting entities, such as a third party. [000186] In block 1712, the system analyzes event information with one or more domain analyzers to identify the requested information. As described with reference to Figure 16, domain analyzers can use domain dictionaries to interpret event information. For example, a domain analyzer can use Petition 870190102926, of 10/14/2019, p. 99/118 93/96 a vocabulary from the domain to find one or more primary words. The domain analyzer can then use a domain grammar to determine a compound word based on one or more primary words. In some embodiments, a domain analyzer may request another domain analyzer to provide data necessary for its interpretation. For example, a mortgage domain analyzer may request @credit_score from a credit domain analyzer when generating its compound word according to a domain grammar that requests a credit score. In block 1714, the system provides the requested data for a requesting application or for a requesting entity. Additional Achievements [000187] It should be understood that not necessarily all objectives or advantages can be achieved according to any particular embodiment described here. Thus, for example, certain embodiments can be configured to operate in a way that achieves or optimizes an advantage or group of advantages as taught here without necessarily achieving other objectives or advantages as can be taught or suggested here. [000188] All the processes described here can be incorporated, and completely automated, through software code modules executed through a computer system that includes one or more computers or processors. In some embodiments, at least some of the processes can be implemented using virtualization techniques such as, for example, cloud computing, Petition 870190102926, of 10/14/2019, p. 100/118 94/96 application containerization, or Lambda architecture, etc., alone or in combination. The code modules can be stored in any type of non-transitory computer-readable medium or other computer storage device. Some or all of the methods can be incorporated into specialized computer hardware. [000189] Many other variations other than those described here will be apparent from this invention. For example, depending on the implementation, certain acts, events, or functions of any of the algorithms described here can be performed in a different sequence or can be added, merged, or left together (for example, not all of the described acts or events are required for the practice of the algorithms). In addition, in certain embodiments, acts or events can be performed concurrently, for example, through multi-threaded processing, interrupted processing, or multiple processors or processor cores or in other parallel architectures, rather than in sequence. In addition, different tasks or processes can be performed by different machines and / or computing systems that work together. [000190] Conditional language as, among others, can, could, should or can, unless specifically stated otherwise, are understood within the context as used in general to pass that certain embodiments include, while other embodiments do not include , certain functionalities, elements and / or processes. So, such a conditional language Petition 870190102926, of 10/14/2019, p. 101/118 95/96 is not generally intended to imply that features, elements and / or processes are in any way necessary for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without user input or request, whether these functionalities, elements and / or processes are included or must be carried out in any particular embodiment. [000191] Disjunctive language such as the phrase at least one of X, Y, or Z, unless specifically stated otherwise, is understood with the context as used in general to represent that an item, term, etc., it can be any of X, Y, or Z, or any combination of them (for example, X, Y, and / or Z). Thus, such disjunctive language in general is not intended to, and should not, imply that certain embodiments require at least one of X, at least one of Y, or at least one of Z for each to be present. [000192] Any process descriptions, elements or blocks in the flow diagrams described here and / or represented in the attached figures should be understood as potentially representing modules, segments, or portions of code that include one or more executable instructions for implementing elements or functions specific logic in the process. Alternative implementations are included within the scope of the embodiments described here in which elements or functions can be deleted, executed out of order from the one shown, or discussed, including substantially concurrently or in reverse order, Petition 870190102926, of 10/14/2019, p. 102/118 6/96 depending on the functionality involved as can be understood by the person skilled in the art. [000193] Unless explicitly stated otherwise, articles such as one or one should generally be interpreted to include one or more items described. Appropriately, phrases such as a device configured for are intended to include one or more of the devices mentioned. Such one or more devices mentioned can also be collectively configured to perform the stated recitations. For example, a processor configured to perform recitations A, B and C may include a first processor configured to perform recitation A that works in conjunction with a second processor configured to perform recitations B and C. [000194] It should be emphasized that many variations and modifications can be made to the embodiments described above, the elements of which should be understood to be within other acceptable examples. All such modifications and variations are intended to be included here within the scope of this invention.
权利要求:
Claims (17) [1] 1. Computer system for determining the identities of account holders for collected event information, the computer system characterized by the fact that it comprises: one or more computer hardware processors; and one or more storage devices configured to store software instructions configured to run by one or more hardware computer processors to cause the computer system to: receive, from a plurality of data sources, a plurality of information about the event associated with a corresponding plurality of events; for each information about the event: access a data store including associations between the data sources and the identifier parameters, the identifier parameters including, at least, an indication of one or more identifiers of information included in the case of the corresponding data source; determine, based on at least the data source identifiers of the event information, identifiers included in the event information, as indicated in the data store accessed; and extract identifiers from event information based on at least the corresponding identifier parameters, where a combination of identifiers comprises a unique identity associated with a unique user, access a plurality of hash functions, each associated with a combination of identifiers; Petition 870190073710, of 7/31/2019, p. 23/32 [2] 2/7 for each unique identity, calculate a plurality of hashes by evaluating the plurality of hash functions; based on whether unique identities that share a common calculated hash with a common hash function, selectively group unique identities into sets of unique identities associated with common hashes; for each set of unique identities: apply one or more rules, including criteria for comparing unique identities within the set; and determine a harmonization group of unique identities such as those that fulfill one or more of the rules; merges the corresponding sets of unique identities each including at least one common unique identity to provide one or more built-in sets having no unique identity in common with other built-in sets; for each cast set: determine an inverted personal identifier; and associate the inverted personal identifier for each of the unique identities in the merged set; for each unique identity: identify information about the event associated with at least one of the combinations of identifiers associated with the unique identity; and associate the event information with the identified event information. 2. Computer system according to claim 1, characterized by the fact that the hash functions include at least: a first hash function that evaluates a first combination of at least portions of a first identifier and at least portions of a second identifier extracted from information about the event; and Petition 870190073710, of 7/31/2019, p. 24/32 [3] 3 / Ί a second hash function evaluates a second combination of at least portions of the first identifier and at least portions of a third identifier extracted from information about the event; 3. Computer system according to claim 2, characterized by the fact that the first hash function is selected based on the types of identifiers of one or more of the first identifier or the second identifier. [4] 4. Computer system according to claim 2, characterized by the fact that the first identifier is a user's social security number and the second identifier is a user's last name, and the first combination is a smaller concatenation than all the social security number digits and less than all the characters of the user's last name. [5] 5. Computer system according to claim 2, characterized in that a first set of events includes a plurality of events associated with the first hash and a second set of events includes a plurality of events associated with each second hash. [6] 6. Computer system, according to claim 1, characterized by the fact that the identifiers are selected from: first name, last name, average initial, middle name, date of birth, social security number, taxpayer identification , or national identification. [7] 7. Computer system, according to claim 1, characterized by the fact that the computer system generates an inverted map associating an inverted personal identifier to each of the remaining unique identities in the Petition 870190073710, of 7/31/2019, p. 25/32 i / Ί built-in sets and stores the map in a data store. [8] 8. Computer system, according to claim 1, characterized by the fact that it also comprises, based on the inverted personal identifier assigned to the remaining unique identities, assigning the inverted personal identifier to each of the plurality of information about the event including the remaining unique identities. [9] 9. Computer system according to claim 1, characterized by the fact that the hash functions comprise location-sensitive hash. [10] 10. Computer system according to claim 1, characterized by the fact that one or more matching rules include one or more identity resolution rules that compare u in one or more sets with account holder information in a bank. external data or CRM system to identify matches for one or more rules. [11] 11. Computer system, according to claim 10, characterized by the fact that the identity resolution rules include criteria that indicate criteria of correspondence between the account holder information and the identifiers. [12] 12. Computer system, according to claim 1, Computer system, according to claim 1, characterized by the fact that the fusion of sets comprises, for each one or more sets, repeating the process of: Petition 870190073710, of 7/31/2019, p. 26/32 5/7 pair each unique identity in a set with another unique identity in the set to create pairs of unique identities; determine a single common identity in pairs; and in response to the determination of the common single identity, grouping non-common unique identities from the peers with the common single identity until the lists of unique identities contained within the resulting groups are mutually exclusive among the resulting groups. [13] 13. Computer system according to claim 12, characterized by the fact that the determination of a single common identity in pairs further comprises the screening of unique identities in pairs. [14] 14. Computer system characterized by the fact that it comprises: one or more hardware computer processors; and one or more storage devices configured to store software instructions configured to run by one or more hardware computer processors to cause the computer system to: receive a plurality of events from one or more data sources, where at least some of the events have heterogeneous structures; store events in heterogeneous access structures by external processes; for each of the data sources: identify a domain based, at least in part, on the data structure or data from the data source; and access a vocabulary associated with the identified domain; and Petition 870190073710, of 7/31/2019, p. 27/32 6/1 for each event: determine if the event matches some or all of a vocabulary; associate the event with the corresponding domain or vocabulary; and associate one or more tags with portions of the event based on the given domain. [15] 15. Computer system, according to claim 14, characterized by the fact that it also includes software instructions, which, when executed by one or more hardware processors, are configured to make the computer system: receive a request for information associated with a user on a first domain; run one or more domain analyzers configured to identify events associated with the user having one or more tags associated with the first domain; and provide at least some of the identified events to a requesting entity. [16] 16. Computer system, according to claim 15, characterized by the fact that at least some of the identified events include only the parts of the identified events associated with the one or more tags associated with the first domain. [17] 17. Computer implemented method characterized by the fact that it comprises, by a computer system having one or more computer processors: receiving a plurality of information about the event from one or more data sources, where the plurality of information about the event has heterogeneous data structures; Petition 870190073710, of 7/31/2019, p. 28/32 7/7 determine a domain for each of the one or more data sources based, at least in part, on one or more of the data source, a data structure associated with the data source, or information about the event data source; access a domain dictionary associated with the given domain including domain vocabulary, domain grammar, and / or annotation criteria; write down one or more pieces of information about the event of the given domain with domain vocabulary based on annotation criteria; receive a request for event information or data included information about the event; interpret event information based on one or more portions of annotated event information; and provide the requested data based on the interpretation.
类似技术:
公开号 | 公开日 | 专利标题 BR112019015920A2|2020-03-31|MASSIVE SCALE HETEROGENEOUS DATA INGESTION AND USER RESOLUTION JP6301516B2|2018-03-28|Fuzzy data manipulation Christen2012|The data matching process CN108053545B|2020-05-15|Certificate verification method and device, server and storage medium Xu et al.2016|Exploiting lists of names for named entity identification of financial institutions from unstructured documents US10366351B2|2019-07-30|Information standardization and verification CN110597870A|2019-12-20|Enterprise relation mining method CN112182246B|2022-01-11|Method, system, medium, and application for creating an enterprise representation through big data analysis US20210342640A1|2021-11-04|Automated machine-learning dataset preparation AU2017201787B2|2019-04-04|Fuzzy data operations US20210366055A1|2021-11-25|Systems and methods for generating accurate transaction data and manipulation Lee et al.2015|A study on the problem analysis and improvement plan of the data quality management system of national R&D Data Wong et al.2019|An Efficient Risk Data Learning with LSTM RNN US20210200744A1|2021-07-01|Multi-table data validation tool van der Weide2016|MASTER THESIS INFORMATION SCIENCES JP2014235619A|2014-12-15|Image information processing apparatus and image information processing method Wang2017|Application of Textual Feature Extraction to Corporate Bankruptcy Risk Assessment CN113988062A|2022-01-28|Client unit information semi-automatic verification method based on short text matching Doll et al.0|Linking Deutsche Bundesbank Company Data Technical Report 2021-05
同族专利:
公开号 | 公开日 CN110383319A|2019-10-25| BR112019015920A8|2020-04-28| AU2018215082A1|2019-08-08| WO2018144612A1|2018-08-09| US20180218069A1|2018-08-02| CA3050139A1|2018-08-09| EP3555837A4|2020-09-16| EP3555837A1|2019-10-23| US11227001B2|2022-01-18|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US3316395A|1963-05-23|1967-04-25|Credit Corp Comp|Credit risk computer| CH545650A|1969-12-15|1974-02-15| US4163290A|1974-02-08|1979-07-31|Optical Data System|Holographic verification system with indexed memory| US4305059A|1980-01-03|1981-12-08|Benton William M|Modular funds transfer system| US4346442A|1980-07-29|1982-08-24|Merrill Lynch, Pierce, Fenner & Smith Incorporated|Securities brokerage-cash management system| US4578530A|1981-06-26|1986-03-25|Visa U.S.A., Inc.|End-to-end encryption system and method of operation| US4491725A|1982-09-29|1985-01-01|Pritchard Lawrence E|Medical insurance verification and processing system| US5025138A|1984-02-27|1991-06-18|Vincent Cuervo|Method and system for providing verifiable line of credit information| US4736294A|1985-01-11|1988-04-05|The Royal Bank Of Canada|Data processing methods and apparatus for managing vehicle financing| US4812628A|1985-05-02|1989-03-14|Visa International Service Association|Transaction system with off-line risk assessment| US4774664A|1985-07-01|1988-09-27|Chrysler First Information Technologies Inc.|Financial data processing system and method| US4876592A|1986-03-10|1989-10-24|Henry Von Kohorn|System for merchandising and the evaluation of responses to broadcast transmissions| US4926255A|1986-03-10|1990-05-15|Kohorn H Von|System for evaluation of response to broadcast transmissions| US4827508A|1986-10-14|1989-05-02|Personal Library Software, Inc.|Database usage metering and protection system and method| US4935870A|1986-12-15|1990-06-19|Keycom Electronic Publishing|Apparatus for downloading macro programs and executing a downloaded macro program responding to activation of a single key| US4989141A|1987-06-01|1991-01-29|Corporate Class Software|Computer system for financial analyses and reporting| US4872113A|1987-08-27|1989-10-03|Jbs Associates, Inc.|Credit check scanner data analysis system| US4895518A|1987-11-02|1990-01-23|The University Of Michigan|Computerized diagnostic reasoning evaluation system| US4868570A|1988-01-15|1989-09-19|Arthur D. Little, Inc.|Method and system for storing and retrieving compressed data| US4891503A|1988-03-29|1990-01-02|Gascard, Inc.|Distributed authorization system| JPH01255993A|1988-04-05|1989-10-12|Sharp Corp|Cash register| US5025373A|1988-06-30|1991-06-18|Jml Communications, Inc.|Portable personal-banking system| JP2742057B2|1988-07-14|1998-04-22|シャープ株式会社|Thin film EL panel| US4947028B1|1988-07-19|1993-06-08|U S Order Inc| US5247575A|1988-08-16|1993-09-21|Sprague Peter J|Information distribution system| US5649114A|1989-05-01|1997-07-15|Credit Verification Corporation|Method and system for selective incentive point-of-sale marketing in response to customer shopping histories| US5148365A|1989-08-15|1992-09-15|Dembo Ron S|Scenario optimization| US5202986A|1989-09-28|1993-04-13|Bull Hn Information Systems Inc.|Prefix search tree partial key branching| US5013038A|1989-12-08|1991-05-07|Interactive Network, Inc.|method of evaluating data relating to a common subject| US5220501A|1989-12-08|1993-06-15|Online Resources, Ltd.|Method and system for remote delivery of retail banking services| US5262941A|1990-03-30|1993-11-16|Itt Corporation|Expert credit recommendation method and system| US5276868A|1990-05-23|1994-01-04|Digital Equipment Corp.|Method and apparatus for pointer compression in structured databases| US5216612A|1990-07-16|1993-06-01|R. J. Reynolds Tobacco Company|Intelligent computer integrated maintenance system and method| US5047687A|1990-07-26|1991-09-10|Eastman Kodak Company|Organic electroluminescent device with stabilized cathode| US5427858A|1990-11-30|1995-06-27|Idemitsu Kosan Company Limited|Organic electroluminescence device with a fluorine polymer layer| US5555409A|1990-12-04|1996-09-10|Applied Technical Sysytem, Inc.|Data management systems and methods including creation of composite views of data| US5274547A|1991-01-03|1993-12-28|Credco Of Washington, Inc.|System for generating and transmitting credit reports| US5325509A|1991-03-05|1994-06-28|Zitel Corporation|Method of operating a cache memory including determining desirability of cache ahead or cache behind based on a number of available I/O operations| US5301105A|1991-04-08|1994-04-05|Desmond D. Cummings|All care health management system| US5259766A|1991-12-13|1993-11-09|Educational Testing Service|Method and system for interactive computer science testing, anaylsis and feedback| US5640577A|1991-12-30|1997-06-17|Davox Corporation|Data processing system with automated at least partial forms completion| JPH05346915A|1992-01-30|1993-12-27|Ricoh Co Ltd|Learning machine and neural network, and device and method for data analysis| US6985883B1|1992-02-03|2006-01-10|Ebs Dealing Resources, Inc.|Credit management for electronic brokerage system| US5239462A|1992-02-25|1993-08-24|Creative Solutions Groups, Inc.|Method and apparatus for automatically determining the approval status of a potential borrower| GB9204450D0|1992-03-02|1992-04-15|Ibm|Concurrent access to indexed data files| US5446885A|1992-05-15|1995-08-29|International Business Machines Corporation|Event driven management information system with rule-based applications structure stored in a relational database| US5583760A|1992-05-22|1996-12-10|Beneficial Franchise Company, Inc.|System for establishing and administering funded and post-funded charge accounts| US5336870A|1992-05-26|1994-08-09|Hughes Thomas S|System for remote purchase payment transactions and remote bill payments| US5737732A|1992-07-06|1998-04-07|1St Desk Systems, Inc.|Enhanced metatree data structure for storage indexing and retrieval of information| US5819226A|1992-09-08|1998-10-06|Hnc Software Inc.|Fraud detection using predictive modeling| US5361201A|1992-10-19|1994-11-01|Hnc, Inc.|Real estate appraisal using predictive modeling| US5345595A|1992-11-12|1994-09-06|Coral Systems, Inc.|Apparatus and method for detecting fraudulent telecommunication activity| AU5869194A|1992-12-03|1994-06-22|Frank E. Frost|System of unique number assignment and genealogical data retrieval| US5341429A|1992-12-04|1994-08-23|Testdrive Corporation|Transformation of ephemeral material| US5317636A|1992-12-09|1994-05-31|Arris, Inc.|Method and apparatus for securing credit card transactions| US5832068A|1994-06-01|1998-11-03|Davox Corporation|Data processing system with real time priority updating of data records and dynamic record exclusion| US5842185A|1993-02-18|1998-11-24|Intuit Inc.|Method and system for electronically tracking financial transactions| CN1055596C|1993-02-23|2000-08-16|英国电讯有限公司|Event correlation| KR100297300B1|1993-03-31|2001-10-24|내쉬 로저 윌리엄|Data processing system for communication network| EP0692171B1|1993-03-31|1998-05-06|BRITISH TELECOMMUNICATIONS public limited company|Fraud preventing system and method for a communication network| US5640551A|1993-04-14|1997-06-17|Apple Computer, Inc.|Efficient high speed trie search process| US5560007A|1993-06-30|1996-09-24|Borland International, Inc.|B-tree key-range bit map index optimization of database queries| US5630070A|1993-08-16|1997-05-13|International Business Machines Corporation|Optimization of manufacturing resource planning| EP0715740B1|1993-08-27|2001-07-04|Affinity Technology, Inc.|Closed loop financial transaction method and apparatus| US5940811A|1993-08-27|1999-08-17|Affinity Technology Group, Inc.|Closed loop financial transaction method and apparatus| US5930776A|1993-11-01|1999-07-27|The Golden 1 Credit Union|Lender direct credit evaluation and loan processing system| US5611052A|1993-11-01|1997-03-11|The Golden 1 Credit Union|Lender direct credit evaluation and loan processing system| US5644778A|1993-11-02|1997-07-01|Athena Of North America, Inc.|Medical transaction system| US5881131A|1993-11-16|1999-03-09|Bell Atlantic Network Services, Inc.|Analysis and validation system for provisioning network related facilities| US6345104B1|1994-03-17|2002-02-05|Digimarc Corporation|Digital watermarks and methods for security documents| US5550734A|1993-12-23|1996-08-27|The Pharmacy Fund, Inc.|Computerized healthcare accounts receivable purchasing collections securitization and management system| US6108641A|1994-01-03|2000-08-22|Merrill Lynch, Pierce, Fenner & Smith|Integrated nested account financial system with medical savings subaccount| US5471382A|1994-01-10|1995-11-28|Informed Access Systems, Inc.|Medical network management system and process| US5692107A|1994-03-15|1997-11-25|Lockheed Missiles & Space Company, Inc.|Method for generating predictive models in a computer system| US5584024A|1994-03-24|1996-12-10|Software Ag|Interactive database query system and method for prohibiting the selection of semantically incorrect query parameters| US6513018B1|1994-05-05|2003-01-28|Fair, Isaac And Company, Inc.|Method and apparatus for scoring the likelihood of a desired performance result| US5500513A|1994-05-11|1996-03-19|Visa International|Automated purchasing control system| US5704029A|1994-05-23|1997-12-30|Wright Strategies, Inc.|System and method for completing an electronic form| JP2683870B2|1994-05-23|1997-12-03|日本アイ・ビー・エム株式会社|Character string search system and method| US5832447A|1994-05-24|1998-11-03|Envoy Corporation|Automated system and method for providing real-time verification of health insurance eligibility| DE69524601T2|1994-06-06|2002-08-08|Nokia Networks Oy|METHOD FOR STORING DATA AND RECOVERING DATA AND A STORAGE ARRANGEMENT| US5659725A|1994-06-06|1997-08-19|Lucent Technologies Inc.|Query optimization by predicate move-around| US5590038A|1994-06-20|1996-12-31|Pitroda; Satyan G.|Universal electronic transaction card including receipt storage and system and methods of conducting electronic transactions| US5557514A|1994-06-23|1996-09-17|Medicode, Inc.|Method and system for generating statistically-based medical provider utilization profiles| EP0804769B1|1994-06-30|2000-02-02|International Business Machines Corporation|Variable length data sequence matching method and apparatus| US5577239A|1994-08-10|1996-11-19|Moore; Jeffrey|Chemical structure storage, searching and retrieval system| GB9416673D0|1994-08-17|1994-10-12|Reuters Ltd|Data exchange filtering system| US5768423A|1994-09-02|1998-06-16|Panasonic Technologies Inc.|Trie structure based method and apparatus for indexing and searching handwritten databases with dynamic search sequencing| US5528701A|1994-09-02|1996-06-18|Panasonic Technologies, Inc.|Trie based method for indexing handwritten databases| EP0789883A4|1994-09-28|2002-07-31|Gordon T Brown|Automated accounting system| AU3734395A|1994-10-03|1996-04-26|Helfgott & Karas, P.C.|A database accessing system| US6073104A|1994-11-09|2000-06-06|Field; Richard G.|System for invoice record management and asset-backed commercial paper program management| US5758257A|1994-11-29|1998-05-26|Herz; Frederick|System and method for scheduling broadcast of and access to video programs and other data using customer profiles| US20010014868A1|1997-12-05|2001-08-16|Frederick Herz|System for the automatic determination of customized prices and promotions| US5745706A|1994-12-30|1998-04-28|Wolfberg; Larry|Computer system and related equipment for spending and investment account management| US5732400A|1995-01-04|1998-03-24|Citibank N.A.|System and method for a risk-based purchase of goods| US5835915A|1995-01-24|1998-11-10|Tandem Computer|Remote duplicate database facility with improved throughput and fault tolerance| US5696907A|1995-02-27|1997-12-09|General Electric Company|System and method for performing risk and credit analysis of financial service applications| US5765143A|1995-02-28|1998-06-09|Triad Systems Corporation|Method and system for inventory management| US5553145A|1995-03-21|1996-09-03|Micali; Silvia|Simultaneous electronic transactions with visible trusted parties| EP2270687A2|1995-04-11|2011-01-05|Kinetech, Inc.|Identifying datain a data processing system| US5926800A|1995-04-24|1999-07-20|Minerva, L.P.|System and method for providing a line of credit secured by an assignment of a life insurance policy| US5699527A|1995-05-01|1997-12-16|Davidson; David Edward|Method and system for processing loan| US6070141A|1995-05-08|2000-05-30|Image Data, Llc|System and method of assessing the quality of an identification transaction using an identificaion quality score| US5774883A|1995-05-25|1998-06-30|Andersen; Lloyd R.|Method for selecting a seller's most profitable financing program| US5708422A|1995-05-31|1998-01-13|At&T|Transaction authorization and alert system| US6094643A|1996-06-14|2000-07-25|Card Alert Services, Inc.|System for detecting counterfeit financial card fraud| US5659731A|1995-06-19|1997-08-19|Dun & Bradstreet, Inc.|Method for rating a match for a given entity found in a list of entities| US6115694A|1995-08-25|2000-09-05|General Electric Company|Method for validating specified prices on real property| US7181427B1|1995-09-12|2007-02-20|Jp Morgan Chase Bank, N.A.|Automated credit application system| US5878403A|1995-09-12|1999-03-02|Cmsi|Computer implemented automated credit application analysis and decision routing system| US20040138992A1|1997-09-03|2004-07-15|Defrancesco James|Computer implemented automated credit application analysis and decision routing system| US6321205B1|1995-10-03|2001-11-20|Value Miner, Inc.|Method of and system for modeling and analyzing business improvement programs| US6393406B1|1995-10-03|2002-05-21|Value Mines, Inc.|Method of and system for valving elements of a business enterprise| US5774692A|1995-10-05|1998-06-30|International Business Machines Corporation|Outer quantifiers in object-oriented queries and views of database systems| US5797136A|1995-10-05|1998-08-18|International Business Machines Corporation|Optional quantifiers in relational and object-oriented views of database systems| US5966695A|1995-10-17|1999-10-12|Citibank, N.A.|Sales and marketing support system using a graphical query prospect database| JP3152871B2|1995-11-10|2001-04-03|富士通株式会社|Dictionary search apparatus and method for performing a search using a lattice as a key| US5875236A|1995-11-21|1999-02-23|At&T Corp|Call handling method for credit and fraud management| US6088686A|1995-12-12|2000-07-11|Citibank, N.A.|System and method to performing on-line credit reviews and approvals| US5778367A|1995-12-14|1998-07-07|Network Engineering Software, Inc.|Automated on-line information service and directory, particularly for the world wide web| US5907828A|1995-12-26|1999-05-25|Meyer; Bennett S.|System and method for implementing and administering lender-owned credit life insurance policies| US5822410A|1996-01-11|1998-10-13|Gte Telecom Services Inc|Churn amelioration system and method therefor| US6044352A|1996-01-11|2000-03-28|Deavers; Karl|Method and system for processing and recording the transactions in a medical savings fund account| US5745654A|1996-02-13|1998-04-28|Hnc Software, Inc.|Fast explanations of scored observations| US5933809A|1996-02-29|1999-08-03|Medcom Solutions, Inc.|Computer software for processing medical billing record information| US6067522A|1996-03-01|2000-05-23|Warady; Arthur D.|Health and welfare benefit enrollment and billing system and method| US6038551A|1996-03-11|2000-03-14|Microsoft Corporation|System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer| US6006333A|1996-03-13|1999-12-21|Sun Microsystems, Inc.|Password helper using a client-side master password which automatically presents the appropriate server-side password to a particular remote server| US5842211A|1996-03-15|1998-11-24|Microsoft Corporation|Method and system for transferring a bank file to an application program| US5884287A|1996-04-12|1999-03-16|Lfg, Inc.|System and method for generating and displaying risk and return in an investment portfolio| US5828837A|1996-04-15|1998-10-27|Digilog As|Computer network system and method for efficient information transfer| US6014645A|1996-04-19|2000-01-11|Block Financial Corporation|Real-time financial card application system| US5930759A|1996-04-30|1999-07-27|Symbol Technologies, Inc.|Method and system for processing health care electronic data transactions| US5995922A|1996-05-02|1999-11-30|Microsoft Corporation|Identifying information related to an input word in an electronic dictionary| US5793972A|1996-05-03|1998-08-11|Westminster International Computers Inc.|System and method providing an interactive response to direct mail by creating personalized web page based on URL provided on mail piece| US5739512A|1996-05-30|1998-04-14|Sun Microsystems, Inc.|Digital delivery of receipts| US5950172A|1996-06-07|1999-09-07|Klingman; Edwin E.|Secured electronic rating system| US5825884A|1996-07-01|1998-10-20|Thomson Consumer Electronics|Method and apparatus for operating a transactional server in a proprietary database environment| US6070147A|1996-07-02|2000-05-30|Tecmark Services, Inc.|Customer identification and marketing analysis systems| US5844218A|1996-07-16|1998-12-01|Transaction Technology, Inc.|Method and system for using an application programmable smart card for financial transactions in multiple countries| US5956693A|1996-07-19|1999-09-21|Geerlings; Huib|Computer system for merchant communication to customers| CN1231039B|1996-07-22|2011-08-24|Cyva研究公司|Personal information security and exchange tool| US5861827A|1996-07-24|1999-01-19|Unisys Corporation|Data compression and decompression system with immediate dictionary updating interleaved with string search| US5878337A|1996-08-08|1999-03-02|Joao; Raymond Anthony|Transaction security apparatus and method| US6129273A|1996-08-21|2000-10-10|Shah; Dinesh V.|Method and apparatus for an automated, computer approved, check cashing system| US5819291A|1996-08-23|1998-10-06|General Electric Company|Matching new customer records to existing customer records in a large business database using hash key| US5991411A|1996-10-08|1999-11-23|International Business Machines Corporation|Method and means for limiting adverse use of counterfeit credit cards, access badges, electronic accounts or the like| US5953710A|1996-10-09|1999-09-14|Fleming; Stephen S.|Children's credit or debit card system| US5966699A|1996-10-11|1999-10-12|Zandi; Richard|System and method for conducting loan auction over computer network| US6968319B1|1996-10-18|2005-11-22|Microsoft Corporation|Electronic bill presentment and payment system with bill dispute capabilities| TW396308B|1997-04-01|2000-07-01|Tumbleweed Software Corp|Document delivery system| US6026381A|1996-11-05|2000-02-15|Itx Corporation|Financial market classification system| US8225003B2|1996-11-29|2012-07-17|Ellis Iii Frampton E|Computers and microchips with a portion protected by an internal hardware firewall| US5950179A|1996-12-03|1999-09-07|Providian Financial Corporation|Method and system for issuing a secured credit card| US5822751A|1996-12-16|1998-10-13|Microsoft Corporation|Efficient multidimensional data aggregation operator implementation| US7890581B2|1996-12-16|2011-02-15|Ip Holdings, Inc.|Matching network system for mobile devices| JPH10261009A|1996-12-20|1998-09-29|Ryoichi Ino|Method and device for processing assessment of used car| US6285987B1|1997-01-22|2001-09-04|Engage, Inc.|Internet advertising system| US5961593A|1997-01-22|1999-10-05|Lucent Technologies, Inc.|System and method for providing anonymous personalized browsing by a proxy system in a network| US5893090A|1997-01-31|1999-04-06|Informix Software, Inc.|Method and apparatus for performing an aggregate query in a database system| JPH10222559A|1997-02-10|1998-08-21|Ryoichi Ino|Used car trade-in estimation assessment processing method and used car trade-in estimation assessment processor| US5819029A|1997-02-20|1998-10-06|Brittan Communications International Corp.|Third party verification system and method| JPH10293732A|1997-02-20|1998-11-04|Just Syst Corp|Electronic mail server device, electronic mail system, electronic mail opening confirming method, and computer readable recording medium recorded with program for executing the method by computer| US6178442B1|1997-02-20|2001-01-23|Justsystem Corp.|Electronic mail system and electronic mail access acknowledging method| US5903888A|1997-02-28|1999-05-11|Oracle Corporation|Method and apparatus for using incompatible types of indexes to process a single query| US5970478A|1997-03-12|1999-10-19|Walker Asset Management Limited Partnership|Method, apparatus, and program for customizing credit accounts| FI102424B1|1997-03-14|1998-11-30|Nokia Telecommunications Oy|Method for implementing memory| FI102426B1|1997-03-14|1998-11-30|Nokia Telecommunications Oy|Method for implementing memory| FI102425B1|1997-03-14|1998-11-30|Nokia Telecommunications Oy|Method for implementing memory| US6064987A|1997-03-21|2000-05-16|Walker Digital, Llc|Method and apparatus for providing and processing installment plans at a terminal| US20020169664A1|1997-12-01|2002-11-14|Walker Jay S.|System for providing offers using a billing statement| US6055570A|1997-04-03|2000-04-25|Sun Microsystems, Inc.|Subscribed update monitors| US20010048738A1|1997-04-03|2001-12-06|Sbc Technology Resourses, Inc.|Profile management system including user interface for accessing and maintaining profile data of user subscribed telephony services| US6014632A|1997-04-15|2000-01-11|Financial Growth Resources, Inc.|Apparatus and method for determining insurance benefit amounts based on groupings of long-term care patients with common characteristics| US6014688A|1997-04-25|2000-01-11|Postx Corporation|E-mail program capable of transmitting, opening and presenting a container having digital content using embedded executable software| US5963932A|1997-04-29|1999-10-05|Oracle Corporation|Method and apparatus for transforming queries| KR100747146B1|1997-05-12|2007-09-07|엠엘케이 소프트웨어|Method and Apparatus for the Centralized Collection of Geographically Distributed Data| US7917259B2|1997-05-16|2011-03-29|Snap-On Technologies, Inc.|Distributed vehicle service method and system| US6173284B1|1997-05-20|2001-01-09|University Of Charlotte City Of Charlotte|Systems, methods and computer program products for automatically monitoring police records for a crime profile| US6119103A|1997-05-27|2000-09-12|Visa International Service Association|Financial risk prediction systems and methods therefor| US6018723A|1997-05-27|2000-01-25|Visa International Service Association|Method and apparatus for pattern generation| US5903881A|1997-06-05|1999-05-11|Intuit, Inc.|Personal online banking with integrated online statement and checkbook user interface| US6523022B1|1997-06-09|2003-02-18|Allen Hobbs|Method and apparatus for selectively augmenting retrieved information from a network resource| US6457012B1|1997-06-10|2002-09-24|Pitney Bowes Inc.|Method and system of updating address records utilizing a clientserver interface| US5949044A|1997-06-13|1999-09-07|Walker Asset Management Limited Partnership|Method and apparatus for funds and credit line transfers| US6144948A|1997-06-23|2000-11-07|Walker Digital, Llc|Instant credit card marketing system for reservations for future services| US6029141A|1997-06-27|2000-02-22|Amazon.Com, Inc.|Internet-based customer referral system| US5905985A|1997-06-30|1999-05-18|International Business Machines Corporation|Relational database modifications based on multi-dimensional database modifications| US5822750A|1997-06-30|1998-10-13|International Business Machines Corporation|Optimization of correlated SQL queries in a relational database management system| US6523041B1|1997-07-29|2003-02-18|Acxiom Corporation|Data linking system and method using tokens| US6073140A|1997-07-29|2000-06-06|Acxiom Corporation|Method and system for the creation, enhancement and update of remote data using persistent keys| US6766327B2|1997-07-29|2004-07-20|Acxiom Corporation|Data linking system and method using encoded links| US8001048B2|1997-08-15|2011-08-16|Masi Larry A|Non-cash transaction incentive and commission distribution system| US5940812A|1997-08-19|1999-08-17|Loanmarket Resources, L.L.C.|Apparatus and method for automatically matching a best available loan to a potential borrower via global telecommunications network| US7376603B1|1997-08-19|2008-05-20|Fair Isaac Corporation|Method and system for evaluating customers of a financial institution using customer relationship value tags| US6128603A|1997-09-09|2000-10-03|Dent; Warren T.|Consumer-based system and method for managing and paying electronic billing statements| US5995947A|1997-09-12|1999-11-30|Imx Mortgage Exchange|Interactive mortgage and loan information and real-time trading system| US6601048B1|1997-09-12|2003-07-29|Mci Communications Corporation|System and method for detecting and managing fraud| US5914472A|1997-09-23|1999-06-22|At&T Corp|Credit card spending authorization control system| DE19743267C1|1997-09-30|1998-12-03|Siemens Ag|Address localization in partially occupied, unbalanced binary tree| DE19743266C1|1997-09-30|1999-03-11|Siemens Ag|Address management method in binary search tree| US6304860B1|1997-10-03|2001-10-16|Joseph B. Martin, Jr.|Automated debt payment system and method using ATM network| US6128599A|1997-10-09|2000-10-03|Walker Asset Management Limited Partnership|Method and apparatus for processing customized group reward offers| JP3922482B2|1997-10-14|2007-05-30|ソニー株式会社|Information processing apparatus and method| US20020138390A1|1997-10-14|2002-09-26|R. Raymond May|Systems, methods and computer program products for subject-based addressing in an electronic trading system| US6766946B2|1997-10-16|2004-07-27|Dentsu, Inc.|System for granting permission of user's personal information to third party| US6128602A|1997-10-27|2000-10-03|Bank Of America Corporation|Open-architecture system for real-time consolidation of information from multiple financial systems| US6925441B1|1997-10-27|2005-08-02|Marketswitch Corp.|System and method of targeted marketing| DE69820391D1|1997-10-31|2004-01-22|Sun Microsystems Inc|Prepaid links to network servers| US6269369B1|1997-11-02|2001-07-31|Amazon.Com Holdings, Inc.|Networked personal contact manager| US6128624A|1997-11-12|2000-10-03|Ncr Corporation|Collection and integration of internet and electronic commerce data in a database during web browsing| US6151601A|1997-11-12|2000-11-21|Ncr Corporation|Computer architecture and method for collecting, analyzing and/or transforming internet and/or electronic commerce data for storage into a data storage area| CA2306814A1|1997-11-20|1999-06-03|Xacct Technologies, Inc.|Network accounting and billing system and method| US5857174A|1997-11-21|1999-01-05|Dugan; John W.|Real estate appraisal method and device for standardizing real property marketing analysis by using pre-adjusted appraised comparable sales| US5978780A|1997-11-21|1999-11-02|Craig Michael Watson|Integrated bill consolidation, payment aggregation, and settlement system| GB9725347D0|1997-11-28|1998-01-28|Ncr Int Inc|Database relationship analysis and strategy implementation tool| US7016870B1|1997-12-02|2006-03-21|Financial Engines|Identifying a recommended portfolio of financial products for an investor based upon financial products that are available to the investor| US6021397A|1997-12-02|2000-02-01|Financial Engines, Inc.|Financial advisory system| US5918217A|1997-12-10|1999-06-29|Financial Engines, Inc.|User interface for a financial advisory system| US6044351A|1997-12-18|2000-03-28|Jones; Annie M. W.|Minimum income probability distribution predictor for health care facilities| US6115690A|1997-12-22|2000-09-05|Wong; Charles|Integrated business-to-business Web commerce and business automation system| JP2002501256A|1998-01-22|2002-01-15|オリ・ソフトウェア・ディベロップメント・リミテッド|Database device| US6202053B1|1998-01-23|2001-03-13|First Usa Bank, Na|Method and apparatus for generating segmentation scorecards for evaluating credit risk of bank card applicants| US6249770B1|1998-01-30|2001-06-19|Citibank, N.A.|Method and system of financial spreading and forecasting| US7263497B1|1998-02-06|2007-08-28|Microsoft Corporation|Secure online music distribution system| US6098052A|1998-02-10|2000-08-01|First Usa Bank, N.A.|Credit card collection strategy model| US6208973B1|1998-02-27|2001-03-27|Onehealthbank.Com|Point of service third party financial management vehicle for the healthcare industry| US6546545B1|1998-03-05|2003-04-08|American Management Systems, Inc.|Versioning in a rules based decision management system| US6405173B1|1998-03-05|2002-06-11|American Management Systems, Inc.|Decision management system providing qualitative account/customer assessment via point in time simulation| US5999596A|1998-03-06|1999-12-07|Walker Asset Management Limited|Method and system for controlling authorization of credit card transactions| US20020035530A1|1998-03-12|2002-03-21|Michael A. Ervolini|Computer system and process for a credit-driven analysis of asset-backed securities| US6263337B1|1998-03-17|2001-07-17|Microsoft Corporation|Scalable system for expectation maximization clustering of large databases| US6330575B1|1998-03-31|2001-12-11|International Business Machines Corporation|Web commerce tool kit for distributed payment processing| US6157707A|1998-04-03|2000-12-05|Lucent Technologies Inc.|Automated and selective intervention in transaction-based networks| US6157927A|1998-04-22|2000-12-05|Unisys Corporation|Methods and apparatus for enabling a component in a first transaction processing environment to access a resource in another environment that is under the control of an Xatmi complaint transaction manager| US7076465B1|1998-04-24|2006-07-11|First Data Corporation|Methods for processing a group of accounts corresponding to different products| US20020198806A1|1998-04-24|2002-12-26|First Data Corporation|Systems and methods for accessing and modifying usage parameters associated with a financial transaction account| US7050996B1|1998-04-24|2006-05-23|First Data Corporation|Method for linking accounts corresponding to different products together to create a group| US6424878B1|1998-04-28|2002-07-23|International Business Machines Corporation|Method and apparatus for implementing custom business logic| US6385594B1|1998-05-08|2002-05-07|Lendingtree, Inc.|Method and computer network for co-ordinating a loan over the internet| US6185543B1|1998-05-15|2001-02-06|Marketswitch Corp.|Method and apparatus for determining loan prepayment scores| CA2357007C|1998-05-21|2002-04-02|Equifax Inc.|System and method for authentication of network users with preprocessing| WO1999060482A1|1998-05-21|1999-11-25|Equifax Inc.|System and method for authentication of network users and issuing a digital certificate| AU4091199A|1998-05-21|1999-12-06|Equifax, Inc.|System and method for authentication of network users| US7083087B1|2000-09-18|2006-08-01|E-Micro Corporation|Method and apparatus for associating identification and personal data for multiple magnetic stripe cards or other sources| US6311169B2|1998-06-11|2001-10-30|Consumer Credit Associates, Inc.|On-line consumer credit data reporting system| US6154729A|1998-06-19|2000-11-28|First Data Corporation|Method of reporting merchant information to banks| US20030204752A1|2001-08-13|2003-10-30|Garrison Greg B.|System and method for securely accessing a database from a remote location| US6513041B2|1998-07-08|2003-01-28|Required Technologies, Inc.|Value-instance-connectivity computer-implemented database| US6182142B1|1998-07-10|2001-01-30|Encommerce, Inc.|Distributed access management of information resources| US6453353B1|1998-07-10|2002-09-17|Entrust, Inc.|Role-based navigation of information resources| US6144958A|1998-07-15|2000-11-07|Amazon.Com, Inc.|System and method for correcting spelling errors in search queries| EP0977128A1|1998-07-28|2000-02-02|Matsushita Electric Industrial Co., Ltd.|Method and system for storage and retrieval of multimedia objects by decomposing a tree-structure into a directed graph| WO2000011574A2|1998-08-20|2000-03-02|Equifax, Inc.|System and method for updating a credit information database| US6223171B1|1998-08-25|2001-04-24|Microsoft Corporation|What-if index analysis utility for database systems| US6163770A|1998-08-25|2000-12-19|Financial Growth Resources, Inc.|Computer apparatus and method for generating documentation using a computed value for a claims cost affected by at least one concurrent, different insurance policy for the same insured| US6397197B1|1998-08-26|2002-05-28|E-Lynxx Corporation|Apparatus and method for obtaining lowest bid from information product vendors| US6343279B1|1998-08-26|2002-01-29|American Management Systems, Inc.|System integrating credit card transactions into a financial management system| GB2343763B|1998-09-04|2003-05-21|Shell Services Internat Ltd|Data processing system| US6339769B1|1998-09-14|2002-01-15|International Business Machines Corporation|Query optimization by transparently altering properties of relational tables using materialized views| US6171112B1|1998-09-18|2001-01-09|Wyngate, Inc.|Methods and apparatus for authenticating informed consent| US6253202B1|1998-09-18|2001-06-26|Tacit Knowledge Systems, Inc.|Method, system and apparatus for authorizing access by a first user to a knowledge profile of a second user responsive to an access request from the first user| US6253203B1|1998-10-02|2001-06-26|Ncr Corporation|Privacy-enhanced database| US20010011247A1|1998-10-02|2001-08-02|O'flaherty Kenneth W.|Privacy-enabled loyalty card system and method| US6275824B1|1998-10-02|2001-08-14|Ncr Corporation|System and method for managing data privacy in a database management system| US6448980B1|1998-10-09|2002-09-10|International Business Machines Corporation|Personalizing rich media presentations based on user response to the presentation| US6269325B1|1998-10-21|2001-07-31|Unica Technologies, Inc.|Visual presentation technique for data mining software| US7742966B2|1998-10-24|2010-06-22|Marketcore.Com, Inc.|Efficient market for financial products| AT273538T|1998-10-28|2004-08-15|Verticalone Corp|DEVICE AND METHOD FOR AUTOMATIC AGGREGATION AND DELIVERY OF ELECTRONIC PERSONAL INFORMATION OR DATA| US6871220B1|1998-10-28|2005-03-22|Yodlee, Inc.|System and method for distributed storage and retrieval of personal information| US7236950B2|1998-10-29|2007-06-26|Universal Card Services Corp.|Method and system of combined billing of multiple accounts on a single statement| US6073106A|1998-10-30|2000-06-06|Nehdc, Inc.|Method of managing and controlling access to personal information| US6324524B1|1998-11-03|2001-11-27|Nextcard, Inc.|Method and apparatus for an account level offer of credit and real time balance transfer| US6567791B2|1998-11-03|2003-05-20|Nextcard, Inc.|Method and apparatus for a verifiable on line rejection of an application for credit| US6718313B1|1998-11-03|2004-04-06|Next Card, Inc.|Integrating live chat into an online credit card application| US6405181B2|1998-11-03|2002-06-11|Nextcard, Inc.|Method and apparatus for real time on line credit approval| US7047416B2|1998-11-09|2006-05-16|First Data Corporation|Account-based digital signature system| US20010014878A1|1998-11-09|2001-08-16|Nilotpal Mitra|Transaction method and apparatus| US6263334B1|1998-11-11|2001-07-17|Microsoft Corporation|Density-based indexing method for efficient execution of high dimensional nearest-neighbor queries on large databases| EP1131976A1|1998-11-18|2001-09-12|Lightbridge, Inc.|Event manager for use in fraud detection| WO2000033238A2|1998-11-30|2000-06-08|Siebel Systems, Inc.|Assignment manager| US6574736B1|1998-11-30|2003-06-03|Microsoft Corporation|Composable roles| US6233588B1|1998-12-02|2001-05-15|Lenel Systems International, Inc.|System for security access control in multiple regions| US6298348B1|1998-12-03|2001-10-02|Expanse Networks, Inc.|Consumer profiling system| US7672879B1|1998-12-08|2010-03-02|Yodlee.Com, Inc.|Interactive activity interface for managing personal data and performing transactions over a data packet network| US6802042B2|1999-06-01|2004-10-05|Yodlee.Com, Inc.|Method and apparatus for providing calculated and solution-oriented personalized summary-reports to a user through a single user-interface| US6199077B1|1998-12-08|2001-03-06|Yodlee.Com, Inc.|Server-side web summary generation and presentation| US6842782B1|1998-12-08|2005-01-11|Yodlee.Com, Inc.|Method and apparatus for tracking functional states of a web-site and reporting results to web developers| US6477565B1|1999-06-01|2002-11-05|Yodlee.Com, Inc.|Method and apparatus for restructuring of personalized data for transmission from a data network to connected and portable network appliances| US7085997B1|1998-12-08|2006-08-01|Yodlee.Com|Network-based bookmark management and web-summary system| US20060136595A1|1998-12-08|2006-06-22|Ramakrishna Satyavolu|Network-based verification and fraud-prevention system| US6725425B1|1998-12-08|2004-04-20|Yodlee.Com|Method and apparatus for retrieving information from semi-structured, web-based data sources| US7752535B2|1999-06-01|2010-07-06|Yodlec.com, Inc.|Categorization of summarized information| US6517587B2|1998-12-08|2003-02-11|Yodlee.Com, Inc.|Networked architecture for enabling automated gathering of information from Web servers| US6532450B1|1998-12-09|2003-03-11|American Management Systems, Inc.|Financial management system including an offset payment process| US6542894B1|1998-12-09|2003-04-01|Unica Technologies, Inc.|Execution of multiple models using data segmentation| US6496819B1|1998-12-28|2002-12-17|Oracle Corporation|Rewriting a query in terms of a summary based on functional dependencies and join backs, and based on join derivability| US20030018558A1|1998-12-31|2003-01-23|Heffner Reid R.|System, method and computer program product for online financial products trading| US6233566B1|1998-12-31|2001-05-15|Ultraprise Corporation|System, method and computer program product for online financial products trading| US6496931B1|1998-12-31|2002-12-17|Lucent Technologies Inc.|Anonymous web site user information communication method| US6085242A|1999-01-05|2000-07-04|Chandra; Rohit|Method for managing a repository of user information using a personalized uniform locator| EP1028401A3|1999-02-12|2003-06-25|Citibank, N.A.|Method and system for performing a bankcard transaction| US7117172B1|1999-03-11|2006-10-03|Corecard Software, Inc.|Methods and systems for managing financial accounts| US20040019560A1|1999-03-12|2004-01-29|Evans Scott L.|System and method for debt presentment and resolution| WO2000055778A1|1999-03-16|2000-09-21|Rafael Carey A De|Digital-timeshare-exchange| US6985887B1|1999-03-19|2006-01-10|Suncrest Llc|Apparatus and method for authenticated multi-user personal information database| US6446200B1|1999-03-25|2002-09-03|Nortel Networks Limited|Service management| US20050192008A1|1999-03-31|2005-09-01|Nimesh Desai|System and method for selective information exchange| US6463533B1|1999-04-15|2002-10-08|Webtv Networks, Inc.|System for generating site-specific user aliases in a computer network| US20040083184A1|1999-04-19|2004-04-29|First Data Corporation|Anonymous card transactions| US6430539B1|1999-05-06|2002-08-06|Hnc Software|Predictive modeling of consumer financial behavior| US6708166B1|1999-05-11|2004-03-16|Norbert Technologies, Llc|Method and apparatus for storing data as objects, constructing customized data retrieval and data processing requests, and performing householding queries| US6901383B1|1999-05-20|2005-05-31|Ameritrade Holding Corporation|Stock purchase indices| JP3313084B2|1999-05-24|2002-08-12|和男 原田|USED CAR INFORMATION MANAGEMENT DEVICE, USED VEHICLE ASSESSED PRICE CALCULATING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM CONTAINING CONTROL PROGRAM FOR USED VEHICLE INFORMATION MANAGEMENT| US7389305B1|1999-06-01|2008-06-17|Fair Isaac Corporation|System and method for managing a database| US6976056B1|1999-06-14|2005-12-13|E.Piphany, Inc.|Apparatus and method for company representatives to monitor and establish live contact with visitors to their website| US6748369B2|1999-06-21|2004-06-08|General Electric Company|Method and system for automated property valuation| US6754665B1|1999-06-24|2004-06-22|Sony Corporation|Information processing apparatus, information processing method, and storage medium| US7058817B1|1999-07-02|2006-06-06|The Chase Manhattan Bank|System and method for single sign on process for websites with multiple applications and services| US6601173B1|1999-07-06|2003-07-29|Avaya Technology Corp.|Multi-user internet access and security system| AU5931800A|1999-07-13|2001-01-30|Brian F. Hogan|Method and apparatus for settling claims between health care providers and thirdparty payers using a smart card id card| US6804346B1|1999-07-13|2004-10-12|Interactive Intelligence, Inc.|Staged predictive dialing system| US7395239B1|1999-07-19|2008-07-01|American Business Financial|System and method for automatically processing loan applications| US20060155639A1|2000-06-03|2006-07-13|Joan Lynch|System and method for automated process of deal structuring| US6560593B1|1999-07-20|2003-05-06|Computer Associates Think, Inc.|Method and apparatus for viewing the effect of changes to an index for a database table on an optimization plan for a database query| US7742972B2|1999-07-21|2010-06-22|Longitude Llc|Enhanced parimutuel wagering| US8126794B2|1999-07-21|2012-02-28|Longitude Llc|Replicated derivatives having demand-based, adjustable returns, and trading exchange therefor| AU6229000A|1999-07-26|2001-02-13|Iprivacy Llc|Electronic purchase of goods over a communication network including physical delivery while securing private and personal information| AU6610300A|1999-07-28|2001-02-19|Terrance A. Tomkow|System and method for verifying delivery and integrity of electronic messages| US7379880B1|1999-07-28|2008-05-27|Fair Isaac Corporation|Cascaded profiles for multiple interacting entities| WO2001009752A2|1999-07-30|2001-02-08|Accenture Llp|A system, method and article of manufacture for a host framework design in an e-commerce architecture| US7100195B1|1999-07-30|2006-08-29|Accenture Llp|Managing user information on an e-commerce system| US6505168B1|1999-08-16|2003-01-07|First Usa Bank, Na|System and method for gathering and standardizing customer purchase information for target marketing| US6725381B1|1999-08-31|2004-04-20|Tumbleweed Communications Corp.|Solicited authentication of a specific user| US8600869B1|1999-08-31|2013-12-03|Capital One Financial Corporation|System and method for assigning a line of credit to a credit card account| US6601234B1|1999-08-31|2003-07-29|Accenture Llp|Attribute dictionary in a business logic services environment| US7092898B1|1999-09-01|2006-08-15|Environmental Performance Research Institute, L.L.C.|Communication system and method for sustaining the environment by using the internet| US6446048B1|1999-09-03|2002-09-03|Intuit, Inc.|Web-based entry of financial transaction information and subsequent download of such information| US7171371B2|1999-09-03|2007-01-30|Smg Trust|Method and system for providing pre and post operative support and care| US6618727B1|1999-09-22|2003-09-09|Infoglide Corporation|System and method for performing similarity searching| US7424439B1|1999-09-22|2008-09-09|Microsoft Corporation|Data mining for managing marketing resources| US7949722B1|1999-09-29|2011-05-24|Actv Inc.|Enhanced video programming system and method utilizing user-profile information| US6985898B1|1999-10-01|2006-01-10|Infoglide Corporation|System and method for visually representing a hierarchical database objects and their similarity relationships to other objects in the database| US6665677B1|1999-10-01|2003-12-16|Infoglide Corporation|System and method for transforming a relational database to a hierarchical database| US6792458B1|1999-10-04|2004-09-14|Urchin Software Corporation|System and method for monitoring and analyzing internet traffic| US6965912B2|1999-10-18|2005-11-15|4Yoursoul.Com|Method and apparatus for distribution of greeting cards with electronic commerce transaction| US6988085B2|1999-10-19|2006-01-17|Shad Hedy|System and method for real-time electronic inquiry, delivery, and reporting of credit information| US7133935B2|1999-10-19|2006-11-07|Shad Hedy|System and method for real-time electronic inquiry, delivery, and reporting of credit information| US6374229B1|1999-10-20|2002-04-16|Billingnetwork.Com, Inc.|Integrated internet facilitated billing, data processing and communication system| US7085739B1|1999-10-20|2006-08-01|Accenture Llp|Method and system for facilitating, coordinating and managing a competitive marketplace| US7039656B1|1999-10-20|2006-05-02|Yodlee.Com, Inc.|Method and apparatus for synchronizing data records between a remote device and a data server over a data-packet-network| US6629245B1|1999-10-22|2003-09-30|Arthur D. Stone|Apparatus for stimulating keypad entry of an access code into a keypad type security system| WO2001031543A1|1999-10-26|2001-05-03|Fusz Eugene A|Method and apparatus for anonymous data profiling| US7630986B1|1999-10-27|2009-12-08|Pinpoint, Incorporated|Secure data interchange| US20010044756A1|1999-10-29|2001-11-22|E-Duction, Inc.|Payroll deduction system and method including provision for financing and dispute resolution| US7987431B2|1999-10-29|2011-07-26|Surfcast, Inc.|System and method for simultaneous display of multiple information sources| US7401040B2|1999-11-01|2008-07-15|Accenture Llp|Financial modeling and counseling system| US7315837B2|1999-11-01|2008-01-01|Accenture Llp|Communication interface for a financial modeling and counseling system| AU777445B2|1999-11-09|2004-10-14|Fraud-Check.Com, Inc.|Method and system for detecting fraud in non-personal transactions| AU1802601A|1999-11-26|2001-06-04|Esurance, Inc.|Insurance marketing methods| US6714944B1|1999-11-30|2004-03-30|Verivita Llc|System and method for authenticating and registering personal background data| US6384844B1|1999-12-01|2002-05-07|Efunds Corporation|Method and apparatus for use in entering financial data into an electronic device| WO2001041355A1|1999-12-01|2001-06-07|Efunds Corporation|Method and system for funding a financial account| US20030065563A1|1999-12-01|2003-04-03|Efunds Corporation|Method and apparatus for atm-based cross-selling of products and services| US6910624B1|1999-12-10|2005-06-28|Ntt Docomo, Inc.|Mobile communication terminal and card information reading device| US20020049624A1|1999-12-10|2002-04-25|Raveis William M.|System and method for tracking real estate transactions| US6397224B1|1999-12-10|2002-05-28|Gordon W. Romney|Anonymously linking a plurality of data records| AU2105001A|1999-12-15|2001-06-25|E-Scoring, Inc.|Systems and methods for providing consumers anonymous pre-approved offers from aconsumer-selected group of merchants| US20090313049A1|1999-12-18|2009-12-17|Raymond Anthony Joao|Apparatus and Method for Processing and/or Providing Healthcare Information and/or Healthcare-Related Information| US6734886B1|1999-12-21|2004-05-11|Personalpath Systems, Inc.|Method of customizing a browsing experience on a world-wide-web site| US6622131B1|1999-12-23|2003-09-16|Rategenius, Inc.|Method and system for auctioning loans through a computing system| US6456983B1|1999-12-23|2002-09-24|General Electric Company|Method for managing disposition of delinquent accounts| US7028001B1|1999-12-27|2006-04-11|Motorola, Inc.|System and method for measuring web page advertisement impressions| US6901406B2|1999-12-29|2005-05-31|General Electric Capital Corporation|Methods and systems for accessing multi-dimensional customer data| US7003476B1|1999-12-29|2006-02-21|General Electric Capital Corporation|Methods and systems for defining targeted marketing campaigns using embedded models and historical data| US7003491B2|1999-12-29|2006-02-21|General Electric Capital Corporation|Methods and systems for a collections model for loans| US8078527B2|1999-12-29|2011-12-13|The Western Union Company|Methods and systems for actively optimizing a credit score and managing/reducing debt| US7277869B2|1999-12-29|2007-10-02|General Electric Capital Corporation|Delinquency-moving matrices for visualizing loan collections| US7120599B2|1999-12-30|2006-10-10|Ge Capital Commercial Finance, Inc.|Methods and systems for modeling using classification and regression trees| US7082435B1|2000-01-03|2006-07-25|Oracle International Corporation|Method and mechanism for implementing and accessing virtual database table structures| WO2001050329A2|2000-01-06|2001-07-12|Espeed, Inc.|Systems and methods for monitoring credit of trading counterparties| US6845448B1|2000-01-07|2005-01-18|Pennar Software Corporation|Online repository for personal information| US20020055869A1|2000-01-13|2002-05-09|David Hegg|Housing market analysis method| IL150728D0|2000-01-14|2003-02-12|Catavault|Method and system for secure registration, storage, management and linkage of personal authentication credentials data over a network| CA2331429A1|2000-01-18|2001-07-18|James Stein|System and method for real-time updating service provider ratings| US7328233B2|2000-01-19|2008-02-05|Corybant, Inc.|Method and apparatus for implementing an active information model| US20010034631A1|2000-01-21|2001-10-25|Kiselik Daniel R.|Method and apparatus for the automatic selection of parties to an arrangement between a requestor and a satisfier of selected requirements| US6581059B1|2000-01-24|2003-06-17|International Business Machines Corporation|Digital persona for providing access to personal information| US20030069839A1|2000-01-24|2003-04-10|Whittington Barry R.|Method for confirming and reporting financial data| US20030097342A1|2000-01-24|2003-05-22|Whittingtom Barry R.|Method for verifying employment data| US7191150B1|2000-02-01|2007-03-13|Fair Isaac Corporation|Enhancing delinquent debt collection using statistical models of debt historical information and account events| US6983478B1|2000-02-01|2006-01-03|Bellsouth Intellectual Property Corporation|Method and system for tracking network use| JP2001216391A|2000-02-02|2001-08-10|Seiko Epson Corp|Method and system for managing reception of order| AU3477101A|2000-02-02|2001-08-14|Searchlogic Com Corp|Combinatorial query generating system and method| US20010029470A1|2000-02-03|2001-10-11|R. Steven Schultz|Electronic transaction receipt system and method| US20030018578A1|2000-02-03|2003-01-23|Schultz Roger Stephen|Product registration using an electronically read serial number| US7366977B2|2000-02-04|2008-04-29|Aol Llc A Delaware Limited Liability Company|Method and systems of automated client-server data validation| US7418417B2|2000-02-11|2008-08-26|Goldman Sachs & Co.|Credit index, a system and method for structuring a credit index, and a system and method for operating a credit index| US7437408B2|2000-02-14|2008-10-14|Lockheed Martin Corporation|Information aggregation, processing and distribution system| US6640098B1|2000-02-14|2003-10-28|Action Engine Corporation|System for obtaining service-related information for local interactive wireless devices| US6867789B1|2000-02-15|2005-03-15|Bank One, Delaware, National Association|System and method for generating graphical user interfaces| US7310618B2|2000-02-22|2007-12-18|Lehman Brothers Inc.|Automated loan evaluation system| AU4160701A|2000-02-22|2001-09-03|Insun Yun|Method and system for maximizing credit card purchasing power and minimizing interest costs over the internet| US20010027413A1|2000-02-23|2001-10-04|Bhutta Hafiz Khalid Rehman|System, software and method of evaluating, buying and selling consumer's present and potential buying power through a clearing house| EP1257959A2|2000-02-24|2002-11-20|Sterling Medical Service, Llc.|Health care payment and compliance system| US7487114B2|2000-10-23|2009-02-03|Costar Group, Inc.|System and method for associating aerial images, map features, and information| US7640204B2|2000-10-23|2009-12-29|Costar Group, Inc.|System and method for collection, distribution, and use of information in connection with commercial real estate| US20010049620A1|2000-02-29|2001-12-06|Blasko John P.|Privacy-protected targeting system| US7076462B1|2000-03-02|2006-07-11|Nelson Joseph E|System and method for electronic loan application and for correcting credit report errors| US7124144B2|2000-03-02|2006-10-17|Actuate Corporation|Method and apparatus for storing semi-structured data in a structured manner| JP2001243186A|2000-03-02|2001-09-07|Internet Research Institute Inc|Personal information alteration/distribution method, and personal information alteration/distribution system| US7107241B1|2000-03-10|2006-09-12|Lenders Residential Asset Company Llc|System and method for processing a secured collateral loan| US6904412B1|2000-03-14|2005-06-07|Everbank|Method and apparatus for a mortgage loan originator compliance engine| US7050989B1|2000-03-16|2006-05-23|Coremetrics, Inc.|Electronic commerce personalized content delivery system and method of operation| US7249072B1|2000-03-17|2007-07-24|Eproperty Tax, Inc.|Method and system for managing multi-jurisdictional property tax information| KR20000036498A|2000-03-17|2000-07-05|조항민|Electronic Commece for Trading a Used Car and Equipment| US20020010594A1|2000-03-20|2002-01-24|Levine Michael R.|Method of payment for a healthcare service| KR20000036594A|2000-03-22|2000-07-05|이기원|used-car price & estimate method| US20020188478A1|2000-03-24|2002-12-12|Joe Breeland|Health-care systems and methods| DK1146701T3|2000-03-24|2006-03-27|Allisblue Sa|Procedure for transferring data stored in a database| US6564210B1|2000-03-27|2003-05-13|Virtual Self Ltd.|System and method for searching databases employing user profiles| US20020004774A1|2000-03-27|2002-01-10|Tony Defarlo|Data analysis system for tracking financial trader history and profiling trading behavior| US7249113B1|2000-03-29|2007-07-24|American Express Travel Related Services Company, Inc.|System and method for facilitating the handling of a dispute| JP2001282957A|2000-03-29|2001-10-12|Moody's Investers Service Inc|System and method for analyzing credit risk| US7725385B2|2000-03-29|2010-05-25|American Express Travel Related Services Company, Inc.|System and method for facilitating the handling of a dispute using disparate architectures| US7343295B2|2000-04-05|2008-03-11|Brenda Pomerance|Automated complaint resolution system| US20010044729A1|2000-04-05|2001-11-22|Brenda Pomerance|Automated complaint management system| US7263506B2|2000-04-06|2007-08-28|Fair Isaac Corporation|Identification and management of fraudulent credit/debit card purchases at merchant ecommerce sites| US7848972B1|2000-04-06|2010-12-07|Metavante Corporation|Electronic bill presentment and payment systems and processes| US8145556B2|2000-04-10|2012-03-27|Tealdi Daniel A|Online mortgage approval and settlement system and method therefor| US6839690B1|2000-04-11|2005-01-04|Pitney Bowes Inc.|System for conducting business over the internet| US20010039532A1|2000-04-11|2001-11-08|Coleman William Edward|Chargeback calculator| WO2001080053A2|2000-04-14|2001-10-25|Mathias Client Management Software Company|Method and system for interfacing clients with relationship management accounts and for permissioning marketing| JP2001297141A|2000-04-14|2001-10-26|Toyota Motor Corp|Device and method for calculating vehicle price| US7698217B1|2000-04-20|2010-04-13|Christopher Phillips|Masking private billing data by assigning other billing data to use in commerce with businesses| US6366903B1|2000-04-20|2002-04-02|Microsoft Corporation|Index and materialized view selection for a given workload| US7221377B1|2000-04-24|2007-05-22|Aspect Communications|Apparatus and method for collecting and displaying information in a workflow system| US7426474B2|2000-04-25|2008-09-16|The Rand Corporation|Health cost calculator/flexible spending account calculator| US8244635B2|2000-04-25|2012-08-14|Yodlee.Com, Inc.|System and method for syndicated collection, aggregation and delivery of personal data| WO2001082117A1|2000-04-27|2001-11-01|Webfeat, Inc.|Method and system for retrieving search results from multiple disparate databases| JP2001312586A|2000-04-28|2001-11-09|Tokio Marine & Fire Insurance Co Ltd|Support system for providing of ranking-related service and support method therefor| US6847942B1|2000-05-02|2005-01-25|General Electric Canada Equipment Finance G.P.|Method and apparatus for managing credit inquiries within account receivables| US6807533B1|2000-05-02|2004-10-19|General Electric Canada Equipment Finance G.P.|Web-based method and system for managing account receivables| WO2001084281A2|2000-05-04|2001-11-08|Mighty Net, Incorporated|Card management system and method therefore| US7613671B2|2005-02-15|2009-11-03|Fair Isaac Corporation|Approach for re-using business rules| AU2001259992B2|2000-05-17|2006-02-16|Tvc International Inc.|Continuously updated data processing system and method for measuring and reporting on value creation performance| US20020013827A1|2000-05-18|2002-01-31|Edstrom Claes G.R.|Personal service environment management apparatus and methods| US20030158960A1|2000-05-22|2003-08-21|Engberg Stephan J.|System and method for establishing a privacy communication path| US7401131B2|2000-05-22|2008-07-15|Verizon Business Global Llc|Method and system for implementing improved containers in a global ecosystem of interrelated services| US7295988B1|2000-05-25|2007-11-13|William Reeves|Computer system for optical scanning, storage, organization, authentication and electronic transmitting and receiving of medical records and patient information, and other sensitive legal documents| US7062475B1|2000-05-30|2006-06-13|Alberti Anemometer Llc|Personalized multi-service computer environment| JP2001344463A|2000-05-30|2001-12-14|System Location Co Ltd|Vehicle resale price analysis system| WO2001093133A1|2000-05-30|2001-12-06|System Location Co., Ltd.|Vehicle resale price analysis system| US6865574B1|2000-06-02|2005-03-08|Vignette Corporation|Method for client-side personalization| US6622266B1|2000-06-09|2003-09-16|International Business Machines Corporation|Method for specifying printer alert processing| KR100398020B1|2000-06-12|2003-09-19|지철수|system and method for selling and estimating price of used automobile on network| US6748426B1|2000-06-15|2004-06-08|Murex Securities, Ltd.|System and method for linking information in a global computer network| JP2001357256A|2000-06-15|2001-12-26|Ryoichi Ino|Supply system for used-car assessed value information| KR100348153B1|2000-06-16|2002-08-09|최승환|Method for trade a used car through the internet| US20020042763A1|2000-06-16|2002-04-11|Ranjini Pillay|Apparatus and method for providing trade credit information and/or trade credit insurance information| US7024386B1|2000-06-23|2006-04-04|Ebs Group Limited|Credit handling in an anonymous trading system| US6742001B2|2000-06-29|2004-05-25|Infoglide Corporation|System and method for sharing data between hierarchical databases| US6853997B2|2000-06-29|2005-02-08|Infoglide Corporation|System and method for sharing, mapping, transforming data between relational and hierarchical databases| US6983379B1|2000-06-30|2006-01-03|Hitwise Pty. Ltd.|Method and system for monitoring online behavior at a remote site and creating online behavior profiles| WO2002003219A1|2000-06-30|2002-01-10|Plurimus Corporation|Method and system for monitoring online computer network behavior and creating online behavior profiles| US7249048B1|2000-06-30|2007-07-24|Ncr Corporation|Incorporating predicrive models within interactive business analysis processes| US7035855B1|2000-07-06|2006-04-25|Experian Marketing Solutions, Inc.|Process and system for integrating information from disparate databases for purposes of predicting consumer behavior| US6738759B1|2000-07-07|2004-05-18|Infoglide Corporation, Inc.|System and method for performing similarity searching using pointer optimization| US7640200B2|2000-07-10|2009-12-29|Byallaccounts, Inc.|Financial portfolio management system and method| US6999941B1|2000-07-11|2006-02-14|Amazon.Com, Inc.|Providing gift clustering functionality to assist a user in ordering multiple items for a recipient| US7359880B2|2000-07-11|2008-04-15|Abel Luther C|System and method for consumer control over card-based transactions| WO2002006962A2|2000-07-18|2002-01-24|Delta Air Lines, Inc.|Method and system for conducting a target audit in a high volume transaction environment| US8086508B2|2000-07-24|2011-12-27|Cashedge, Inc.|Method and apparatus for delegating authority| US6523021B1|2000-07-31|2003-02-18|Microsoft Corporation|Business directory search engine| US6873972B1|2000-08-01|2005-03-29|General Electric Company|Systems and methods for credit line monitoring| US7280980B1|2000-08-01|2007-10-09|Fair Isaac Corporation|Algorithm for explaining credit scores| US20040199456A1|2000-08-01|2004-10-07|Andrew Flint|Method and apparatus for explaining credit scores| US7711635B2|2001-02-22|2010-05-04|Fair Isaac Corporation|System and method for helping consumers understand and interpret credit scores| US8078524B2|2001-02-22|2011-12-13|Fair Isaac Corporation|Method and apparatus for explaining credit scores| US20020035520A1|2000-08-02|2002-03-21|Weiss Allan N.|Property rating and ranking system and method| WO2002013065A1|2000-08-03|2002-02-14|Epstein Bruce A|Information collaboration and reliability assessment| JP2004515840A|2000-08-04|2004-05-27|ファーストデータコーポレイション|Method and apparatus for an access authentication entity| WO2002013049A1|2000-08-04|2002-02-14|Infoglide Corporation|System and method for comparing heterogeneous data sources| US7617116B2|2000-08-04|2009-11-10|Athenahealth, Inc.|Practice management and billing automation system| JP2002055997A|2000-08-08|2002-02-20|Tsubasa System Co Ltd|Device and method for retrieving used-car information| US7039176B2|2000-08-14|2006-05-02|Telephony@Work|Call center administration manager with rules-based routing prioritization| US7206768B1|2000-08-14|2007-04-17|Jpmorgan Chase Bank, N.A.|Electronic multiparty accounts receivable and accounts payable system| US6574623B1|2000-08-15|2003-06-03|International Business Machines Corporation|Query transformation and simplification for group by queries with rollup/grouping sets in relational database management systems| US20050154664A1|2000-08-22|2005-07-14|Guy Keith A.|Credit and financial information and management system| KR20030024896A|2000-08-25|2003-03-26|아메리칸 익스프레스 트레블 릴레이티드 서비스즈 컴퍼니, 아이엔씨.|System and method for account reconciliation| US20020026507A1|2000-08-30|2002-02-28|Sears Brent C.|Browser proxy client application service provider interface| US7395232B1|2000-08-30|2008-07-01|Traderisks, Inc.|Method and system for providing financial functions| US20020052836A1|2000-08-31|2002-05-02|Yuri Galperin|Method and apparatus for determining a prepayment score for an individual applicant| US7185016B1|2000-09-01|2007-02-27|Cognos Incorporated|Methods and transformations for transforming metadata model| US6647383B1|2000-09-01|2003-11-11|Lucent Technologies Inc.|System and method for providing interactive dialogue and iterative search functions to find information| US20020091706A1|2000-09-06|2002-07-11|Johnson Controls Technology Company|Vehicle history and personalization information management system and method| JP2002092305A|2000-09-13|2002-03-29|Hitachi Ltd|Score calculating method, and score providing method| US20020033846A1|2000-09-14|2002-03-21|Ramakrishnan Balasubramanian|Apparatus for controlling the display of and for resolving special characters in URLs, URIs & email addresses and mehtod therefor| JP2002163498A|2000-09-14|2002-06-07|Jidosha Ryutsu Hosho:Kk|System and method for assessing buying price of used car| DE10046110B8|2000-09-18|2006-07-06|Siemens Ag|Medical diagnostic device with patient recognition| US7234160B2|2000-09-20|2007-06-19|United Parcel Services Of America, Inc.|Method and apparatus for authorizing the transfer of information| US7383223B1|2000-09-20|2008-06-03|Cashedge, Inc.|Method and apparatus for managing multiple accounts| US7392216B1|2000-09-27|2008-06-24|Ge Capital Mortgage Corporation|Methods and apparatus for utilizing a proportional hazards model to evaluate loan risk| US6691136B2|2000-09-28|2004-02-10|Fair Issac Corporation|Fast data retrieval based upon contiguous consolidation of records according to frequency of access| US6631374B1|2000-09-29|2003-10-07|Oracle Corp.|System and method for providing fine-grained temporal database access| US6723051B2|2000-09-29|2004-04-20|New Health Sciences, Inc.|Systems and methods for assessing vascular health| US8762178B2|2000-09-30|2014-06-24|Advisen, Ltd.|System and method for providing global information on risks and related hedging strategies| US7243075B1|2000-10-03|2007-07-10|Shaffer James D|Real-time process for defining, processing and delivering a highly customized contact list over a network| US8332291B2|2001-10-05|2012-12-11|Argus Information and Advisory Services, Inc.|System and method for monitoring managing and valuing credit accounts| US20030208412A1|2001-09-28|2003-11-06|Hillestad Willam E.|Method and system facilitating transactions between consumers and service providers| US20030115122A1|2000-10-13|2003-06-19|Slater Michael Sol|System and method for alert processing and delivery| GB0025299D0|2000-10-13|2000-11-29|Ibm|Request tracking for analysis of website navigation| RU2181216C1|2000-10-17|2002-04-10|Закрытое акционерное общество "Компания "Русский Стандарт"|Method and system for taking decisions in crediting field| US7983976B2|2000-10-17|2011-07-19|Hedgestreet, Inc.|Methods and apparatus for formulation, initial public or private offering, and secondary market trading of risk management contracts| CA2424588A1|2000-10-18|2002-04-25|Steve Shaya|Intelligent performance-based product recommendation system| US7827097B2|2000-10-19|2010-11-02|Peter K. Trzyna|System for transferring an inbond communication to one of a plurality of credit-counseling agencies| US8209257B2|2000-10-19|2012-06-26|Peter K. Trzyna|System for transfering an inbound communication to one of a plurality of credit-counseling agencies| US7930252B2|2000-10-24|2011-04-19|Google, Inc.|Method and system for sharing anonymous user information| US7383215B1|2000-10-26|2008-06-03|Fair Isaac Corporation|Data center for account management| AU2873902A|2000-10-27|2002-05-06|Entigen Corp|Integrating heterogeneous data and tools| US20020052841A1|2000-10-27|2002-05-02|Guthrie Paul D.|Electronic payment system| US20030158776A1|2000-10-30|2003-08-21|Mark Landesmann|Buyer-driven targeting of purchasing entities| US6865680B1|2000-10-31|2005-03-08|Yodlee.Com, Inc.|Method and apparatus enabling automatic login for wireless internet-capable devices| US20020107849A1|2000-11-01|2002-08-08|Hickey Matthew W.|Scholarship search method and system| US20100299251A1|2000-11-06|2010-11-25|Consumer And Merchant Awareness Foundation|Pay yourself first with revenue generation| US7991688B2|2000-11-14|2011-08-02|Knowledge Works Inc.|Methods and apparatus for automatically exchanging credit information| US7392201B1|2000-11-15|2008-06-24|Trurisk, Llc|Insurance claim forecasting system| JP2002149778A|2000-11-16|2002-05-24|Susumu Fujii|Method and system for calculating buying assessed price| US8862656B2|2000-11-21|2014-10-14|Chironet, Llc|Performance outcomes benchmarking| WO2002042982A2|2000-11-27|2002-05-30|Nextworth, Inc.|Anonymous transaction system| JP2002163449A|2000-11-29|2002-06-07|World Business Management Kk|Method and system for financing and evaluating method for technology-secured credit| CA2327078C|2000-11-30|2005-01-11|Ibm Canada Limited-Ibm Canada Limitee|Secure session management and authentication for web sites| KR20010016349A|2000-12-05|2001-03-05|강욱성|floating vehiclesdatabase business model using on-line and off-line network| US20030009418A1|2000-12-08|2003-01-09|Green Gerald M.|Systems and methods for electronically verifying and processing information| US20020073138A1|2000-12-08|2002-06-13|Gilbert Eric S.|De-identification and linkage of data records| US20020107765A1|2000-12-13|2002-08-08|Timothy Walker|Electronic financing system| CA2432141C|2000-12-18|2010-02-09|Cora Alisuag|Computer oriented record administration system| US7254558B2|2000-12-21|2007-08-07|Ge Corporate Financial Services, Inc.|Method and system for prioritizing debt collections| US7711818B2|2000-12-22|2010-05-04|Oracle International Corporation|Support for multiple data stores| US6782379B2|2000-12-22|2004-08-24|Oblix, Inc.|Preparing output XML based on selected programs and XML templates| US6816871B2|2000-12-22|2004-11-09|Oblix, Inc.|Delivering output XML with dynamically selectable processing| US6928487B2|2000-12-23|2005-08-09|International Business Machines Corporation|Computer system, method, and business method for automating business-to-business communications| JP2002197186A|2000-12-27|2002-07-12|Fujitsu Ltd|Personal information management device| US20020087460A1|2001-01-04|2002-07-04|Hornung Katharine A.|Method for identity theft protection| US7072842B2|2001-01-08|2006-07-04|P5, Inc.|Payment of health care insurance claims using short-term loans| US20020091650A1|2001-01-09|2002-07-11|Ellis Charles V.|Methods of anonymizing private information| US7529698B2|2001-01-16|2009-05-05|Raymond Anthony Joao|Apparatus and method for providing transaction history information, account history information, and/or charge-back information| US7472088B2|2001-01-19|2008-12-30|Jpmorgan Chase Bank N.A.|System and method for offering a financial product| JP2002297934A|2001-01-23|2002-10-11|Mazda Motor Corp|Estimated value providing device, estimated value providing system, estimated value providing method, computer program and computer readable storage medium| US20020099635A1|2001-01-24|2002-07-25|Jack Guiragosian|Control of account utilization| US20020103933A1|2001-01-29|2002-08-01|Ross Garon|Internet-access enabled device personalization| US6947989B2|2001-01-29|2005-09-20|International Business Machines Corporation|System and method for provisioning resources to users based on policies, roles, organizational information, and attributes| US6757689B2|2001-02-02|2004-06-29|Hewlett-Packard Development Company, L.P.|Enabling a zero latency enterprise| US20060014129A1|2001-02-09|2006-01-19|Grow.Net, Inc.|System and method for processing test reports| CA2335395A1|2001-02-09|2002-08-09|Opengraphics Corporation|Controlled access system for online communities| WO2002065240A2|2001-02-09|2002-08-22|Personal Genie, Inc.|Calendaring systems and methods| US6543683B2|2001-02-12|2003-04-08|Ncr Corporation|System and method for providing consumer access to a stored digital receipt generated as a result of a purchase transaction and to business/consumer applications related to the stored digital receipt| US20020111910A1|2001-02-12|2002-08-15|Avenue A, Inc.|Method and facility for preserving internet privacy| US6947897B2|2001-02-13|2005-09-20|Capital One Financial Corporation|System and method for managing consumer information| US7313538B2|2001-02-15|2007-12-25|American Express Travel Related Services Company, Inc.|Transaction tax settlement in personal communication devices| US20020116247A1|2001-02-15|2002-08-22|Tucker Kathleen Ann|Public-initiated incident reporting system and method| US7340434B2|2001-02-16|2008-03-04|Capitol One Financial Corporation|Method and apparatus for monitoring guaranteed loans and notifying guarantors| US7356503B1|2001-02-21|2008-04-08|Fair Isaac And Company, Inc.|ASP business decision engine| US7483842B1|2001-02-21|2009-01-27|The Yacobian Group|System and method for determining recommended action based on measuring and analyzing store and employee data| CA2354372A1|2001-02-23|2002-08-23|Efunds Corporation|Electronic payment and authentication system with debit and identification data verification and electronic check capabilities| US7620592B2|2001-02-26|2009-11-17|First Data Corporation|Tiered processing method and system for identifying and mitigating merchant risk| CA2340562A1|2001-02-28|2002-08-28|Midway Amusement Games, Llc|Tournament network for linking amusement games| JP2002259753A|2001-03-01|2002-09-13|Nissan Motor Co Ltd|Evaluation method and evaluation system for used vehicle| AT345619T|2001-03-08|2006-12-15|Rsa Security Inc|TRANSACTION SYSTEM| US7552080B1|2001-03-09|2009-06-23|Nextcard, Llc|Customized credit offer strategy based on terms specified by an applicant| US7308417B1|2001-03-12|2007-12-11|Novell, Inc.|Method for creating and displaying a multi-dimensional business model comparative static| US7075894B2|2001-03-14|2006-07-11|Fair Isaac Corporation|Algorithm for prioritization of event datum in generic asynchronous telemetric streams| US7302634B2|2001-03-14|2007-11-27|Microsoft Corporation|Schema-based services for identity-based data access| US20020165839A1|2001-03-14|2002-11-07|Taylor Kevin M.|Segmentation and construction of segmentation classifiers| US20020133462A1|2001-03-16|2002-09-19|Koninklijke Philips Electronics N.V.|Instant electronic notification of credit card use serves as deterrent| US20020133365A1|2001-03-19|2002-09-19|William Grey|System and method for aggregating reputational information| US7559217B2|2001-03-21|2009-07-14|Capital One Financial Corporation|Method and system for offering debt recovery products to a customer| US20020138297A1|2001-03-21|2002-09-26|Lee Eugene M.|Apparatus for and method of analyzing intellectual property information| US20020138470A1|2001-03-21|2002-09-26|Inter China Network Software Company Limited|System and method of personal and business web cards| US7246068B2|2001-03-23|2007-07-17|Thomas Jr James C|Computerized system for combining insurance company and credit card transactions| US7065566B2|2001-03-30|2006-06-20|Tonic Software, Inc.|System and method for business systems transactions and infrastructure management| US6738748B2|2001-04-03|2004-05-18|Accenture Llp|Performing predictive maintenance on equipment| US20020156797A1|2001-04-04|2002-10-24|Alorica Inc.|Method, system, and program for customer service and support management| US20020194117A1|2001-04-06|2002-12-19|Oumar Nabe|Methods and systems for customer relationship management| US7216102B2|2001-04-06|2007-05-08|General Electric Capital Corporation|Methods and systems for auctioning of pre-selected customer lists| US7555462B2|2001-04-12|2009-06-30|International Business Machines Corporation|Method and apparatus for incorporating scanned checks into financial applications| US20030041050A1|2001-04-16|2003-02-27|Greg Smith|System and method for web-based marketing and campaign management| US20020156676A1|2001-04-17|2002-10-24|Ahrens John C.|System, method, and apparatus for creating and securely managing accounts holding cash equivalents| US7543739B2|2003-12-17|2009-06-09|Qsecure, Inc.|Automated payment card fraud detection and location| EP1251669A1|2001-04-19|2002-10-23|BRITISH TELECOMMUNICATIONS public limited company|Communications network| GB2395319A|2001-04-19|2004-05-19|Espeed Inc|Electronic asset assignment and tracking| US20030009426A1|2001-04-19|2003-01-09|Marcelo Ruiz-Sanchez|Methods and apparatus for protecting against credit card fraud, check fraud, and identity theft| JP2002323409A|2001-04-26|2002-11-08|Fuji Heavy Ind Ltd|Vehicle control system| US20020184054A1|2001-04-26|2002-12-05|Robert Cox|Two-way practice management data integration| JP2002329055A|2001-04-26|2002-11-15|Dentsu Tec Inc|Customer's property value-evaluating system| US6848542B2|2001-04-27|2005-02-01|Accenture Llp|Method for passive mining of usage information in a location-based services system| US20020165757A1|2001-05-01|2002-11-07|Lisser Charles Steven|Systems, methods and computer program products for comparing business performance| US20040197761A1|2001-05-01|2004-10-07|Boehmer Daniel R.|Method for communicating confidential educational information| US20020198830A1|2001-05-01|2002-12-26|Randell Wayne L.|Method and system for handling disputes in an electronic invoice management system| US20030014336A1|2001-05-04|2003-01-16|Fu-Tak Dao|Analytically determining revenue of internet companies using internet metrics| EP1393179A4|2001-05-08|2005-10-05|Ipool Corp|Privacy protection system and method| US7028052B2|2001-05-10|2006-04-11|Equifax, Inc.|Systems and methods for notifying a consumer of changes made to a credit report| US7542993B2|2001-05-10|2009-06-02|Equifax, Inc.|Systems and methods for notifying a consumer of changes made to a credit report| US20020194120A1|2001-05-11|2002-12-19|Russell Jeffrey J.|Consultative decision engine method and system for financial transactions| WO2002093436A1|2001-05-11|2002-11-21|Swisscom Mobile Ag|Method for transmitting an anonymous request from a consumer to a content or service provider through a telecommunication network| US7249076B1|2001-05-14|2007-07-24|Compucredit Intellectual Property Holdings Corp. Iii|Method for providing credit offering and credit management information services| US20030009415A1|2001-05-14|2003-01-09|Lutnick Howard W.|Methods and systems for trading futures contracts for intangible assets| US20020173994A1|2001-05-21|2002-11-21|Ferguson Joseph M.|Method and apparatus for insuring an insured from identity theft peril and identity reclamation and credit restoration| US6768988B2|2001-05-29|2004-07-27|Sun Microsystems, Inc.|Method and system for incorporating filtered roles in a directory system| US7016907B2|2001-05-29|2006-03-21|Sun Microsystems, Inc.|Enumerated roles in a directory system| US7130839B2|2001-05-29|2006-10-31|Sun Microsystems, Inc.|Method and system for grouping entries in a directory server by group memberships defined by roles| US7171389B2|2001-06-01|2007-01-30|Landnet Corporation|Identification, storage and display of land data on a website| US7325193B2|2001-06-01|2008-01-29|International Business Machines Corporation|Automated management of internet and/or web site content| US7403919B2|2001-06-05|2008-07-22|Goldman Sachs & Co.,|System and method for determining the liquidity of a credit| CA2452697A1|2001-06-05|2002-12-12|Goldman Sachs & Co.|A system and method for determining the liquidity of a credit| US7689506B2|2001-06-07|2010-03-30|Jpmorgan Chase Bank, N.A.|System and method for rapid updating of credit information| US7188169B2|2001-06-08|2007-03-06|Fair Isaac Corporation|System and method for monitoring key performance indicators in a business| US7174302B2|2001-06-11|2007-02-06|Evolution Benefits, Inc.|System and method for processing flexible spending account transactions| US20030002671A1|2001-06-11|2003-01-02|Eastman Kodak Company|Delivery of electronic content over a network using a hybrid optical disk for authentication| US20040006536A1|2001-06-11|2004-01-08|Takashi Kawashima|Electronic money system| US7430532B2|2001-06-12|2008-09-30|Blackrock Financial Management, Inc.|System and method for trade entry| US8407136B2|2001-06-15|2013-03-26|Capital One Financial Corporation|System and methods for providing starter credit card accounts| US7233937B2|2001-06-18|2007-06-19|Siebel Systems, Inc.|Method, apparatus, and system for searching based on filter search specification| US7603317B2|2001-06-19|2009-10-13|International Business Machines Corporation|Using a privacy agreement framework to improve handling of personally identifiable information| US20030046311A1|2001-06-19|2003-03-06|Ryan Baidya|Dynamic search engine and database| US7580884B2|2001-06-25|2009-08-25|Intuit Inc.|Collecting and aggregating creditworthiness data| US7533050B2|2001-06-26|2009-05-12|International Business Machines Corporation|Integration of computer applications and e-business capability| JP2003016261A|2001-07-05|2003-01-17|Asahi Bank Ltd|Total financing managing system, credit scoring deciding system and credit guarantee managing system| US7801828B2|2001-07-06|2010-09-21|Candella George J|Method and system for detecting identity theft in non-personal and personal transactions| US20030229507A1|2001-07-13|2003-12-11|Damir Perge|System and method for matching donors and charities| US7689489B2|2001-07-27|2010-03-30|Scott Fergusson|Methods and systems for assisting financial services firms and their representatives| US20030028477A1|2001-07-31|2003-02-06|Accredited Bankruptcy Services, Inc.|Automated method and system for consumer financial counseling| US8407125B2|2001-07-31|2013-03-26|Ameriprise Financial, Inc.|System and method for providing financial planning and advice| WO2003011410A1|2001-08-03|2003-02-13|Walker Digital, Llc|Method and apparatus for generating directives for personnel| US7747453B2|2001-08-06|2010-06-29|Ulrich Medical Concepts, Inc.|System and method for managing patient encounters| US7243369B2|2001-08-06|2007-07-10|Sun Microsystems, Inc.|Uniform resource locator access management and control system and method| US7672924B1|2001-08-09|2010-03-02|Teradata Us, Inc.|Systems and methods for generating information from a data collection to support decision-making| US20030037054A1|2001-08-09|2003-02-20|International Business Machines Corporation|Method for controlling access to medical information| US20030046112A1|2001-08-09|2003-03-06|International Business Machines Corporation|Method of providing medical financial information| CA2471078A1|2001-08-13|2003-02-27|Electronic Financial Services, Inc.|Loan securitization pool having pre-defined requirements| US8306829B2|2001-08-15|2012-11-06|Chamberlin Edmonds & Associates|Method for determining eligibility for an assistance program| US20030041019A1|2001-08-15|2003-02-27|Vagim James G.|Methods and systems for deal structuring for automobile dealers| US7366694B2|2001-08-16|2008-04-29|Mortgage Grader, Inc.|Credit/financing process| US7680728B2|2001-08-16|2010-03-16|Mortgage Grader, Inc.|Credit/financing process| US6778995B1|2001-08-31|2004-08-17|Attenex Corporation|System and method for efficiently generating cluster groupings in a multi-dimensional concept space| US7313545B2|2001-09-07|2007-12-25|First Data Corporation|System and method for detecting fraudulent calls| US20030050795A1|2001-09-12|2003-03-13|Baldwin Byron S.|Health care debt financing system and method| US7333937B2|2001-09-13|2008-02-19|Ads Responsecorp, Inc.|Health care financing method| US20030055931A1|2001-09-18|2003-03-20|Cravo De Almeida Marcio|Managing a remote device| AU2002353379B2|2001-09-20|2009-08-27|Connexity Audience, Inc.|Method and system for characterization of online behavior| US7373335B2|2001-09-27|2008-05-13|Accudata Technologies, Inc.|System and method for processing database queries| US20030064705A1|2001-10-02|2003-04-03|Desiderio Piero L.|Communication of real estate information utilizing moving map GPS and wireless telecommunications to access MLS and other property specific information from remote databases| US7251625B2|2001-10-02|2007-07-31|Best Buy Enterprise Services, Inc.|Customer identification system and method| US20030069943A1|2001-10-04|2003-04-10|International Business Machines Corporation|Method and apparatus for user personalized and adaptive business processing modeling and integration| US7403923B2|2001-10-12|2008-07-22|Accenture Global Services Gmbh|Debt collection practices| US7546266B2|2001-10-18|2009-06-09|General Electric Company|Method, system, and storage medium for pre-screening customers for credit card approval at a point of sale| US7536346B2|2001-10-29|2009-05-19|Equifax, Inc.|System and method for facilitating reciprocative small business financial information exchanges| US20050097017A1|2001-11-02|2005-05-05|Patricia Hanratty|Financial funding system and methods| US7478157B2|2001-11-07|2009-01-13|International Business Machines Corporation|System, method, and business methods for enforcing privacy preferences on personal-data exchanges across a network| US20040103147A1|2001-11-13|2004-05-27|Flesher Kevin E.|System for enabling collaboration and protecting sensitive data| US7370044B2|2001-11-19|2008-05-06|Equifax, Inc.|System and method for managing and updating information relating to economic entities| US7783562B1|2001-11-21|2010-08-24|Clayton Fixed Income Services Inc.|Credit risk managing loan pools| US7895097B2|2001-11-26|2011-02-22|Hewlett-Packard Development Company, L.P.|Intelligent apparatus, system and method for financial data computation, report remittance and funds transfer over an interactive communications network| US6636803B1|2001-11-30|2003-10-21|Corus Home Realty|Real-estate information search and retrieval system| US6959420B1|2001-11-30|2005-10-25|Microsoft Corporation|Method and system for protecting internet users' privacy by evaluating web site platform for privacy preferences policy| US7552086B1|2001-12-03|2009-06-23|Oracle International Corp.|Methods and systems for managing credit| US8694420B1|2001-12-05|2014-04-08|Experian Information Solutions, Inc.|System and method for outputting a credit risk report based on debit data| US20030110111A1|2001-12-07|2003-06-12|Nalebuff Barry J.|Home equity insurance financial product| US7689451B2|2001-12-12|2010-03-30|Capital One Financial Corporation|Systems and methods for marketing financial products and services| US6826568B2|2001-12-20|2004-11-30|Microsoft Corporation|Methods and system for model matching| US7222369B2|2001-12-20|2007-05-22|Sap Ag|Role-based portal to a workplace system| US20040159700A1|2001-12-26|2004-08-19|Vivotech, Inc.|Method and apparatus for secure import of information into data aggregation program hosted by personal trusted device| US6950807B2|2001-12-31|2005-09-27|Credit Acceptance Corporation|System and method for providing financing| US20030130933A1|2001-12-31|2003-07-10|Xiao-Ming Huang|Method and apparatus for determining a customer's likelihood of paying off a financial account| US7013310B2|2002-01-03|2006-03-14|Cashedge, Inc.|Method and apparatus for retrieving and processing data| WO2004107094A2|2002-01-25|2004-12-09|Seurat Company|Data integration system and method for presenting 360° customer views| US7966192B2|2002-01-30|2011-06-21|First Data Corporation|Method and apparatus for processing electronic dispute data| US7630932B2|2002-01-31|2009-12-08|Transunion Interactive, Inc.|Loan rate and lending information analysis system| US20030154162A1|2002-02-11|2003-08-14|Danaher John Thomas|Credit report retrieval system including voice-based interface| US20030163483A1|2002-02-19|2003-08-28|Abraham Zingher|Method and system for a data service to control access to personal information| US20030163513A1|2002-02-22|2003-08-28|International Business Machines Corporation|Providing role-based views from business web portals| US20030163435A1|2002-02-22|2003-08-28|Payone Bernadino J.|Credit repair services system| JP2003248780A|2002-02-25|2003-09-05|Fujitsu Ltd|Purchase information management system, purchase information anonymization server, and purchase information management method| US6934714B2|2002-03-04|2005-08-23|Intelesis Engineering, Inc.|Method and system for identification and maintenance of families of data records| US6993510B2|2002-03-05|2006-01-31|First Data Corporation|System and method for managing accounts| US7283998B2|2002-09-03|2007-10-16|Infoglide Software Corporation|System and method for classification of documents| US20030171942A1|2002-03-06|2003-09-11|I-Centrix Llc|Contact relationship management system and method| US7188107B2|2002-03-06|2007-03-06|Infoglide Software Corporation|System and method for classification of documents| JP4080769B2|2002-03-15|2008-04-23|ソフトバンクモバイル株式会社|Used car sales brokerage system| US7107285B2|2002-03-16|2006-09-12|Questerra Corporation|Method, system, and program for an improved enterprise spatial system| US20030187780A1|2002-03-27|2003-10-02|First Data Corporation|Systems and methods for managing collections relating to merchant accounts| US20030191731A1|2002-04-04|2003-10-09|Daleen Technologies, Inc.|Method and system for rule based validation prior to committing data to a database system| US7599870B2|2002-04-12|2009-10-06|Glo Software Llc|System, method and framework for generating scenarios| US20030195859A1|2002-04-16|2003-10-16|Lawrence Jason E.|System and methods for authenticating and monitoring transactions| US8571971B1|2002-04-19|2013-10-29|Wells Fargo Bank, N.A.|Credit application status monitor| US20030200151A1|2002-04-22|2003-10-23|John Ellenson|System and method for facilitating the real-time pricing, sale and appraisal of used vehicles| JP4358475B2|2002-04-23|2009-11-04|株式会社金融工学研究所|Credit evaluation system| US8271882B2|2002-04-24|2012-09-18|Sap Ag|Processing life and work events| JP2003316881A|2002-04-26|2003-11-07|Tsubasa System Co Ltd|Used car price retrieval method| US20040010443A1|2002-05-03|2004-01-15|May Andrew W.|Method and financial product for estimating geographic mortgage risk| WO2003096147A2|2002-05-06|2003-11-20|Zoot Enterprises, Inc.|System and method of application processing| US20030212618A1|2002-05-07|2003-11-13|General Electric Capital Corporation|Systems and methods associated with targeted leading indicators| US20030220858A1|2002-05-24|2003-11-27|Duc Lam|Method and system for collaborative vendor reconciliation| US8930263B1|2003-05-30|2015-01-06|Consumerinfo.Com, Inc.|Credit data analysis| US9400589B1|2002-05-30|2016-07-26|Consumerinfo.Com, Inc.|Circular rotational interface for display of consumer credit information| US9710852B1|2002-05-30|2017-07-18|Consumerinfo.Com, Inc.|Credit report timeline user interface| US7593891B2|2003-05-30|2009-09-22|Experian Scorex Llc|Credit score simulation| US7610229B1|2002-05-30|2009-10-27|Experian Information Solutions, Inc.|System and method for interactively simulating a credit-worthiness score| US9569797B1|2002-05-30|2017-02-14|Consumerinfo.Com, Inc.|Systems and methods of presenting simulated credit score information| US8224723B2|2002-05-31|2012-07-17|Jpmorgan Chase Bank, N.A.|Account opening system, method and computer program product| US20040111359A1|2002-06-04|2004-06-10|Hudock John J.|Business method for credit verification and correction| US20040073456A1|2002-06-07|2004-04-15|Gottlieb Joshua L.|Multiple eligibility medical claims recovery system| US20030229580A1|2002-06-10|2003-12-11|David Gass|Method for establishing or improving a credit score or rating for a business| US7444655B2|2002-06-11|2008-10-28|Microsoft Corporation|Anonymous aggregated data collection| US7356516B2|2002-06-13|2008-04-08|Visa U.S.A. Inc.|Method and system for facilitating electronic dispute resolution| US20030233259A1|2002-06-14|2003-12-18|Anthony Mistretta|Medicare enrollment processing| WO2003107135A2|2002-06-17|2003-12-24|Jp Morgan Chase Bank|A system and method for portfolio valuation using an age adjusted delinquency rate| US7505938B2|2002-06-20|2009-03-17|Alliance Data Systems Corporation|Interactive voice response quick credit system and associated methods| US7421442B2|2002-07-02|2008-09-02|American Express Travel Related Services Company, Inc.|System and method for data capture and reporting| US20040010458A1|2002-07-10|2004-01-15|First Data Corporation|Methods and systems for organizing information from multiple sources| US7386554B2|2002-09-03|2008-06-10|Infoglide Software Corporation|Remote scoring and aggregating similarity search engine for use with relational databases| US20040052357A1|2002-07-31|2004-03-18|Xpherix Corporation|Method and apparatus for processing phone numbers| US7945510B1|2002-07-31|2011-05-17|Federal Home Loan Mortgage Corp. |Systems and methods for providing a mortgage with a sliding credit line| US20040030667A1|2002-08-02|2004-02-12|Capital One Financial Corporation|Automated systems and methods for generating statistical models| US20040024709A1|2002-08-05|2004-02-05|Yu Paul D.|System and method for determining the identity of a party associated with a transaction| US20040030621A1|2002-08-07|2004-02-12|Cobb Keith B.|Method of reconciling credit union corporate accounts| JP2004078435A|2002-08-13|2004-03-11|Ibm Japan Ltd|Risk management device, risk management system, risk management method, future expected profit computing method, and program| US7050982B2|2002-08-14|2006-05-23|Veretech, Llc|Lead generation system using buyer criteria| US7234064B2|2002-08-16|2007-06-19|Hx Technologies, Inc.|Methods and systems for managing patient authorizations relating to digital medical data| JP2004096527A|2002-09-02|2004-03-25|Pioneer Electronic Corp|Information recording medium stored with reproduction control program and reproduction control program| US20040044617A1|2002-09-03|2004-03-04|Duojia Lu|Methods and systems for enterprise risk auditing and management| US20040044615A1|2002-09-03|2004-03-04|Xue Xun Sean|Multiple severity and urgency risk events credit scoring system| US20040044673A1|2002-09-04|2004-03-04|Jeffrey Brady|System and method for a planner and a deduplicating planner| US20040049473A1|2002-09-05|2004-03-11|David John Gower|Information analytics systems and methods| US7409369B1|2002-09-05|2008-08-05|Capital One Financial Corporation|Providing a customer one or more options for increasing a line of credit| CA2403300A1|2002-09-12|2004-03-12|Pranil Ram|A method of buying or selling items and a user interface to facilitate the same| US6805287B2|2002-09-12|2004-10-19|American Express Travel Related Services Company, Inc.|System and method for converting a stored value card to a credit card| US7380280B2|2002-09-13|2008-05-27|Sun Microsystems, Inc.|Rights locker for digital content access control| US7356506B2|2002-09-18|2008-04-08|General Electric Capital Corporation|Methods and apparatus for evaluating a credit application| US7792715B1|2002-09-21|2010-09-07|Mighty Net, Incorporated|Method of on-line credit information monitoring and control| US9443268B1|2013-08-16|2016-09-13|Consumerinfo.Com, Inc.|Bill payment and reporting| US20040064402A1|2002-09-27|2004-04-01|Wells Fargo Home Mortgage, Inc.|Method of refinancing a mortgage loan and a closing package for same| US20050004870A1|2002-10-01|2005-01-06|Mcgaughey Richard D.|Methods and apparatus for sharing revenue associated with negative collection information| CA2406565A1|2002-10-04|2004-04-04|Ibm Canada Limited-Ibm Canada Limitee|Method and apparatus for using business rules or user roles for selecting portlets in a web portal| WO2004051399A2|2002-10-10|2004-06-17|Household International, Inc.|Quality control for loan processing| US20040122736A1|2002-10-11|2004-06-24|Bank One, Delaware, N.A.|System and method for granting promotional rewards to credit account holders| US7930195B2|2002-10-11|2011-04-19|Accenture Global Services Limited|Strategic management and budgeting tools| US7043476B2|2002-10-11|2006-05-09|International Business Machines Corporation|Method and apparatus for data mining to discover associations and covariances associated with data| US20040138995A1|2002-10-16|2004-07-15|Fidelity National Financial, Inc.|Preparation of an advanced report for use in assessing credit worthiness of borrower| US20040078324A1|2002-10-16|2004-04-22|Carl Lonnberg|Systems and methods for authenticating a financial account at activation| US20040107250A1|2002-10-21|2004-06-03|Guillermo Marciano|Methods and systems for integrating communication resources using the internet| JP2006511896A|2002-10-21|2006-04-06|スペロ,ラファエル|Receipt and related data capture, storage and processing systems and methods| US7823167B2|2002-10-23|2010-10-26|Genesys Telecommunications Laboratories, Inc.|Method and apparatus for extending contact center configuration data for access by third-party applications over a data network| US7451095B1|2002-10-30|2008-11-11|Freddie Mac|Systems and methods for income scoring| US7395273B2|2002-10-31|2008-07-01|General Electric Company|System providing receipt inspection reporting| US7870078B2|2002-11-01|2011-01-11|Id Insight Incorporated|System, method and computer program product for assessing risk of identity theft| US20040143546A1|2002-11-01|2004-07-22|Wood Jeff A.|Easy user activation of electronic commerce services| US20040088237A1|2002-11-01|2004-05-06|Peter Moenickheim|Identifying candidate billers or payees of a payor| US20040133515A1|2002-11-01|2004-07-08|Mccoy Randal A.|Distributed matching of consumers with billers having bills available for electronic presentment| US7526448B2|2002-11-01|2009-04-28|Checkfree Corporation|Matching consumers with billers having bills available for electronic presentment| US7966255B2|2002-11-01|2011-06-21|American Express Travel Related Services Company, Inc.|Method and apparatus for a no pre-set spending limit transaction card| US20040133513A1|2002-11-01|2004-07-08|Mccoy Randal|Identity protection technique in matching consumers with electronic billers| US20040133509A1|2002-11-01|2004-07-08|Mccoy Randal A.|Technique for making payments for a non-subscriber payor| EP1593063A4|2002-11-04|2006-10-04|Timothy K Ford|Method and system for comprehensive real estate transaction management| WO2004043444A1|2002-11-06|2004-05-27|Mount Sinai School Of Medicine|Treatment of amyotrophic lateral sclerosis with nimesulide| US7900052B2|2002-11-06|2011-03-01|International Business Machines Corporation|Confidential data sharing and anonymous entity resolution| AU2003294245A1|2002-11-08|2004-06-03|Dun And Bradstreet, Inc.|System and method for searching and matching databases| US7240059B2|2002-11-14|2007-07-03|Seisint, Inc.|System and method for configuring a parallel-processing database system| US7720761B2|2002-11-18|2010-05-18|Jpmorgan Chase Bank, N. A.|Method and system for enhancing credit line management, price management and other discretionary levels setting for financial accounts| US20050154665A1|2002-11-22|2005-07-14|Florida Bankers Association, Inc.|Fraud prevention system| US7707059B2|2002-11-22|2010-04-27|Accenture Global Services Gmbh|Adaptive marketing using insight driven customer interaction| US7698163B2|2002-11-22|2010-04-13|Accenture Global Services Gmbh|Multi-dimensional segmentation for use in a customer interaction| US7047251B2|2002-11-22|2006-05-16|Accenture Global Services, Gmbh|Standardized customer application and record for inputting customer data into analytic models| US8290840B2|2002-11-27|2012-10-16|Consumerinfo.Com, Inc.|Method for determining insurance benefits and premiums from dynamic credit information| US20040111292A1|2002-12-06|2004-06-10|Hutchins Patton A.|Healthcare credit evaluation method| US7853984B2|2002-12-11|2010-12-14|Authorize.Net Llc|Methods and systems for authentication| US7305359B2|2002-12-12|2007-12-04|Siemens Medical Solutions Health Services Corporation|Healthcare cash management accounting system| US20040117235A1|2002-12-13|2004-06-17|Nachum Shacham|Automated method and system to recommend one or more supplier-side responses to a transaction request| US7571140B2|2002-12-16|2009-08-04|First Data Corporation|Payment management| US8538840B2|2002-12-20|2013-09-17|Siebel Systems, Inc.|Financial services data model| US7219107B2|2002-12-23|2007-05-15|Sap Ag|Collaborative information spaces| US20040122693A1|2002-12-23|2004-06-24|Michael Hatscher|Community builder| US7246067B2|2002-12-26|2007-07-17|Better Dating Bureau, Inc.|Secure online dating support system and method| WO2004061561A2|2002-12-30|2004-07-22|Fannie Mae|System and method for facilitating delivery of a loan to a secondary mortgage market purchaser| US7593889B2|2002-12-30|2009-09-22|Fannie Mae|System and method for processing data pertaining to financial assets| US20040128228A1|2002-12-30|2004-07-01|Fannie Mae|Servicer compensation system and method| US20040199789A1|2002-12-30|2004-10-07|Shaw Terry D.|Anonymizer data collection device| US20050102226A1|2002-12-30|2005-05-12|Dror Oppenheimer|System and method of accounting for mortgage related transactions| US20040128235A1|2002-12-30|2004-07-01|Fannie Mae|Cash flow aggregation system and method| AU2003298688A1|2002-12-30|2004-07-29|Fannie Mae|System and method for pricing loans in the secondary mortgage market| AU2003291140A1|2002-12-30|2004-07-29|Fannie Mae|System and method for facilitating sale of a loan to a secondary market purchaser| AU2003297296A1|2002-12-30|2004-07-29|Fannie Mae|System and method for creating and tracking agreements for selling loans to a secondary market purchaser| US20040128227A1|2002-12-30|2004-07-01|Fannie Mae|Cash flow system and method| AU2003297295A1|2002-12-30|2004-07-29|Fannie Mae|System and method of processing data pertaining to financial assets| US20040128230A1|2002-12-30|2004-07-01|Fannie Mae|System and method for modifying attribute data pertaining to financial assets in a data processing system| US20040128150A1|2002-12-31|2004-07-01|Lundegren Mark Edward|Methods and structure for collaborative customer account management| JP2004220212A|2003-01-10|2004-08-05|Aruze Corp|Personal information input system and information management server| US20040215556A1|2003-01-10|2004-10-28|Merkley John Eugene|Marketing of an agricultural input via electronic communications| JP4531374B2|2003-01-10|2010-08-25|富士フイルム株式会社|Information holding device| US7536329B2|2003-01-17|2009-05-19|Barra, Inc.|Method and apparatus for an incomplete information model of credit risk| US20040143596A1|2003-01-17|2004-07-22|Mark Sirkin|Content distributon method and apparatus| US20040143478A1|2003-01-18|2004-07-22|Ward Andrew David|Method and process for capuring, storing, processing and displaying customer satisfaction information| US20040141005A1|2003-01-22|2004-07-22|International Business Machines Corporation|System and method for integrating online meeting materials in a place| US7584165B2|2003-01-30|2009-09-01|Landmark Graphics Corporation|Support apparatus, method and system for real time operations and maintenance| CA2418163A1|2003-01-31|2004-07-31|Ibm Canada Limited - Ibm Canada Limitee|Method of query transformation using window aggregation| US7657540B1|2003-02-04|2010-02-02|Seisint, Inc.|Method and system for linking and delinking data records| US7912842B1|2003-02-04|2011-03-22|Lexisnexis Risk Data Management Inc.|Method and system for processing and linking data records| US7720846B1|2003-02-04|2010-05-18|Lexisnexis Risk Data Management, Inc.|System and method of using ghost identifiers in a database| US7403942B1|2003-02-04|2008-07-22|Seisint, Inc.|Method and system for processing data records| US20040153330A1|2003-02-05|2004-08-05|Fidelity National Financial, Inc.|System and method for evaluating future collateral risk quality of real estate| US20040158521A1|2003-02-06|2004-08-12|First Data Corporation|Credit enhancement systems and methods| US20040158523A1|2003-02-06|2004-08-12|Dort David Bogart|Method providing contingency access to valuable accounts or information| US20040158723A1|2003-02-06|2004-08-12|Root David C.|Methods for providing high-integrity enrollments into biometric authentication databases| US7200602B2|2003-02-07|2007-04-03|International Business Machines Corporation|Data set comparison and net change processing| CA2515957C|2003-02-13|2016-07-12|Truelink, Inc.|Methods, apparatuses and systems facilitating seamless, virtual integration of online membership models and services| US20040267660A1|2003-02-21|2004-12-30|Automated Financial Systems, Inc.|Risk management system| US20050289003A1|2004-02-20|2005-12-29|Thompson R M|System and method for direct marketing| US6962336B2|2003-02-25|2005-11-08|Mechel Glass|Credit card debt management board game| JP2004258940A|2003-02-26|2004-09-16|Hitachi Ltd|Method for supervising network of information system and method for weighing operational risk| US7810036B2|2003-02-28|2010-10-05|Bea Systems, Inc.|Systems and methods for personalizing a portal| US20040177030A1|2003-03-03|2004-09-09|Dan Shoham|Psychometric Creditworthiness Scoring for Business Loans| KR20040078798A|2003-03-05|2004-09-13|안상진|Electronic commerce system to seal up information| US8082202B2|2003-03-07|2011-12-20|Market Shield Capital, Llc|Market-indexed mortgage system and method| US8255978B2|2003-03-11|2012-08-28|Innovatrend, Inc.|Verified personal information database| US7577934B2|2003-03-12|2009-08-18|Microsoft Corporation|Framework for modeling and providing runtime behavior for business software applications| US20040220865A1|2003-03-17|2004-11-04|Stephen Lozowski|Financial record processing system| US20040186807A1|2003-03-21|2004-09-23|Nathans Michael G.|Credit data collection method and apparatus| US7451113B1|2003-03-21|2008-11-11|Mighty Net, Inc.|Card management system and method| US20040193535A1|2003-03-26|2004-09-30|Reza Barazesh|Global failure risk score| WO2004088464A2|2003-03-28|2004-10-14|Dun & Bradstreet, Inc.|System and method for data cleansing| US20050137912A1|2003-03-31|2005-06-23|Rao R. B.|Systems and methods for automated classification of health insurance claims to predict claim outcome| US20040190688A1|2003-03-31|2004-09-30|Timmins Timothy A.|Communications methods and systems using voiceprints| US20040193538A1|2003-03-31|2004-09-30|Raines Walter L.|Receipt processing system and method| US20040199462A1|2003-04-02|2004-10-07|Ed Starrs|Fraud control method and system for network transactions| US20040199458A1|2003-04-07|2004-10-07|Thinh Ho|System and method for on-line mortgage services| US6826535B2|2003-04-08|2004-11-30|Richard Glee Wood|Method for reducing fraud in healthcare programs using a smart card| US20060100944A1|2004-11-10|2006-05-11|Lendingtree, Llc|Method and computer network for co-ordinating financial services/products| US20040204948A1|2003-04-09|2004-10-14|Carol Singletary|Internet service for the travel medical professional staffing industry| US20050209880A1|2003-04-24|2005-09-22|Drelicharz Peggy A|Integrated healthcare information system| US7058615B2|2003-04-24|2006-06-06|International Business Machines Corporation|Scheduling for data warehouse ETL processing and data mining execution| US7343567B2|2003-04-25|2008-03-11|Microsoft Corporation|System and method for providing dynamic user information in an interactive display| CA2427209A1|2003-04-30|2004-10-30|Ibm Canada Limited - Ibm Canada Limitee|Optimization of queries on views defined by conditional expressions having mutually exclusive conditions| US7966368B2|2003-05-02|2011-06-21|Microsoft Corporation|Communicating messages over transient connections in a peer-to-peer network| US7299221B2|2003-05-08|2007-11-20|Oracle International Corporation|Progressive relaxation of search criteria| US20040225545A1|2003-05-08|2004-11-11|Turner James E.|System and method for offering unsecured consumer credit transactions| DE10320631A1|2003-05-08|2004-12-09|Wacker-Chemie Gmbh|Organosilicon compounds containing polyalkoxy radicals| US8386377B1|2003-05-12|2013-02-26|Id Analytics, Inc.|System and method for credit scoring using an identity network connectivity| US7562814B1|2003-05-12|2009-07-21|Id Analytics, Inc.|System and method for identity-based fraud detection through graph anomaly detection| US20040230534A1|2003-05-12|2004-11-18|Digital Matrix Systems, Inc.|Encrypted credit application processing system and method| US7684550B2|2003-05-20|2010-03-23|Oc Concepts, Inc.|Customer information system| US20040243588A1|2003-05-29|2004-12-02|Thomas Tanner|Systems and methods for administering a global information database| US7647344B2|2003-05-29|2010-01-12|Experian Marketing Solutions, Inc.|System, method and software for providing persistent entity identification and linking entity information in an integrated data repository| US8306907B2|2003-05-30|2012-11-06|Jpmorgan Chase Bank N.A.|System and method for offering risk-based interest rates in a credit instrument| US20040243450A1|2003-06-02|2004-12-02|Bernard Thomas James|Method, system, and computer program product for real property metric monitoring| US7212995B2|2003-06-02|2007-05-01|Transunion L.L.C.|Loan underwriting system and method| US7617028B2|2003-06-03|2009-11-10|The Cobalt Group, Inc.|Method and system of managing service reminders and promotions using mileage estimates| WO2005001631A2|2003-06-10|2005-01-06|Citibank, N.A.|System and method for analyzing marketing efforts| US20040254935A1|2003-06-12|2004-12-16|International Business Machines Corporation|Method and apparatus for automatic consolidation of personalized dynamic data| EP1639459A2|2003-06-13|2006-03-29|Equifax, Inc.|Systems and processes for automated criteria and attribute generation, searching, auditing and reporting of data| US8700515B2|2003-06-13|2014-04-15|Dun & Bradstreet, Inc.|Security-to-entity crosswalk| US7472275B2|2003-06-13|2008-12-30|Michael Arnouse|System and method of electronic signature verification| US8296229B1|2003-06-17|2012-10-23|Citicorp Credit Services, Inc.|Method and system for associating consumers with purchase transactions| US20050027633A1|2003-06-25|2005-02-03|Joey Fortuna|Application and processes for the review and adjustment of the full lifecycle of consumer finances| WO2005003907A2|2003-06-26|2005-01-13|Ebay Inc.|Method and apparatus to authenticate and authorize user access to a system| US20040267714A1|2003-06-27|2004-12-30|Yuri Frid|Method and system for computerized creating, maintaining, updating, and querying inventory database over the internet for the locations and the obiects with time-dependent and time-independent attributes| US20050080821A1|2003-07-21|2005-04-14|Breil Peter D.|System and method for managing collections accounts| US20050086176A1|2003-07-31|2005-04-21|John Dahlgren|Method and apparatus for loan management using an electronic portal| US20050027983A1|2003-08-01|2005-02-03|Klawon Kevin T.|Integrated verification system| US20090132347A1|2003-08-12|2009-05-21|Russell Wayne Anderson|Systems And Methods For Aggregating And Utilizing Retail Transaction Records At The Customer Level| US7302420B2|2003-08-14|2007-11-27|International Business Machines Corporation|Methods and apparatus for privacy preserving data mining using statistical condensing approach| US7584126B1|2003-08-18|2009-09-01|Capital One Financial Corporation|System and method for managing dedicated use of a credit account| US7624068B1|2003-08-18|2009-11-24|Jpmorgan Chase Bank, N.A.|Method and system for dynamically adjusting discount rates for a card transaction| WO2005022348A2|2003-08-27|2005-03-10|Equifax, Inc.|Application processing and decision systems and processes| US20050055231A1|2003-09-08|2005-03-10|Lee Geoffrey C.|Candidate-initiated background check and verification| EP1515223A1|2003-09-10|2005-03-16|Siemens Aktiengesellschaft|Generation of an object editing platform between two computers using screen-joining| US7756789B2|2003-09-11|2010-07-13|Capital One Financial Corporation|Method and system for debt recovery| CN104200152B|2003-09-12|2020-02-14|Emc公司|System and method for risk-based authentication| US20050125341A1|2003-09-16|2005-06-09|John Miri|Method, system and program for credit risk management utilizing credit exposure| US7835983B2|2003-09-18|2010-11-16|Trans Union Llc|Credit approval monitoring system and method| US8938399B1|2003-09-23|2015-01-20|Edward S. Herman|Method and system for automatically repairing a fraudulent identity theft incident| US20050108631A1|2003-09-29|2005-05-19|Amorin Antonio C.|Method of conducting data quality analysis| US20050071328A1|2003-09-30|2005-03-31|Lawrence Stephen R.|Personalization of web search| US20050080697A1|2003-10-14|2005-04-14|Foss Sheldon H.|System, method and apparatus for providing financial services| US7387238B2|2003-10-14|2008-06-17|Foss Jr Sheldon H|Customer enrollment in a stored value card program| US20050086071A1|2003-10-15|2005-04-21|Fox Charles S.Jr.|System and method for managing patient care| US20050086072A1|2003-10-15|2005-04-21|Fox Charles S.Jr.|Task-based system and method for managing patient care through automated recognition| US8388440B2|2003-10-20|2013-03-05|Sony Computer Entertainment America Llc|Network account linking| US20050086261A1|2003-10-20|2005-04-21|Richard Mammone|Child locator apparatus and method| US7707102B2|2003-10-23|2010-04-27|Rothstein Robert E|Method and apparatus for monitoring the collateral risk analysis commodity lenders| US7444306B2|2003-10-24|2008-10-28|Thomas Bryan Varble|Method and apparatus for the rental or sale, and secure distribution of digital content| JP4059321B2|2003-10-30|2008-03-12|インターナショナル・ビジネス・マシーンズ・コーポレーション|Personal information management system, information processing system, personal information management method, program, and recording medium| US7653688B2|2003-11-05|2010-01-26|Sap Ag|Role-based portal to a workplace system| US20050097039A1|2003-11-05|2005-05-05|Laszlo Kulcsar|Multiple credit card management system| US20050102206A1|2003-11-07|2005-05-12|Serkan Savasoglu|Systems and methods for contingent obligation retainable deduction securities| WO2005048003A2|2003-11-14|2005-05-26|Canada Post Corporation|System and method for coordination of delivery of marketing material| US7527967B2|2003-11-25|2009-05-05|Academia Sinica|Recombinant baculovirus and virus-like particle| US7596512B1|2003-11-26|2009-09-29|Carfax, Inc.|System and method for determining vehicle price adjustment values| US7925579B1|2003-12-01|2011-04-12|Fannie Mae|System and method for processing a loan| US20050125397A1|2003-12-04|2005-06-09|William Gross|Transparent search engine| US20050125350A1|2003-12-09|2005-06-09|Tidwell Lisa C.|Systems and methods for assessing the risk of financial transaction using geographic-related information| US20050130704A1|2003-12-15|2005-06-16|Dun & Bradstreet, Inc.|Credit limit recommendation| US20090164380A1|2006-12-20|2009-06-25|Brown Kerry D|Financial transaction network| WO2005059781A1|2003-12-18|2005-06-30|Fusion Technology Group Pty Ltd|System and method for facilitating trading of debt instruments between parties via an electronic telecommunications network| US7788040B2|2003-12-19|2010-08-31|Siemens Medical Solutions Usa, Inc.|System for managing healthcare data including genomic and other patient specific information| US8036907B2|2003-12-23|2011-10-11|The Dun & Bradstreet Corporation|Method and system for linking business entities using unique identifiers| US7613600B2|2003-12-24|2009-11-03|Sap Ag|Unified personalization| US20060184410A1|2003-12-30|2006-08-17|Shankar Ramamurthy|System and method for capture of user actions and use of capture data in business processes| US20050251474A1|2003-12-31|2005-11-10|Michael Shinn|Method of financing home ownership for sub prime prospective home buyers| JP4069078B2|2004-01-07|2008-03-26|松下電器産業株式会社|DRAM control device and DRAM control method| US20050154769A1|2004-01-13|2005-07-14|Llumen, Inc.|Systems and methods for benchmarking business performance data against aggregated business performance data| US20050165797A1|2004-01-16|2005-07-28|Girish Nair|Profile verification system| US7272591B1|2004-01-22|2007-09-18|Ncr Corporation|Method and system for updating value correlation optimizations| US20050187948A1|2004-02-05|2005-08-25|Arnold Monitzer|Patient admission and information access system| WO2005079417A2|2004-02-17|2005-09-01|Bodybio Inc.|Integrating individualized clinical test results and nutritional treatment| US7647274B2|2004-02-20|2010-01-12|Horizon Digital Finance, Llc|System and method for matching loan consumers and lenders| US7630933B2|2004-02-20|2009-12-08|Horizon Digital Finance, Llc|System and method for matching loan consumers and lenders| US20060184585A1|2004-02-24|2006-08-17|First Data Corporation|Communication point delivery instructions| WO2005086022A1|2004-02-25|2005-09-15|Applied Aged Care Solutions Pty Ltd|Essential data communication system| US7380707B1|2004-02-25|2008-06-03|Jpmorgan Chase Bank, N.A.|Method and system for credit card reimbursements for health care transactions| US7467127B1|2004-02-27|2008-12-16|Hyperion Solutions Corporation|View selection for a multidimensional database| US20050273849A1|2004-03-11|2005-12-08|Aep Networks|Network access using secure tunnel| US9324239B2|2004-03-19|2016-04-26|Sap Se|Authoring tool to structure and create a computer-based training course, and having role-specific functions| US20050209922A1|2004-03-19|2005-09-22|Hofmeister Kurt J|Credit based product marketing method| US8201257B1|2004-03-31|2012-06-12|Mcafee, Inc.|System and method of managing network security risks| KR100701383B1|2004-04-07|2007-03-28|엘지전자 주식회사|Method for synchronizing network profiles stored in a plurality of managing devices in a home network and a network system for the synchronizing method| US7433864B2|2004-04-08|2008-10-07|At&T Intellectual Property I, L.P.|Compiling information obtained by combinatorial searching| US7367011B2|2004-04-13|2008-04-29|International Business Machines Corporation|Method, system and program product for developing a data model in a data mining system| US8165900B2|2004-08-09|2012-04-24|Epic Systems Corporation|Patient check-in/scheduling kiosk| US20050279827A1|2004-04-28|2005-12-22|First Data Corporation|Methods and systems for providing guaranteed merchant transactions| US7958150B2|2004-04-30|2011-06-07|International Business Machines Corporation|Method for implementing fine-grained access control using access restrictions| US7421322B1|2004-04-30|2008-09-02|Carfax, Inc.|System and method for automatic identification of vehicle identification number| US20070067297A1|2004-04-30|2007-03-22|Kublickis Peter J|System and methods for a micropayment-enabled marketplace with permission-based, self-service, precision-targeted delivery of advertising, entertainment and informational content and relationship marketing to anonymous internet users| CA2567391A1|2004-05-18|2005-12-15|Vincent W. Talbert|Method, system and apparatus for providing a variable credit account to a consumer| US7797286B2|2004-05-21|2010-09-14|Sap Ag|System and method for externally providing database optimizer statistics| US20050273423A1|2004-05-28|2005-12-08|Amir Kiai|System, method, and apparatus for a complete mortgage solution for borrowers, mortgage brokers, mortgage bankers, and investors| US7296734B2|2004-06-02|2007-11-20|Robert Kenneth Pliha|Systems and methods for scoring bank customers direct deposit account transaction activity to match financial behavior to specific acquisition, performance and risk events defined by the bank using a decision tree and stochastic process| US7580874B2|2004-06-04|2009-08-25|Black Diamond Capital Management, L.L.C.|Managing an investment vehicle| US7272728B2|2004-06-14|2007-09-18|Iovation, Inc.|Network security and fraud detection system and method| US9213461B2|2004-06-16|2015-12-15|Redfin Corporation|Web-based real estate mapping system| US7314166B2|2004-06-16|2008-01-01|American Express Travel Related Services Company, Inc.|System and method for calculating recommended charge limits| WO2005124619A1|2004-06-18|2005-12-29|George Walter Owen|Credit management system| US8224697B2|2004-06-25|2012-07-17|Sap Aktiengesellschaft|Managing customer entitlements to rewards from multiple entitlement programs| US7672889B2|2004-07-15|2010-03-02|Brooks Kent F|System and method for providing customizable investment tools| US7490356B2|2004-07-20|2009-02-10|Reflectent Software, Inc.|End user risk management| US20060036748A1|2004-07-28|2006-02-16|Nusbaum Edward S|Apparatus and method for computerized information management| US7596716B2|2004-07-29|2009-09-29|Sobha Renaissance Information Technology|Method and system for managing networks| US20080172324A1|2004-08-03|2008-07-17|Tom Johnson|System and method for modifying criteria used with decision engines| US6955294B1|2004-08-06|2005-10-18|Mark Seegar|Apparatus and method for preventing credit card fraud| CA2617235A1|2004-08-06|2006-02-16|Entaire Global Intellectual Property, Inc.|Computer system for actively monitoring and enhancing the collateral security for a portfolio of loans to facilitate financing and securitization| US20060031158A1|2004-08-09|2006-02-09|Suze Orman|Credit card with incentives tied to credit score| US7467401B2|2004-08-12|2008-12-16|Avatier Corporation|User authentication without prior user enrollment| GB2417345A|2004-08-13|2006-02-22|Ebs Group Ltd|Automated trading system| US7298872B2|2004-08-17|2007-11-20|Shawn Glisson|Electronic identification system for form location, organization, and endorsment| US7774270B1|2004-08-19|2010-08-10|Maccloskey Randy|Credit report lock system| US20070093234A1|2004-08-20|2007-04-26|Willis John A|Identify theft protection and notification system| EP1628184A1|2004-08-20|2006-02-22|Basf Aktiengesellschaft|Method and computer system to carry out a network based business process| WO2006018647A1|2004-08-20|2006-02-23|Rhoderick John Kennedy Pugh|Server authentication| US7987124B1|2004-08-20|2011-07-26|Fannie Mae|Method of and system for evaluating an appraisal value associated with a loan| US8533030B1|2004-08-30|2013-09-10|Jpmorgan Chase Bank, N.A.|In-bound telemarketing system for processing customer offers| US7904306B2|2004-09-01|2011-03-08|Search America, Inc.|Method and apparatus for assessing credit for healthcare patients| US7970672B2|2004-09-01|2011-06-28|Metareward, Inc.|Real-time marketing of credit-based goods or services| AU2005285125A1|2004-09-13|2006-03-23|Ixept, Inc.|Purchase notication alert forwarding system and method for preventing fraud| US20060059086A1|2004-09-14|2006-03-16|Michael Mulhern|Computer system and method for marketing and making loans to individuals for retirement savings| US20060059073A1|2004-09-15|2006-03-16|Walzak Rebecca B|System and method for analyzing financial risk| US7543740B2|2004-09-17|2009-06-09|Digital Envoy, Inc.|Fraud analyst smart cookie| US8732004B1|2004-09-22|2014-05-20|Experian Information Solutions, Inc.|Automated analysis of data to generate prospect notifications based on trigger events| WO2006036814A2|2004-09-22|2006-04-06|Citibank, N.A.|Systems and methods for offering credit line products| US7685209B1|2004-09-28|2010-03-23|Yahoo! Inc.|Apparatus and method for normalizing user-selected keywords in a folksonomy| US7593892B2|2004-10-04|2009-09-22|Standard Chartered Plc|Financial institution portal system and method| US20060085454A1|2004-10-06|2006-04-20|Blegen John L|Systems and methods to relate multiple unit level datasets without retention of unit identifiable information| US20060080139A1|2004-10-08|2006-04-13|Woodhaven Health Services|Preadmission health care cost and reimbursement estimation tool| US20060085361A1|2004-10-14|2006-04-20|The Trizetto Group, Inc.|Anomaly detector in a health care system using adapter| TWI256569B|2004-10-14|2006-06-11|Uniminer Inc|System and method of credit scoring by applying data mining method| US20060085334A1|2004-10-14|2006-04-20|Murphy Kevin M|Dynamic financial liability management| US7587366B2|2004-10-14|2009-09-08|International Business Machines Corporation|Secure information vault, exchange and processing system and method| US7818229B2|2004-10-19|2010-10-19|Apollo Enterprise Solutions, Inc.|Method for future payment transactions| US7814005B2|2004-10-19|2010-10-12|Apollo Enterprise Solutions, Inc.|Dynamic credit score alteration| NZ555166A|2004-10-19|2010-05-28|Apollo Entpr Solutions Llc|System and method for resolving transactions| US7848978B2|2004-10-19|2010-12-07|Apollo Enterprise Solutions, Inc.|Enhanced transaction resolution techniques| US20060089842A1|2004-10-22|2006-04-27|Medawar Cherif R|System and method for finding, analyzing, controlling, timing and strategizing real estate investing online| US20060179050A1|2004-10-22|2006-08-10|Giang Phan H|Probabilistic model for record linkage| EP1650701A1|2004-10-22|2006-04-26|The First American Corporation|Product, system and method for certification of closing and mortgage loan fulfillment| JP2008519332A|2004-10-28|2008-06-05|ヤフー!インコーポレイテッド|Search system and method integrating user judgment including a trust network| US8326672B2|2004-10-29|2012-12-04|American Express Travel Related Services Company, Inc.|Using commercial share of wallet in financial databases| US20070016500A1|2004-10-29|2007-01-18|American Express Travel Related Services Co., Inc. A New York Corporation|Using commercial share of wallet to determine insurance risk| US7840484B2|2004-10-29|2010-11-23|American Express Travel Related Services Company, Inc.|Credit score and scorecard development| US8904040B2|2004-10-29|2014-12-02|Go Daddy Operating Company, LLC|Digital identity validation| US7610243B2|2004-10-29|2009-10-27|American Express Travel Related Services Company, Inc.|Method and apparatus for rating asset-backed securities| US7814004B2|2004-10-29|2010-10-12|American Express Travel Related Services Company, Inc.|Method and apparatus for development and use of a credit score based on spend capacity| US7792732B2|2004-10-29|2010-09-07|American Express Travel Related Services Company, Inc.|Using commercial share of wallet to rate investments| US20070226114A1|2004-10-29|2007-09-27|American Express Travel Related Services Co., Inc., A New York Corporation|Using commercial share of wallet to manage investments| US7788147B2|2004-10-29|2010-08-31|American Express Travel Related Services Company, Inc.|Method and apparatus for estimating the spend capacity of consumers| US20070244732A1|2004-10-29|2007-10-18|American Express Travel Related Services Co., Inc., A New York Corporation|Using commercial share of wallet to manage vendors| US7912770B2|2004-10-29|2011-03-22|American Express Travel Related Services Company, Inc.|Method and apparatus for consumer interaction based on spend capacity| US20070016501A1|2004-10-29|2007-01-18|American Express Travel Related Services Co., Inc., A New York Corporation|Using commercial share of wallet to rate business prospects| US8204774B2|2004-10-29|2012-06-19|American Express Travel Related Services Company, Inc.|Estimating the spend capacity of consumer households| US8131614B2|2004-10-29|2012-03-06|American Express Travel Related Services Company, Inc.|Using commercial share of wallet to compile marketing company lists| US8326671B2|2004-10-29|2012-12-04|American Express Travel Related Services Company, Inc.|Using commercial share of wallet to analyze vendors in online marketplaces| US7822665B2|2004-10-29|2010-10-26|American Express Travel Related Services Company, Inc.|Using commercial share of wallet in private equity investments| US20060202012A1|2004-11-12|2006-09-14|David Grano|Secure data processing system, such as a system for detecting fraud and expediting note processing| US20060106670A1|2004-11-15|2006-05-18|Simin Cai|System and method for interactively and progressively determining customer satisfaction within a networked community| US7797725B2|2004-12-02|2010-09-14|Palo Alto Research Center Incorporated|Systems and methods for protecting privacy| US20060129419A1|2004-12-14|2006-06-15|International Business Machines Corporation|Coupling of a business component model to an information technology model| US7480631B1|2004-12-15|2009-01-20|Jpmorgan Chase Bank, N.A.|System and method for detecting and processing fraud and credit abuse| US20060131390A1|2004-12-16|2006-06-22|Kim Mike I|Method and system for providing transaction notification and mobile reply authorization| US8285613B1|2004-12-16|2012-10-09|Coulter David B|System and method for managing consumer information| US20060178971A1|2004-12-20|2006-08-10|Owen John S|Personal credit management and monitoring system and method| JP4208081B2|2004-12-27|2009-01-14|インターナショナル・ビジネス・マシーンズ・コーポレーション|System, web server, method and program for adding personalized value to multiple websites| US20060149674A1|2004-12-30|2006-07-06|Mike Cook|System and method for identity-based fraud detection for transactions using a plurality of historical identity records| CA2532741A1|2005-01-13|2006-07-13|Alfred Hartunian|Method and system for secure information brokering| US8718605B2|2005-01-21|2014-05-06|Resource Consortium Limited|Method and apparatus for providing information in response to the grant of a subscriber's permission| AU2005325726B2|2005-01-25|2011-10-27|I4 Commerce Inc.|Computer-implemented method and system for dynamic consumer rating in a transaction| US20060184440A1|2005-01-26|2006-08-17|Britti Michael A|Risk-based pricing for rental property| US7836111B1|2005-01-31|2010-11-16|Hewlett-Packard Development Company, L.P.|Detecting change in data| US7516134B2|2005-02-01|2009-04-07|Apple Inc.|Controlling access to a database using database internal and external authorization information| US20060173772A1|2005-02-02|2006-08-03|Hayes John B|Systems and methods for automated processing, handling, and facilitating a trade credit transaction| US20060178983A1|2005-02-07|2006-08-10|Robert Nice|Mortgage broker system allowing broker to match mortgagor with multiple lenders and method therefor| US20060195351A1|2005-02-07|2006-08-31|Bagrat Bayburtian|Internet-based system and method for leasing rental property to a prospective tenant based on criminal history| US7979908B2|2005-02-11|2011-07-12|SecureTest Inc.|Method and system of verifying and authenticating background and consumer records| US20060190998A1|2005-02-17|2006-08-24|At&T Corp|Determining firewall rules for reverse firewalls| US8286157B2|2005-02-28|2012-10-09|International Business Machines Corporation|Method, system and program product for managing applications in a shared computer infrastructure| US8005795B2|2005-03-04|2011-08-23|Emc Corporation|Techniques for recording file operations and consistency points for producing a consistent copy| US7983979B2|2005-03-10|2011-07-19|Debix One, Inc.|Method and system for managing account information| US7584127B2|2005-03-11|2009-09-01|Byrne James P|Methods and apparatus for updating credit bureau data| US20060212386A1|2005-03-15|2006-09-21|Willey Dawn M|Credit scoring method and system| US20060212407A1|2005-03-17|2006-09-21|Lyon Dennis B|User authentication and secure transaction system| US8806218B2|2005-03-18|2014-08-12|Microsoft Corporation|Management and security of personal information| US7552089B2|2005-03-23|2009-06-23|Microsoft Corporation|Method and apparatus for automatically applying/linking transactions in a financial management system| US8177121B2|2006-01-13|2012-05-15|Intuit Inc.|Automated aggregation and comparison of business spending relative to similar businesses| US20060233332A1|2005-03-24|2006-10-19|Toms Alvin D|Credit worthiness rating method| US20070027778A1|2005-03-29|2007-02-01|Scott Schellhammer|Single electronic application for originating and controlling workflow for multiple requested products| US20060229799A1|2005-03-31|2006-10-12|Utilimarc, Inc.|Fleet data reporting and benchmarking system and method| US8175889B1|2005-04-06|2012-05-08|Experian Information Solutions, Inc.|Systems and methods for tracking changes of address based on service disconnect/connect data| US20060229961A1|2005-04-08|2006-10-12|Efunds Corporation|Risk evaluation method and system using ACH data| US7908242B1|2005-04-11|2011-03-15|Experian Information Solutions, Inc.|Systems and methods for optimizing database queries| US8756099B2|2005-04-11|2014-06-17|Bill Me Later, Inc.|Consumer processing system and method| US20080195548A1|2005-04-11|2008-08-14|Hyun Gon Chu|License Data Structure and License Issuing Method| US20060235743A1|2005-04-18|2006-10-19|Sbc Knowledge Ventures, Lp|System and method for determining profitability scores| GB2439878B|2005-04-22|2011-03-09|Draeger Medical Systems Inc|A system for managing patient medical data derived from a plurality of medical devices| US7281652B2|2005-05-18|2007-10-16|Foss Jonathan G|Point-of-sale provider evaluation| US8019828B2|2005-05-24|2011-09-13|CRIF Corporation|System and method for defining attributes, decision rules, or both, for remote execution, claim set III| US7853518B2|2005-05-24|2010-12-14|Corelogic Information Solutions, Inc.|Method and apparatus for advanced mortgage diagnostic analytics| US7860782B2|2005-05-24|2010-12-28|Magnum Communications, Limited|System and method for defining attributes, decision rules, or both, for remote execution, claim set IV| US8019843B2|2005-05-24|2011-09-13|CRIF Corporation|System and method for defining attributes, decision rules, or both, for remote execution, claim set II| US8024778B2|2005-05-24|2011-09-20|CRIF Corporation|System and method for defining attributes, decision rules, or both, for remote execution, claim set I| US20060271633A1|2005-05-25|2006-11-30|Adler Robert M|Geographically specific broadcasting system providing advisory alerts of sexual predators| US20060271457A1|2005-05-26|2006-11-30|Romain Martin R|Identity theft monitoring and prevention| US20060277141A1|2005-06-02|2006-12-07|Robert Palmer|Method and system for accelerated collateral review and analysis| US8635094B2|2005-06-03|2014-01-21|International Business Machines Corporation|System and method for dynamically configuring user interface components of a collaborative space based on mapping rules and user roles| US20060277092A1|2005-06-03|2006-12-07|Credigy Technologies, Inc.|System and method for a peer to peer exchange of consumer information| EP1902414A2|2005-06-06|2008-03-26|SMS. AC, Inc.|Billing system and method for micro-transactions| US7904520B2|2005-06-09|2011-03-08|Trueffect, Inc.|First party advertisement serving| US8271364B2|2005-06-09|2012-09-18|Bank Of America Corporation|Method and apparatus for obtaining, organizing, and analyzing multi-source data| US9235560B2|2005-06-09|2016-01-12|International Business Machines Corporation|General purpose annotation service for portal-based applications| CN101194268A|2005-06-10|2008-06-04|松下电器产业株式会社|Information security device| US7731086B2|2005-06-10|2010-06-08|American Express Travel Related Services Company, Inc.|System and method for mass transit merchant payment| US7571473B1|2005-06-10|2009-08-04|Sprint Communications Company L.P.|Identity management system and method| US9792351B2|2005-06-10|2017-10-17|International Business Machines Corporation|Tolerant and extensible discovery of relationships in data using structural information and data analysis| US20060287764A1|2005-06-20|2006-12-21|Kraft Harold H|Privacy Information Reporting Systems Event Classification and Reporting| US20060294199A1|2005-06-24|2006-12-28|The Zeppo Network, Inc.|Systems and Methods for Providing A Foundational Web Platform| US7676418B1|2005-06-24|2010-03-09|Experian Information Solutions, Inc.|Credit portfolio benchmarking system and method| WO2007002611A2|2005-06-27|2007-01-04|Tc3 Health, Llc|Healthcare claims loss control systems and methods| US7603701B2|2005-06-30|2009-10-13|Xerox Corporation|Tools for access to databases via internet protocol networks| US8660919B2|2005-07-01|2014-02-25|Consumerinfo.Com, Inc.|Method for monitoring and reporting changes in the value of real estate| US20070011020A1|2005-07-05|2007-01-11|Martin Anthony G|Categorization of locations and documents in a computer network| WO2007004158A2|2005-07-05|2007-01-11|Kreditinform Limited|Debtor management system and method| US20070011083A1|2005-07-08|2007-01-11|Bird Alan H|System and method of processing asset financing transactions| US20070016518A1|2005-07-12|2007-01-18|Paul Atkinson|System and process for providing loans or other financing instruments| US20070016517A1|2005-07-18|2007-01-18|Solomon Barbara J|Method and apparatus for enabling mortgage officer to increase credit score to secure loan for consumer| US20070022141A1|2005-07-19|2007-01-25|Singleton Shawn D|System and method for acquiring and assembling real property data| US8234498B2|2005-07-25|2012-07-31|Britti Michael A|Screening using a personal identification code| US8418254B2|2005-07-25|2013-04-09|Transunion Rental Screening Solutions, Inc.|Applicant screening| US7556192B2|2005-08-04|2009-07-07|Capital One Financial Corp.|Systems and methods for decisioning or approving a financial credit account based on a customer's check-writing behavior| US20070033139A1|2005-08-08|2007-02-08|Brad Handler|Credit applicant and user authentication solution| US7832006B2|2005-08-09|2010-11-09|At&T Intellectual Property I, L.P.|System and method for providing network security| US7860805B2|2005-08-15|2010-12-28|Personal Estate Manager, Inc.|Computer-implemented personal information manager method and system| US7805345B2|2005-08-26|2010-09-28|Sas Institute Inc.|Computer-implemented lending analysis systems and methods| US7925578B1|2005-08-26|2011-04-12|Jpmorgan Chase Bank, N.A.|Systems and methods for performing scoring optimization| US7575154B2|2005-08-26|2009-08-18|Reagan Inventions, Llc|System and method for issuing and managing a plurality of credit card accounts| US7896242B2|2005-08-26|2011-03-01|Reagan Inventions, Llc|System and method for issuing digital receipts for purchase transactions over a network| US7383988B2|2005-08-31|2008-06-10|Metavante Corporation|System and method for locking and unlocking a financial account card| US20080208726A1|2005-09-02|2008-08-28|Intersections, Inc.|Method and system for securing credit accounts| US7333635B2|2005-09-02|2008-02-19|Intersections Inc.|Method and system for confirming personal identity| US8725537B2|2005-09-12|2014-05-13|Mymedicalrecords, Inc.|Method and system for providing online records| US7933632B2|2005-09-16|2011-04-26|Microsoft Corporation|Tile space user interface for mobile devices| US8090818B2|2005-09-19|2012-01-03|Sap Ag|Generation of customized client proxies| US20070083463A1|2005-09-20|2007-04-12|Kraft Harold H|Fraud alert switch| US7672833B2|2005-09-22|2010-03-02|Fair Isaac Corporation|Method and apparatus for automatic entity disambiguation| US8306986B2|2005-09-30|2012-11-06|American Express Travel Related Services Company, Inc.|Method, system, and computer program product for linking customer information| US20070192121A1|2005-09-30|2007-08-16|American Express Travel Related Services Company, Inc. a New York Corporation|Method, system, and computer program product for honoring customer privacy and preferences| US7668769B2|2005-10-04|2010-02-23|Basepoint Analytics, LLC|System and method of detecting fraud| US8396747B2|2005-10-07|2013-03-12|Kemesa Inc.|Identity theft and fraud protection system and method| US20090150238A1|2005-10-12|2009-06-11|Adam Marsh|System and method for the reversible leasing of anonymous user data in exchange for personalized content including targeted advertisements| US20080228541A1|2005-10-24|2008-09-18|Megdal Myles G|Using commercial share of wallet in private equity investments| US20080221972A1|2005-10-24|2008-09-11|Megdal Myles G|Method and apparatus for determining credit characteristics of a consumer| US20080228556A1|2005-10-24|2008-09-18|Megdal Myles G|Method and apparatus for consumer interaction based on spend capacity| US20080222015A1|2005-10-24|2008-09-11|Megdal Myles G|Method and apparatus for development and use of a credit score based on spend capacity| US20080222027A1|2005-10-24|2008-09-11|Megdal Myles G|Credit score and scorecard development| US8346638B2|2005-10-26|2013-01-01|Capital One Financial Corporation|Systems and methods for processing transaction data to perform a merchant chargeback| US8161044B2|2005-10-26|2012-04-17|International Business Machines Corporation|Faceted web searches of user preferred categories throughout one or more taxonomies| CA2527538A1|2005-11-12|2007-05-14|Matt Celano|Method and apparatus for a consumer interactive credit report analysis and score reconciliation adaptive education and counseling system| WO2008054403A2|2005-11-15|2008-05-08|Probity Laboratories, Llc|Systems and methods for identifying, categorizing, quantifying and evaluating risks| US8560350B2|2005-11-22|2013-10-15|Robert J. Nadai|Method, system and computer program product for generating an electronic bill having optimized insurance claim items| US20070266439A1|2005-11-30|2007-11-15|Harold Kraft|Privacy management and transaction system| US8560456B2|2005-12-02|2013-10-15|Credigy Technologies, Inc.|System and method for an anonymous exchange of private data| US20070156554A1|2005-12-19|2007-07-05|Nikoley Richard L|Method and Apparatus for Computer Assisted Settling of Debts| US7512627B2|2005-12-30|2009-03-31|Ecollege.Com|Business intelligence data repository and data management system and method| US8180779B2|2005-12-30|2012-05-15|Sap Ag|System and method for using external references to validate a data object's classification / consolidation| WO2007076878A1|2005-12-30|2007-07-12|Telecom Italia S.P.A.|Method and system for protected distribution of digitalized sensitive information| US20070156589A1|2005-12-30|2007-07-05|Randy Zimler|Integrating personalized listings of media content into an electronic program guide| US7480550B2|2005-12-31|2009-01-20|General Motors Corporation|Vehicle email notification using data from different sources| US20070299699A1|2006-01-05|2007-12-27|Thomas Policelli|System and Method for Initiation of Payment of a Member Cost Portion of Insurance Claim Expenses| US8280805B1|2006-01-10|2012-10-02|Sas Institute Inc.|Computer-implemented risk evaluation systems and methods| US8099341B2|2006-01-31|2012-01-17|OREM Financial Services Inc.|System and method for recreating tax documents| US20070198407A1|2006-02-02|2007-08-23|Ntelagent|Self-pay management system and process for the healthcare industry| US7475118B2|2006-02-03|2009-01-06|International Business Machines Corporation|Method for recognizing spam email| US8135642B1|2006-02-07|2012-03-13|Sprint Communications Company L.P.|Resilient messaging system and method| US20070185797A1|2006-02-08|2007-08-09|Rodney Robinson|System and method for aggregating financial data for loan processing| WO2007095157A2|2006-02-10|2007-08-23|Fair Isaac Corporation|Consumer-driven secure sockets layer modulator| CA2541763A1|2006-02-15|2007-08-15|Sharon Rossmark|Retail deployment model| US8219535B1|2006-02-15|2012-07-10|Allstate Insurance Company|Retail deployment model| US20070220611A1|2006-02-17|2007-09-20|Ari Socolow|Methods and systems for sharing or presenting member information| US20070208640A1|2006-02-21|2007-09-06|Banasiak Michael J|Method and Apparatus for Assessing Debtor Payment Behavior| US20070198336A1|2006-02-23|2007-08-23|Thompson Mark A|Automated system and method for discounting medical bills of self-pay patients| US7996252B2|2006-03-02|2011-08-09|Global Customer Satisfaction System, Llc|Global customer satisfaction system| US20070250459A1|2006-03-07|2007-10-25|Intersections, Inc.|Method and system for conducting background investigations| US7711636B2|2006-03-10|2010-05-04|Experian Information Solutions, Inc.|Systems and methods for analyzing data| US7801812B2|2006-03-10|2010-09-21|Vantagescore Solutions, Llc|Methods and systems for characteristic leveling| US7587348B2|2006-03-24|2009-09-08|Basepoint Analytics Llc|System and method of detecting mortgage related fraud| US7966256B2|2006-09-22|2011-06-21|Corelogic Information Solutions, Inc.|Methods and systems of predicting mortgage payment risk| US7747480B1|2006-03-31|2010-06-29|Sas Institute Inc.|Asset repository hub| US7841008B1|2006-03-31|2010-11-23|Symantec Corporation|Threat personalization| US20070279187A1|2006-04-12|2007-12-06|Shahrooz Hekmatpour|Patient information storage and access| WO2007120844A2|2006-04-12|2007-10-25|Chimento Marc A|System and method for screening for fraud in commercial transactions| US7620597B2|2006-04-14|2009-11-17|Eze Ike O|Online loan application system using borrower profile information| US20070250441A1|2006-04-25|2007-10-25|Uc Group Limited|Systems and methods for determining regulations governing financial transactions conducted over a network| US20070265929A1|2006-04-26|2007-11-15|Michael Danninger|Portal page personalization offering a direct manipulative window arrangement functionality| WO2007127338A2|2006-04-27|2007-11-08|Bruce Reiner|Apparatus and method for utilizing biometrics in medical applications| US20070261114A1|2006-05-01|2007-11-08|Michael Pomerantsev|Method and system for secure sharing of personal information| US20070282729A1|2006-05-01|2007-12-06|Carpenter Steven A|Consolidation, sharing and analysis of investment information| US20070288360A1|2006-05-03|2007-12-13|Joseph Guy Seeklus|Systems and methods for determining whether candidates are qualified for desired situations based on credit scores| US8364711B2|2006-05-09|2013-01-29|John Wilkins|Contact management system and method| US8490869B2|2006-05-10|2013-07-23|Metavante Corporation|Predictive authorization techniques| CA2651644C|2006-05-10|2016-09-13|Margaret Atwood|System, method and computer program, for enabling entry into transactions on a remote basis| US7676410B2|2006-05-12|2010-03-09|CompuCredit Intellectual Property Holdings, Corp. II|Combined debt consolidation and settlement program| US20080195600A1|2006-05-25|2008-08-14|Deakter Daniel R|Efficient method and process to search structured and unstructured patient data to match patients to clinical drug/device trials| US20080033750A1|2006-06-02|2008-02-07|The Trizetto Group, Inc.|Enhanced systems and methods for processing of healthcare information| US9195985B2|2006-06-08|2015-11-24|Iii Holdings 1, Llc|Method, system, and computer program product for customer-level data verification| US20080015977A1|2006-06-14|2008-01-17|Curry Edith L|Methods of deterring fraud and other improper behaviors within an organization| US20070299759A1|2006-06-19|2007-12-27|Keith Kelly|Hybrid mortgage-backed investment vehicles and a method and system for hybrid mortgage-backed investment vehicles| US8099309B1|2006-06-26|2012-01-17|Intuit Inc.|Financial policy change advisor| US7880728B2|2006-06-29|2011-02-01|Microsoft Corporation|Application switching via a touch screen interface| US7644042B2|2006-06-30|2010-01-05|Amazon Technologies, Inc.|Managing transaction accounts| US20080015979A1|2006-07-14|2008-01-17|Shanan Bentley|Web-based searching for payment card products with credit pre-approvals| US8161544B2|2006-07-19|2012-04-17|Microsoft Corporation|Trusted communications with child processes| US7860769B2|2006-07-26|2010-12-28|Benson Tracey M|Method of preventing fraud| US7725421B1|2006-07-26|2010-05-25|Google Inc.|Duplicate account identification and scoring| US20080033742A1|2006-08-03|2008-02-07|National Surveys Online, Llc.|Method and apparatus for performing employee background checks| WO2008021061A2|2006-08-07|2008-02-21|Dominium Intellectual Property Inc.|Method and system for providing multiple funding sources for health insurance and other expenditures| US8086523B1|2006-08-07|2011-12-27|Allstate Insurance Company|Credit risk evaluation with responsibility factors| US8407250B2|2006-08-07|2013-03-26|Google Inc.|Distribution of content document to varying users with security customization and scalability| US20080109875A1|2006-08-08|2008-05-08|Harold Kraft|Identity information services, methods, devices, and systems background| US8458062B2|2006-08-11|2013-06-04|Capital One Financial Corporation|Real-time product matching| US7966647B1|2006-08-16|2011-06-21|Resource Consortium Limited|Sending personal information to a personal information aggregator| CA2660493A1|2006-08-17|2008-02-21|Experian Information Solutions, Inc.|System and method for providing a score for a used vehicle| US20080052224A1|2006-08-24|2008-02-28|Peerfunds, Inc.|Method for guaranteeing a peer-to-peer loan| US8788701B1|2006-08-25|2014-07-22|Fair Isaac Corporation|Systems and methods for real-time determination of the semantics of a data stream| US8321342B2|2006-08-28|2012-11-27|Choicepay, Inc.|Method and system to accept and settle transaction payments for an unbanked consumer| US7874008B2|2006-08-29|2011-01-18|International Business Machines Corporation|Dynamically configuring extensible role based manageable resources| US8375041B2|2006-08-31|2013-02-12|Business Objects Software Ltd|Processing queries against combinations of data sources| US8799148B2|2006-08-31|2014-08-05|Rohan K. K. Chandran|Systems and methods of ranking a plurality of credit card offers| US8027888B2|2006-08-31|2011-09-27|Experian Interactive Innovation Center, Llc|Online credit card prescreen systems and methods| US20080059224A1|2006-08-31|2008-03-06|Schechter Alan M|Systems and methods for developing a comprehensive patient health profile| US20080059364A1|2006-09-01|2008-03-06|Tidwell Lisa C|Systems and methods for performing a financial trustworthiness assessment| US8564544B2|2006-09-06|2013-10-22|Apple Inc.|Touch screen device, method, and graphical user interface for customizing display of content category icons| US7606752B2|2006-09-07|2009-10-20|Yodlee Inc.|Host exchange in bill paying services| US20080071577A1|2006-09-14|2008-03-20|Highley Robert D|Dual-access security system for medical records| US20080086400A1|2006-09-15|2008-04-10|Carrie Ardelean|Computerized credit services information management system| US7912865B2|2006-09-26|2011-03-22|Experian Marketing Solutions, Inc.|System and method for linking multiple entities in a business database| US7730078B2|2006-09-28|2010-06-01|Honeywell Hommed Llc|Role based internet access and individualized role based systems to view biometric information| CN101536520B|2006-09-29|2011-08-17|联合视频制品公司|Management of profiles for interactive media guidance applications| US10068220B2|2006-10-11|2018-09-04|Visa International Service Association|Systems and methods for brokered authentication express seller links| US20080097768A1|2006-10-12|2008-04-24|Godshalk Edward L|Visualization of future value predictions and supporting factors for real estate by block| US7860786B2|2006-10-17|2010-12-28|Canopy Acquisition, Llc|Predictive score for lending| US8219771B2|2006-10-19|2012-07-10|Stmicroelectronics, Inc.|Portable device for storing private information such as medical, financial or emergency information| US7797252B2|2006-10-20|2010-09-14|Target Brands, Inc.|Service plan product and associated system| GB0621189D0|2006-10-25|2006-12-06|Payfont Ltd|Secure authentication and payment system| EP2084891A2|2006-10-27|2009-08-05|American Family Life Assurance Company Of Columbus|Method and apparatus for sending notification to subscribers of requested events| US8566227B2|2006-10-27|2013-10-22|Ccip Corp.|Location based credit| US7899750B1|2006-10-31|2011-03-01|Intuit Inc.|Goal orientated computing system implemented financial management using projected balances| US7752236B2|2006-11-03|2010-07-06|Experian Marketing Solutions, Inc.|Systems and methods of enhancing leads| US8645853B2|2006-11-03|2014-02-04|Business Objects Software Ltd.|Displaying visualizations linked to one or more data source queries| KR100851976B1|2006-11-14|2008-08-12|삼성전자주식회사|Method and apparatus of transmitting private information using trusted apparatus| US20080120133A1|2006-11-21|2008-05-22|Arvind Krishnaswami|Method for predicting the payment of medical debt| US7830382B2|2006-11-22|2010-11-09|Fair Isaac Corporation|Method and apparatus for automated graphing of trends in massive, real-world databases| US8239250B2|2006-12-01|2012-08-07|American Express Travel Related Services Company, Inc.|Industry size of wallet| US7953627B2|2006-12-12|2011-05-31|American Express Travel Related Services Company, Inc.|Identifying industry segments with highest potential for new customers or new spending for current customers| US7958126B2|2006-12-19|2011-06-07|Yahoo! Inc.|Techniques for including collection items in search results| US8781951B2|2006-12-22|2014-07-15|Ccip Corp.|Method and system for providing financing| US7818231B2|2006-12-27|2010-10-19|Financial Management Systems, Inc.|Method to increase collection of debts owed to government| US7844604B2|2006-12-28|2010-11-30|Yahoo! Inc.|Automatically generating user-customized notifications of changes in a social network system| US8010403B2|2006-12-29|2011-08-30|American Express Travel Related Services Company, Inc.|System and method for targeting transaction account product holders to receive upgraded transaction account products| WO2008085204A2|2006-12-29|2008-07-17|Prodea Systems, Inc.|Demarcation between application service provider and user in multi-services gateway device at user premises| US20080162383A1|2007-01-02|2008-07-03|Kraft Harold H|Methods, systems, and apparatus for lowering the incidence of identity theft in consumer credit transactions| US8655939B2|2007-01-05|2014-02-18|Digital Doors, Inc.|Electromagnetic pulse hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor| US8554669B2|2007-01-09|2013-10-08|Bill Me Later, Inc.|Method and system for offering a credit product by a credit issuer to a consumer at a point-of sale| US7895139B2|2007-01-22|2011-02-22|Fair Isaac Corporation|Data spiders| US20080177655A1|2007-01-23|2008-07-24|David Zalik|Systems and methods of underwriting business credit| US7689526B2|2007-01-25|2010-03-30|Fair Isaac Corporation|Knowledge base with clustered data objects| WO2008092147A2|2007-01-26|2008-07-31|Information Resources, Inc.|Analytic platform| US20080183564A1|2007-01-30|2008-07-31|Microsoft Corporation|Untethered Interaction With Aggregated Metrics| US8606666B1|2007-01-31|2013-12-10|Experian Information Solutions, Inc.|System and method for providing an aggregation tool| US7949597B2|2007-02-02|2011-05-24|Zadoorian James A|Method of collecting delinquent specialized debt| US7870151B2|2007-02-07|2011-01-11|Fair Issac Corporation|Fast accurate fuzzy matching| US9031873B2|2007-02-13|2015-05-12|Future Route Limited|Methods and apparatus for analysing and/or pre-processing financial accounting data| US20080201257A1|2007-02-15|2008-08-21|Darryl Lewis|Alternative method and system for leasing, financing and purchasing residential real estate| US20080208735A1|2007-02-22|2008-08-28|American Expresstravel Related Services Company, Inc., A New York Corporation|Method, System, and Computer Program Product for Managing Business Customer Contacts| US20080208631A1|2007-02-22|2008-08-28|General Electric Company|Methods and systems for providing clinical documentation for a patient lifetime in a single interface| US7797265B2|2007-02-26|2010-09-14|Siemens Corporation|Document clustering that applies a locality sensitive hashing function to a feature vector to obtain a limited set of candidate clusters| US8433648B2|2007-02-26|2013-04-30|Bill Me Later, Inc.|Method and system for engaging in a transaction between a consumer and a merchant| US8126076B2|2007-02-27|2012-02-28|Motorola Mobility, Inc.|Method and apparatus for transmission within a multi-carrier communication system| US20080208610A1|2007-02-28|2008-08-28|Nicholas Arthur Thomas|Methods and Systems for Script Operations Management| US7644299B2|2007-03-02|2010-01-05|Proprietary Controls Systems Corporation|Fault tolerant security system, method and apparatus| US20080222706A1|2007-03-06|2008-09-11|Martin Renaud|Globally aware authentication system| US7853998B2|2007-03-22|2010-12-14|Mocana Corporation|Firewall propagation| WO2008121824A1|2007-03-29|2008-10-09|Initiate Systems, Inc.|Method and system for data exchange among data sources| US8285656B1|2007-03-30|2012-10-09|Consumerinfo.Com, Inc.|Systems and methods for data verification| US20090048957A1|2007-04-02|2009-02-19|Matthew Celano|Method and system for financial counseling| US7698214B1|2007-04-03|2010-04-13|General Mortgage Finance Corp.|Systems and methods of trading closed loans, debt, and other financial obligations| US8775238B2|2007-04-03|2014-07-08|International Business Machines Corporation|Generating customized disincentive marketing content for a customer based on customer risk assessment| US8955122B2|2007-04-04|2015-02-10|Sri International|Method and apparatus for detecting malware infection| US7975299B1|2007-04-05|2011-07-05|Consumerinfo.Com, Inc.|Child identity monitor| US20080255922A1|2007-04-12|2008-10-16|Jon Feldman|Preferred cost bidding for online advertising| US7698445B2|2007-04-12|2010-04-13|Younite, Inc.|Client agents for obtaining attributes from unavailable clients| US7742982B2|2007-04-12|2010-06-22|Experian Marketing Solutions, Inc.|Systems and methods for determining thin-file records and determining thin-file risk levels| US20080312969A1|2007-04-20|2008-12-18|Richard Raines|System and method for insurance underwriting and rating| US7987207B2|2007-04-20|2011-07-26|John Peden|System and method for tenant screening| US8725597B2|2007-04-25|2014-05-13|Google Inc.|Merchant scoring system and transactional database| US7792743B2|2007-05-02|2010-09-07|Google Inc.|Flexible advertiser billing system with mixed postpayment and prepayment capabilities| US10769290B2|2007-05-11|2020-09-08|Fair Isaac Corporation|Systems and methods for fraud detection via interactive link analysis| US20080294501A1|2007-05-21|2008-11-27|Steven Carl Rennich|Collecting and providing information about vendors, products and services| WO2008147918A2|2007-05-25|2008-12-04|Experian Information Solutions, Inc.|System and method for automated detection of never-pay data sets| US20080301016A1|2007-05-30|2008-12-04|American Express Travel Related Services Company, Inc. General Counsel's Office|Method, System, and Computer Program Product for Customer Linking and Identification Capability for Institutions| US20080301188A1|2007-06-04|2008-12-04|O'hara Daniel P|Method and system to track accomplishments and to compute relative rankings| CA2690025C|2007-06-06|2014-05-20|Boldstreet Inc.|Remote service access system and method| US20080306750A1|2007-06-08|2008-12-11|Adp, Inc.|Employment screening system and method| US8549472B1|2007-06-12|2013-10-01|Fair Isaac Corporation|System and method for web design| WO2009002836A1|2007-06-22|2008-12-31|Eaffordit, Inc.|Search methods and systems using periodic payment data to identify items by lump sum value| US20080319909A1|2007-06-25|2008-12-25|Perkins George S|System and method for managing the lifecycle of encryption keys| US7739169B2|2007-06-25|2010-06-15|Visa U.S.A. Inc.|Restricting access to compromised account information| WO2009006448A1|2007-06-28|2009-01-08|Cashedge, Inc.|Global risk administration method and system| US20090007231A1|2007-06-29|2009-01-01|Caterpillar Inc.|Secured systems and methods for tracking and management of logistical processes| US8037046B2|2007-06-29|2011-10-11|Microsoft Corporation|Collecting and presenting temporal-based action information| US7958050B2|2007-07-02|2011-06-07|Early Warning Services, Llc|Payment account monitoring system and method| US7788207B2|2007-07-09|2010-08-31|Blackboard Inc.|Systems and methods for integrating educational software systems| US8326878B2|2007-07-19|2012-12-04|Carnegie Research, Inc.|System for and method of processing business personnel information| US7970676B2|2007-08-01|2011-06-28|Fair Isaac Corporation|Method and system for modeling future action impact in credit scoring| US20090043691A1|2007-08-06|2009-02-12|Sheldon Kasower|System and method for gathering, processing, authenticating and distributing personal information| US20090138335A1|2007-08-13|2009-05-28|Universal Passage, Inc.|Method and system for providing identity template management as a part of a marketing and sales program for universal life stage decision support| US9760553B1|2007-08-15|2017-09-12|Fair Isaac Corporation|Systems and methods for early identification of anomalies in large projects| US8521628B1|2007-08-22|2013-08-27|United Services Automobile Association |Systems and methods for financial assessment specific advice| US20090055322A1|2007-08-23|2009-02-26|Microsoft Corporation|Removable module in personal handheld devices for personal information exchange| US7849014B2|2007-08-29|2010-12-07|American Express Travel Related Services Company, Inc.|System and method for facilitating a financial transaction with a dynamically generated identifier| US20090060343A1|2007-08-30|2009-03-05|Andrew Rosca|Method for partially obscuring content of documents and images| US8170998B2|2007-09-12|2012-05-01|American Express Travel Related Services Company, Inc.|Methods, systems, and computer program products for estimating accuracy of linking of customer relationships| US9690820B1|2007-09-27|2017-06-27|Experian Information Solutions, Inc.|Database system for triggering event notifications based on updates to database records| US20090089190A1|2007-09-27|2009-04-02|Girulat Jr Rollin M|Systems and methods for monitoring financial activities of consumers| US20090119169A1|2007-10-02|2009-05-07|Blinkx Uk Ltd|Various methods and apparatuses for an engine that pairs advertisements with video files| US8060502B2|2007-10-04|2011-11-15|American Express Travel Related Services Company, Inc.|Methods, systems, and computer program products for generating data quality indicators for relationships in a database| US20090094064A1|2007-10-09|2009-04-09|Michael Tyler|Healthcare Insurance Claim Fraud and Error Detection Using Co-Occurrence| US20090106846A1|2007-10-23|2009-04-23|Identity Rehab Corporation|System and method for detection and mitigation of identity theft| US8191117B2|2007-10-25|2012-05-29|Anchorfree, Inc.|Location-targeted online services| US20090112650A1|2007-10-31|2009-04-30|Iwane Donna S|Online method of procuring mortgage loans| US8180654B2|2007-10-31|2012-05-15|Health Record Corporation|Method and system for creating, assembling, managing, utilizing, and securely storing portable personal medical records| US8250097B2|2007-11-02|2012-08-21|Hue Rhodes|Online identity management and identity verification| US10726440B1|2007-11-02|2020-07-28|Fair Isaac Corporation|System and method for executing consumer transactions based on credential information relating to the consumer| US20090119199A1|2007-11-07|2009-05-07|Nameyourloan|Loan determination method and apparatus| US7653593B2|2007-11-08|2010-01-26|Equifax, Inc.|Macroeconomic-adjusted credit risk score systems and methods| WO2009064840A1|2007-11-13|2009-05-22|Equifax, Inc.|Systems and methods for detecting child identity theft| WO2009065029A1|2007-11-14|2009-05-22|Panjiva, Inc.|Evaluating public records of supply transactions| US8626618B2|2007-11-14|2014-01-07|Panjiva, Inc.|Using non-public shipper records to facilitate rating an entity based on public records of supply transactions| US8041592B2|2007-11-30|2011-10-18|Bank Of America Corporation|Collection and analysis of multiple data sources| US20090150166A1|2007-12-05|2009-06-11|International Business Machines Corporation|Hiring process by using social networking techniques to verify job seeker information| US8744908B2|2008-01-17|2014-06-03|Analog Analytics, Inc.|System and method for management and optimization of off-line advertising campaigns with a consumer call to action| WO2009076555A2|2007-12-12|2009-06-18|Google Inc.|User-created content aggregation and sharing| US8127986B1|2007-12-14|2012-03-06|Consumerinfo.Com, Inc.|Card registry systems and methods| US8281145B2|2007-12-14|2012-10-02|Mehran Randall Rasti|Doing business without SSN, EIN, and charge card numbers| US7546271B1|2007-12-20|2009-06-09|Choicepoint Asset Company|Mortgage fraud detection systems and methods| US20090171723A1|2007-12-26|2009-07-02|Jenkins Chad G|Systems and methods for electronic account certification and enhanced credit reporting| US8762243B2|2007-12-26|2014-06-24|Formfree Holdings Corporation|Systems and methods for electronic account certification and enhanced credit reporting| US20090183259A1|2008-01-11|2009-07-16|Rinek Jeffrey L|Integrated Protection Service System Defining Risk Profiles for Minors| US8868457B2|2008-01-16|2014-10-21|Richard F. Irwin, Ltd.|Firm offers of credit system| CN101499071A|2008-01-30|2009-08-05|国际商业机器公司|Device and method for creating and using customized uniform resource locator| US8165940B2|2008-01-31|2012-04-24|Visa U.S.A. Inc.|Non-credit account credit rating| WO2009099448A1|2008-02-06|2009-08-13|Vantagescore Solutions, Llc|Methods and systems for score consistency| US20090210886A1|2008-02-19|2009-08-20|Bhojwani Sandeep M|Method and system for defining financial transaction notification preferences| US8078528B1|2008-02-21|2011-12-13|Jpmorgan Chase Bank, N.A.|System and method for providing borrowing schemes| US20090216591A1|2008-02-22|2009-08-27|Cunexus|Method for computer evaluation of customer information and automatically providing customized financial product offers thereto| US8706474B2|2008-02-23|2014-04-22|Fair Isaac Corporation|Translation of entity names based on source document publication date, and frequency and co-occurrence of the entity names| US7853520B2|2008-02-29|2010-12-14|American Express Travel Related Services Company, Inc.|Total structural risk model| US7849004B2|2008-02-29|2010-12-07|American Express Travel Related Services Company, Inc.|Total structural risk model| US8868741B2|2008-03-03|2014-10-21|Leapfrog Enterprises, Inc.|Method and apparatus for custodial monitoring, filtering, and approving of content| US20090222308A1|2008-03-03|2009-09-03|Zoldi Scott M|Detecting first party fraud abuse| US20090228918A1|2008-03-05|2009-09-10|Changingworlds Ltd.|Content recommender| US8805736B2|2008-03-08|2014-08-12|Stefan Melik-Aslanian|Fraud prevention and replacement of credit/debit cards—lost, stolen, defective or fraudulently used| US20090234665A1|2008-03-11|2009-09-17|Electronic Data Systems Corporation|System and method for customer feedback| US20090234775A1|2008-03-12|2009-09-17|Jason Whitney|Real estate appraisal system and method| US20090234876A1|2008-03-14|2009-09-17|Timothy Schigel|Systems and methods for content sharing| US20090240565A1|2008-03-18|2009-09-24|Jerry Calonge|Online system and method for property rental transactions, property management, and assessing performance of landlords and tenants| US20090240609A1|2008-03-19|2009-09-24|Soogyung Cho|System and method for tracking and analyzing loans involved in asset-backed securities| US20110016042A1|2008-03-19|2011-01-20|Experian Information Solutions, Inc.|System and method for tracking and analyzing loans involved in asset-backed securities| US20090240624A1|2008-03-20|2009-09-24|Modasolutions Corporation|Risk detection and assessment of cash payment for electronic purchase transactions| CA2659698C|2008-03-21|2020-06-16|Dressbot Inc.|System and method for collaborative shopping, business and entertainment| US20090271248A1|2008-03-27|2009-10-29|Experian Information Solutions, Inc.|Precalculation of trending attributes| US20090248573A1|2008-03-28|2009-10-01|American Express Travel Related Services Company, Inc.|Consumer behaviors at lender level| WO2009145987A2|2008-03-30|2009-12-03|Symplified, Inc.|System, method, and apparatus for single sign-on and managing access to resources across a network| US8060423B1|2008-03-31|2011-11-15|Intuit Inc.|Method and system for automatic categorization of financial transaction data based on financial data from similarly situated users| US20090254375A1|2008-04-08|2009-10-08|The Quantum Group, Inc.|System and methods for automated healthcare patient record search, extraction, and creation| US8266168B2|2008-04-24|2012-09-11|Lexisnexis Risk & Information Analytics Group Inc.|Database systems and methods for linking records and entity representations with sufficiently high confidence| US20090271265A1|2008-04-28|2009-10-29|Cyndigo, Corp.|Electronic receipt system and method| US8799010B2|2008-05-07|2014-08-05|Unitedhealth Group Incorporated|Telehealth scheduling and communications network| US8677129B2|2008-05-13|2014-03-18|Fair Isaac Corporation|Consumer-driven secure sockets layer modulator| US20090289110A1|2008-05-22|2009-11-26|Paul Regen|Wireless Biometric Computer Mouse with Integrated Credit Card Reader| US8521631B2|2008-05-29|2013-08-27|Sas Institute Inc.|Computer-implemented systems and methods for loan evaluation using a credit assessment framework| US9165044B2|2008-05-30|2015-10-20|Ethority, Llc|Enhanced user interface and data handling in business intelligence software| US8744946B2|2008-06-09|2014-06-03|Quest Growth Partners, Llc|Systems and methods for credit worthiness scoring and loan facilitation| US8171415B2|2008-06-11|2012-05-01|International Business Machines Corporation|Outage management portal leveraging back-end resources to create a role and user tailored front-end interface for coordinating outage responses| US7853493B2|2008-06-18|2010-12-14|Consumerinfo.Com, Inc.|Personal finance integration system and method| US8095443B2|2008-06-18|2012-01-10|Consumerinfo.Com, Inc.|Debt trending systems and methods| US8312033B1|2008-06-26|2012-11-13|Experian Marketing Solutions, Inc.|Systems and methods for providing an integrated identifier| US20090327120A1|2008-06-27|2009-12-31|Eze Ike O|Tagged Credit Profile System for Credit Applicants| US8646103B2|2008-06-30|2014-02-04|Gabriel Jakobson|Method and system for securing online identities| US8572070B2|2008-07-02|2013-10-29|LexisNexis Risk Solution FL Inc.|Statistical measure and calibration of internally inconsistent search criteria where one or both of the search criteria and database is incomplete| CN101625779A|2008-07-11|2010-01-13|深圳富泰宏精密工业有限公司|Mobile terminal and credit card consumption method through same| US20100009320A1|2008-07-11|2010-01-14|Christopher Allen Wilkelis|Credit management course| US8499037B2|2008-08-19|2013-07-30|Manoj Ramnani|Automatic profile update in a mobile device| US7991689B1|2008-07-23|2011-08-02|Experian Information Solutions, Inc.|Systems and methods for detecting bust out fraud using credit data| US20100023434A1|2008-07-27|2010-01-28|Isaiah Bond|Automated Credit/Debt Management Counsel By Isaiah Bond| US8781882B1|2008-08-07|2014-07-15|Accenture Global Services Limited|Automotive industry high performance capability assessment| US20100037299A1|2008-08-08|2010-02-11|American Express Travel Related Services Company, Inc.|Method, System, And Computer Program Product For Identifying An Authorized Officer Of A Business| US20100042517A1|2008-08-12|2010-02-18|The Westem Union Company|Universal loyalty systems and methods| US8069053B2|2008-08-13|2011-11-29|Hartford Fire Insurance Company|Systems and methods for de-identification of personal data| US9256904B1|2008-08-14|2016-02-09|Experian Information Solutions, Inc.|Multi-bureau credit file freeze and unfreeze| US9037648B2|2008-08-19|2015-05-19|John Ogilvie|Anonymity-preserving reciprocal vetting from a system perspective| US8032932B2|2008-08-22|2011-10-04|Citibank, N.A.|Systems and methods for providing security token authentication| US9411864B2|2008-08-26|2016-08-09|Zeewise, Inc.|Systems and methods for collection and consolidation of heterogeneous remote business data using dynamic data handling| US8595101B1|2008-09-08|2013-11-26|Exerian Information Solutions, Inc.|Systems and methods for managing consumer accounts using data migration| WO2010036933A2|2008-09-25|2010-04-01|Harclay, Llc|Borrowing and lending platform and method| US20100082476A1|2008-10-01|2010-04-01|Bowman Eric A|Comprehensive method for increasing credit scores| US8412593B1|2008-10-07|2013-04-02|LowerMyBills.com, Inc.|Credit card matching| US20100094758A1|2008-10-13|2010-04-15|Experian Marketing Solutions, Inc.|Systems and methods for providing real time anonymized marketing information| US20100094704A1|2008-10-15|2010-04-15|Contextweb, Inc.|Method and system for displaying internet ad media using etags| US8560161B1|2008-10-23|2013-10-15|Experian Information Solutions, Inc.|System and method for monitoring and predicting vehicle attributes| US8117106B2|2008-10-30|2012-02-14|Telesign Corporation|Reputation scoring and reporting system| US8682785B2|2008-10-30|2014-03-25|Bank Of America Corporation|Bank card authorization with balance indicator| US8060424B2|2008-11-05|2011-11-15|Consumerinfo.Com, Inc.|On-line method and system for monitoring and reporting unused available credit| AU2009311303B2|2008-11-06|2015-09-10|Visa International Service Association|Online challenge-response| US20100122316A1|2008-11-12|2010-05-13|Dennis Bower Lyon|User Controlled Identity Authentication| US9535959B2|2008-11-21|2017-01-03|Li Sun|Method and apparatus for reconciliation of multiple sets of data| US8566141B1|2008-12-03|2013-10-22|Lower My Bills, Inc.|System and method of applying custom lead generation criteria| US8634542B2|2008-12-09|2014-01-21|Satmap International Holdings Limited|Separate pattern matching algorithms and computer models based on available caller data| US8862519B2|2008-12-29|2014-10-14|International Business Machines Corporation|Predicting email response patterns| US20100169159A1|2008-12-30|2010-07-01|Nicholas Rose|Media for Service and Marketing| CN101452555A|2008-12-31|2009-06-10|中国建设银行股份有限公司|Method for enquiring personal credit information, system and personal credit enquiring system| US20100174638A1|2009-01-06|2010-07-08|ConsumerInfo.com|Report existence monitoring| US8127982B1|2009-01-09|2012-03-06|Apple Inc.|Parental controls| US20100211445A1|2009-01-15|2010-08-19|Shaun Bodington|Incentives associated with linked financial accounts| US8296323B2|2009-01-20|2012-10-23|Titanium Fire Ltd.|Personal data subscriber systems and methods| US20100188684A1|2009-01-23|2010-07-29|Kabushiki Kaisha Toshiba|Method and system for identification of scanning/transferring of confidential document| US8380618B1|2009-02-02|2013-02-19|United Services Automobile Association |Systems and methods for issuing credit for unused interest free grace periods| US20100205087A1|2009-02-10|2010-08-12|Loan Value Group Llc|Systems and methods to promote loan repayment| EP2404274A4|2009-03-06|2013-01-23|Clarity Services Inc|System and method for credit reporting| US8495384B1|2009-03-10|2013-07-23|James DeLuccia|Data comparison system| US20100250509A1|2009-03-27|2010-09-30|Bank Of America Corporation|File scanning tool| US7783515B1|2009-03-27|2010-08-24|Bank Of America Corporation|Itemized receipt tracking system| US8260645B2|2009-03-27|2012-09-04|Bank Of America Corporation|Transaction recurrence engine| US20100248681A1|2009-03-27|2010-09-30|Anthony Phills|Method and system for producing emergency notifications| US9886693B2|2009-03-30|2018-02-06|Yuh-Shen Song|Privacy protected anti identity theft and payment network| US8447687B2|2009-03-30|2013-05-21|Albert OGRODSKI|Method and system for centralized identity and account controls| US8380590B1|2009-03-31|2013-02-19|Intuit Inc.|Method and system for detecting recurring income from financial transaction data| US8810574B2|2009-04-02|2014-08-19|Mellmo Inc.|Displaying pie charts in a limited display area| US20100268660A1|2009-04-15|2010-10-21|Jared Ekdahl|Systems and methods for verifying and rating mortgage financial companies| US8214238B1|2009-04-21|2012-07-03|Accenture Global Services Limited|Consumer goods and services high performance capability assessment| US20100274653A1|2009-04-28|2010-10-28|Ayman Hammad|Notification social networking| US8429398B2|2009-05-08|2013-04-23|Nokia Corporation|Method and apparatus of providing personalized virtual environment| US8639920B2|2009-05-11|2014-01-28|Experian Marketing Solutions, Inc.|Systems and methods for providing anonymized user profile data| US20100293090A1|2009-05-14|2010-11-18|Domenikos Steven D|Systems, methods, and apparatus for determining fraud probability scores and identity health scores| US8602293B2|2009-05-15|2013-12-10|Visa International Service Association|Integration of verification tokens with portable computing devices| US8534564B2|2009-05-15|2013-09-17|Ayman Hammad|Integration of verification tokens with mobile communication devices| US7690032B1|2009-05-22|2010-03-30|Daon Holdings Limited|Method and system for confirming the identity of a user| CN102473185B|2009-07-07|2014-02-26|日本电气株式会社|Information search system, information management device, information search method, information management method, and recording medium| US8364518B1|2009-07-08|2013-01-29|Experian Ltd.|Systems and methods for forecasting household economics| US8359210B1|2009-07-09|2013-01-22|Intuit Inc.|Method and system for providing healthcare expense payment recommendations| US8607340B2|2009-07-21|2013-12-10|Sophos Limited|Host intrusion prevention system using software and user behavior analysis| US20110035315A1|2009-08-06|2011-02-10|Enyfcu Holdings, Llc|Methods and Apparatus for Directing Consumers to Debt Settlement Providers| US8914342B2|2009-08-12|2014-12-16|Yahoo! Inc.|Personal data platform| US20110054981A1|2009-08-27|2011-03-03|Faith Patrick L|Analyzing Local Non-Transactional Data with Transactional Data in Predictive Models| US20110161218A1|2009-09-22|2011-06-30|Cortera, Inc.|Credit reporting interface| US8799150B2|2009-09-30|2014-08-05|Scorelogix Llc|System and method for predicting consumer credit risk using income risk based credit score| WO2011059957A1|2009-11-10|2011-05-19|Youdiligence Llc|System and method for monitoring activity of a specified user on internet-based social networks| US20110113086A1|2009-11-10|2011-05-12|Kevin Long|System and method for monitoring activity on internet-based social networks| CA2685758A1|2009-11-10|2011-05-10|Neobanx Technologies Inc.|System and method for assessing credit risk in an on-line lending environment| US8566029B1|2009-11-12|2013-10-22|Google Inc.|Enhanced identification of interesting points-of-interest| US8239130B1|2009-11-12|2012-08-07|Google Inc.|Enhanced identification of interesting points-of-interest| US8433512B1|2009-11-12|2013-04-30|Google Inc.|Enhanced identification of interesting points-of-interest| US8589069B1|2009-11-12|2013-11-19|Google Inc.|Enhanced identification of interesting points-of-interest| US20110125632A1|2009-11-23|2011-05-26|Mortgagesoft Corporation|Consumer Direct Loan Qualification System And Method For Submitting Loan Applications| US20110126197A1|2009-11-25|2011-05-26|Novell, Inc.|System and method for controlling cloud and virtualized data centers in an intelligent workload management system| US8504456B2|2009-12-01|2013-08-06|Bank Of America Corporation|Behavioral baseline scoring and risk scoring| US20110137789A1|2009-12-03|2011-06-09|Venmo Inc.|Trust Based Transaction System| US20110137760A1|2009-12-03|2011-06-09|Rudie Todd C|Method, system, and computer program product for customer linking and identification capability for institutions| US8520842B2|2010-01-07|2013-08-27|Microsoft Corporation|Maintaining privacy during user profiling| US8489499B2|2010-01-13|2013-07-16|Corelogic Solutions, Llc|System and method of detecting and assessing multiple types of risks related to mortgage lending| US8694390B2|2010-01-15|2014-04-08|Apollo Enterprise Solutions, Inc.|System and method for resolving transactions with lump sum payment capabilities| US8510184B2|2010-01-15|2013-08-13|Apollo Enterprise Solutions, Inc.|System and method for resolving transactions using weighted scoring techniques| US8321339B2|2010-01-15|2012-11-27|Apollo Enterprise Solutions, Inc.|System and method for resolving transactions with variable offer parameter selection capabilities| US20110178841A1|2010-01-20|2011-07-21|American Express Travel Related Services Company, Inc.|System and method for clustering a population using spend level data| US8600855B2|2010-01-26|2013-12-03|Visa International Service Association|Transaction data repository for risk analysis| US10089683B2|2010-02-08|2018-10-02|Visa International Service Association|Fraud reduction system for transactions| US20110238566A1|2010-02-16|2011-09-29|Digital Risk, Llc|System and methods for determining and reporting risk associated with financial instruments| US8234194B2|2010-02-18|2012-07-31|Bank Of America Corporation|Life calendar| US8885459B2|2010-02-26|2014-11-11|Futurewei Technologies, Inc.|System and method for computing a backup ingress of a point-to-multipoint label switched path| US8738418B2|2010-03-19|2014-05-27|Visa U.S.A. Inc.|Systems and methods to enhance search data with transaction based data| US9652802B1|2010-03-24|2017-05-16|Consumerinfo.Com, Inc.|Indirect monitoring and reporting of a user's credit data| US20110258050A1|2010-04-16|2011-10-20|Bread Labs Inc. A Delaware Corporation|Social advertising platform| US8725613B1|2010-04-27|2014-05-13|Experian Information Solutions, Inc.|Systems and methods for early account score and notification| US20110270925A1|2010-04-28|2011-11-03|Magid Joseph Mina|System to share credit information| US8458074B2|2010-04-30|2013-06-04|Corelogic Solutions, Llc.|Data analytics models for loan treatment| US20120066084A1|2010-05-10|2012-03-15|Dave Sneyders|System and method for consumer-controlled rich privacy| US20120005070A1|2010-07-01|2012-01-05|Veretech Holdings, Inc.|Sales lead generation system using a credit score survey| US8744956B1|2010-07-01|2014-06-03|Experian Information Solutions, Inc.|Systems and methods for permission arbitrated transaction services| US8931058B2|2010-07-01|2015-01-06|Experian Information Solutions, Inc.|Systems and methods for permission arbitrated transaction services| US8606694B2|2010-07-02|2013-12-10|Experian Credit Advisors, Inc.|Online registration system for CROA-compliant credit advice services| US20120011056A1|2010-07-07|2012-01-12|Roderick Ward|System and method for processing commerical loan information| CA2733343A1|2010-07-26|2012-01-26|Quickbridge Limited|Plug-in system and method for consumer credit acquisition online| US20120029956A1|2010-07-30|2012-02-02|Bank Of America Corporation|Comprehensive exposure analysis system and method| US9152727B1|2010-08-23|2015-10-06|Experian Marketing Solutions, Inc.|Systems and methods for processing consumer information for targeted marketing applications| US8340685B2|2010-08-25|2012-12-25|The Nielsen Company , Llc|Methods, systems and apparatus to generate market segmentation data with anonymous location data| US8560935B2|2010-08-31|2013-10-15|American Sterling Dental Plan, Llc|Segmenting forms for multiple user completion| US20120066065A1|2010-09-14|2012-03-15|Visa International Service Association|Systems and Methods to Segment Customers| US8515842B2|2010-09-14|2013-08-20|Evolution Finance, Inc.|Systems and methods for monitoring and optimizing credit scores| US8341131B2|2010-09-16|2012-12-25|Sap Ag|Systems and methods for master data management using record and field based rules| US8639616B1|2010-10-01|2014-01-28|Experian Information Solutions, Inc.|Business to contact linkage system| US20120101938A1|2010-10-25|2012-04-26|Sheldon Kasower|Method and system for secure online payments| US20120108274A1|2010-10-27|2012-05-03|Acebo Ruiz Agustin|Method and System of Communication That Allow People Unknown to Each Other Who Have Visual Contact to Communicate by SMS or E-mail| US9021363B2|2010-10-29|2015-04-28|Ncr Corporation|Centralized user preference management for electronic decision making devices| US8930262B1|2010-11-02|2015-01-06|Experian Technology Ltd.|Systems and methods of assisted strategy design| US8781169B2|2010-11-03|2014-07-15|Endeavoring, Llc|Vehicle tracking and locating system| US8799311B2|2010-11-05|2014-08-05|Apple Inc.|Intelligent data caching| US8498930B2|2010-11-09|2013-07-30|Creditxpert, Inc.|System and method for credit forecasting| US8782217B1|2010-11-10|2014-07-15|Safetyweb, Inc.|Online identity management| US8484186B1|2010-11-12|2013-07-09|Consumerinfo.Com, Inc.|Personalized people finder| US10395245B2|2010-11-12|2019-08-27|Yuh-Shen Song|Global customer identification network| US8589208B2|2010-11-19|2013-11-19|Information Resources, Inc.|Data integration and analysis| US9147042B1|2010-11-22|2015-09-29|Experian Information Solutions, Inc.|Systems and methods for data verification| US8671107B2|2010-12-02|2014-03-11|Bank Of America Corporation|Method and apparatus for global information reporting| CN102096886A|2010-12-13|2011-06-15|苏州德融嘉信信用管理技术有限公司|Credit levying business system| US20120158654A1|2010-12-17|2012-06-21|Google Inc.|Receipt storage in a digital wallet| US20120173417A1|2010-12-29|2012-07-05|Darlene Lohman|Methods and systems for biller-initiated reporting of payment transactions| US8326725B2|2011-01-03|2012-12-04|Intuit Inc.|Method and system for obtaining user data from third parties| US8370371B1|2011-01-18|2013-02-05|The Pnc Financial Services Group, Inc.|Business constructs| US8613086B2|2011-01-31|2013-12-17|Bank Of America Corporation|Ping and scan of computer systems| US8555400B2|2011-02-04|2013-10-08|Palo Alto Research Center Incorporated|Privacy-preserving aggregation of Time-series data| US9003297B2|2011-02-17|2015-04-07|Mworks Worldwide, Inc.|Integrated enterprise software and social network system user interfaces utilizing cloud computing infrastructures and single secure portal access| US8949981B1|2011-02-28|2015-02-03|Symantec Corporation|Techniques for providing protection against unsafe links on a social networking website| US8745413B2|2011-03-02|2014-06-03|Appature, Inc.|Protected health care data marketing system and method| US20120232958A1|2011-03-11|2012-09-13|Bar & Club Statistics, Inc.|Systems and methods for dynamic venue demographics and marketing| US20120239583A1|2011-03-15|2012-09-20|Dobrowolski John M|Method and system for computerized tracking, analyzing and reporting of information specific to residential and commercial tenancy histories| US20120239553A1|2011-03-16|2012-09-20|Metro Enterprises, Inc.|Method for processing and funding short-term loans to a consumer and a method for converting currency, both to a mobile credit storage facility account| US20120246060A1|2011-03-25|2012-09-27|LoanHD, Inc.|Loan management, real-time monitoring, analytics, and data refresh system and method| AU2012236091A1|2011-04-01|2013-10-17|Visa International Service Association|Restricted-use account payment administration apparatuses, methods and systems| WO2012140663A1|2011-04-15|2012-10-18|Google Inc.|Click-to-reveal content| US20130110565A1|2011-04-25|2013-05-02|Transparency Sciences, Llc|System, Method and Computer Program Product for Distributed User Activity Management| US20120278227A1|2011-04-26|2012-11-01|Black Oak Partners, Llc|Systems and methods for using data metrics for credit score analysis| US9202200B2|2011-04-27|2015-12-01|Credibility Corp.|Indices for credibility trending, monitoring, and lead generation| US9189789B1|2011-04-27|2015-11-17|Intuit Inc.|Methods, systems, and articles of manufacture for fulfilling a loan request of a business entity| US9558519B1|2011-04-29|2017-01-31|Consumerinfo.Com, Inc.|Exposing reporting cycle information| US20120284118A1|2011-05-04|2012-11-08|Microsoft Corporation|Using collective data for targeting of advertisements| WO2012170838A1|2011-06-09|2012-12-13|My Interest Broker, LLC|System and method for trading debt instruments| US9607336B1|2011-06-16|2017-03-28|Consumerinfo.Com, Inc.|Providing credit inquiry alerts| US20120324388A1|2011-06-17|2012-12-20|Business Objects Software Limited|Pie chart graphical user interface| CN103827908A|2011-07-12|2014-05-28|益百利信息解决方案公司|Systems and methods for a large-scale credit data processing architecture| US8392230B2|2011-07-15|2013-03-05|Credibility Corp.|Automated omnipresent real-time credibility management system and methods| US10176533B2|2011-07-25|2019-01-08|Prevedere Inc.|Interactive chart utilizing shifting control to render shifting of time domains of data series| US9218390B2|2011-07-29|2015-12-22|Yellowpages.Com Llc|Query parser derivation computing device and method for making a query parser for parsing unstructured search queries| US8660943B1|2011-08-31|2014-02-25|Btpatent Llc|Methods and systems for financial transactions| US8504470B1|2011-08-31|2013-08-06|BT Patent LLC|Methods and systems for financial transactions| US8825547B2|2011-09-06|2014-09-02|Mastercard International Incorporated|Apparatus, method, and computer program product for data cleansing and/or biller scrubbing| US10129211B2|2011-09-15|2018-11-13|Stephan HEATH|Methods and/or systems for an online and/or mobile privacy and/or security encryption technologies used in cloud computing with the combination of data mining and/or encryption of user's personal data and/or location data for marketing of internet posted promotions, social messaging or offers using multiple devices, browsers, operating systems, networks, fiber optic communications, multichannel platforms| US20130103571A1|2011-10-06|2013-04-25|CreditXpert Inc.|System and method for determination and reporting of credit use and impact on credit score| US8738516B1|2011-10-13|2014-05-27|Consumerinfo.Com, Inc.|Debt services candidate locator| US10810218B2|2011-10-14|2020-10-20|Transunion, Llc|System and method for matching of database records based on similarities to search queries| US20130117087A1|2011-11-07|2013-05-09|Apriva, Llc|System and method for authenticating electronic transaction instruments| US20130124263A1|2011-11-14|2013-05-16|Visa International Service Association|Systems and Methods to Summarize Transaction data| US9143541B1|2011-11-17|2015-09-22|Google Inc.|Systems, computer-implemented methods, and computer-readable media to target internet-based services on a geographic location| US9135306B2|2011-12-09|2015-09-15|Tiversa Ip, Inc.|System for forensic analysis of search terms| US20130173447A1|2011-12-30|2013-07-04|Walter J. Rothschild|Consumer-driven credit information control method, system and storage medium for storing a set of computer instructions which effectuate the method| MX345275B|2011-12-30|2017-01-24|Trans Union Llc|System and method for automated dispute resolution of credit data.| US8874909B2|2012-02-03|2014-10-28|Daniel Joseph Lutz|System and method of storing data| US8442886B1|2012-02-23|2013-05-14|American Express Travel Related Services Company, Inc.|Systems and methods for identifying financial relationships| US20130226783A1|2012-02-23|2013-08-29|American Express Travel Related Services Company, Inc.|Systems and methods for identifying financial relationships| US8463595B1|2012-03-06|2013-06-11|Reputation.Com, Inc.|Detailed sentiment analysis| CN102663650A|2012-03-14|2012-09-12|钟文清|System for analyzing enterprise credit risk and application method thereof| KR101337447B1|2012-03-22|2013-12-05|네오위즈게임즈|Method and server for authenticatiing user in onlie game| CN112036952A|2012-03-31|2020-12-04|环联公司|System and method for targeted internet marketing based on offline, online, and credit-related data| US9953326B2|2012-05-02|2018-04-24|Jpmorgan Chase Bank, N.A.|Alert optimization system and method| US8515828B1|2012-05-29|2013-08-20|Google Inc.|Providing product recommendations through keyword extraction from negative reviews| US8572083B1|2012-05-30|2013-10-29|Ncino, Llc|Financial-service structured content manager| US10229200B2|2012-06-08|2019-03-12|International Business Machines Corporation|Linking data elements based on similarity data values and semantic annotations| US20140025562A1|2012-07-18|2014-01-23|Corelogic Solutions, Llc.|Enhanced credit reporting system, method and computer program product| US8892697B2|2012-07-24|2014-11-18|Dhana Systems Corp.|System and digital token for personal identity verification| AU2013295603A1|2012-07-26|2015-02-05|Experian Marketing Solutions, Inc.|Systems and methods of aggregating consumer information| US20140032300A1|2012-07-27|2014-01-30|Collections Marketing Center, Inc.|Method and System for Debt Resolution Restricted Offer| US20140074689A1|2012-09-12|2014-03-13|Kristian Lund|Systems and Methods for Modifying Consumer Credit Data| US8862566B2|2012-10-26|2014-10-14|Equifax, Inc.|Systems and methods for intelligent parallel searching| US10091325B2|2012-10-30|2018-10-02|Elwha Llc|Methods and systems for data services| US9116918B1|2012-11-14|2015-08-25|Google Inc.|Methods, systems, and media for interpreting queries| US8856894B1|2012-11-28|2014-10-07|Consumerinfo.Com, Inc.|Always on authentication| US20140156500A1|2012-12-03|2014-06-05|Experian Information Solutions, Inc.|Systems and methods for providing a customizable credit report| US20140156501A1|2012-12-04|2014-06-05|Mastercard International Incorporated|Real-time interactive credit score improvement coach| US9525753B2|2012-12-12|2016-12-20|Netspective Communications Llc|Integration of devices through a social networking platform| US9697263B1|2013-03-04|2017-07-04|Experian Information Solutions, Inc.|Consumer data request fulfillment system| US20140258083A1|2013-03-06|2014-09-11|Venkat Achanta|Systems and methods for microfinance credit data processing and reporting| US8972400B1|2013-03-11|2015-03-03|Consumerinfo.Com, Inc.|Profile data management| US20140258089A1|2013-03-11|2014-09-11|Experian Information Solutions, Inc.|Estimated score stability system| US20140279329A1|2013-03-15|2014-09-18|Bernaldo Dancel|Debt extinguishment ranking model| US9553936B2|2013-03-15|2017-01-24|Google Inc.|Targeting of digital content to geographic regions| US10268645B2|2013-04-04|2019-04-23|Sap Se|In-database provisioning of data| US20140324655A1|2013-04-26|2014-10-30|Creditcast Inc.|Electronic system, computing device and methods for updating data records across multiple electronic credit databases| US10115102B2|2013-10-14|2018-10-30|Equifax Inc.|Providing identification information to mobile commerce applications| US10102536B1|2013-11-15|2018-10-16|Experian Information Solutions, Inc.|Micro-geographic aggregation system| US9280678B2|2013-12-02|2016-03-08|Fortinet, Inc.|Secure cloud storage distribution and aggregation| US9529851B1|2013-12-02|2016-12-27|Experian Information Solutions, Inc.|Server architecture for electronic data quality processing| US10579647B1|2013-12-16|2020-03-03|Palantir Technologies Inc.|Methods and systems for analyzing entity performance| US20160055487A1|2014-02-07|2016-02-25|Bank Of America Corporation|Determining user authentication based on user patterns within application| US10262362B1|2014-02-14|2019-04-16|Experian Information Solutions, Inc.|Automatic generation of code for attributes| EP2916242B1|2014-03-06|2019-06-05|Tata Consultancy Services Limited|Graph-based entity resolution for documents using either bucket or record centric parallelization| MX2016011739A|2014-03-11|2017-05-15|Trans Union Llc|Digital prescreen targeted marketing system and method.| US20150287091A1|2014-04-08|2015-10-08|Turn Inc.|User similarity groups for on-line marketing| US9608982B2|2014-04-14|2017-03-28|Trulioo Information Services, Inc.|Identity validation system and associated methods| CN106462605A|2014-05-13|2017-02-22|云聚公司|Distributed secure data storage and transmission of streaming media content| US9449346B1|2014-05-21|2016-09-20|Plaid Technologies, Inc.|System and method for programmatically accessing financial data| US9595023B1|2014-05-21|2017-03-14|Plaid Technologies, Inc.|System and method for facilitating programmatic verification of transactions| US20160048700A1|2014-08-14|2016-02-18|Nagravision S.A.|Securing personal information| US9811848B2|2014-09-08|2017-11-07|Facebook, Inc.|Verifying purchasers of restricted gifts| US11042946B2|2014-09-30|2021-06-22|Walmart Apollo, Llc|Identity mapping between commerce customers and social media users| US9774681B2|2014-10-03|2017-09-26|Fair Isaac Corporation|Cloud process for rapid data investigation and data integrity analysis| EP3767472A1|2014-10-07|2021-01-20|Optum, Inc.|Highly secure system, computing environment and method for transforming, securing and transmitting personal information| US10180861B2|2014-11-11|2019-01-15|Fair Isaac Corporation|Stream schema resolution and stream tuple processing in a distributed stream-processing system| US9942398B2|2015-02-03|2018-04-10|At&T Intellectual Property I, L.P.|Just-in time data positioning for customer service interactions| US20170109735A1|2015-07-14|2017-04-20|Fmr Llc|Computationally Efficient Transfer Processing and Auditing Apparatuses, Methods and Systems| US10402792B2|2015-08-13|2019-09-03|The Toronto-Dominion Bank|Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers| US10104059B2|2015-09-08|2018-10-16|Plaid Technologies, Inc.|Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts| US20180253702A1|2015-11-24|2018-09-06|Gartland & Mellina Group|Blockchain solutions for financial services and other transactions-based industries| US10757154B1|2015-11-24|2020-08-25|Experian Information Solutions, Inc.|Real-time event-based notification system| CA3004599A1|2015-11-24|2017-06-01|Trans Union Llc|System and method for automated address verification| US9940728B2|2015-12-15|2018-04-10|Intel Corporation|Computer vision assisted item search| US10770181B2|2015-12-16|2020-09-08|Alegeus Technologies, Llc|Systems and methods for reducing resource consumption via information technology infrastructure| US10726491B1|2015-12-28|2020-07-28|Plaid Inc.|Parameter-based computer evaluation of user accounts based on user account data stored in one or more databases| US10992649B2|2016-04-01|2021-04-27|Consensys Software Inc.|Systems and methods for privacy in distributed ledger transactions| US10362058B2|2016-05-13|2019-07-23|Vmware, Inc|Secure and scalable data transfer using a hybrid blockchain-based approach| US10460118B2|2016-08-30|2019-10-29|Workday, Inc.|Secure storage audit verification system| US10187203B2|2016-08-30|2019-01-22|Workday, Inc.|Secure storage encryption system| US10177908B2|2016-08-30|2019-01-08|Workday, Inc.|Secure storage decryption system| US20180075527A1|2016-09-14|2018-03-15|Royal Bank Of Canada|Credit score platform| US20180089379A1|2016-09-23|2018-03-29|HealthcarePays Network, LLC|Healthcare claim analysis network| EP3535729A4|2016-11-01|2020-06-24|B. Well Connected Health, Inc.|Systems and methods of aggregating healthcare-related data from multiple data centers and corresponding applications| US20200074109A1|2016-12-02|2020-03-05|Equifax Inc.|Generating and processing obfuscated sensitive information| US10547592B2|2017-01-19|2020-01-28|Hewlett Packard Enterprise Development Lp|Computing a global sum that preserves privacy of parties in a multi-party environment| CA3050139A1|2017-01-31|2018-08-09|Experian Information Solutions, Inc.|Massive scale heterogeneous data ingestion and user resolution| US10586067B2|2017-02-22|2020-03-10|International Business Machines Corporation|System and method of protecting digitally transferred data| US10783112B2|2017-03-27|2020-09-22|International Business Machines Corporation|High performance compliance mechanism for structured and unstructured objects in an enterprise| US10469460B2|2017-04-17|2019-11-05|Cisco Technology, Inc.|Data sharing in a blockchain-enabled trust domain| US10742393B2|2017-04-25|2020-08-11|Microsoft Technology Licensing, Llc|Confidentiality in a consortium blockchain network| US10282790B1|2017-05-09|2019-05-07|Promontech Llc|Systems, media, and methods for enriching data records and enabling historical data replay| US20210042366A1|2017-06-19|2021-02-11|Equifax Inc.|Machine-learning system for servicing queries for digital content| US10735183B1|2017-06-30|2020-08-04|Experian Information Solutions, Inc.|Symmetric encryption for private smart contracts among multiple parties in a private peer-to-peer network| US20200201878A1|2017-07-22|2020-06-25|Plaid Inc.|Browser-based aggregation| US10878421B2|2017-07-22|2020-12-29|Plaid Inc.|Data verified deposits| US20200265155A1|2017-10-30|2020-08-20|Equifax Inc.|Data protection via aggregation-based obfuscation| CA3084360A1|2018-01-08|2019-07-11|Equifax Inc.|Facilitating entity resolution, keying, and search match without transmitting personally identifiable information in the clear| WO2019157491A1|2018-02-12|2019-08-15|Equifax Inc.|Facilitating entity resolution via secure entity resolution database| AU2019239311A1|2018-03-23|2020-10-29|Equifax Inc.|Facilitating queries of encrypted sensitive data via encrypted variant data objects| JP2021521526A|2018-04-13|2021-08-26|プレイド インク|Secure permission to access user accounts, including secure distribution of user account aggregate data| US20190356672A1|2018-05-16|2019-11-21|Equifax Inc.|Controlling access to secured data via timed filtering of data| US10963434B1|2018-09-07|2021-03-30|Experian Information Solutions, Inc.|Data architecture for supporting multiple search models| US20200143363A1|2018-11-02|2020-05-07|Comenity Llc|Seamless electronic system and method for application, acceptance of, authorizing access to, and tracking purchases made with a new credit account| CA3060136A1|2018-11-02|2020-05-02|Comenity Llc|Seamless electronic system and method for application, acceptance of, authorizing access to, and tracking purchases made with a new credit account| AU2019413702A1|2018-12-28|2021-07-22|Plaid Inc.|System and method of filtering internet traffic via a client fingerprint| US20200226284A1|2019-01-11|2020-07-16|Experian Information Solutions, Inc.|Systems and methods for secure dataaggregation and computation| US20200364246A1|2019-03-13|2020-11-19|Fico|Relationship Retrieval in a Partitioned List of Records| CA3134595A1|2019-03-26|2020-10-01|Equifax Inc.|Verification of electronic identity components| US11030222B2|2019-04-09|2021-06-08|Fair Isaac Corporation|Similarity sharding| US20200327560A1|2019-04-15|2020-10-15|Comenity Llc|Manage information pertaining to anonymous and known customer activity| CA3139144A1|2019-05-14|2020-11-19|Equifax Inc.|Data protection via attributes-based aggregation| US20210064725A1|2019-08-26|2021-03-04|Comenity Llc|Generating and utilizing a digital pass with user verification and autofill formatted data| US20210065160A1|2019-08-30|2021-03-04|Comenity Llc|Replacing a customer card payment with a one-time loan at a point of sale|US9569797B1|2002-05-30|2017-02-14|Consumerinfo.Com, Inc.|Systems and methods of presenting simulated credit score information| US8732004B1|2004-09-22|2014-05-20|Experian Information Solutions, Inc.|Automated analysis of data to generate prospect notifications based on trigger events| US7711636B2|2006-03-10|2010-05-04|Experian Information Solutions, Inc.|Systems and methods for analyzing data| US9690820B1|2007-09-27|2017-06-27|Experian Information Solutions, Inc.|Database system for triggering event notifications based on updates to database records| US8312033B1|2008-06-26|2012-11-13|Experian Marketing Solutions, Inc.|Systems and methods for providing an integrated identifier| US9256904B1|2008-08-14|2016-02-09|Experian Information Solutions, Inc.|Multi-bureau credit file freeze and unfreeze| US20100174638A1|2009-01-06|2010-07-08|ConsumerInfo.com|Report existence monitoring| US9652802B1|2010-03-24|2017-05-16|Consumerinfo.Com, Inc.|Indirect monitoring and reporting of a user's credit data| US10102536B1|2013-11-15|2018-10-16|Experian Information Solutions, Inc.|Micro-geographic aggregation system| US10262362B1|2014-02-14|2019-04-16|Experian Information Solutions, Inc.|Automatic generation of code for attributes| US10572296B2|2015-02-27|2020-02-25|Savi Technology, Inc.|System and method for a data processing architecture| US10757154B1|2015-11-24|2020-08-25|Experian Information Solutions, Inc.|Real-time event-based notification system| CA3050139A1|2017-01-31|2018-08-09|Experian Information Solutions, Inc.|Massive scale heterogeneous data ingestion and user resolution| US10735183B1|2017-06-30|2020-08-04|Experian Information Solutions, Inc.|Symmetric encryption for private smart contracts among multiple parties in a private peer-to-peer network| JP2021523504A|2018-05-06|2021-09-02|ストロング フォース ティエクス ポートフォリオ 2018,エルエルシーStrong Force Tx Portfolio 2018,Llc|Methods and systems for improving machines and systems that automate the execution of distributed ledgers and other transactions in the spot and futures markets for energy, computers, storage, and other resources.| US10880313B2|2018-09-05|2020-12-29|Consumerinfo.Com, Inc.|Database platform for realtime updating of user data from third party sources| US10963434B1|2018-09-07|2021-03-30|Experian Information Solutions, Inc.|Data architecture for supporting multiple search models| CN110365782A|2019-07-18|2019-10-22|江苏德高物联技术有限公司|A kind of Internet of Things means of communication, equipment, hardware terminal and server based on Netty| CN111147568B|2019-12-23|2020-08-25|浙江口碑网络技术有限公司|Identity data synchronization method and device| US11222358B2|2020-05-29|2022-01-11|At&T Intellectual Property I, L.P.|Facilitation of artificial intelligence predictions of telecommunications customers| CN112364016B|2020-10-27|2021-08-31|中国地震局地质研究所|Construction method of time nested cache model of pilot frequency data object|
法律状态:
2021-10-13| B350| Update of information on the portal [chapter 15.35 patent gazette]|
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 US201762452701P| true| 2017-01-31|2017-01-31| US62/452,701|2017-01-31| PCT/US2018/016258|WO2018144612A1|2017-01-31|2018-01-31|Massive scale heterogeneous data ingestion and user resolution| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|