Authenticated access and aggregation database platform

Information

  • Patent Grant
  • 12074876
  • Patent Number
    12,074,876
  • Date Filed
    Wednesday, April 22, 2020
    4 years ago
  • Date Issued
    Tuesday, August 27, 2024
    4 months ago
Abstract
A data processing system is disclosed for data processing, including database and file management, as well accessing one or more databases or other data structures, authenticating users, and categorizing data items for addition to the database system. In some embodiments, the system may be configured to coordinate access to user account information via user-provided authentication credentials; apply account identification rules to the accessed account information to identify a plurality of accounts of the user; and initiate updates to a database record associated with the user indicative of any accounts identified.
Description
LIMITED COPYRIGHT AUTHORIZATION

A portion of the disclosure of this patent document includes material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyrights whatsoever.


BACKGROUND

Electronic databases provide storage and retrieval of digital data records. Data records in such databases may be electronically updated. Certain data records have access restrictions, such as restrictions regarding entities that can view or make use of the records, as well as restrictions on entities that can provide updates or changes to such records.


SUMMARY OF EMBODIMENTS

The systems, methods, and devices described herein each have several aspects, no single one of which is solely responsible for its desirable attributes. Without limiting the scope of this disclosure, several non-limiting features will now be described briefly.


In some embodiments, an account discovery system interfaces between an end-user (for example, a consumer) and one or more external accounts of the user to identify accounts of the user based on data items accessed at the external accounts. Multiple data items, which may be accessed or received from one or more third-party entities, such as via a direct application programming interface (API) communication channel, are analyzed to determine whether any of the data items, or combinations of data items, meet rules for addition of the data items to a secure third-party risk item database.


A system of one or more computers can be configured to perform particular operations or actions by virtue of having software, firmware, hardware, or a combination of them installed on the system that in operation causes or cause the system to perform the actions. One or more computer programs can be configured to perform particular operations or actions, such as those described below as computerized methods or simply methods, by virtue of including instructions that, when executed by data processing apparatus, cause the apparatus to perform the actions.


In one embodiment, a computerized method is performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system to perform the computerized method comprising receiving, via network communication with a user computing device, selection of a third-party entity from a plurality of third-party entities indicated in a user interface displayed on the user computing device, and credentials for directly accessing, by proxy on behalf of the user via an application programming interface (API), a plurality of data items associated with the user stored in one or more databases associated with the selected third-party entity. The method may further include transmitting at least an API token associated with the selected third-party and the credential to one or more databases associated with the selected third-party, accessing a plurality of data items associated with the user, via an API communication channel established with the one or more databases associated with the selected third-party entity. The method may further include selecting a first data item of the plurality of data items, determining a recipient identified in the first data item, identifying a subset of data items each indicating the determined recipient, wherein the subset of data items includes at least the first data item and one or more other data items. The method may further include determining, based at least on the identified subset of data items, account data associated with an account of the user associated with the recipient, the account data comprising at least one or more of: a number of data items each having time stamps within a predetermined time period, average number of days between time stamps of sequential data items, applying a first account identification rule, associated with a first account type, to the account data, determine, based on said application of the first account identification rule, a first confidence level indicating likelihood that the account is the first type of account. The method may further include, in response to determining that the first confidence level is about a first threshold, applying a first account scoring model to the account data, the first account scoring model configured to determine an expected change to a risk score associated with the user. The method may further include receiving, from the user computing device, confirmation that the account of the user is the first type of account, receiving, from the user computing device, a request to add the account with the recipient to risk data associated with the user at a secured third-party risk database. The method may further include generating, based on portions of the plurality of data items and the account data associated with the recipient, an account creation data package, the account creation data package formatted for ingestion at the secured third-party risk database to initiate addition of the account to risk data of the user, identifying a security key associated with the secured third-party risk database. The method may further include transmitting the security key and the account creation data package to the third-party risk database via a secure communication channel established with the third-party risk database, requesting execution of a risk scoring algorithm using risk data of the user at the secured third-party risk database, wherein the risk scoring algorithm is based at least partly on portions of the plurality of data items or the account data included in the risk data of the user. The method may further include providing risk score change information to the user computing device.


In one embodiment, the method further includes, prior to receiving credentials from the user computing device, transmit user interface data to the user computing device, the user interface data configured to depict a permissions interface element that is selectable to indicate authorization to access account information associated with the user, and receiving, from the user computing device, authorization to access account information associated with the user.


In one embodiment, the method further includes transmitting user interface data to the user computing device, the user interface data configured to depict a user interface including one or more interactive elements selectable to indicate authorized uses of the data items associated with the user by the computing system, receiving, from the user computing device, selection of authorized uses of the data items, and selectively sharing, based on the authorized uses of the data items, the data items with one or more third parties.


In one embodiment, determining a recipient identified in the first data items comprises: determining a recipient identifier in the first data item, accessing a recipient data structure storing indications of associations between recipient identifiers and corresponding recipients, wherein the recipient is associated with a plurality of recipient identifiers used by different third-party databases to identify the recipient, and determining that the recipient identifier is associated with the recipient in the recipient data structure. In one embodiment, associations between recipient identifiers and corresponding recipients are deterministic. In one embodiment, associations between recipient identifiers and corresponding recipients are probabilistic.


In one embodiment, the account creation data package includes at least: an identifier of the recipient, a data furnisher identifier associated with an entity that provides consumer data to the secured third-party risk database, and at least a portion of the account information formatted for ingestion by the secured third-party risk database to initiate addition of the account to risk data of the user. In one embodiment, the security key comprises an an API token associated with the secured third-party risk database.


In one embodiment, the method further includes determining a first one or more items available to the user based on the current risk score, determining a second one or more items not available to the user based on the current risk score, determining an estimated risk score of the user based on potential addition of a new account of the user to risk data of the user, in response to determining that at least one of the second one or more items would be available to the user based on the estimated risk score, providing an option to the user in the interactive user interface to initiate updates to risk data of the user, in response to receiving an indication of selection of the option in the interactive user interface on the user device, initiating receiving via network communication with the user computing device, determining an updated risk score based at least on the risk score change information, determining at least one of the second one or more items eligible to the user based on the updated risk score, and updating the interactive user interface data to depict information regarding the at least one of the second one or more items in the user interface on the user device. In one embodiment, the first account scoring model is configured to determine an estimated risk score change if the first account of the first account type is added to the risk data of the user, wherein the first account scoring model is based at least on actual risk score changes of a plurality of other users in response to addition of accounts of the first account type to their respective risk data. In one embodiment, the method further includes, for each of a plurality of accounts included in the risk data of the user, determining an account type from a plurality of account types, identifying a second account type of the plurality of account types that impacts risk scores of users that is not included in the determined account types of the plurality accounts of the user, executing a score impact algorithm, based at least on the second account type and the risk data of the user, to determine a possible risk score change if an account of the second account type is added to the risk data of the user, and providing, to the user, an indication of the possible risk score change prior to receiving the request to add the account with the recipient to risk data of the user at the secured third-party risk database.


In one embodiment, a computing system comprising a hardware computer processor is configured to perform processor-executable instructions comprising receiving, via network communication with a user computing device, selection of a third-party entity from a plurality of third-party entities indicated in a user interface displayed on the user computing device, and credentials for directly accessing, by proxy on behalf of the user via an application programming interface (API), a plurality of data items associated with the user stored in one or more databases associated with the selected third-party entity, transmitting at least an API token associated with the selected third-party and the credential to one or more databases associated with the selected third-party, accessing a plurality of data items associated with the user, via an API communication channel established with the one or more databases associated with the selected third-party entity, selecting a first data item of the plurality of data items, determining a recipient identified in the first data item, identifying a subset of data items each indicating the determined recipient, wherein the subset of data items includes at least the first data item and one or more other data items, determining, based at least on the identified subset of data items, account data associated with an account of the user associated with the recipient, the account data comprising at least one or more of: a number of data items each having time stamps within a predetermined time period, and average number of days between time stamps of sequential data items. In one embodiment, the operations further comprise applying a first account identification rule, associated with a first account type, to the account data; determining, based on said application of the first account identification rule, a first confidence level indicating likelihood that the account is the first type of account, in response to determining that the first confidence level is about a first threshold, applying a first account scoring model to the account data, the first account scoring model configured to determine an expected change to a current risk score associated with the user, receiving, from the user computing device, confirmation that the account of the user is the first type of account, receiving, from the user computing device, a request to add the account with the recipient to risk data associated with the user at a secured third-party risk database, generating, based on portions of the plurality of data items and the account data associated with the recipient, an account creation data package, the account creation data package formatted for ingestion at the secured third-party risk database to initiate addition of the account to risk data of the user, identifying a security key associated with the secured third-party risk database, transmitting the security key and the account creation data package to the third-party risk database via a secure communication channel established with the third-party risk database, requesting execution of a risk scoring algorithm using risk data of the user at the secured third-party risk database, wherein the risk scoring algorithm is based at least partly on portions of the plurality of data items or the account data included in the risk data of the user, and providing risk score change information to the user computing device.


In one embodiment, the operations further comprise, prior to receiving credentials from the user computing device, transmit user interface data to the user computing device, the user interface data configured to depict a permissions interface element that is selectable to indicate authorization to access account information associated with the user, and receiving, from the user computing device, authorization to access account information associated with the user. In one embodiment, the operations further comprise transmitting user interface data to the user computing device, the user interface data configured to depict a user interface including one or more interactive elements selectable to indicate authorized uses of the data items associated with the user by the computing system, receiving, from the user computing device, selection of authorized uses of the data items, and selectively sharing, based on the authorized uses of the data items, the data items with one or more third parties.


In one embodiment, a non-transitory computer readable medium has processor-executable instructions stored thereon that are executable by a hardware computer processor to perform operations comprising receiving, via network communication with a user computing device, selection of a third-party entity from a plurality of third-party entities indicated in a user interface displayed on the user computing device, and credentials for directly accessing, by proxy on behalf of the user via an application programming interface (API), a plurality of data items associated with the user stored in one or more databases associated with the selected third-party entity, transmitting at least an API token associated with the selected third-party and the credential to one or more databases associated with the selected third-party, accessing a plurality of data items associated with the user, via an API communication channel established with the one or more databases associated with the selected third-party entity, selecting a first data item of the plurality of data items, determining a recipient identified in the first data item, identifying a subset of data items each indicating the determined recipient, wherein the subset of data items includes at least the first data item and one or more other data items, determining, based at least on the identified subset of data items, account data associated with an account of the user associated with the recipient, the account data comprising at least one or more of: a number of data items each having time stamps within a predetermined time period, and average number of days between time stamps of sequential data items. In one embodiment, the operations further comprise applying a first account identification rule, associated with a first account type, to the account data; determining, based on said application of the first account identification rule, a first confidence level indicating likelihood that the account is the first type of account, in response to determining that the first confidence level is about a first threshold, applying a first account scoring model to the account data, the first account scoring model configured to determine an expected change to a current risk score associated with the user, receiving, from the user computing device, confirmation that the account of the user is the first type of account, receiving, from the user computing device, a request to add the account with the recipient to risk data associated with the user at a secured third-party risk database, generating, based on portions of the plurality of data items and the account data associated with the recipient, an account creation data package, the account creation data package formatted for ingestion at the secured third-party risk database to initiate addition of the account to risk data of the user, identifying a security key associated with the secured third-party risk database, transmitting the security key and the account creation data package to the third-party risk database via a secure communication channel established with the third-party risk database, requesting execution of a risk scoring algorithm using risk data of the user at the secured third-party risk database, wherein the risk scoring algorithm is based at least partly on portions of the plurality of data items or the account data included in the risk data of the user, and providing risk score change information to the user computing device.


In one embodiment, a non-transitory computer readable medium has processor-executable instructions stored thereon that are executable by a hardware computer processor to perform operations comprising transmitting user interface data to a user computing device, the user interface data configured to depict a permissions interface element that is selectable to indicate authorization to access account information associated with the user, receiving, from the user computing device, authorization to access account information associated with the user, in response to receiving the authorization to access account information associated with the user, receiving, from the user computing device, selection of a third-party entity from a plurality of third-party entities indicated in a user interface on the user computing device, receiving credentials for accessing account information associated with the user at the selected third-party entity, identifying an API token associated with the selected third-party entity, transmitting to an online address associated with a system in electronic communication with the selected third-party entity, the API token and the credentials, receiving, via the system, indicators of one or more accounts of the user with the selected third-party entity, receiving, from the user computing device, selection of an account of the one or more financial accounts, accessing, via a secure communication session initiated with the API token, a plurality of data items of the selected account of the user at the third-party entity, transmitting user interface data to the user computing device, the user interface data configured to depict a user interface on a display of the user computing device, the user interface including one or more interactive elements selectable to indicate authorized uses of the data items by the computing system, receiving, from the user computing device, selection of authorized uses of the data items, and selectively sharing, based on the authorized uses of the data items, the data items with one or more third parties.


In one embodiment, a computerized method performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system comprises transmitting user interface data to a user computing device, the user interface data configured to depict a permissions interface element that is selectable to indicate authorization to access account information associated with the user, receiving, from the user computing device, authorization to access account information associated with the user. The method may further include, in response to receiving the authorization to access account information associated with the user, receiving, from the user computing device, selection of a third-party entity from a plurality of third-party entities indicated in a user interface on the user computing device, receiving credentials for accessing account information associated with the user at the selected third-party entity, identifying an API token associated with the selected third-party entity, transmitting to an online address associated with a system in electronic communication with the selected third-party entity, the API token and the credentials, receiving, via the system, indicators of one or more accounts of the user with the selected third-party entity, receiving, from the user computing device, selection of an account of the one or more financial accounts, accessing, via a secure communication session initiated with the API token, a plurality of data items of the selected account of the user at the third-party entity, transmitting user interface data to the user computing device, the user interface data configured to depict a user interface on a display of the user computing device, the user interface including one or more interactive elements selectable to indicate authorized uses of the data items by the computing system, receiving, from the user computing device, selection of authorized uses of the data items. The method may further include selectively sharing, based on the authorized uses of the data items, the data items with one or more third parties.


In one embodiment, transaction data items associated with a post date more than one year prior to a current date are disregarded. In one embodiment, transaction data items associated with a post date more than two years prior to a current date are disregarded. In one embodiment, the computing system comprises the system in electronic communication with the selected third-party. In one embodiment, the system in electronic communication with the selected third-party entity is operated by a third-party. In one embodiment, the user interface includes an iframe provided by the system in electronic communication with the selected third-party, wherein the credentials are provided directly to the system electronic communication with the selected third-party. In one embodiment, the credentials are not stored by the computing system. In one embodiment, the credentials comprises a username and password. In one embodiment, the credentials comprise biometric data of the user. In one embodiment, the system in electronic communication with the selected third-party entity communicates with the third-party entity via a secured API communication channel initiated via use of a second API token associated with the third-party entity. In one embodiment, the system in electronic communication with the selected third-party entity stores the credentials for use in a later request for information associated with the user from the selected third-party entity.


In one embodiment, a computerized method performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system comprises receiving, from a user computing device, a request to update risk data of the user with account information regarding an account identified in account data items associated with the user stored by a third-party entity, generating an account creation data package formatted for ingestion at a secured third-party risk database to initiate addition of the account to risk data of the user. The account creation data package may include an identifier of recipient indicated in each of the account data items, a data furnisher identifier associated with an entity that provides consumer data to the secured third-party risk database, and at least a portion of the account information formatted for ingestion by the secured third-party risk database to initiate addition of the account to risk data of the user, identifying an API token associated with the secured third-party risk database. The method may include transmitting the API token and the account creation data package to the secured third-party risk database via an secure communication channel established with the third-party risk database, wherein the account information is usable to update a risk score of the user.


In one embodiment, the account information includes a plurality of historical transaction data items indicating a corresponding plurality of historical transactions between the recipient and the user. In one embodiment, the method further includes requesting execution of a risk scoring algorithm using risk data of the user at the secured third-party risk database, including the plurality of historical transaction data items included in the risk data of the user. In one embodiment, the method further includes receiving, from the secured third-party risk database, a risk score of the user based on said execution of the risk scoring algorithm, and transmitting a notification to the user indicating the risk score. In one embodiment, the method further includes, in response to determining that the risk score is lower than a previous risk score of the user, initiating activation of a user interface on the user computing device that includes an option to remove the account information from the risk data of the user, in response to selection of the option to remove the account information from the risk data of the user, generating an account removal data package formatted for ingestion at the secured third-party risk database to initiate removal of the account from risk data of the user, the account removal data package including: the identifier of the recipient and the data furnisher identifier associated with the entity that provides consumer data to the secured third-party risk database, and transmitting the account removal data package to the secured third-party risk database via a secure communication channel.


In one embodiment, the method further includes receiving updated account information regarding the account associated with the user, the updated account information including a transaction data item not included in the plurality of historical transaction data items, generating an account update data package formatted for ingestion at the secured third-party risk database to initiate update of risk data of the user associated with the account, the account update data package including: an identifier of the recipient indicated in the transaction data item, the data furnisher identifier associated with the entity that provides consumer data to the secured third-party risk database, and at least a portion of the updated account information formatted for ingestion by the secured third-party risk database to initiate addition of the transaction data item to risk data of the user, and transmitting the API token associated with the secured third-party risk database and the account update data package to the secured third-party risk database. In one embodiment, the method further includes, requesting execution of a risk scoring algorithm using risk data of the user at the secured third-party risk database, wherein the risk scoring algorithm is based at least partly on portions of the plurality of historical transaction data items and the transaction data item. In one embodiment, the method further includes receiving, from the secured third-party risk database, a risk score of the user based on said execution of the risk scoring algorithm, and in response to determining that a risk score of the user is different than prior to transmitting the account update data package to the secured third-party risk database, transmitting a notification to the user. In one embodiment, the notification comprises a push notification to the user computing device, the push notification configured to automatically activate an application on the user computing device to cause display of information associated with the notification. In one embodiment, the notification is transmitted to the user in real-time from receiving the updated account information.


In one embodiment, the computerized method further comprises receiving, via network communication with the user computing device, selection of a third-party entity from a plurality of third-party entities indicated in a user interface displayed on the user computing device, credentials for directly accessing, by proxy on behalf of the user via an application programming interface (API), the account items associated with the user stored in one or more databases associated with the third-party entity, transmitting at least an API token associated with the selected third-party and the credential to one or more databases associated with the selected third-party entity, accessing the account data items associated with the user, via an API communication channel established with the one or more databases associated with the selected third-party entity, selecting a first data item of the plurality of account data items, determining a recipient identified in the first data item, identifying a subset of account data items each indicating the determined recipient, wherein the subset of account data items includes at least the first data item and one or more other account data items, determining, based at least on the identified subset of account data items, account data associated with an account of the user associated with the recipient, the account data comprising at least one or more of: a number of account data items each having time stamps within a predetermined time period, and average number of days between time stamps of sequential account data items, applying a first account identification rule, associated with a first account type, to the account data, determine, based on said application of the first account identification rule, a first confidence level indicating likelihood that the account is the first type of account. In some embodiments, the method further includes, in response to determining that the first confidence level is above a first threshold, applying a first account scoring model to the account data, the first account scoring model configured to determine an expected change to a current risk score associated with the user, requesting execution of a risk scoring algorithm using risk data of the user at the secured third-party risk database, wherein the risk scoring algorithm is based at least partly on portions of the plurality of account data items or the account data included in the risk data of the user, and providing risk score change information to the user computing device.


In one embodiment, a computing system comprising a hardware computer processor is configured to perform operations comprising receiving, from a user computing device, a request to update risk data of the user with account information regarding an account identified in account data items associated with the user stored by a third-party entity, generating an account creation data package formatted for ingestion at a secured third-party risk database to initiate addition of the account to risk data of the user, the account creation data package including: an identifier of recipient indicated in each of the account data items, a data furnisher identifier associated with an entity that provides consumer data to the secured third-party risk database, and at least a portion of the account information formatted for ingestion by the secured third-party risk database to initiate addition of the account to risk data of the user. In some embodiments, the operations further include identifying an API token associated with the secured third-party risk database and transmitting the API token and the account creation data package to the secured third-party risk database via a secure communication channel established with the third-party risk database, wherein the account information is usable to update a risk score of the user.


In one embodiment, the account information includes a plurality of historical transaction data items indicating a corresponding plurality of historical transactions between the recipient and the user. In one embodiment, the operations further comprise requesting execution of a risk scoring algorithm using risk data of the user at the secured third-party risk database, including the plurality of historical transaction data items included in the risk data of the user. In one embodiment, the operations further comprise receiving, from the secured third-party risk database, a risk score of the user based on said execution of the risk scoring algorithm and transmitting a notification to the user indicating the risk score.


In one embodiment, a non-transitory computer readable medium having processor-executable instructions stored thereon that are executable by a hardware computer processor to perform operations comprising receiving, from a user computing device, a request to update risk data of the user with account information regarding an account identified in account data items associated with the user stored by a third-party entity, generating an account creation data package formatted for ingestion at a secured third-party risk database to initiate addition of the account to risk data of the user, the account creation data package including: an identifier of recipient indicated in each of the account data items, a data furnisher identifier associated with an entity that provides consumer data to the secured third-party risk database, and at least a portion of the account information formatted for ingestion by the secured third-party risk database to initiate addition of the account to risk data of the user. In one embodiment, the operations further comprise identifying an API token associated with the secured third-party risk database, and transmitting the API token and the account creation data package to the secured third-party risk database via a secure communication channel established with the third-party risk database, wherein the account information is usable to update a risk score of the user.


In one embodiment, a computerized method performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system comprises receiving authentication information from a user computing device, the authentication information including at least a name and address of a user, transmitting, to a secured third-party risk system, a request for execution of a risk scoring algorithm to determine a current risk score of the user based at least on risk data of the user at the secured third-party risk system, receiving, from the secured third-party risk system, the current risk score of the user, accessing an item database including information associated with a plurality of items and, for each item, an associated criteria for matching the item with users, querying the item database with at least the current risk score of the user, receiving, in response to said querying the item database, information indicating: a first one or more items matched to the user based on the current risk score, and a second one or more items not matched to the user based on the current risk score. In one embodiment, the method further comprises generating interactive user interface data configured to display an interactive user interface on the user computing device, the user interface depicting information regarding at least one of the first one or more items, determining an estimated risk score of the user based on potential addition of a new account of the user to risk data of the user, in response to determining that at least one of the second one or more items would be matched to the user based on the estimated risk score, providing an option to the user in the interactive user interface to initiate updates to risk data of the user, in response to receiving an indication of selection of the option in the interactive user interface on the user computing device, initiating communication between the user computing device and an account discovery system, wherein the account discovery system is configured to identify a new account of the user through analysis of data items associated with the user stored by one or more third-party databases, transmitting, to the secured third-party risk system, a second request for execution of the risk scoring algorithm to determine an updated risk score of the user based at least on risk data of the user, including information regarding the new account of the user, at the secured third-party risk system, receiving, from the secured third-party risk system, the updated risk score of the user, querying the item database with at least the updated risk score of the user, receiving, in response to said querying the item database, information indicating that at least one of the second one or more data items matched to the user based on the updated risk score and updating the interactive user interface data to depict information regarding the at least one of the second one or more items in the user interface on the user computing device.


In one embodiment, the updated risk score equals the estimated risk score. In one embodiment, the user interface further depicts a first access link to a first enrollment entity associated with a first of the one or more items. In one embodiment, the first access link is configured to redirect communication of the user computing device to an enrollment website. In one embodiment, the access links comprise hyperlinks. In one embodiment, said determining the estimated risk score comprises determining a first account type of a plurality of account types that impacts risk scores of users that is not included in risk data of the user, determining a score impact associated with the determined first account type, and calculating the estimated risk score based at least on the current risk score and the score impact. In one embodiment, said determining the score impact associated with the determined first account type comprises identifying a plurality of other users associated with addition of accounts of the first account type to respective risk data, and, based on account data of the plurality of other users, generating a score impact algorithm configured to determine, for respective users, score impacts in response to addition of accounts of the first account type. In one embodiment, the plurality of other users are identified as users having accounts of the first account type with account attributes within a predetermined threshold of account attributes of the new account of the user.


In one embodiment, the method further comprises generating a first access link associated with a first item, the first access link including an online address of a first enrollment entity and personally identifiable information of the user, wherein the personally identifiable information is usable by the first enrollment entity to auto-populate an enrollment user interface with the personally identifiable information of the user. In one embodiment, the items are products or services. In one embodiment, first criteria for matching a first item with users is based on a risk score of the user being greater than a predetermined risk score threshold. In one embodiment, the user interface further includes a filter control configured for interaction with the user of the user computing device to receive a filter criteria, wherein application of the filter criteria generates a filtered set of the first one or more items.


In one embodiment, the account discovery system is configured to perform operations comprising receiving, via network communication with a user computing device, selection of a third-party entity from a plurality of third-party entities indicated in a user interface displayed on the user computing device, credentials for directly accessing, by proxy on behalf of the user via an application programming interface (API), a plurality of data items associated with the user stored in one or more databases associated with the selected third-party entity, transmitting at least an API token associated with the selected third-party and the credential to one or more databases associated with the selected third-party entity, accessing a plurality of data items associated with the user, via an API communication channel established with the one or more databases associated with the selected third-party entity, selecting a first data item of the plurality of data items, determining a recipient identified in the first data item, identifying a subset of data items each indicating the determined recipient, wherein the subset of data items includes at least the first data item and one or more other data items, determining, based at least on the identified subset of data items, account data associated with an account of the user associated with the recipient, the account data comprising at least one or more of: a number of data items each having time stamps within a predetermined time period, and an average number of days between time stamps of sequential data items, applying a first account identification rule, associated with a first account type, to the account data, determine, based on said application of the first account identification rule, a first confidence level indicating likelihood that the account is the first type of account. In one embodiment, the method further includes, in response to determining that the first confidence level is above a first threshold, applying a first account scoring model to the account data, the first account scoring model configured to determine an expected change to a current risk score associated with the user, receiving, from the user computing device, confirmation that the account of the user is the first type of account, receiving, from the user computing device, a request to add the account with the recipient to risk data associated with the user at a secured third-party risk database, generating, based on portions of the plurality of data items and the account data associated with the recipient, an account creation data package, the account creation data package formatted for ingestion at the secured third-party risk database to initiate addition of the account to risk data of the user, identifying a security key associated with the secured third-party risk database, and transmitting the security key and the account creation data package to the third-party risk database via a secure communication channel established with the third-party risk database.


In one embodiment, a computing system comprises a hardware computer processor configured to perform operations comprising receiving authentication information from a user computing device, the authentication information including at least a name and address of a user, transmitting, to a secured third-party risk system, a request for execution of a risk scoring algorithm to determine a current risk score of the user based at least on risk data of the user at the secured third-party risk system, receiving, from the secured third-party risk system, the current risk score of the user, accessing an item database including information associated with a plurality of items and, for each item, an associated criteria for matching the item with users, querying the item database with at least the current risk score of the user, receiving, in response to said querying the item database, information indicating: a first one or more items matched to the user based on the current risk score; and a second one or more items not matched to the user based on the current risk score, generating interactive user interface data configured to display an interactive user interface on the user computing device, the user interface depicting information regarding at least one of the first one or more items, determining an estimated risk score of the user based on potential addition of a new account of the user to risk data of the user, in response to determining that at least one of the second one or more items would be matched to the user based on the estimated risk score, providing an option to the user in the interactive user interface to initiate updates to risk data of the user, in response to receiving an indication of selection of the option in the interactive user interface on the user computing device, initiating communication between the user computing device and an account discovery system, wherein the account discovery system is configured to identify a new account of the user through analysis of data items associated with the user stored by one or more third-party databases, transmitting, to the secured third-party risk system, a second request for execution of the risk scoring algorithm to determine an updated risk score of the user based at least on risk data of the user, including information regarding the new account of the user, at the secured third-party risk system, receiving, from the secured third-party risk system, the updated risk score of the user, querying the item database with at least the updated risk score of the user, receiving, in response to said querying the item database, information indicating that at least one of the second one or more data items matched to the user based on the updated risk score, and updating the interactive user interface data to depict information regarding the at least one of the second one or more items in the user interface on the user computing device.


In one embodiment, the operations further include generating a first access link associated with a first item, the first access link including an online address of a first enrollment entity and personally identifiable information of the user, wherein the personally identifiable information is usable by the first enrollment entity to auto-populate an enrollment user interface with the personally identifiable information of the user.


In one embodiment, a computerized method performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system performs the computerized method comprising determining identification information of a user, obtaining a current risk score associated with the user, determining a first one or more items available to the user based on the current risk score, determining a second one or more items not available to the user based on the current risk score, generating interactive user interface data configured to display an interactive user interface on a user device, the user interface depicting information regarding at least one of the first one or more items, including an access link to an enrollment entity associated with the at least one of the first one or more items, determining an estimated risk score of the user based on potential addition of a new account of the user to risk data of the user, in response to determining that at least one of the second one or more items would be available to the user based on the estimated risk score, providing an option to the user in the interactive user interface to initiate updates to risk data of the user, in response to receiving an indication of selection of the option in the interactive user interface on the user device, initiating communication between the user device and an account discovery system, wherein the account discovery system is configured to identify a new account of the user through analysis of data items associated with the user stored by one or more third-party databases and to trigger generation of an updated risk score, receiving an indication of an updated risk score of the user, wherein the updated risk score is higher than the current risk score based on addition of the new account to risk data of the user by the account discovery system, determining at least one of the second one or more items eligible to the user based on the updated risk score, and updating the interactive user interface data to depict information regarding the at least one of the second one or more items in the user interface on the user device.


In one embodiment, a non-transitory computer readable medium having processor-executable instructions stored thereon are executable by a hardware computer processor to perform operations comprising receiving authentication information from a user computing device, the authentication information including at least a name and address of a user, transmitting, to a secured third-party risk system, a request for execution of a risk scoring algorithm to determine a current risk score of the user based at least on risk data of the user at the secured third-party risk system, receiving, from the secured third-party risk system, the current risk score of the user, accessing an item database including information associated with a plurality of items and, for each item, an associated criteria for matching the item with users, querying the item database with at least the current risk score of the user, receiving, in response to said querying the item database, information indicating: a first one or more items matched to the user based on the current risk score, and a second one or more items not matched to the user based on the current risk score, generating interactive user interface data configured to display an interactive user interface on the user computing device, the user interface depicting information regarding at least one of the first one or more items, determining an estimated risk score of the user based on potential addition of a new account of the user to risk data of the user, in response to determining that at least one of the second one or more items would be matched to the user based on the estimated risk score, providing an option to the user in the interactive user interface to initiate updates to risk data of the user, in response to receiving an indication of selection of the option in the interactive user interface on the user computing device, initiating communication between the user computing device and an account discovery system, wherein the account discovery system is configured to identify a new account of the user through analysis of data items associated with the user stored by one or more third-party databases, transmitting, to the secured third-party risk system, a second request for execution of the risk scoring algorithm to determine an updated risk score of the user based at least on risk data of the user, including information regarding the new account of the user, at the secured third-party risk system, receiving, from the secured third-party risk system, the updated risk score of the user, querying the item database with at least the updated risk score of the user, receiving, in response to said querying the item database, information indicating that at least one of the second one or more data items matched to the user based on the updated risk score, and updating the interactive user interface data to depict information regarding the at least one of the second one or more items in the user interface on the user computing device.


In one embodiment, a computerized method performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system comprises accessing a score impact rule indicating one or more account types that impacts risk scores of users, identifying an API token associated with a secured third-party risk database, transmitting the API token and a request for risk data of a user to the third-party risk database. The method may include accessing, via an secure communication channel established with the third-party risk database, risk data of the user, identifying a plurality of groupings of data items (which may also be referred to as subsets of data items) included in the risk data of the user, each of the groupings including a plurality of data items associated with an entity, determining an account type of a plurality of account types for each of the groupings of data items, identifying a first account type of the one or more account types that impacts credit scores of users that is not included in the determined account types of the plurality of groups of data items associated with the user, execute a score impact algorithm, based at least on the first account type and the risk data of the user, to determine a possible risk score change if an account of the first account type is added to the risk data of the user. The method may include providing, to the user, an indication of the possible risk score change.


In one embodiment, the possible risk score changes indicates an estimated risk score. In one embodiment, the possible risk score changes indicates an estimated risk score increase or decrease. In one embodiment, the method further comprises providing, to the user, an option to initiate addition of an account of the first account type to risk data of the user. In one embodiment, a first plurality of data items associated with a second entity indicate transactions of the user in a second account of the second account type. In one embodiment, the score impact algorithm is developed based at least on historical risk score changes of a plurality of other users in response to addition of respective accounts of the first account type to respective risk data of the users. In one embodiment, the method further comprises executing a second score impact algorithm configured to estimate a second possible risk score associated with addition of a second account of a second account type to the risk data of the user, and providing, to the user, a second indication of the second possible risk score change.


In one embodiment, the computerized method of further comprises receiving, via network communication with a user computing device, selection of a third-party entity from a plurality of third-party entities indicated in a user interface displayed on the user computing device, credentials for directly accessing, by proxy on behalf of the user via an application programming interface (API), a plurality of data items associated with the user stored in one or more databases associated with the selected third-party entity, transmitting at least an API token associated with the selected third-party and the credential to one or more databases associated with the selected third-party entity, accessing a plurality of data items associated with the user, via an API communication channel established with the one or more databases associated with the selected third-party entity, wherein said identifying a plurality of groupings of data items further comprises: selecting a first data item of the plurality of data items, determining a recipient identified in the first data item, identifying a subset grouping of data items each indicating the determined recipient, wherein the subset grouping of data items includes at least the first data item and one or more other data items, determining, based at least on the identified subset grouping of data items, account data associated with an account of the user associated with the recipient, the account data comprising at least one or more of: a number of data items each having time stamps within a predetermined time period, and an average number of days between time stamps of sequential data items. In one embodiment, the method further includes applying a first account identification rule, associated with thea first account type, to the account data, determine, based on said application of the first account identification rule, a first confidence level indicating likelihood that the account is the first type of account, in response to determining that the first confidence level is above a first threshold, applying a first account scoring model to the account data, the first account scoring model configured to determine an expected change to a current risk score associated with the user, receiving, from the user computing device, confirmation that the account of the user is the first type of account type, receiving, from the user computing device, a request to add the account with the recipient to risk data associated with of the user at a the secured third-party risk database, generating, based on portions of the plurality of data items and the account data associated with the recipient, an account creation data package, the account creation data package formatted for ingestion at the secured third-party risk database to initiate addition of the account to risk data of the user, identifying a security key associated with the secured third-party risk database, transmitting the security key and the account creation data package to the third-party risk database via a secure communication channel established with the third-party risk database, requesting execution of a risk scoring algorithm using risk data of the user at the secured third-party risk database, wherein the risk scoring algorithm is based at least partly on portions of the plurality of data items or the account data included in the risk data of the user, and providing risk score change information to the user computing device.


In one embodiment, a computing system is configured to perform operations comprising accessing a score impact rule indicating one or more account types that impacts risk scores of users, identifying an API token associated with a secured third-party risk database, transmitting the API token and a request for risk data of a user to the third-party risk database, accessing, via a secure communication channel established with the third-party risk database, risk data of the user, identifying a plurality of groupings of data items included in the risk data of the user, each of the groupings including a plurality of data items associated with an entity, determining, for each of the groupings of data items, an account type of a plurality of account types, identifying a first account type of the plurality of account types that impacts risk scores when added to risk data of respective users and is not included in the determined account types associated with the user, executing a score impact algorithm, based at least on the first account type and the risk data of the user, to determine a possible risk score change if an account of the first account type is added to the risk data of the user, and providing, to the user, an indication of the possible risk score change.


In one embodiment, the possible risk score changes indicates an estimated risk score. In one embodiment, the possible risk score changes indicates an estimated risk score increase or decrease. In one embodiment, the operations further comprise providing, to the user, an option to initiate addition of an account of the first account type to risk data of the user. In one embodiment, a first plurality of data items associated with a second entity indicate transactions of the user in a second account of the second account type. In one embodiment, the score impact algorithm is developed based at least on historical risk score changes of a plurality of other users in response to addition of respective accounts of the first account type to respective risk data of the users. In one embodiment, the operations further comprise executing a second score impact algorithm configured to estimate a second possible risk score associated with addition of a second account of a second account type to the risk data of the user, and providing, to the user, a second indication of the second possible risk score change.


In one embodiment, a non-transitory computer readable medium having processor-executable instructions stored thereon that are executable by a hardware computer processor to perform operations comprising accessing a score impact rule indicating one or more account types that impacts risk scores of users, identifying an API token associated with a secured third-party risk database, transmitting the API token and a request for risk data of a user to the third-party risk database, accessing, via a secure communication channel established with the third-party risk database, risk data of the user, identifying a plurality of groupings of data items included in the risk data of the user, each of the groupings including a plurality of data items associated with an entity, determining, for each of the groupings of data items, an account type of a plurality of account types, identifying a first account type of the plurality of account types that impacts risk scores when added to risk data of respective users and is not included in the determined account types associated with the user, executing a score impact algorithm, based at least on the first account type and the risk data of the user, to determine a possible risk score change if an account of the first account type is added to the risk data of the user, and providing, to the user, an indication of the possible risk score change.





BRIEF DESCRIPTION OF THE FIGURES


FIG. 1 is an embodiment of a flow diagram illustrating example components and example communications between the components of an embodiment of an authenticated access and aggregation database platform.



FIG. 2A is an embodiment of a block diagram illustrating an account discovery system in communication with various external devices and systems via a network.



FIG. 2B a one embodiment of a block diagram illustrating another example embodiment of an account discovery system in communication with various external computing systems and devices.



FIG. 3 is one embodiment of an example user interface that may be provided to a user to initiate an account discovery process.



FIG. 4 is one embodiment of a block diagram illustrating various components and processes that may be performed according to various embodiments discussed herein.



FIG. 5 is an embodiment of a flowchart illustrating one example of a process of interacting with a consumer, accessing DDA account data of the consumer, identifying non-traditional account(s) of the consumer in the DDA account data, and updating credit data of the consumer at a credit bureau.



FIG. 6 is an embodiment of a block diagram illustrating another example of an account access system and an account discovery system in communication with one another (whether operated by a single and the or by separate entities).



FIG. 7 is one embodiment of a flowchart illustrating one example of a method that may be performed to authorize and initiate access to a user's DDA account information at a financial institution.



FIG. 8 illustrates embodiments of three example user interfaces that may be displayed on a user device.



FIG. 9 illustrates embodiments of example user interfaces that may be provided by the data permissioning component, whether operated by a third-party account access system or the account discovery system, to obtain access credentials from the user.



FIG. 10 illustrates an embodiment of an example user interface that may be presented to the user indicating multiple accounts identified at the financial institution, and providing the user an option to select one or more of the accounts from which the account access system will be authorized to access specific transaction data items.



FIG. 11 is an embodiment of a flowchart illustrating one example of a method that may be performed to categorize data items (for example, transaction data items) from the transaction provider (for example, a financial institution).



FIG. 12 is one embodiment of a flowchart illustrating one embodiment of a method for identifying account types of interest from groupings of transaction data items (for example, from the process of FIG. 11).



FIG. 13 is one embodiment of a flowchart illustrating an example of a method that may be performed to request additional information from third-party and/or from a user.



FIGS. 14-18 are example user interfaces that illustrate a user experience as the account discovery system accesses transaction data items of the user and attempts to identify accounts within the transaction data that can be added to the user's credit data.



FIG. 19-20 include embodiments of example user interfaces that may be presented to a user after scan of the consumer transaction data is completed and, in this example, accounts that may be added to the user's credit data are located.



FIGS. 21-22 are conceptual diagrams illustrating example transaction data items that may be identified in transaction data of the consumer and analyzed to determine whether the groups transaction data items are indicative of an account that can be added to credit data of a consumer.



FIG. 23 illustrates an embodiment of a user interface that may be provided to a user after an initial scan of transaction data items has been performed.



FIG. 24A is another embodiment of an example user interface that provides information regarding an identified account in transaction data items of user, with an option that is selectable by the user to add the account to credit data of the user (as a self-reported account).



FIG. 24B illustrates an embodiment of an example user interface that provides an overview of self-reported accounts that have been added to the credit data of the user.



FIG. 24C illustrates an embodiment of an example user interface that summarizes the various areas of consumer credit that may impact credit worthiness of the user.



FIG. 25 is an embodiment of a block diagram illustrating an account discovery system in communication with a financial institution, a user device, and a credit bureau.



FIG. 26 is an embodiment of a flowchart illustrating one embodiment of a method of providing a new trade line request to a credit bureau to initiate addition of a self-reported account to credit data of the user.



FIG. 27 illustrates an embodiment of example user interfaces associated with addition of a new account to credit data of the user.



FIG. 28A illustrates embodiments of example user interfaces that may be provided to a user to indicate availability of additional product offers, such as credit offers, in view of an increase credit score, such as may be caused by the addition of a new self-reported account to credit data of the user.



FIG. 28B illustrates an embodiment of an example user interface that may be provided after the consumer has boosted their credit file by adding one or more self-reported accounts.



FIG. 28C is an embodiment of an example user interface that may be provided to the user as part of an online credit report that is accessible to the user, either through a free or paid account with a credit reporting agency or other authorized credit reporting entity.



FIG. 28D is an embodiment of another example user interface that may be provided to the user as part of an online credit report.



FIG. 29 provides embodiments of example user interfaces that may be used in a trade line removal process.



FIG. 30 is an embodiment of a flowchart illustrating one embodiment of a method that may be performed to provide updated offers to a user responsive to an increase in credit score of the user that is caused by addition of one or more self-reported accounts to credit data of the user.



FIG. 31 is an embodiment of an example user interface that may be provided by and offer provider, such as an offer provider that prescreens users for credit card offers and provides information regarding matching credit cards to the user.



FIG. 32 includes embodiments of example user interfaces that may be displayed on a mobile device of a user to invite the user to engage the account discovery system to potentially increase the credit score of the user and potentially allow more offers to be provided to the user.



FIG. 33 is an embodiment of a flowchart illustrating one embodiment of a method that may be performed by the account discovery system to provide users with an estimated score increase that they may expect prior to adding new trade lines to their credit file.



FIG. 34 illustrates embodiments of example user interfaces that may be provided to users to indicate possible credit score changes.



FIG. 35 illustrates an embodiment of another example user interface that displays a similar estimate of credit score increase likelihood.



FIG. 36 illustrates an embodiment of an example user interface that may be provided to a consumer who wishes to stop periodic reporting of payment activity for one or more self-reported accounts.



FIG. 37 is an embodiment of an example user interface that may be provided to the user that wishes to dispute information associated with a self-reported account, such as an account that is added as a trade line to credit data of the user by the account discovery system discussed herein.



FIG. 38 is a block diagram illustrating one embodiment of an account discovery system that may be used to implement certain systems and methods discussed herein, such as providing a credit report to a user, gathering transaction data regarding non-traditional credit accounts of users, verifying account information with the user, adding the accounts as a self-reported accounts in the credit data of the user, and updating users' credit scores based on newly added self-reported accounts.





DETAILED DESCRIPTION OF EMBODIMENTS

Although several embodiments, examples and illustrations are disclosed below, the systems and methods described herein extends beyond the specifically disclosed embodiments, examples and illustrations and includes other uses of the embodiments and modifications and equivalents thereof. Embodiments are described with reference to the accompanying figures, wherein like numerals refer to like elements throughout. The terminology used in the description presented herein is not intended to be interpreted in any limited or restrictive manner simply because it is being used in conjunction with a detailed description of certain specific embodiments. In addition, various embodiments can comprise several novel features and no single feature is solely responsible for its desirable attributes or is essential to practicing the embodiments herein described.



FIG. 1 is an embodiment of a flow diagram illustrating example components and example communications between the components of an embodiment of an authenticated access and aggregation database platform. In the example of FIG. 1, multiple data items 10, which may be accessed or received from one or more third-party entities, such as via a direct application programming interface (API) communication channel, are analyzed to determine whether any of the data items 10, or combinations of data items 10, meet rules for addition of the data items 10 to secure third-party risk item database 70. In general, the item database 70 stores and maintains database records for a plurality of users, each having one or more associated data items.


In this example, aggregation unit 20 accesses the multiple data items 10, and identifies groupings (also referred to as “subsets”) of data items each associated with a common entity. For example, multiple data items of a user stored in a third-party database may be included in a grouping. A categorization unit 30 may then apply rules to the groupings of data items to identify groupings that match one or more patterns indicative of groupings of data items that should be added to the item database 70.


Authentication unit 40 allows a user of a user device 50 to provide authentication credentials that uniquely identify the user as associated with a set of data items in a particular data item database, such as a database operated by a particular third-party entity. In some embodiments, the authentication unit 40 also receives authentication credentials via the aggregation unit 20, for example. Thus, authentication of the user may occur at various levels. In some embodiments, the user is the owner of data items associated with the user and can control, set, change, and/or issue electronic permissions for use of varying sets, silos, individual data items, or even particular pieces of data within a data item, via the authentication unit 40.


The authentication unit 40 may then provide a set of authenticated data items 60 to item database 70, such as multiple data items 10 that were aggregated to a particular grouping of data items associated with the user, and matching a rule for addition to the items database 70. The user may then authenticate the grouping of data items, via input from the user device 50, to authenticate the grouping of data items for addition to the item database 70.


The item database 70, after receipt of authenticated data items 60, may determine that information of the corresponding database record, such as a record associated with the user, is to be updated. For example, the authenticated data items 60 may include a grouping of data items each associated with a particular entity (different than the entity from which the data items were accessed) that the user authenticated as begin associated with an account that the user would like to add to the item database 70, such as in a new database record associated with the user. Communication of the authenticated data items 60 to the item database 70 may occur via a secure communication channel established via an application programming interface (API).


In some embodiments, the item database 70 includes records associated with unique identifiers (for example, a key value and/or index value) for users. The system may determine that the received authenticated grouping of data items are associated with a particular database record because the authenticated data items include information that associates them with the particular database record. For example, the authenticated data items may include the unique user identifier, and/or the authenticated data items may include another identifier that may be used to map to the unique user identifier by reference to additional information. The system may then determine that the authenticated data items include additional information regarding the user that is not already in the database record for the user, and may therefore update the database record with the new information.


In some instances, the system may determine that the corresponding database record is not to be updated. For example, the authenticated data items may include one or more groupings of data items that are already included in the database record of the user. Accordingly, no update may be necessary, or in some instances the database record or associated database items may be updated to indicate that a duplicate of the authenticated data items was received.


The system may generate a log of each database record update performed by the system. In some implementations, the log includes one or more (which may include all) data items included in the corresponding database record, including any newly added grouping of data items. Further, the log may include an indication of the change or update that was performed in the item database 70.


Database record updates/changes may be continuously logged as the item database 70 is updated. Logging updates to the item database 70 may speeds up later evaluation of triggers. For example, as described below, triggers may be evaluated against the log of record changes, and may not need to be evaluated against the records database 70 as a whole. This aspect may significantly reduce processing power needed to generate event notifications. Further, because much information related to the updated record may be included in the log, the system may not need to re-query the database to generate notifications, further making the process of generating notification more efficient and less processor intensive. In some implementations, logs of database record updates may be stored in a historical database.


The triggers database 80 maintains rules indicating when alerts should be transmitted to entities responsive to changes in the item database 70. For example, the triggers database may maintain rules or criteria for transmitting a notification 90 to a user (such as via the user device 50) in response to certain changes in the database record of the user in the item database 70. For example, the user may establish such criteria based on various levels of granularity, so that the user is alerted of only those changes to their database record at the item database 70 of particular interest to the user. For example, a user may indicate that an alert should be sent to the user device 50 in response to addition of a new account data (associated with a grouping of data items) to the user's record in the item database 70. Thus, the trigger database 80 may monitor continuously or periodically, changes to the item database 70, apply trigger rules for each of a plurality of users, and transmit notifications accordingly.


The notification 90 may be in various forms, which may be selected by the user, by the system, and/or set as a system default. For example, notification 90 may be a push notification to a mobile application on the user device 50, which may cause an immediate display of the notification information on the user device screen, text message, email, and/or update to an online portal that the user may access to review additional information regarding the users database record with the item database.


In the example of FIG. 1, a notification 92 is also transmitted to third-party device 52. For example, a third-party may establish rules that periodically identify user records within the item database 70 that each have a predetermined set of characteristics. In this embodiment, the notification 92 may include a list of user information, and/or some or all of the corresponding user records from item database 70, that match the third-party established rules.


Aggregation unit 20 may aggregate account data from financial institutions, such as the data items 10. As an example, aggregation unit 20 may download transaction data items 10 associated with users from financial institutions, such that the users can review the transaction data from one or more financial institutions in one place. Aggregation unit 20 may also provide transaction data to the categorization unit 30, which is similar to the account discovery systems discussed below, such as after receiving authorization from users to provide such transaction data to the categorization unit.


Financial institutions may include, as examples, institutions maintaining demand deposit accounts (for example, checking and savings accounts) or other accounts (for example, credit card accounts, revolving card accounts, prepaid cash card accounts, reloadable card accounts, and so forth) on behalf of users, including accepting deposits into users' accounts and processing payments (including check and electronic payments) out of users' accounts to third parties such as utility or rent providers. Financial institutions may provide transaction data to account discovery system showing users' payments to utility and rent providers (for example, at the direction or authorization of said users).


Vendors or service providers may include various service providers such as landlords (for example, rental service providers), telecoms (for example, providers of telephone, internet, wireless accounts, cable, media such as television, movies, games, music, and other related services), and utilities (for example, providers of electricity, gas, water, trash, and related services). In general, service providers may include any entity which is regularly paid by users, such that those payments can be used as an indicator of credit risk associated with the user, and as discussed herein, added as a trade line in a users' credit data. For example, service provider accounts may include accounts for payment of child care, school tuition, gym memberships, after school programs, daycare service, medical care, home owners association dues, country club dues, insurance (such as, for example, automobile insurance, life insurance, medical insurance, dental insurance, vision insurance, disability insurance, and so forth), sports team dues, as well as other service provider account payments. While much of the disclosure references rental and utility providers, accounts with other service providers may also be added to users' credit data and used in credit scoring algorithms.


Terms


To facilitate an understanding of the systems and methods discussed herein, a number of terms are described below. The terms described below, as well as other terms used herein, should be construed to include the provided descriptions, the ordinary and customary meaning of the terms, and/or any other implied meaning for the respective terms. Thus, the descriptions below do not limit the meaning of these terms, but only provide example descriptions.


The terms user, individual, consumer, and customer generally refer to single persons, as well as groups of users, such as, for example, married couples, households, or domestic partners, organizations, groups, and business entities. Additionally, the terms may be used interchangeably. In some embodiments, the terms refer to a computing device of a user rather than, or in addition to, an actual human operator of the computing device.


User Input (also referred to as Input) generally refers to any type of input provided by a user that is intended to be received and/or stored by one or more computing devices, to cause an update to data that is displayed, and/or to cause an update to the way that data is displayed. Non-limiting examples of such user input include keyboard inputs, mouse inputs, digital pen inputs, voice inputs, finger touch inputs (for example, via touch sensitive display), gesture inputs (for example, hand movements, finger movements, arm movements, movements of any other appendage, and/or body movements), and/or the like.


Credit data generally refers to user data that is collected and maintained by one or more credit bureaus (for example, Experian, TransUnion, and Equifax) and is subject to regulatory requirements that limit, for example, sharing of credit data to requesting entities based on the Fair Credit Reporting Act (FCRA) regulations in the United States and/or other similar federal regulations. Regulated data, as used herein, often refers to credit data as an example of such regulated data. However, regulated data may include other types of data, such as HIPPA regulated medical data. Credit data can describe each user data item associated with a user, for example, an account balance, or any combination of the user's data items. Credit file and credit report generally refer to a collection of credit data associated with a user, such as may be provided to the user, to a requesting entity that the user has authorized to access the user's credit data, or to a requesting entity that has a permissible purpose (for example, under the FCRA) to access the users credit data without the user's authorization.


Credit Event (also referred to as an event) generally refers to information associated with an event that is reported by a financial institution to one or more credit bureaus and/or the credit data system discussed herein. The credit events may include, for example, information associated with a payment, purchase, bill payment due date, bank transaction, credit inquiries, and/or any other event that may be reported to a credit bureau. Typically one credit event is associated with one single user. For example, a credit event may be a specific transaction, such as details regarding purchase of a particular product (for example, Target, $12.53, grocery, and so forth) or a credit event may be information associated with a credit line (for example, Citi credit card, $458 balance, $29 minimum payment, $1000 credit limit, and so forth, such as a periodic (for example, monthly) provision of summary information regarding the credit line of the consumer that is provided by the credit issuer.


Non-traditional Credit Data generally refers to data that is not generally included in FCRA regulated credit data of consumers, such as consumer data stored by one or more bureaus. Types of nontraditional credit data may change over time, such as if the FCRA revises regulations to allow or require credit bureaus to store additional types of consumer data as credit data. Depending on the jurisdiction, nontraditional credit data types may include rental, utility, and/or telecom data, for example.


Self-Reported Account generally refers to a consumer account with a vendor or service provider, such as a utility, telecom, or rental company, that is added to credit data of the consumer at the request of the user. The account discovery system discussed herein provides an example of a computing system that may interact with a user to identify and update credit data of the user to include accounts that are Self-Reported Accounts. In general, self-reported accounts are associated with non-traditional credit data, such as utility, rental, and/or telecom payment data.


DDA Account generally refers to a checking, savings, or money market account of a user, but could be any other type of account. DDA accounts typically allow the user to deposit to and withdraw from the account substantially immediately, such as on demand, for example, through use of a credit card, debit card, paper check, online check, electronic transfer, and so forth.


While DDA accounts are discussed herein as sources for transaction data from which transactions of a user may be accessed, in some implementations additional types of accounts, such as credit card, PayPal, Venmo, and/or other currently existing or later developed payment platforms, may be used in identifying new consumer trade lines. Thus, any reference herein to a DDA account, or any specific type of DDA account, should be interpreted to include other embodiments where other types of accounts, such as credit card accounts, are accessed in place of (or in addition to) the referenced DDA account.


Financial institution generally refers to a bank or lender with which a user may have a DDA account, such as a bank with which a user may have a checking or savings account.


Trade line generally refers to credit data associated with a financial account of a user. For example, a checking account at a particular financial institution may be a first trade line of a user, while a savings account at the same, or another, financial institution may be a second trade line of a user. Trade lines may be summarized in credit data of users, such as by providing information regarding the financial institution, account balance, last account payment amount, payment status over prior months, and so forth.


Transaction and transaction data item generally refer to a particular payment from one entity to another entity. For example, a transaction may include Bob purchasing coffee on Friday morning. A transaction data item associated with that transaction may include data about the transaction, such as that it occurred on Aug. 10, 2018 and $7.18 was paid to Coffee123 from Bob's checking account 123 at Bank XYZ. Transaction data items may indicate transactions using various user accounts, such as checking account, savings account, or credit card account. While discussions herein of transaction data items is primarily with reference to transaction identified in DDA account data of a user, transaction data items may also include transaction in a credit card account, or other credit-based account, of the user. Thus, the groupings and analysis of transaction data items that is discussed herein is not limited to only DDA account data, but also may include credit card transaction (and other payment account) data. As another example, cash, cashier check, money order, wire transfers, and other similar forms of payment may be included in transaction data items that are analyzed by the account discovery system. Such forms of payment may require additional validation procedures, such as a photograph of a receipt from the payee.


Application Programming Interface (API) generally refers to a defined communication channel, protocol, settings, and so forth that allows two devices to exchange information between one another in a more direct manner than might otherwise be possible. In some embodiments, an API registration module may be configured to register individual devices (for example, computing devices, Internet of things devices, sensors, and so forth) for communication with a particular computing device (for example, a central server that receives, processes, stores, provides, information to the individual devices) by issuing a security token (for example, such as an API token or an API key) to the individual devices that authorizes such direct communications. Thus, a computing system may establish secure and direct communication channels with multiple devices via APIs.


EXAMPLE EMBODIMENTS

The credit score is an important indicator of a user's financial health. A user's credit score may impact availability and/or terms (for example, interest rate) of such things as loan applications, rental applications, and real estate mortgages, as well as impacting the user's ability to find employment. Therefore, users have a substantial interest in monitoring and improving their credit scores.


Making timely payments and having those payments reported to national credit bureaus may improve a user's credit score. However, the types of financial accounts for which data is reported to the credit reporting agencies (CRAs), otherwise referred to as credit bureaus, is limited. For example, certain types of consumer accounts that could be used as indicators of risk associated with a lender extending credit to the consumer have not been historically included in credit data that is reported to the credit bureaus. In particular, telecommunications, utilities, real estate rentals, and other types of accounts associated with recurring statements, are not included in most credit score algorithms used by the credit bureaus. Thus, consumers that have good payment history with a home rental are not able to use that payment history in improving its the consumer's credit score. Accordingly, it may be desirable for a user to add telecommunications, utility, rental, and/or other recurring accounts (for example, records of payments to utility and rental providers) to users' credit data in order to improve the users' credit scores and related risk scores. Various systems and methods discussed herein provide a networking device architecture, as well as software usable on the various computing devices, to address this need for additional types of payment information being reportable to the credit bureaus. Other examples of recurring accounts that may be identified and added as trade lines to credit data of users may include accounts for payment of child care, school tuition, gym memberships, after school programs, daycare service, medical care, home owners association dues, country club dues, insurance (such as, for example, automobile insurance, life insurance, medical insurance, dental insurance, vision insurance, disability insurance, and so forth), sports team dues, as well as any other service provider account payments.


Some users, particularly those with poor credit scores or limited credit data, may benefit from adding non-traditional credit data to their credit reports. As an example, a user with limited credit data may see a significant boost in their credit score by adding, to their credit data, a utility account, showing recurring on-time payments to a utility provider, and a rental account, showing recurring on-time rent payments to a landlord. The present disclosure describes systems and methods that provide a technology platform for identifying and adding non-traditional credit data, such as rent and utility trade lines, to users' credit reports. Such accounts may then be referred to as self-reported accounts of the consumer. Additionally, the present disclosure describes issues that arise when attempting to add rent and utility accounts, such as issues with obtaining transaction data and assessing the reliability of transaction and account data.



FIG. 2A is an embodiment of a block diagram illustrating an account discovery system 110 (also referred to herein simply as the “system 110”) in communication with various external devices and systems via a network 160. In this example, the system 110 is an indication with multiple transaction providers 100 (generally including one or multiple transaction providers 100A, 100B, 100C, or any other number of transaction providers). Transaction providers may financial institutions that provide DDA accounts to users, such as to consumers or businesses. As discussed further below, transaction providers store transaction data, in the form of transaction data items corresponding to individual transactions of the account holder, in secure databases that limit access to the consumer data. As described below, the account discovery system 110 advantageously provides a technical solution to allowing the system 110 to access transaction data of consumers have one or more transaction providers 100 using authorization credentials provided by the DDA account holder.


In the embodiment of FIG. 2A, the account discovery system 110 is also in communication with a user device 120 (which may refer to the user alone, the user computing device alone, or the combination of the user and the user computing device), a third-party system 130, and a credit bureau 140. The account discovery system 110 includes data permissioning component 112, account identification component 114, account verification component 116, trade line update component 117, and updated credit score usage component 118. In some embodiments, these components are distributed amongst multiple computer systems, servers, devices, and so forth, and/or among different entities, such as with one or more third-party entity that performs some of the functionality discussed with reference to the component. In some embodiments, the transaction providers 100 facilitate transactions between the user device 120 and the third-party system 130. For example, the transaction provider 100A may be a first financial institution with which the user has a checking account. Thus, the transaction provider 100A may facilitate payment of a monthly goods or services fee to the third-party system 130 via an electronic or printed check sent to the third-party system 130.


In one embodiment, the data permissioning component 112 provides a communication channel with the transaction providers 100, such as via application programming interfaces (API's) of the particular transaction providers. Thus, the data permissioning component 112 advantageously allows the account discovery system 110 to access transaction data items of the user. Wth access to the transaction data items of the user, the account discovery system 110 may analyze the transaction data items to potentially identify one or more recurring payment accounts that are not already included in the consumer's credit data. As an example, the data permissioning component 112 may store users' usernames and passwords or security tokens in order to download transaction data from the financial institutions. As another example, the data permissioning component 112 may store records, certificates, or other material enabling the user account discovery system to download transaction data directly from financial institutions or via account aggregation services.


In the embodiment of FIG. 2A, the account identification component 114 analyzes transaction data from one or more transaction provider 100 (for example, from one or more financial institutions) in search of sets of transaction data items indicative of a particular type of account, such as, for example, a recurring payment rental, utility, or telecom account. In some embodiments, the rules for identification of a particular type of account based on a set of transaction data items varies based on the particular type of account. For example, a rental account may have different identification criteria than a cellular telephone account. In some embodiments, the account identification component 114 may calculate a confidence level indicating likelihood that an identified account (for example, an identified rental, utility, or telecom account) is actually an account of the identified type. For example, the confidence level may indicate likelihood that a set of transaction data items really are indicative of a rental account of the consumer, rather than related to other transactions (for example, monthly payments to an ailing relative).


In one embodiment, the account verification component 116 performs account verification, such as by interacting with the user and/or one or more third-party system 130 to verify that the appropriate account type has been associated with the set of transaction data items and/or that the account is truly associated with the particular user.


In one embodiment, the trade line update component 117 provides information to one or more credit bureaus requesting addition of an identified and verified user account (for example, a “self-reported account” of the user) to credit data of the user. For example, the trade line update component 117 may format and compile information regarding a new account to be added to credit data of the user in different formats for each of multiple different credit bureaus and generate a secure data packet storing such information to be transmitted to a remote system. Additionally, the trade line update component 117 may coordinate periodic updates to trade line data stored at the credit bureau 140, such as monthly updates to a rental account that was added to the credit data of the user previously by the trade line update component 117.


In one embodiment, the updated credit score usage component 118 provides updated credit information regarding the user (for example, an updated credit score of the user that considers a newly added rental account) to credit requesters. For example, a new account (or trade line in the credit data of the user) may be considered by various credit scoring algorithms in calculating risk scores of the user. Thus, if a new rental account of the consumer is added to the consumer's credit data, and the consumer has a history of on time rental payments, the consumer's credit score may increase immediately, or very soon, after addition of the new rental account information at the one or more credit bureaus. In some embodiments, the updated credit score usage component 118 provides alerts, such as in real time as credit data of a user is changed.


In some embodiments, the account discovery system 110 includes a user interface module (not shown) that interfaces with users. As an example, the user interface module may generate user-facing user interfaces, such as the user interfaces shown in the figures discussed below. Additionally, the user interface module may receive inputs and commands from the users, such as via interface with the user interfaces. As examples, the user interface module may receive a user's agreement with terms and conditions, may receive a user's identification of which financial institution to connect to, may receive credentials for connecting to an identified financial institution, may receive confirmations of and/or revisions to transaction data, may receive additional verification information such as copies of a lease agreement, and so forth.



FIG. 2B a one embodiment of a block diagram illustrating another example embodiment of an account discovery system in communication with various external computing systems and devices. In this embodiment, the account discovery system 110A includes the account verification component 116 and the updated credit score usage component 118. However, a separate account access system 202 includes the data permissioning component 112 and the account identification component 114. In one embodiment, the account access system 202 is operated and controlled by a third-party to the owner of the account discovery system 110A. For example, the account access system 202 may have relationships or be configured to electronically communicate with multiple transaction providers 100, such as the illustrated transaction provider 100A in FIG. 2B that allow the account access system 202 to access transaction data of the user via user device 120. The transaction providers 100 may be financial institutions, such as banks, lenders, creditors, and/or other facilitators of transactions. For example, the account access system 202 may communicate with the user device 120 to obtain credentials for accessing the users DDA account information at the transaction provider 100A (such as a financial institution), and then make use of an API 204 to access DDA account information from the transaction provider 100A immediately and/or periodically in the future. The DDA account information, for example, including multiple transaction data items, may then be analyzed by the account identification component 114 to identify potential accounts of the desired account type (for example, rental, utility, telecom, etc.). For example, the transaction provider 100A may have previously provided payment(s) to one or more of the utility provider system 130A (such as gas, electric, water, power, solar, or other utility provider), telecom provider system 130B (such as mobile phone provider, phone service provider, internet service provider, cable or satellite television provider, or the like), or other provider 130C, and so forth), and stores transaction data items for each of those payments. These transaction data items stored at the transaction provider 100A may be accessed by the account access system 202 to identify self-reported accounts that may be added to credit data of the user. Information regarding the identified accounts may then be provided to the account discovery system 110A to verify with the user and/or third-party (for example, the utility provider system 130A, telecom provider system 130B, or other provider 130C) and to provide verified accounts to the credit bureau 140.


In this way, the account access system 202 maintains a layer of security between the account discovery system and the consumers financial data held by the financial institution (or other transaction provider 100). In other embodiments, the various components 112, 114, 116, 117, and 118 may be combined or separated, various computing systems and/or entities. For example, in one embodiment each of the components 112, 114, 116, 117, and 118 are operated by different entities.



FIG. 3 is one embodiment of an example user interface that may be provided to a user to initiate an account discovery process. In this particular example, the user interface 300 includes credit score information 310, which includes a current credit score of the user in this example. The example user interface 300 also includes a potential score improvement interface 320, which illustrates estimated likelihood of improvement in the consumer's credit score in response to adding additional non-traditional trade lines to the consumer's credit data. In this particular example, the estimated likelihood of improvement is based on improvements realized by a similar group of consumers, such as consumers that have reticular overlapping attributes as the current user. The example user interface 300 further includes information regarding account types that may be identified by the system and added to the credit data of the user to potentially improve the credit score of the user. In particular, the credit improvement interface 330 illustrates that an electric account, water account, and wireless account could be added to the credit data of the user to potentially increase the user's credit score. In this example, the system has identified that these three account types are not currently in the crediting of the user and, thus, are good candidates for potentially improving the credit score of the user. Any of the user interfaces discussed herein may be provided in part or in whole by a server system (such as, for example, via a web browser access a secure web portal) or may be provided by an application that runs locally on the user device. Additional user interfaces, as well as systems and methods for providing features similar to those discussed herein, may be found in U.S. Provisional Applications No. 62/727,479, titled “System for authenticated access, aggregation, and categorization of database records,” filed on Sep. 5, 2018, and No. 62/826,319, titled “Authenticated access and aggregation database platform,” filed Mar. 29, 2019, each of which are hereby incorporated by reference in their entireties and for all purposes.


In one embodiment, the systems and methods discussed herein provide an authenticated access and aggregation database platform. For example, in one embodiment a data processing system is disclosed for data processing, including database and file management, as well accessing one or more databases or other data structures, authenticating users, and categorizing data items for addition to the database system. In some embodiments, the system may be configured to coordinate access to user account information via user-provided authentication credentials; apply account identification rules to the accessed account information to identify a plurality of accounts of the user; and initiate updates to a database record associated with the user indicative of any accounts identified.


In one embodiment, a computerized method of obtaining information regarding user accounts is performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system to perform operations comprising receiving, from a user computing device, a request to access financial account information associated with a user, selection of a financial institution indicator from a plurality of financial institution indicators indicated in a user interface on the user computing device. The method may further include receiving, from an account access system, account data associated with a financial account of the user with a payee, the account data indicating an account type and an associated payee, wherein the financial account is a rental account, a utility account, or a telecommunication account. The method may further include receiving, from the user computing device, confirmation that identified account type for the payee is accurate, a request to add the financial account with the payee to credit data of the user. The method may further include generating, based on portions of the plurality of transaction data items and the account data associated with the payee, a trade line creation data package, the trade line creation data package formatted for ingestion by a credit bureau to initiate addition of the trade line to credit data of the user, transmitting the trade line creation data package to the credit bureau, requesting a credit score of the user from the credit bureau, wherein a credit scoring algorithm executed by the credit bureau to generate the credit score is based at least partly on portions of the plurality of transaction data items or the account data included in the credit data of the user. The method may further include providing credit score change information to the user computing device.


In one embodiment, the method may further include receiving, from the user computing device credentials for accessing financial account information associated with the user at the selected financial institution, the credentials including a username and a password, selection of a financial account of the user at the financial institution via the user interface on the user computing device, the user interface displaying one or more of a checking account, a savings account, or a credit card account of the user at the financial institution. The method may further include accessing a plurality of transaction data items of the selected financial account of the user at the financial institution. The method may further include selecting a first transaction data item of the plurality of transaction data items, determining a payee identified in the first transaction data item, identifying a subset of transaction data items each indicating the determined payee, wherein the subset of transaction data items includes at least the first transaction data item and one or more other transactions data items. The method may further include, for individual payees, determining, based at least on the identified subset of transaction data items, account data associated with a financial account of the user with the payee, the account data comprising at least one or more of a number of payments, an annual payment amount, average payment amount, or average number of days between payments. The method may further include applying a first account identification rule, associated with a first account type, to the account data, the first account identification rule based on one or more of the number of payments, the annual payment amount, the average payment amount, or the average number of days between payments, determine, based on said application of the first account identification rule, a first confidence level indicating likelihood that the financial account is the first type of account. The method may further include applying a second account identification rule, associated with a second account type, to the account data, the second account identification rule based on one or more of the number of payments, the annual payment amount, the average payment amount, or the average number of days between payments, determine, based on said application of the second account identification rule, a second confidence level indicating likelihood that the financial account is the second type of account. The method may further include, if the first confidence level is higher than the second confidence level, identifying the financial account as of the first type of account, if the first confidence level is lower than the second confidence level, identifying the financial account as of the second type of account.


In one embodiment, the systems and methods discussed herein provide user permissions for access to secure data at third-party. For example, in one embodiment a user permission system manages and regulates access to secure data at one or more third-party data sites. The system may provide access to one or more databases or other data structures based on user authentication and access rules that have been established, such as by a user associated with the data being accessed at the third party data store. Access may be provided via an API to the third-party data site, along with access credentials of a user with data stored with the third-party data site, allowing the system to access data on behalf of the user.


In one embodiment, a computerized method of obtaining information regarding user accounts is performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system to perform operations comprising transmitting user interface data to a user computing device, the user interface data configured to depict a permissions interface element that is selectable to indicate authorization to access financial account information associated with the user, receiving, from the user computing device, authorization to access financial account information associated with the user. The method may further include, in response to receiving the authorization to access financial account information associated with the user, receiving, from the user computing device, selection of a financial institution from a plurality of financial institutions indicated in a user interface on the user computing device, receiving credentials for accessing financial account information associated with the user at the selected financial institution, identifying an API key associated with the selected financial institution, transmitting, to an online address of a system in electronic communication with the selected financial institution, the API token and the credentials, receiving, via the system, indicators of one or more financial accounts of the user with the selected financial institution, receiving, from the user computing device, selection of a financial account of the one or more financial accounts, accessing, via a secure communication session initiated with the API token, a plurality of transaction data items of the selected financial account of the user at the financial institution. The method may further include transmitting user interface data to the user computing device, the user interface data configured to depict a user interface on a display of the user computing device, the user interface including one or more interactive elements selectable to indicate authorized uses of the transaction data items by the computing system, receiving, from the user computing device, selection of authorized uses of the transaction data items, selectively sharing, based on the authorized uses of the transaction data items, the transaction data items with one or more third parties.


In some embodiments, the authorized uses of the transaction data items include one or more of use in: identifying recurring payments, updating credit data of the user, calculating derived attributes, or calculating a risk score. In some embodiments, transaction data items associated with a post date more than one year prior to a current date are disregarded. In some embodiments, transaction data items associated with a post date more than two years prior to a current date are disregarded. In some embodiments, the access component is operated by the computing system. In some embodiments, the access component is operated by a third-party.


In one embodiment, a computerized method performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system to perform the computerized method comprises accessing a plurality of data items associated with a user via an application programming interface (API) communication channel established with a third-party database, selecting a first data item of the plurality of data items, determining a recipient identifier in the first data item, accessing a recipient data structure storing indications of associations between recipient identifiers and corresponding recipients, wherein a first recipient is associated with a plurality of recipient identifiers used by different third-party databases to identify the first recipient, determining that the recipient identifier is associated with the first recipient in the recipient data structure, scanning the plurality of data items to identify a subset of the data items each associated with the recipient identifier, wherein the subset of data items includes at least the first data item and one or more other data items, determining, based at least on the identified subset of data items, account data associated with an account of the user with the first recipient, the account data comprising at least one or more of a number of data items each having time stamps within a predetermined time period; or an average number of days between time stamps of sequential data items, applying a first account identification rule, associated with a first account type, to the account data, determining, based on said application of the first account identification rule, a first confidence level indicating likelihood that the account is the first type of account. The method may further include, in response to determining that the first confidence level exceeds a threshold confidence level, initiating addition of the account to the secured third-party risk database.


In one embodiment, a computerized method of identifying accounts of a user each associated with a plurality of transaction data items is performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system to perform the computerized method comprising accessing a plurality of transaction data items indicative of transactions of a user with one or more financial institution, selecting a first transaction data item of the plurality of transaction data items, determining a payee identifier in the first transaction data item, accessing a payee data structure storing indications of associations between payee identifiers and corresponding payees, wherein a first payee is associated with a plurality of payee identifiers used by different financial institutions to identify the first payee, determining that the payee identifier is associated with the first payee in the payee data structure, scanning the plurality of transaction data items to identify a subset of the transaction data items each associated with the payee identifier, wherein the subset of transaction data items includes at least the first transaction data item and one or more other transactions data items, determining, based at least on the identified subset of transaction data items, account data associated with a financial account of the user with the payee, the account data comprising at least one or more of: a number of payments, an annual payment amount, an average payment amount, or an average number of days between payments, applying a first account identification rule, associated with a first account type, to one or more of the number of payments, the annual payment amount, the average payment amount, or the average number of days between payments of the account data, determining, based on said application of the first account identification rule, a first confidence level indicating likelihood that the financial account is the first type of account, in response to the first confidence level exceeding a threshold confidence level, determining an expected risk score impact of including the account data a risk data set associated with the user, in response to the expected risk score exceeding a threshold, initiating addition of the account data to the risk data set associated with the user.


The method may further include selecting, based on the account data, the first account type from a plurality of account types including at least a rental account type, a utility account type, and a telecommunication account type. The method may further include selecting, based on the account data, the first account type from a plurality of account types that each require recurring payments from account holders. The method may further include applying a second account identification rule, associated with a second account type, to the account data, the second account identification rule based on one or more of the number of payments, the annual payment amount, the average payment amount, or the average number of days between payments, and determining, based on said application of the second account identification rule, a second confidence level indicating likelihood that the financial account is the second type of account. In one embodiment, the plurality of transaction data items are indicative of transactions of the user with a first financial institution and a second financial institution, a second transaction data item from the second financial institution includes a second payee indicator that is different from the first payee indicator, and the first payee indicator and the second payee indicator are each associated the first payee in the payee data structure.


In one embodiment, the systems and methods discussed herein provide generation of data structures based on categories of matched data. For example, in one embodiment a data processing system communicates with a secure third-party database to provide updated user data that is then usable by a plurality of other entities. In some embodiments, the system may be configured to coordinate access to user account information via user-provided authentication credentials, apply account identification rules to the accessed account information to identify a plurality of accounts of the user, and initiate updates to a database record of the user at the secure third-party database associated indicative of any accounts identified.


In one embodiment, a computerized method of updating user risk data, the computerized method performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system to perform the computerized method comprises receiving, from a user computing device, a request to update credit data of the user with account information regarding an account identified in direct deposit account data of a financial payment account of the user, generating a trade line creation data package including an identifier of an issuer of the account identified in the direct deposit account data, a data furnisher identifier associated with an entity that provides consumer data to a credit bureau; and at least a portion of the account information formatted for ingestion by a credit bureau to initiate addition of the account to credit data of the user. The method may include identifying an API key associated with the credit bureau, and transmitting the API key and the trade line creation data package to the credit bureau, wherein the account information is usable by the credit bureau to update a risk score of the user.


The method may further include periodically receiving payment information associated with the account from the direct deposit account data of the financial payment account; and transmitting the periodically received payment information to the credit bureau.


The method may further include executing a credit scoring algorithm to generate the credit score of the user based at least on the account information stored by the credit bureau.


In one embodiment, the systems and methods discussed herein provide a database platform for realtime updating of user data from third party sources. For example, in one embodiment a data processing system communicates with a secure third-party database to obtain information about a user that is usable to determine one or more items associated with the user. The system then coordinates gathering and identification of additional data relevant to the user from other third-party data sources, to potentially update the user's information stored with the secure third-party database. The updated information may then be accessed at the secure third-party database to determine items associated with the user, which may include additional items in view of the additional data.


In one embodiment, a computerized method, performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system to perform the computerized method comprises determining identification information of a user, obtaining a current risk score associated with the user, determining a first one or more product offers available to the user based on the current risk score, determining a second one or more product offers not available to the user based on the current risk score, determining an estimated risk score of the user based on hypothetical addition a new trade line of the user to risk data of the user, in response to determining that at least one of the second one or more product offers would be available to the user based on the estimated risk score, providing an option to the user to initiate updates to risk data of user, in response to the user selecting the option to initiate updates to risk data, initiating communication of the user with an account discovery system, receiving, from the account discovery system, an indication of an updated risk score of the user, wherein the updated risk score is higher than the current risk score based on addition of the new trade line to risk data of the user by the account discovery system, determining at least one of the second one or more product offers that are now available to the user based on the updated risk score, and providing the at least one of the second one or more product offers to the user. The method may include providing credit score change information to the user computing device.


In one embodiment, the systems and methods discussed herein are usable in estimating changes to user risk indicators based on modeling of similarly categorized users. For example, in one embodiment a data processing system communicates with a secure third-party database to obtain information about a plurality of users and generates a model usable to identify other users with similar characteristics. A scoring algorithm may be selected for use on user data based on the associated users identified with the model. The scoring algorithm determines an estimated score change for the user, and may provide the user information regarding how the user can achieve the estimated score change.


In one embodiment, a computerized method, performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system to perform the computerized method comprises accessing a score impact rule indicating one or more account types that impacts credit scores of users, accessing credit data of a user, identifying a plurality of accounts included in the credit data, determining account types of the plurality of accounts in the credit data, identifying a first account type of the one or more account types that impacts credit scores of users that is not included in the determined account types of the plurality of accounts of the user, execute a score impact algorithm, based at least on the first account type and credit data of the user, to determine a possible credit score change if an account of the first account type is added to the credit data of the user. The method may include providing, to the user, an indication of the possible credit score change.


The method may include identifying a plurality of other users associated with addition of accounts of the first account type, analyzing account data of the plurality of other users, based on the aggregated account data, generating the score impact algorithm configured to determine, for respective users, possible credit score changes based on addition of accounts of the first account type.


In some embodiments, other users are identified as users having accounts of the first account type with account attributes within predetermined threshold of the account attributes of the account of the user.


In some embodiments, the predetermined threshold is of payment history, payment amount, or account subtype of the accounts.


Example System and Process



FIG. 4 is one embodiment of a block diagram illustrating various components and processes that may be performed according to various embodiments discussed herein. Depending on the embodiment, certain implementations may include fewer or additional blocks than illustrated in FIG. 4, and/or the blocks may be performed in an order different than illustrated. Additionally, while the blocks are illustrated in functional groups, each of these functional groups may be performed by multiple computing systems and/or entities, and conversely, multiple functional groups may be combined for performance by a single computing system and/or entity.


The illustration of FIG. 4 includes functional modules for data permissioning, account identification, account verification, trade line updating, and updated credit score usage. However, the functional modules could be partitioned differently in certain embodiments. In the example of FIG. 4, the functional blocks 462, 464, 466, 467, and 468 are generally associated with components 112, 114, 116, 117, and 118, respectively. In other embodiments, functionality in a particular block of FIG. 4 may be divided among different components and/or functionality in multiple blocks of FIG. 4 may be combined into a single component.


Beginning with block 402, the user engages an account discovery system, such as a system that may be controlled and/or operated by a credit bureau. Account discovery systems may include credit bureaus, such as Experian, TransUnion, and Equifax, as well as agents of credit bureaus, such as entities that provide credit data to users that is accessed from one or more credit bureaus, but is made available to the user via a third-party user interface (for example, via a website or mobile application). In some embodiments, the user provides login credentials, or establishes a credit monitoring account with a credit bureau, in order to access credit information via the account discovery system 110.


In some embodiments, the user accepts terms and conditions 404 agreeing to the account discovery system's rights and responsibilities, authorizing performance of the functional modules of FIG. 4, and agreeing to the accessing, storing, maintaining, sharing, and so forth, of the user's personal information, such as information that may be obtained from financial institutions doing business with the user. In some embodiments, the user has previously accepted terms and conditions 404 that include authorization for performance of the remaining functional modules of FIG. 4.


Data Permission


In the embodiment of FIG. 4, a data permission module 462 performs functions that allow the user to select a financial institution 410, provide credentials for the financial institution 412, and select a direct deposit account (DDA) or other account at the financial institution 414 from which transaction data of the user should be accessed. In one embodiment, the functions of the data permissioning module 462 are performed by the data permissioning component 112.


At block 410, the user may be provided with a user interface that lists, or allows the user to search for, a financial institution (or other transaction provider 100) with which the user has a DDA account. In other embodiments, the user may indicate a financial institution in other manners. Next, in block 412, the user provides credentials that allow the account discovery system 110 (FIG. 1), the account access system 202 (FIG. 2), or another system, to access the user's financial information held with the selected financial institution. For example, a user with a checking account with XYZ bank may select XYZ bank at block 410 and then at block 412 provide a login and password that is usable to access the user's XYZ bank transactional data via XYZbank.com, or via an application programming interface (API) that communicates with XYZ bank. In some embodiments, transactional data includes a plurality of transaction data items that each correspond with a transaction between a payee (or other entity) and a user (for example, a consumer looking to identify accounts for addition to the consumer's credit file). Depending on the embodiment, the credentials provided at block 412 may be secured through use of a third-party account access and/or aggregation service, such as the account access system 202, so that the user is not required to provide their financial institution credentials (for example, their login and password for that financial institution) to the account discovery system 110. In such embodiments, the user may authorize the account discovery system 102 to access DDA account data via the third-party service, which may itself have access to the user's records at the financial institution.


Moving to block 414, the user selects a particular DDA account held at the financial institution, such as from a list of DDA accounts that is retrieved directly from the financial institution by the data permissioning component 112 (whether performed by account discovery system 102 or another system/entity). For example, the user may be provided with an option to select one or both of a XYZ bank checking account or a XYZ savings account after providing credentials for XYZ bank in block 412. In some embodiments, the user may be allowed to connect a credit card account also, so that transaction data items include payments made through the credit card account. While FIG. 4 references a DDA account at a financial institution, other accounts with other entities may be used in various implementations.


Depending on the embodiment, user authentication may be performed using various methods and based on various information. For example, authentication information may comprise a user-selected personal identifier, a username/password combination, biometric data (for example, faces, fingerprints or eye scans), and/or other information that can be used to authenticate a user. Similarly, various authentication protocols may be implemented to authenticate the user and/or any entities that are requesting information regarding the user's credit information, such as the service providers discussed herein. For example, a requesting user may send an electronic request to a token gateway environment (of the account discovery system 110 or account access system 202) with credentials, and then the token gateway environment may validate the credentials with a security and access management environment using a standard open protocol such as OAuth (for example, OAuth 2.0, which is generally an authorization framework that enables applications to obtain limited access to user accounts).


Account Identification


In the example of FIG. 4, an account identification component 464, at block 420, identifies accounts based on transaction data items within the selected DDA account (for example, the account selected in block 414) that may be added as trade lines to a user's credit data. In one embodiment, the account identification component 114 (for example, FIGS. 1 and 2) identifies accounts by finding patterns of transactions that indicate a high likelihood those transactions are associated with an account that can be added as a trade line to a user's credit data. In some embodiments, the account identification component (or other component) also determines whether an account that can be added to the user's credit data should be added to the user's credit data. For example, transaction data items associated with an electrical utility account (for example, Southern California Edison) of a user may meet criteria for adding the account to credit data of the user (for example, the monthly payment amounts, timing of the payments, payee information, and so forth, indicate that the transaction data items are for an electrical utility), in some situations addition of the account as a trade line to the user's credit data actually decreases the credit score of the user, for example, if the user paid less than the full amount due each month. Thus, rules or criteria for identifying accounts could include those identifying accounts that are likely qualified for addition to the user's credit data and further identify which of those accounts would have a positive impact on the credit score (and/or long term credibility of the user).


As another example of an account identification process that may be performed by the account identification module, transaction data items in Bob's checking account with XYZ bank may indicate that Bob has paid a regular amount to Al's Landlord Service on the last day of each month over the last two years. Thus, the account identification module may identify these regular transactions as being part of a rental account that may qualify for inclusion as a trade line in Bob's credit data (at one or more credit bureaus). Other types of accounts that may be identified include utility accounts (electrical, gas, water, and so forth), mobile phone accounts, and other accounts that are associated with payments indicative of credit worthiness of the account holder.


In some embodiments, the transaction processing of block 420 may be performed by the account discovery system 110, while in other embodiments a third-party that accesses and/or aggregates financial account information, such as account access system 202 (for example, as illustrated in FIG. 2B) may perform the transaction processing. In some embodiments, transaction data items from multiple accounts of the user, such as from both a checking account and a savings account of Bob (which may be at a common financial institution or at different financial institutions), are analyzed to identify potential accounts for addition as trade lines to the user's credit file. Thus, in such an embodiment, even if Bob alternates his monthly rental payments between his different accounts (even accounts at different financial institutions), the account identification component 114 may associate the payments with a common rental account. In some embodiments, transaction data items (or, more generally data items) may be accessed from other data sources, such as non-financial data sources. For example, data items indicating rental payments may be obtained from the landlord (or rental/leasing company) for analysis in identifying data items indicative of a rental account of the user and/or for verifying a rental account of the user.


In some embodiments, the account identification component 114 applies or executes one or more models that are configured to categorize transactions across multiple months or years of transactional data of the user. For example, in some embodiments, the account identification component 114 may search transaction data items of a user for transactions that occur with a certain periodicity, within a certain monetary range of one another, with certain keywords or characters in the payee's name (or other information, such as a memo or “for:” information field provided by the user), and/or any other attributes that may be associated with transaction data for the user. Data item groupings may then be created to indicate sets of data items that are believed to be associated with a particular account of the user. In some embodiments, each data item groupings is associated with a different payee.


In some embodiments the account identification component 114 may calculate a confidence level or score indicating likelihoods that the particular transaction data item should be included in a grouping of data items. Thus, for a particular transaction data item (for example, $4.58 purchase at Starbucks #417325 on Mar. 21, 2018 at 6:38 AM), multiple confidence levels may be calculated to indicate strength of correlation with multiple transaction groupings. In this implementation, the transaction data items may be associated with a transaction grouping for with a highest confidence level for the transaction data item was calculated. In some embodiments, a transaction data item confidence level may additionally need to exceed a threshold confidence level for the transaction data item to be associated with a grouping.


The account identification component 114 may associate an account type with each identified account (for example, each grouping of data items for particular payees) in the user's transactional data. For example, a first identified account (for example, associated with 24 separate monthly payments identified in Bob's checking account data) may be indicated as a rental type account. Account types may include a general account type (for example, telecom, utility) and/or a specific account type, or may have additional levels of categorization. For example, telecom account types may be further categorized as mobile phone, phone, internet, cable, or satellite accounts, while utilities account types may be further categorized as gas, electric, water, power, solar, or trash account.


In some embodiments, characteristics of transaction data items that are analyzed to help identify potential accounts of a given user may include payee identifier (or normalized payee identifier), description or memo associated with the transactions, transaction amount, transaction periodicity, and/or other related transaction characteristics. For example, in one embodiment information regarding the payee on each transaction (for example, in the transaction data item for the transaction) is normalized for matching with other transactions, such as from the same payee. For example, extraneous characters in the payee information, such as characters that are associated with a payment account or number of the transactions (for example, an electronic check number), may be removed or disregarded. Additionally, payee information may be standardized, such as by identifying a standardized identifier for a particular payee that may be associated with various adaptations of payee information for that particular payee. For example, a standardized identifier for a payee (for example, “Southern California Edison”) may be associated with multiple variations of payee information that could be used by different financial institutions in identifying transactions with that payee (for example, “SCE”, “So Calif Edison”, and so forth). Thus, through standardizing payee information of transaction data items, matching of transaction, even from multiple DDA accounts of the user, may be associated as payments to a particular account.


In some embodiments, additional data of a transaction data item may be normalized, standardized, or otherwise cleansed for use in matching the corresponding transaction with other related transactions (for example, other transactions to the same payee). For example, the description or memo associated with transactions may be analyzed and used in matching. For example, memo information that is handwritten on a paper check may be recognized using optical character recognition to determine the memo. A handwritten “rent” in the memo of rental payment checks each month may be used by the account identification component 114 to match the monthly rental payment checks as each being related to a rental payment of the user. Further, text input into a memo field may be parsed to be used in the matching. Additionally, in some embodiments the transaction amount of transactions is used in matching to other related transactions. For example, transactions of an identical amount (for example, to transactions for exactly $29.99) may have a higher likelihood of each being grouped together as associated with a common payee and user account than transactions of different amounts. In some embodiments, a range or percentage variation in payment amounts may be determined as within a tolerance zone such that transaction data items that vary within the tolerance zone (for example, payment amounts within 5% of the average payment amount for the grouping) are not disqualified from being in the grouping associated with a particular payee. For example, an electrical account may vary from month to month depending on usage by the user that month. Thus, a transaction amount rule may indicate that transaction amounts within a range of 20% of an average transaction amount for a group of transactions does not disqualify the transaction as being associated with the electrical account of the user. In some embodiments, third-party data may be access to determine and/or adjust tolerance zones for grouping transaction data items with one another. For example, for an electrical account, whether information may be accessed for the month corresponding to a particular transaction data item to determine an expected change in electrical power usage based on weather conditions that might cause additional (or less) power use.


In some embodiments, the account identification component 464 identifies a transaction periodicity for transactions that are preliminarily identified as being associated with a common payee. For example, the account identification component 464 may calculate an average time between payments to Electric Company as 31 days, with the shortest time between payments as 26 days and the longest time between payments as 34 days. Other statistical values associated with timing of the transaction data items, such as median, mean, standard deviation, and so forth, may also be calculated in certain embodiments. This transaction periodicity may then be used as a factor in determining whether the transactions should be grouped as being associated with a common payee and, thus, with a particular account of the user.


In some embodiments, the account identification component 114 determines one or more confidence levels or scores for each identified grouping of transaction data items. For example, a confidence score may indicate a likelihood that the identified grouping of transaction data items is associated with an account of the indicated type. For example, the confidence level may be based on factors such as periodicity of transactions, amount of transactions, payee information, and so forth that may indicate likelihood that each of the associated transactions are properly correlated with a particular payee and account of the indicated type. Thus, a lower confidence score may indicate that the identified transactions are only somewhat likely to be associated with a particular account type or trade line of the user, while higher confidence scores would indicate that the identified transactions are more likely associated with a particular trade line of the user.


Depending on the implementation, the account identification component 114 may determine an overall confidence level or score (for example, a single common score that indicates the overall likelihood that a grouping of transaction data items are associated with a particular type of account and/or with a particular payee) and/or may determine transaction-level confidence scores (for example, a score for each individual transaction, or for groups of transactions, each of which indicates the likelihood that that particular transaction, or group of transactions, is associated with a particular grouping of transaction data items and/or with a particular payee). In some embodiments, the confidence levels or scores may further consider a minimum frequency and/or recency requirement for addition of a self-report account as a tradeline in the user's credit data. For example, some or all types of self-reported accounts may be required to have at least three payments within six months to even be considered for addition as a trade line. Thus, for an account with three payments within seven months, even if there is a high confidence level in the account type being appropriate for addition as a trade line (for example, the transaction data items are associated with a wireless account), the account will not be transmitted to the credit bureau for addition as a tradeline. In some embodiments, the frequency and recency requirements for addition of trade lines may vary based on account type.


In some embodiments, the account identification component (and/or the account verification component) validate ownership of a DDA account by the user to ensure that the appropriate user is provided the potential credit score boost from payments included in the DDA account. For example, an account ownership validation component may receive information regarding an account, such as name, address, email address, phone number, etc, from the financial institution. This account ownership information may then be compared to user information associated with the user's account with the account identification system, such as a credit monitoring account. The account ownership information could be provided by the account access system, such as via an API communication to the account discovery system, so that the account discovery system may perform the account ownership validation matching and validation. Such account ownership validation may increase the likelihood that a user only gets credit for the accounts that they pay (and belong to them).


Account Verification


The account verification module generally processes the account information provided by the account identification component 464, attempts to verify the account information as being accurate, and/or determines if additional information may be needed to confirm accuracy of the account information. For example, an account of a user should not be added to the user's credit data unless the account accurately indicates payment activity of the user and, correspondingly, can be used as a factor in determining creditworthiness of the user. In the discussion below, an “account” is generally associated with a single payee (for example, a particular electric company, cellular provider, and so forth) as well as a grouping of transaction data items that have each been determined to be associated with the single payee by the account identification component 464. The accounts identified by the account identification component 464 may not include an account number provided by the payee since the account was identified based on transaction data items of the user that may not include the account number. As discussed below, in some embodiments additional information regarding an account, which may include an account number that is verifiable with the payee, for example, may be automatically collected and/or provided to the account discovery system.


At block 430, a list of accounts for possible inclusion in credit data of the user is provided to the account verification module (whether provided by the same or different entity as the account identification component 464). For example, the list of accounts may include, for each account, an account type, transactions associated with the account (for example, the transaction data items that were each categorized as associated with the account), a confidence score or scores, and/or other related information.


At block 432, the user confirms accuracy of each of the identified accounts, or indicates that one or more of the accounts is not accurately reflected (for example, transactions indicated as associated with a cell phone account may not actually be associated with a cell phone account). In some embodiments, a user interface indicating the identified accounts, or potentially just those identified accounts having confidence scores below a threshold or minimum confidence score for positive identification of the account type, may be provided to the user. The user may then select, or deselect, identified accounts to indicate those that are accurate. In some embodiments, transaction data associated with an indicated account may be displayed for review by the user. Additionally, the user may indicate that an identified account is legitimate, but that one or more of the particular associated transactions are not associated with the identified account. For example, an identified utility account may be associated with 14 transaction data items (for example, payments) over the prior 12 month period, and the user may indicate that two of the indicated transactions are not associated with that particular utility account. In such embodiments, the account verification module (and/or other modules discussed herein) may update the transaction data items associated with the identified account, which may in turn update the confidence level that the account is of the determine type (for example, a utility type).


In some embodiments, the user can indicate missing transaction data items to be added to an account. For example, if a cellular service provider account is missing three monthly payments over a 12 month period, the user may indicate that the payments were made during those three months with information regarding the payments. For example, the user may indicate that the payments were made from another DDA account with another financial institution and provide credentials allowing the account discovery system to access transaction data items of the user at that other financial institution. The transaction data items may then be identified in the other DDA account data and combined with the grouping for the cellular service provider.


Moving to block 434, for those accounts that the user has verified (for example, indicated are actual accounts of the user of the identified type at block 432), a determination is made as to whether additional information may be needed from the user and/or a third-party before providing the account to one or more credit bureaus for addition as a trade line to the user's credit. Thus, in some embodiments one or more criteria or rules may be applied to the identified account information to determine whether the account is sufficiently accurate and reliable for inclusion in the user's credit data. For example, a rule may indicate that for any identified rental accounts, additional account verification information is required before providing the new rental account to a credit bureau. As another example, a rule may indicate that a minimum number of transactions and/or minimum number of payments must be associated with an account for the account to qualify for addition to the user's credit data. In some embodiments, such a rule may vary based on the identified account type (and/or subtype), such that for a first account type (for example, rental) a minimum of eight payments are required, while for a second account type (for example, electricity), a minimum of 12 payments are required.


If additional information is needed (for example, the result of block 434 is a determination that additional information is needed), the process moves to block 436, where additional information is requested from the user and/or a third-party. For example, a user may be asked to provide additional information, such as a typical monthly payment amount and/or payment date for a particular identified account. This additional information may then be provided back to the account identification module (and block 420 repeated) to better categorize transactions that may be associated with the account. For example, with the typical payment amount and payment date provided by the user, the account identification module may identify additional payments that were not initially identified (and, similarly, may exclude certain payments that were initially identified). Thus, the additional information may increase likelihood of the identified accounts being eligible for addition to the user's credit data. In some embodiments, the user may provide information regarding an account that was not identified in the initial account identification block 420, so that the account identification module may potentially identify a new account only after the user provides additional information.


In some embodiments, a third-party is contacted for further information to verify a (potential) account of the user. For example, a mobile phone account may be verified with a request to the mobile carrier identified in the transaction data for the account. Such verification may be performed via an API call to the mobile carrier, which may return simply a binary (for example, yes or no) verification indication, or detailed transaction information regarding the account (such as payment history, payment timing, bill due dates, and so forth).


In some embodiments, the user and/or a third-party may provide documentation confirming authenticity of the identified account. For example, for an identified (potential) rental account of a user, the user may be asked to upload a scanned or photographed copy of a lease agreement that may be analyzed to confirm the rental account. In this example, the lease agreement may be automatically parsed (for example, after optical character recognition) and information, such as monthly payment amount, payment due date, landlord, and so forth, may be extracted and compared to account information included with that particular account (such as the grouping of transaction data items associated with the payee from the account identification module 464).


In some embodiments, other information and/or data sources may be accessed to verify accuracy of financial accounts. In some embodiments, one or more of the processes of scanning the user's DDA account (block 420), transmitting identified accounts (block 430), providing the user an opportunity to confirm accuracy (block 432), determining if additional information is needed (block 434) and requesting such additional information (block 436), may be repeated multiple times to enhance the accuracy of the identified account information and/or confidence level in categorization of transaction data. Additionally, in some embodiments the data permissioning process (beginning at block 410) may be performed as part of the account verification process to access additional transaction data items of the user from additional DDA accounts.


Trade Line Updating


In the embodiment of FIG. 4, if an account is verified by the user, and no additional information is needed (block 434), the account is provided to one or more credit bureaus for addition to the user's credit data. In some embodiments, at block 440, the user is provided an opportunity to decide whether or not the account is added to the user's credit data. In some embodiments, an estimate of impact on the user's credit score may be provided to the user, such as an expected credit score increase (or decrease) before the user decides whether or not to add the account as a trade line to the user's credit data. Depending on the embodiment, this expected (or “simulated”) credit score may be generated using the same scoring model or algorithm as is used to provide the user with their actual credit score (for example, that would appear in the user's credit report). In some embodiments, the expected credit score, or credit score change (for example, a plus or minus amount), may be determined based on a different model or algorithm, such as a scoring algorithm that is developed by the account discovery system 102 based on previous changes in credit scores of other users due to addition of particular types of accounts and/or accounts with particular ranges of attributes (for example, payment history, payment amount, account subtype, and so forth). Thus, in some embodiments, a scoring model may be developed and improved over time, such as by a machine learning algorithm that analyzes credit information of users before and after addition of new trade lines for patterns in how credit scores are affected by such additions of trade lines. In some embodiments, such a scoring model may also consider user demographics and credit history in developing an algorithm for predicting credit score impact by the addition of new trade lines. For example, a user with a thin credit file (for example, less than two trade lines) may benefit greatly by addition of a cellular service account, while a user with a thick credit file (for example, eight or more trade lines) may not see a credit score impact by addition of the same cellular service account. In some embodiments, the system generates an improvement metric that is reflective of other users that match one or more characteristics of the user. In some embodiments, an estimated credit score is not provided to the user prior to adding the account to the user's credit data (for example, a newly generated credit score may only be provided after the new account is added as a trade line at block 440).


If the user indicates a desire not to add the account to the user's credit data at block 440, the process may end, or may return to a prior block, such as block 410 where the user is asked to connect to one or more additional financial institutions, to block 430 where a list of accounts already identified is provided to the user, or to another block.


At block 442, the account discovery system updates profile information of the user to indicate the added trade line. In some embodiments, the account discovery system may generate or estimate the user's credit score based on account information (for example, trade line information) maintained by the account discovery system (or by a credit bureau or other entity that controls the account discovery system), such as without requesting credit data from a credit bureau. Additionally, the user profile information may be provided to the user in various formats and levels of detail, such as in user interfaces that are displayed to the user via a mobile application, web browser, text messages, and so forth, and which allow the user to interact with the provided information.


If the user requests the addition of the account to credit data of the user (at block 440), at block 444 the account discovery system generates a new trade line request for transmission to a credit bureau (or multiple credit bureaus in some embodiments). For example, the account information may be formatted in the same manner as account information provided by a typical credit data furnisher, such as a credit card lender that regularly provides account information to credit bureaus for addition (or updating) of trade lines associated with its credit card holders. In some embodiments, the format is the Metro 2 format. In other embodiments, other formatting may be used to prepare account information for transmission to the credit bureau. In some embodiments, the format of the trade line request is customized for the particular credit bureau. For example, a first format may be used for transmission to the first credit bureau while a second format is used for transmission to a second credit bureau. In some embodiments, communication with credit bureaus may be accomplished via API calls.


At block 446, the credit bureau receives the formatted trade line information (generated at block 444) and processes the information to add the trade line to the user's credit data. In some embodiments, the credit bureau applies the same requirements for adding new trade line information to a user's credit file as would be applied to other trade line information (for example, from other data furnishers). Thus, if the trade line information is not usable to uniquely identify a user in the credit bureau's data, the trade line information may not be added to the requesting user's credit data or, depending on the circumstances, may be added with reference to a newly added credit record for the user indicated in the trade line information.


In some instances where trade line information is transmitted to the credit bureau, a trade line for the payee may already exist in the user's credit data. Thus, the transmitted trade line information may be used to supplement the account information (for example, to include additional transactions that are not already reflected in the user's credit file).


Updated Credit Score Usage


In the embodiment of FIG. 4, with the user's credit data updated with the newly added trade line, the user's credit score may be impacted. For example, the user's credit score may increase, and such increase may make the user eligible for financial or other products for which the user was not eligible minutes before with the lower credit score.


At block 450, one or more scoring models may be applied to the user's credit data (including the newly added trade line) to generate updated credit scores for the user. For example, a scoring algorithm that includes utility account data as an input variable may be evaluated after addition of a utility trade line to the user's credit data to produce an updated (for example, higher) credit score for the user.


Various entities may apply scoring algorithms and/or otherwise access credit data of users. For example, in some embodiments the credit bureau may apply a credit scoring algorithm periodically to each users' credit data, such as nightly, so a credit score that is no more than 24 hours old is always quickly available to requesters. In some embodiments, the credit bureau may apply a credit scoring algorithm in response to requests for credit data of a particular user, such as in real-time in response to receiving an inquiry for credit data of a user. In some embodiments, the credit bureau may apply a scoring algorithm provided by another user risk assessment entity, such as by providing credit data of the user to a scoring server configured to analyze the credit data using a proprietary credit scoring algorithm and output to the credit bureau the resultant credit score for the user. Thus, in some embodiments, the account discovery system 110 may not know how particular credit data of users' impacts credit scores generated using the proprietary credit scoring algorithm. In other embodiments, other entities, such as financial institutions, marketing companies, and so forth, may generate risk scores based on credit data, and possibly other data, of the user.


At block 452, the updated credit score of the user may be used in identifying offers to provide to the user. For example, the account discovery system 110 may receive an indication of the user's new credit score (after addition of a new rental, utility, or telecom trade line, for example) and determine whether the user is prequalified for one or more financial products, such as credit cards, personal loans, refinance loans, car loans, and so forth Such financial products may not have been available to the user or may only have been available on less desirable terms (such as a higher interest rate) prior to addition of the new rental, utility, or telecom trade line to the user's credit data (for example, Alice's credit score may have increased from 600 to 625 after adding a rental trade line indicating she has regularly paid her rent over a two-year period, and Bank XYZ Bronze Credit Card may only be offered to users with a credit score above 620). Depending on the embodiment, the updated credit score (and/or additional user credit data) may be compared to offer criteria by the account discovery system 102 and/or another entity, such as directly by a financial institution.


At block 454, the user receives a notification of a change in credit data, such as an indication that the user's credit score has changed. The notification of block 454 may be one example of notification 90 sent to user device 50 of FIG. 1. In some embodiments, the notification is provided to the user via the user interface through which the user initially engaged the account discovery system 102, for example, within seconds of the user requesting that a newly identified and verified account be added to the user's credit file. In other embodiments, an alert or notification may be provided to the user in other manners, such as a SMS message delivered to a telephone number associated with the user (for example, a telephone number stored in the credit bureau's data of the user or in the user profile stored by the account discovery system 102) or a push notification to a mobile application, such as a credit management application provided by the account discovery system 102. In any case, the alert may advantageously be delivered to the user's mobile (and/or other) device in substantially real-time to when the change to the user's credit file occurred so that the user can immediately make use of the updated credit score (for example, by applying for a new credit line) or, if the change to the user's credit file is not correct or even fraudulent (for example, added by someone other than the user), the user can take action to dispute the updated credit information as soon as possible. In some embodiments, a software module monitors credit bureau data for changes to credit data of users, or changes to credit data that impacts a credit score of the user in some embodiments, and initiates delivery of an alert to the user as the change is detected. For example, when a new rental trade line is added to a user's credit data, such a module may detect addition of the trade line and initiate an alert to the user. Such alerts may be transmitted directly from the credit bureau or via another entity, such as the account discovery system 102. In some embodiments, the user alert (block 452) is transmitted in response to detection of a change to the user's credit data that has been transmitted from the credit bureau, such as when an updated credit score of the user is received at the account discovery system 102. Depending on the embodiment, alerts may be associated with rules that specify which types of changes to the user's credit data should be provided in real-time alerts.


In some embodiments, the account discovery system 102 requests an updated credit score of the user after providing the new trade line information to the credit bureau. Account discovery system 102 may request the updated credit score immediately after providing the new trade line information or after some amount of elapsed time (for example, one second, five seconds, and so forth after transmitting the trade line data to the credit bureau). Thus, in this embodiment the account discovery system 102 may receive the newly calculated credit score of the user within seconds of addition of the trade line to the user's credit file. After the new calculated credit score is received, the account discovery system 102 may optionally display to the user a change in the user's credit score (for example, a plus or minus amount) attributable to the newly added account.


In some embodiment, after the user has been shown an updated credit score, an option to remove a trade line from the user's credit file is provided via the user interface. For example, if the user adds a new utility account to the user's credit data, such as via the method discussed above, a newly calculated credit score may be displayed to the user via the account discovery system website, mobile application, text message, and so forth If the newly calculated score is lower than a previous score of the user, for example, the new utility account trade line actually decreased the user's credit score, the user interface may provide an option for the user to remove the new trade line credit data. For example, a button, check-box, link, or other user interface feature associated with removal of an account from credit data may be selected by the user to initiate a removal process. In response to a request for removal of a trade line, the account discovery system 102 may transmit a properly formatted request to one or more credit bureaus requesting removal of the trade line.


In various embodiments discussed herein, alerts and/or notifications (which may be used interchangeably) are automatically transmitted to a device operated by the user whose credit data has been updated and/or requested (for example, such as notification 90 sent to user device 50 of FIG. 1). The alert and/or notification can be transmitted at the time that the alert and/or notification is generated or at some determined time after generation of the alert and/or notification. When received by the user's device, the alert and/or notification can cause the device to display the alert and/or notification via the activation of an application on the device (for example, a browser, a mobile application, and so forth). For example, receipt of the alert and/or notification may automatically activate an application on the device, such as a messaging application (for example, SMS or MMS messaging application), a standalone application (for example, a credit monitoring application provided to the user by the credit report access control system), or a browser, for example, and display information included in the alert and/or notification. If the device is offline when the alert and/or notification is transmitted, the application may be automatically activated when the device is online such that the alert and/or notification is displayed. As another example, receipt of the alert and/or notification may cause a browser to open and be redirected to a login page generated by the system so that the user can log in to the system and view the alert and/or notification. Alternatively, the alert and/or notification may include a URL of a webpage (or other online information) associated with the alert and/or notification, such that when the device (for example, a mobile device) receives the alert, a browser (or other application) is automatically activated and the URL included in the alert and/or notification is accessed via the Internet. The alert and/or notification may be determined based on preferences stored in a data store. For example, a user may sign up for a publish/subscribe service or a credit monitoring service that may be configured to identify changes to credit data. After enrollment, the individual may additionally select an option to be notified of credit data inquiries and a selection of preferences for receiving alerts/notifications.


Calculation of Expected Score Boost


In some embodiments, an estimate of impact on the user's credit score may be provided to the user, such as an expected credit score increase (or decrease) even before the user provides permission to the account discovery system to identify new trade line's (for example, at block 402). For example, an expected credit score impact may be calculated for users based on an expected impact of adding an account type (for example, an electrical account) that is currently missing from the user's credit data, and perhaps that is typically included in credit data, to the user's credit data. The account discovery system and/or an affiliated system may provide the expected credit score increase associated with the addition of an electrical account to the user as an incentive for the user to engage the account discovery system.


Depending on the embodiment, this expected (or “simulated”) credit score may be generated using the same scoring model or algorithm as is used to provide the user with their actual credit score (for example, that would appear in the user's credit report). In some embodiments, the expected credit score, or credit score change (for example, a plus or minus amount), may be determined based on a different model or algorithm, such as a scoring algorithm that is developed by the account discovery system 102 based on previous changes in credit scores of other users due to addition of particular types of accounts and/or accounts with particular ranges of attributes (for example, payment history, payment amount, account subtype, and so forth).


In one implementation, a score impact rule indicating one or more account types that impact risk scores of users are accessed. Next, an API key associated with the financial institution is identified and transmitted to the financial institution with a request for transaction data of the user. Via secure communication channel established with the financial institution, transaction data items of the user are obtained. Next, a plurality of groupings of the accessed data items are identified, such as groupings of data items associated with an entity. An account type for each of the groupings of data items may be determined, and then a first account type that impacts credit scores of users that is not included in the determined account types of the user may be identified. This account type represents a type of account that could be added to the credit data of the user to potentially impact credit score of the user. A score impact algorithm may be executed to determine a possible risk score change if an account of the first account type is added to the risk data of the user. The score impact algorithm may be based on the first account type and the existing credit data of the user.


Thus, in some embodiments a scoring model may be developed and improved over time, such as by a machine learning algorithm that analyzes credit information of users before and after addition of new trade lines for patterns in how credit scores are affected by such additions of trade lines. In some embodiments, such a scoring model may also consider user demographics and credit history in developing an algorithm for predicting credit score impact by the addition of new trade lines. For example, a user with a thin credit file (for example, less than two trade lines) may benefit greatly by addition of a cellular service account, while a user with a thick credit file (for example, three or more trade lines) may not see a credit score impact by addition of the same cellular service account. In some embodiments, an estimated credit score is not provided to the user prior to adding the account to the user's credit data (for example, a newly generated credit score may only be provided after the new account is added as a trade line at block 440).


Example Methods



FIG. 5 is an embodiment of a flowchart illustrating one example of a process of interacting with a consumer, accessing DDA account data of the consumer, identifying non-traditional account(s) of the consumer in the DDA account data, and updating credit data of the consumer at a credit bureau. In one embodiment, the method of FIG. 5 is performed by the account discovery system. Depending on the embodiment, the method of FIG. 5 may include fewer or additional blocks and the blocks may be performed in an order that is different than illustrated.


Beginning at block 510, an account discovery system may be accessed by a user. For example, the user may visit a website of a credit monitoring service, such as may be provided by a credit bureau. The user may contact the account discovery system in response to an advertisement or other communication offering to help the user increase the user's credit score and/or qualify for a financial account. The user may then provide the account discovery system authorization to access DDA transaction data of the user at one or more identified financial institutions. As an example, the account discovery system may receive a user's authorization together with the user's username and password for a particular financial institution, such that the user account discovery system can prove to the financial institution it is authorized to retrieve the user's transaction data. In some embodiments, other forms of authentication of the user are requested for decreasing likelihood that a fraudster is attempting to access the user's financial account data. Further details of receiving the user's authorization to access DDA transaction data are discussed below.


Moving to block 520, the account discovery system accesses DDA transactions at the identified financial institution(s). Block 520 may involve downloading records of some or all of the DDA transactions made available to the user by the identified financial institution(s). In some embodiments, the access to DDA transactions is via an API communication channel that is established between the account discovery system and the financial institution. In other embodiments, the DDA transactions are accessed via a front end interface, such as the same or similar user interface that may be displayed to the user.


Continuing to block 530, the account discovery system categorizes the DDA transactions. For example, the user account discovery system identifies, from a plurality of transaction data items accessed at the indicated financial institution, a group of transactions associated with a particular payee. As an example, the system may identify monthly recurring transactions made to the same payee as being categorized together and associated with a single account (for example, an electric, water, or wireless account). Additionally, the system may identify a second set of transaction data items made to another payee and, based on account identification rules, determines that the second set of transaction data items are associated with a rental account of the user.


At block 540, the account discovery system receives a user's confirmation of the identified accounts. For example, the user account discovery system may identify, in block 530, a particular set of transaction data items as being associated with a particular utility account, may identify that the utility account is believed to be of a certain type (such as an electricity bill from a given utility), and may identify various attributes of the account such as the average payment, the maximum payment, the minimum payment, and so forth. Then, in block 540, the user account discovery system may provide at least some of this identified information to the user and receive the user's verification that the information is correct. The user may verify that individual transactions are properly categorized, that the identified account is correctly identified, and so forth.


At block 550, the user account discovery system may assess the reliability of the identified account and may, optionally, obtain additional information to verify that the account is of the type indicated. For example, the user may be asked to take a driver license photo, use an app to scan in a document (for example, associated with the account), provide electronic authorization to request automatic sending of electronic verification from a third-party (such as the account issuer), and so forth. Further details of account verification processes are discussed below.


At block 560, the account discovery system initiates addition of the account(s) as trade line(s) in the user's credit data. For example, the system may generate a data package formatted for ingestion by a particular credit bureau to allow the credit bureau to add the account as a new trade line of the user.


At block 570, the account discovery system recalculates the credit score of the user, based on the newly updated credit data (for example, including any newly added trade lines).


At block 580, the user account discovery system provides the updated credit score to the user and/or to third-parties. The updated credit score can be used by such third parties in determining whether to offer credit, and at what terms to offer said credit, to the user. By including additional trade lines such as rent and utility accounts, the updated credit score may more accurately reflect the credit worthiness of the user. In some embodiments, the updated credit score may be provided to, and usable, by the user and/or authorized third parties substantially immediately after the account is added as a new trade line to credit data of the user. For example, the credit score of the user may be recalculated in substantially real-time in response to addition of a new trade line to credit data of the user, and the recalculated credit score may similarly be provided to the user and/or authorized third parties substantially real-time in response to calculation of the updated credit score.


Example System, Method, and User Interfaces for Accessing DDA Data of Users



FIG. 6 is an embodiment of a block diagram illustrating another example of an account access system 202 and an account discovery system 110A in communication with one another (whether operated by a single and the or by separate entities). In this embodiment, three transaction providers 100 A, 100 B, and 100C are in communication with the account access system 202 via respective APIs 204A, 204B, and 204C. Thus, in this embodiment, data permissioning process, such as performed by the data permissioning component 112, may be performed via communications with transaction providers 100 that is initiated and authenticated using API tokens, keys, and/or other similar secure communication credentials. For example, the transaction provider 100 a may be a first financial institution that allows direct access to transactions of its customers (for example, consumers with DDA accounts at the financial institution) via a secure communication channel that is initiated through use of an API token that has been issued to the account access system 202 by the financial institution. In this way, the transaction provider 100 a maintain security of consumer information by limiting access to the consumer DDA account information to only those with a pre-issued API token. Similarly, communications with transaction providers 100 B and 100 C may be performed with unique API keys or tokens issues from those transaction providers. In some embodiments, the transaction providers may include, or may use third-party, API token service, which interfaces with external entities (for example, the data permissioning component 112), receives authorizations from the external entities indicating that the account access system 202 has sufficient rights to access transaction data items of consumers held by the transaction provider, and issues a API token to the account access system 202 usable to initiate a “backend” communication channel with the transaction provider to efficiently and quickly access data to which the account access system 202 is authorized. Thus, in some embodiments the account access system 202 provides the API token issued to the account access system 202 in conjunction with a request for transaction data items of a particular consumer.


The data permissioning component 112 may further communicate with the user device 120 to obtain credentials that allow the data permissioning component 112 to access transaction data items of the user at a transaction provider. These user credentials may include a login ID and password for a particular transaction provider, or any other credentials that the user may have been issued that allow the user and/or the account access system 202 to access transaction data items in the user's secure account with the transaction provider. The data permissioning component 112, with a valid API token issued from a transaction provider and access credentials from the user device 124 that transaction provider, may initiate communication with the particular transaction provider and access transaction data items of the user with that transaction provider.


In the embodiment of FIG. 6, the account access system 202, which includes the data permissioning component 112 and the account identification component 114, may be operated and/or controlled by an entity separate from the account discovery system 110A. For example, the account discovery system 110A may be operated by a credit reporting agency, while the account access system 202 is operated by a financial account aggregator. Through separation of the functionality performed by these two entities, consumer privacy of information may be maintained. For example, in some embodiments the account access system 202 accesses individual transaction data items of the consumer at the one or more transaction providers 100. However, those individual transaction data items may not be shared with the account discovery system 110A (for example, a credit bureau). Rather, the account access system 202 may analyze the transaction data items to identify accounts that may be added to the consumer's credit data and provide only the minimum information needed to the account discovery system 110A for addition of the new account to credit data of the consumer. In other embodiments, the account discovery system 110A receives and stores the transaction data items.



FIG. 7 is one embodiment of a flowchart illustrating one example of a method that may be performed to authorize and initiate access to a user's DDA account information at a financial institution. For purposes of illustration, the method of FIG. 7 will be discussed in conjunction with several example user interfaces in FIGS. 8-10. In some embodiments, the method may be performed by the data permissioning component 112, such as may be controlled by an account access system 202 (for example, FIG. 2B). In other embodiments, the data permissioning component 112 may be operated by the account discovery system 110A (for example, FIG. 2A). Depending on the embodiment, the process of FIG. 7 may include fewer or additional blocks and or the blocks may be performed in order different than is illustrated.


Beginning at block 710, a user provides authorization to the data permissioning component 112 to access DDA account information of the user at one or more transaction providers. For example, a consumer may authorize a credit bureau to initiate communication with a financial institution at which the consumer has a checking account for purposes of analyzing transactions in that checking account. For example, user interface 810 illustrates an example user interface that may be presented to a consumer on a mobile device, such as a cell phone or tablet. A similar user interface may be provided on a desktop computing device of a user or any other consumer electronic device. Any references herein to a mobile device or mobile user interface are provided for illustration purposes and should not be construed to limit implementations of the systems and methods herein to only those specifically mentioned mobile device or mobile user interfaces. Conversely, any mobile device or mobile user interface could also be implemented with a desktop, laptop, or other computing device and associated user interfaces.



FIG. 8 illustrates embodiments of three example user interfaces that may be displayed on a user device. User interface 810 illustrates security measures associated with the proposed access to the user's financial account data. The user can select button 822 to continue on to the data permissioning process. User interface 820 illustrates an introductory screen from an example credit reporting agency, “MyBureau”, which could represent any credit bureau. Additionally, similar user interfaces may be provided by other entities, such as an aggregation entity. In the example user interface 820, information regarding an example “Score Boost” process is provided to the user and the user is asked to select an interface element, such as button 812, to initiate the process. In this example, after the user selects button 812, a user interface 830 may then be displayed to the user, which request information from the user on a financial institution at which the user maintains a DDA account, such as a checking account, savings account, money market account, or the like. The example user interface 830 provides a listing of several “popular options,” which may be stored as a predetermined listing based on one or more factors such as geographic location, and also allows the user to search for financial institutions that may not be listed already.


Returning to FIG. 7, at block 720 a selection of a financial institution from the user is received, with reference to user interface 830 of FIG. 8, the user may select one of the popular options of financial institutions or search for another financial institution. After the user selects a financial institution at block 720, credentials for accessing the user's financial information at the selected financial institution are received at block 730. For example, a username and password that allow access to the users checking account information at the selected financial institution may be provided to the data permissioning component 112. In an embodiment where the data permissioning component 112 is operated by a third-party entity (different than the account discovery system 110 A, such as in FIG. 2B), communication with the user may be directly between the data permissioning component 112 (for example, of the account access system 202 of FIG. 2B) and the user device 120. In this way, credentials to the users financial account at the financial institution are only disclosed to the account access system 202 and not also to the account discovery system 110 A, providing increased security to the user by limiting dissemination of the user's login credentials. In some embodiments, the communication with the user device 120 is provided via a pass-through functionality (for example, using an iFrame or similar functionality) of the account discovery system 110 A, such that the user is unaware that they are communicating directly with the account access system 202 (or other entity that provides the data permissioning component 112) and the communication with the user are seamless as they proceed through the blocks of FIG. 7. In such an embodiment, the user may be unaware that a separate data permissioning component 112, possibly operated by a third-party to the account discovery system 110A, is coordinating communication with the selected financial institution. In some embodiments, the user is alerted to the shift in communication from the account discovery system 110A to the account access system 202 (or other entity it provides the data permissioning component 112).


In one example implementation, the account discovery system may create a user record in an API from the account access system 202 (or more particularly, with the data permissioning component 112). The account discovery system 110 A may then generate a redirect URL and iFrame URL that are delivered to the user device (for example, user interface 910). The user within interacts with the iFrame URL, such as to provide login credentials and two factor authentication information, directly with the data permissioning component 112. After the user is authenticated with the financial institution, the account identification component 114 and/or other components of the account discovery system 110 A may access financial account information of the user has the financial institution via an API connection established by the data permissioning component 112. In one embodiment, after authorization to access a particular user's financial account information at a particular financial institution has been established, the data permissioning component 112 (and/or other related components) may request financial account information (for example, transaction data items) of the using a user-specific token, such as may be issued by the data permissioning component 112 and/or an API token generator/manager of the financial institution. Thus, the account identification component 114, for example, may immediately and/or periodically in the future, access transaction data items of the user at the financial institution using an API call that includes the user specific token. In some embodiments, an entity token may also be required, such as a token issued to the data permissioning component 112 that authorizes the account access system 202 to access user data at the financial institution (for example, with a user specific token).



FIG. 9 illustrates embodiments of example user interfaces that may be provided by the data permissioning component 112, whether operated by a third-party account access system 202 or the account discovery system 110A, to obtain access credentials from the user. In other embodiments, other user interfaces, such as requesting other credential information from a user and/or providing different two-step authentication procedures, may alternatively be used. Example user interface 910 displays the name of the selected financial institution, “MyBank” in this example, with a request for the user to provide a User Name and Password for the MyBank account. After the user provides that information, user interface 920 initiates a two-step authentication procedure using a cell phone number associated with the user's account at the selected financial institution. The telephone numbers associated with the user account may be provided by the selected financial institution, for example, MyBank, after the username and password have been excepted. An example of FIG. 9, the user is able to select one of multiple telephone numbers associated with the user's financial account with a request that a security code be transmitted to the selected number. After one of the telephone numbers is selected by the user in interface 920, a security code is transmitted to the selected telephone number and user interface 930 is displayed, requesting entry of the security code received at the selected telephone number by the user. If the user cannot provide the security code, access to the users financial information at the financial institution is not allowed and, additionally, the user may be provided with a fraud risk alert. If the two-step authentication is completed successfully by the user providing the transmitted security code, access to the financial account of the user is allowed. In other embodiments, additional forms of two-step authentication procedures, such as use of an Authenticator application, and/or other authentication procedures may be implemented.


Next, at block 730, with the user authenticated at the financial institution (via the data permissioning component 112), the account identification component 114 and/or other components of the account discovery system 110A, may access the users financial account information. In the example of FIG. 7, at block 740 the user is presented with a list of accounts at the financial institution (for example, associated with the login credentials provided by the user), and an option to select one or more of the accounts. User interface 1010 in FIG. 10 illustrates an example user interface that may be presented to the user indicating multiple accounts identified at the financial institution, and providing the user an option to select one or more of the accounts from which the account access system 202 will be authorized to access specific transaction data items. In the example of user interface 1010, a checking account (for example, “MyChecking” with a balance of $523) and a savings account (for example, “MySavings” with a balance of $3,101) were identified in the user's account data at the financial institution (for example, “MyBank”). In this example, the user selects the checking account, indicating that transaction data items in the user's checking account may be accessed by the account discovery system. In this example, because the user did not also select the MySavings account, the users savings account information will not be made available to the account discovery system. User interface 1020 confirms that the user has granted access to “1 account” of the user with MyBank.


At block 745, a security token, such as an API token or key, is associated with the user account at the financial institution, so that the account identification component 114 and/or account access system 202 can use the security token to securely access transaction data items of the user at the financial institution. In one embodiment, a security token is an encrypted way of storing a username and password. It ensures that when the account discovery system is connecting to the financial institution of the user to get account information, it is safe and secure. For example, the security token may be provided to an API interface of the financial institution to authorize access to financial account data of the user at the financial institution. The security token may have a limited life (for example, two hours, two days, two weeks, and so forth) and may be associated with additional restrictions on use of the security token.


Moving to block 750, the account identification component 114 may use the established communication channel with the financial institution to access transaction data items of the user. For example, the account access system 202 may provide the user specific token (for example, as discussed above with reference to block 745) to the financial institution to obtain access to transaction data items in the one or more DDA accounts of the user associated with the user specific token (which the user previously authorized the account access system 202 to access).


At block 780, transaction data items of the user are accessed via a secure communication session with the financial institution. In some embodiments, transaction data items are copied to the account access system 202 for further analysis. In some embodiments, a subset of transaction data items, such as those within a predetermined time or meeting other filter criteria, are provided to the account access system 202.


At block 790, the transaction data items are accessible to the account identification component 114, for example, to analyze for indications of financial accounts (for example, utility, rental, telecom, and so forth) that may not already be in the credit data of the user, and which could be added to credit data of the user to potentially increase the credit score of the user.


Example System, Method, and User Interfaces for Categorizing Data Items



FIG. 11 is an embodiment of a flowchart illustrating one example of a method that may be performed to categorize data items (for example, transaction data items) from the transaction provider (for example, a financial institution). In some embodiments, the transactions data items are categorized or grouped according to a payee or recipient of a transaction. For example, multiple monthly payment transactions from a checking account to Power Company 123 may all be grouped as payments that are likely associated with an ongoing account of the user with Power Company 123. In other embodiments, data items may be categorized in groups in other manners. For example, transactions with multiple payees or recipients may be grouped, such as those that are each associated with a particular type of account. For example, multiple wireless provider accounts may be grouped together via a process similar to FIG. 11. For purposes of illustration, the method of FIG. 11 will be discussed in conjunction with several example user interfaces in FIGS. 14-15 and 18, as well as conceptual diagrams in FIGS. 16-17 of data items that may be grouped and account identification rules that may be applied to such grouped data items.


In some embodiments, the method of FIG. 11 may be performed by the data permission account identification component 114, such as may be controlled by an account access system 202 (for example, FIG. 2B). In other embodiments, the account identification component 114 may be operated by the account discovery system 110A (for example, FIG. 2A). Depending on the embodiment, the process of FIG. 11 may include fewer or additional blocks and or the blocks may be performed in order different than is illustrated.


Beginning at block 1110, a payee included in the transaction data items is selected. A user transaction data items, even with a single financial institution, may include dozens, hundreds, thousands or more transaction data items. Thus, categorization or grouping of the transaction data items may be initiated in various manners. For purposes of illustration, at block 1110, a particular transaction data items included in the set of access transaction data items is selected for analysis. In some embodiments, multiple transaction data items may be concurrently selected and analyzed, such as via a process similar to that illustrated in FIG. 11.


For the selected transaction data items, at block 1120 a payee identified in the transaction data item is determined. For some transaction data items, the payee is included in a separate payee field as digital information, for example, a payee may be indicated as “ABC Rentals” in a “PAYEE” field of a transaction data item. For some transaction data items, the payee may not be as easily identifiable. For example, a paper check may include a handwritten payee. The account identification component 114 may analyze the handwritten payee information, such as by using a handwriting analysis algorithm and/or other optical character recognition algorithm, to identify digital characters included in the payee field. For the example payee ABC Rentals, character recognition of a handwritten version of ABC Rentals may result in something that is not precise such as “ABC Reatils”. Thus, correlation of transaction data items by payee may be technically challenging in such circumstances. In some embodiments, categorization of transaction data items associated with a recurring account of the user may be based on other parameters of the transaction data items, rather than or in addition to the payee identifier.


In some embodiments, the account identification component 114 performs a normalization and/or standardization process on data values of the transaction data items. For example, standardization may include removal of certain special characters (for example, symbols), correction of typographical errors (for example, which could catch the typo “Reatils” and correct to “Rentals”) and/or perform other standardization processes. A normalization process may involve accessing a payee data structure associating a normalized payee identifier with one or multiple possible payee identifiers that could be located in transaction data items. Example, the payee data structure could include a standard payee identifier of “ABC Rentals” that is associated with multiple variations of that payee identifier, such as “ABC Rental”, “ABC-Rentals”, “ABC Rentals Inc.”, and so forth. In this way, the account identification component 114 can more accurately associate transaction data items that are each involve a common payee.


In some embodiments, other data values of transaction data items are normalized, standardized, and used in generating groupings of similar transaction data items. For example, information provided in a memorandum or other informational field of a transaction data item may be analyzed.


After performance of block 1120 on a selected payee (block 1110), a grouping of transaction data items, each associated with the selected payee, are identified. Thus, if the transaction data items are associated with monthly payments to the selected payee, and two years of transaction data items are processed, the grouping of transaction data items identified at block 1120 may include 24 transaction data items.


Moving to blocks 1130-1150, information summarizing, characterizing, or aggregating information in the grouping of transaction data items located at block 1120, is performed. The information derived in blocks 1130-1150 is provided as examples of information that may be determined to help evaluate whether the grouping of transaction data items indicate an account of the user that potentially could be added to the credit data of the user. In other embodiments, other information may be derived from the grouping of transaction data items.


At block 1130, an annual payment amount for the transaction data items is calculated. For example, transaction amounts for each transaction data item dated within a prior 12 month period may be summed to determine the annual payment amount. A similar process may be performed for a prior yearly period, such as transaction data items dated from 24 months prior to 12 months prior. Similarly, total payment amounts for other time periods may be developed, such as quarterly or semiannually.


At block 1140, an average payment amount is determined. For example, an average payment amount over the prior one year period may be determined by averaging payments received over the last 12 month period.


At block 1150, periodicity of payments is determined. For example, an average number of days between payments over the prior one year period may be determined by averaging the number of days between each pair of sequential transaction data items.


At block 1160, the account identification component 114 determines whether there are additional payees in the transaction data items that have not yet been analyzed for categorization. In some embodiments, those transaction data items grouped with the transaction data item selected at block 1110 are not the selected for grouping. In other embodiments, each transaction data item, whether already associated with a grouping of transaction data items or not, is analyze with the method of blocks 1110-1150. If additional payees have not yet been analyzed for categorization, the method returns to block 1110 where another payee is selected. If no additional payees need categorization, the method continues to process for identifying the type of account each grouping of transaction data items is most associated with and identifying any accounts that may be added to credit data of the user.



FIG. 12 is one embodiment of a flowchart illustrating one embodiment of a method for identifying account types of interest from groupings of transaction data items (for example, from the process of FIG. 11). In some embodiments, the method of FIG. 12 may be performed by the account identification component 114, whether operated by a account access system 202 or the account discovery system 110 A. Depending on the embodiment, the method of FIG. 12 may include fewer or additional blocks and/or the blocks may be performed in order different than is illustrated.


Beginning at block 1210, a payee included in the transaction data items is selected. For example, a payee that is associated with a grouping of multiple transaction data items (for example, 24 transaction data items spanning a period of 24 months of transaction data items) is selected.


Next, at block 1220, rules for identifying a probable account type associated with the grouping of transaction data items are executed. Such rules may be stored in a datastore and/or in a rules engine. In some embodiments, the payee identifier (for example, the normalized payee identifier) may be a significant factor in determining account type associated with the transaction data items. For example, is the normalized payee identifier is associated with a well-known wireless provider, designation of those transaction data items grouped with the wireless provider ID may be categorized as a wireless account without further application of account determination rules. In some implementations, even where a payee of multiple groups transaction data items is well-known, additional rules may be applied to the transaction data items, as well as the overall information derived at blocks 1130-1150, for example, to validate that the grouping of transaction data items really is for the believed account type. For payee identifiers that are not well-known (for example, an account types is not readily known for a grouping of transaction data items associated with a particular payee), account identification rules may be applied.


Next, at block 1230, a confidence level that a grouping of transaction data items is of a particular account type is determined. For example, at block 1220 a rule set for a rental account may be applied to the grouping of transaction data items and at block 1230 the confidence level that the grouping of transaction data items really is a rental account is determined. In some embodiments, the rules applied at block 1220 automatically output the confidence level of block 1230, thus, these blocks may be combined in certain implementations.


At block 1240, the account identification component 114 determines whether the confidence level calculated at block 1230 is above a threshold that indicates sufficient confidence that the selected account type accurately reflects the grouping of transaction data items. For example, if a rental account rule set is applied to the grouping of transaction data items at block 1220, a confidence level that the grouping of transaction data items are associated with a rental account is determined at block 430, and at block 1240 a confidence level threshold is compared to the confidence level calculated at block 1230 to determine if the transaction data items are associated with a rental account. In some embodiments, the threshold levels vary based on the account type. For example, a confidence level may be higher for rental account then for a wireless account.


If the confidence level is above the threshold at block 1240, the method continues to block 1270 where the grouping of transaction data items are associated with the selected account type.


Depending on the embodiment, the confidence level associate with a grouping of transaction data items may be based on various information regarding the transaction data items, the financial account of the user, the financial institution from which the account information was obtained, the user (and/or related users, such as those in the same household), and/or other related characteristics. As an example, the account identification component 114 may determine if there are a sufficient number of transactions for the account to be reliable, may determine if the transactions were reported by a sufficiently reliable financial institution, and/or may determine if the transactions are consistent enough with patterns expected for such accounts (for example, rent transactions with amounts that vary each month may indicate a lower reliability that the transactions accurately reflect a rental account of the user, utility transactions with a payee name that doesn't match a known utility provider may indicate a lower reliability, and so forth). In some embodiments, the account identification component 114 may assign individual reliability scores to each of multiple factors, such as number of transactions, reliability of the associated financial institution, consistency with typical patterns for such accounts, and so forth, and may combine the individual reliability scores to determine an overall reliability score. In some embodiments, a threshold confidence level may include both individual reliability scores for each of one or more individual factors and a an overall reliability score for all of the factors that are determinative of reliability.


If the confidence level is not above the threshold at block 1240, the method continues to block 1250 where the account identification component 114 determines if additional information may be helpful in increasing the confidence level associated with the grouping of transaction data items. As an example, the account identification component 114 may determine that the account is a rental account and that obtaining a copy of the lease agreement would significantly improve the confidence of the system that the rental transactions are accurate, reliable, and properly associated with a rental agreement. As another example, the user account discovery system may determine that the account is a utility account and that confirming one or more details of the user's account directly with the utility provider would significantly improve the system's confidence in the utility account (for example, the account's reliability).


If additional information may be useful at block 1250, at block 1280 additional information is requested from the user and/or a third-party. In some embodiments, information regarding transactions that may be missing in a grouping of transaction data items may be requested from the user and/or third-party to supplement the transaction data items acquired directly from the transaction provider and increase the confidence level. In some embodiments, the types of additional information and/or sources of additional mission may vary based on the account type being analyzed. In some embodiments, additional information may only be requested if the confidence level is already near the threshold, such as within 10% of the required confidence level.


As other examples, the user may be asked to provide the date and amount of a monthly rent (or other utility, wireless, or other) payment; the user may be asked to provide a copy of a lease agreement, a utility bill, or other such confirming information, the financial institution may be asked to provide additional details of the transactions, utilities may be asked to confirm account and/or transaction details, rental providers may be asked to confirm rental agreement details, and so forth.


If additional information is not needed at block 1250, the account identification component 114 determines at block 1260 whether the grouping of transaction data items should be analyzed against other account types. For example, if the transaction data items are initially tested against rental account rules, at block 1260 the account identification component 114 may determine that utility account type rules should now be applied to determine whether those transaction data items are an utility account. If no additional account types are to be tested, the method continues to block 1290 where additional payees, or groupings of transaction data items associated with an additional payee, remain to be tested against the account type rules. If additional groupings of transaction data items do remain, the method continues to block 1210 where another grouping of transaction data items, associated with a particular payee, is selected and analyzed. At block 1295, associations of transaction data item groupings with account types, as well as potentially the confidence levels associated with the identified account types, are stored for later access.



FIG. 13 is one embodiment of a flowchart illustrating an example of a method that may be performed to request additional information from third-party and/or from a user, such as may be performed at block 1250 and 1280 of FIG. 12. In the example of FIG. 13, at block 1310 the account identification component 114 determines sources and/or types of additional information that may be used to improve identification of accounts within categorized transaction data items. In some embodiments, the types of information that are helpful may be based primarily on the type of account being identified. For example, if a rental account is being identified (for example, a confidence level that a group of transaction data items are associated with a rental account of the user is met or almost met), a rental agreement between the user and the rental payee (for example, a landlord) may be the default data item requested of the user and/or third-party.


If a determination is made that additional information is requested from a third-party, at block 1320 a request for the additional information is transmitted to the third-party and at block 1330 the third-party provides additional information. Such additional information may include, for example, demographic information of the user that may be compared to information associated with a payee on the groups transaction data items to confirm that the user lives within a service district of the payee. If a determination is made that additional information is to be requested from the user, at block 1340 the information is requested from the user, such as via the mobile application or website with which the user is already interacting with the account discovery system, and the user provides requested additional information at block 1350. Examples of additional information that may be provided by a user could include a payment type (for example, cash, handwritten check, cashier check, and so forth), payment amount, digital images of payments, digital images of account specific information (for example, monthly invoices or statements from the payee), and so forth. In one example embodiment, the user is requested to provide a digital copy of at least a portion of a rental agreement to validate terms and existence of a rental account. Information from the rental agreement may be extracted, such as through an optical character recognition processing, to identify key terms of the rental agreement and compare such terms to information included in (or derived from) the grouping of transaction data items.



FIGS. 14-18 are example user interfaces that illustrate a user experience as the account discovery system accesses transaction data items of the user and attempts to identify accounts within the transaction data that can be added to the user's credit data. For example, the user interfaces may present dialogue blocks sequentially as the user interfaces with an artificial intelligence system (for example, provided by a credit bureau) that helps the user understand their credit situation better. For example, a user may click on certain of the dialogue blocks 1410 to cause additional dialogue blocks to be presented.


Beginning at FIG. 14, the dialogue blocks 1410 provide information to the user on types of accounts that may be used to increase the consumer's credit score, such as, for example, phone, Internet, a utility (for example, electrical, water, gas, and so forth) bills. The dialogue then continues to provide educational information regarding a payment history that may be needed to impact credit score the user. Depending on the embodiment, the payment history threshold for impacting a credit score of user may depend on the type of account. For example, a wireless account may be considered by a credit scoring algorithm with only three months of consistent payment history, while a rental account may require six months. Different credit scoring algorithms may have different requirements, weightings, and factors, for example, for the required payment history for an account to be considered by the scoring algorithm.



FIG. 15 illustrates embodiments of additional dialogue blocks 1510 that provide current credit score information to the user, such as to provide a baseline to the user for comparison to a later calculated credit score, for example, after one or more new accounts are added to the credit data of the consumer. In this example, the dialogue blocks 1520 allow the user an option to watch a educational video describing how the user's DDA account information is accessed and analyzed to locate accounts of the user that can be added to the credit file of the user. Additionally, other educational videos or interactive media can be provided to the user.



FIG. 16-18 illustrate embodiments of additional dialogue blocks 1610-1810 that may be provided to the user, such as to educate user on additional areas related to their credit data. In some embodiments, the informational dialogue blocks, such as those in FIGS. 16, 17, and/or 18, may be presented to the user only while the account identification component 114 is still processing transaction data from the one or more links financial account of the user areas for example, after the account identification component 114 has completed processing of the transaction data items, presentation of further dialogue blocks may be postponed in favor of presenting the user with an indication of identified accounts for boosting the consumer's credit score, such as the dialogue block 1820 of FIG. 18.



FIG. 19-20 include embodiments of example user interfaces that may be presented to a user after scan of the consumer transaction data is completed and, in this example, accounts that may be added to the user's credit data are located. In other embodiments, the user interfaces may include additional or less information and/or may be formatted and presented in different manners. The user interfaces of FIGS. 19-20, as well as the other user interfaces discussed herein, are only examples of user interfaces that may present this information.


In some embodiments, the system may interact with the user via a chat window (for example, a pop-up window) that may be operated by a chatbot to request the information needed from the user and/or provide the user with educational information regarding the process. In some embodiments, such chatbots may be entirely automated (for example, using artificial intelligence that learns how to best interact with users over time) or may be partially operated by a human operator (for example, when the chatbot is unsure of how to respond to a query from the user). Similarly, any other user interactions discussed herein may be partially or fully performed via a conversational format, with a chatbot (for example, fully or partially automated) interacting with the user via primarily textual communications. FIGS. 14-18 illustrates example embodiments of such chat-like communications.


User interface 1910 request information from the user regarding a few potential accounts that could be added to the credit data of the consumer. The user interface request that the user confirm that payments to the identified payees are actually made by the user and, accordingly, could properly be used in calculating credit worthiness of the user. In this embodiment, if the user does not recognize payees listed, those payees can be removed by clicking the acts the right of the payee data identifiers.


After the user selects payees with which the user has an account, the user may select a confirmation indicator element, such as an “I make these payments” link or button, and be presented with a user interface 1920 which indicates that the account identification process performed by account identification component 114 (referred to loosely as a “scan” in certain of the user interface features discussed herein) has completed. The user interface further indicates that two accounts, of the type that may be added to credit data of users, have been identified. In this particular example, an electrical account (associated with the payee “So Calif Edison”) and a wireless account (associated with the payee “T Mobile”) have been identified.


User interface 1930 illustrates an example of a request for additional information from the user, in this case related to a potential lease account for which transaction data items were identified in the user's transaction data. Advantageously, the user may launch a camera on their mobile application directly via the user interface 1930 and take one or more snapshots of the lease agreement. The lease agreement may then be processed by the account identification component 114 to validate a grouping of transaction data items associated with a lessee as indicative of a rental account of the user that may be added to credit data of the user.



FIG. 20 illustrates an embodiment of the user interface 2010 that provides detailed information regarding the transaction data items associated with a particular account, in this case the account associated with the payee “So Calif Edison” the example user interface identifies a number of payments that were found in the transaction data items, as well as an average payment amount across those located payments. In other embodiments, less or additional information regarding the individual transaction data items and/or data derived from all or some of the transaction data items, may be provided. In one embodiment, the user interface 2010 may additionally provide the account type associated with the identified payee, such as “utility account” associated with the identified payee “So Calif Edison.”


User interface 2020 includes further details regarding the payments that were found in the transaction data items. In this example, two years of prior data is illustrated graphically such that the user can identify months where they transaction data item was not located. In this example, April 2018 payment was not identified in the transaction data items. In some embodiments, the user is given an opportunity to update the account information with payments may outside of the linked DDA account. For example, the user may be given the opportunity provide a copy of a cashiers check that was used to make the payment to So Calif Edison in April 2018 so that the historical payment activity for the account shows no missed payments over the last two years. Finally, after the user has reviewed information regarding the located account and related transaction data items, the user can select the “add to my credit file” button to initiate addition of the account to the user's credit file.



FIG. 24A is another embodiment of an example user interface that provides information regarding an identified account in transaction data items of user, with an option that is selectable by the user to add the account to credit data of the user (as a self-reported account). In the example of FIG. 24A, the user interface may be displayed via a browser, such as on a desktop or laptop computer. However, the same or similar user interface may be displayed on any other display device or type. In this example, a payment account associated with So Cal Edison has been identified, and payments identified in transaction data items are indicated in the payment history graphic 2412. In this example, payments for two months in 2017 were not identified and a payment for one month in 2018 was not identified (indicated as gray circles in the payment history graphic 2412, rather than green circles). Thus, 21 of 24 payments were identified in the prior two year history for the account. Missing payments in one or more calendar months may not necessarily indicate negative activity associated with the account. For example, a user may have made two payments within a given month (for example, paid bill on 1st and 31st of the same month), causing the following calendar month to not be associated with a payment. However, the payment for that following month was actually paid early, so the account identification component 114 may be programmed to identify special circumstances such as this example (either through manually provided rules and/or rules determined by machine learning) so missed payments can be more accurately identified.


Since there are a few missing payments, the user may want to review the payment transaction items that were identified by the account identification component 114 to determine if some of those missing payments can be located (for example, in another DDA account of the user). Similarly, the user may want to provide the account identification component 114 with additional information regarding payments made to the payee, such as an alternate payee identifier that may have been used in certain transaction data items. As another example, the user may want to authorize access to another DDA account where payments to the payee may also be located. Through these processes, the user may improve the payment history associated with the account and, accordingly, may further increase a score impact by addition of the account to credit data of the user. In some implementations, a user interface such as FIG. 24B, which displays missing payments associated with a particular account, may not be displayed to the user until after the account is added as a trade line to the credit data of the user.



FIG. 24B illustrates an embodiment of an example user interface 2420 that provides an overview of self-reported accounts that have been added to the credit data of the user. User interface 2420 may be considered to be an electronic, interactive view of the user's credit report, and may provide the same or similar information that would be reported on a credit report delivered in other manners than a user interface. The user interface 2420, or similar user interface, may be provided to third parties with a permissible purpose for viewing the consumers credit data. For example, a lender, landlord, or other entity interested in credit of a user, may view and electronic report of trade lines in the user's credit data.



FIG. 24C illustrates an embodiment of an example user interface 2430 that summarizes the various areas of consumer credit that may impact credit worthiness of the user. In this example, a current credit score interface 2431 is displayed, showing the user a relative strength of the current credit score of the user with how lenders may interpret that current credit score (for example, fair, good, very good, exceptional). This example also includes an account summary interface 2432 providing a summary of those accounts (for example, trade lines) that are currently part of the user's credit data. In this example, self-reported accounts are identified separate from other credit accounts. In some embodiments, self-reported accounts may be combined with other credit accounts. The debt summary interface 2434 provides overall credit, retail, real estate, installment loan, and collections debt. The overall credit usage interface 2435 provides the user with an indicator of credit utilization across all of the credit account of the user. Inquiries interface 2436 indicates the number of credit inquiries currently impacting credit score of the user, such as those that were received within the prior two-year period (or other time period, depending on the credit scoring algorithm). Public records interface 2438 indicates whether any derogatory public record information was identified for the user. The information summarized in user interface 2430 provides a user with a comprehensive overview of factors that generally weigh into credit score calculations, although each credit scoring algorithm may view these factors differently, may consider additional factors, and/or may not consider some of these factors.


The user interfaces of FIG. 24, for example, may be utilized by the user as a form of financial account monitoring. Similarly, the information may be provided to the user and/or authorized third parties, in other formats, such as via periodic emails or push messages that summarize activity of the self-reported accounts of the user, as well as other credit data.



FIGS. 21-22 are conceptual diagrams illustrating example transaction data items that may be identified in transaction data of the consumer and analyzed to determine whether the groups transaction data items are indicative of an account that can be added to credit data of a consumer. In the example of FIG. 21, transaction data items 2110-2118 represent five transaction data items that were identified in transaction data of a user in a DDA account of the user, each of which was associated with a common payee, “Big Landlord” in this example. As shown, the payments were each in the amount of $475 and each occurred between 27 days and 33 days after the prior payment. Derived data 2120, which indicates aggregated, summarized, extr1acted, and so forth data related to the transaction data items, is also illustrated in FIG. 21. In the example transactions associated with Big Landlord, the account identification component 114 may determine, for example, that five payments were identified over a period of five months, the average payment amount was $475, and the average days between payments was 31.25 days.


Also shown in the example of FIG. 21 are four transaction data items 2132-2138 that have each been associated with the payee “ABC Mobile”. As shown, these example payments vary in amount from $46 to $118 and the time between payment varies from 27 days to 65 days. Thus, the derived data 2130 for the ABC Mobile transaction data items indicates an average payment of $74.5 and average days between payments of 41.7 days. Another data point that may be derived from these transaction data items is the variance between payment amounts. In some implementations, rules for identifying a regularly recurring payment that is indicative of a wireless phone account may disqualify these transaction data items because of the large difference between the payment amounts (for example, between the $46 and the $118 payment amounts) and high average number of days between payments (for example, 41.7 days where an average of 30.4 days between payments is expected).



FIG. 22 illustrates the same transaction data items 2132, 2134, 2136, and 2138 associated with payee “ABC Mobile” as in FIG. 21, but with additional analysis logic that splits the large payment 2136 of $118 that was paid almost twice as many days from the prior payment 2134 as expected, into two simulated payments 2136A and 2136B. In this way, the account identification component 114 has interpreted the transaction data item 2136 in a way that causes the modeled number of payments to be 5, with the modeled average payment being $59.6, resulting in a much smaller variance between the low payment of $46 and high payment of $67, and the average days between payments of 31.25 days. Thus, this modeled data regarding the account may result in a much higher confidence level that the transaction data items are associated with a mobile account than application of the rules to the derived data 2130 of the original transaction data items.


Ongoing Access to Transaction Data Items


In some implementations, the account discovery system 110 periodically access transaction data items of the user, such as via the data permissioning component 112 that communicates with the financial institution of the user using the user security token. For example, the account discovery system 110 may periodically access recent transaction data items, for example, those transaction data items that are new since the financial account of the user was last accessed, to search for additional accounts of the user that could be added to the user's credit data. In some embodiments, the user is provided with a permissions dashboard that allows the user to selectively authorize uses of data associated with self-reported (and possible other) accounts of the user. For example, the user may opt into use of their credit data (including self-reported data) in calculation of other risk indicators and/or for other financial analysis or products. In one embodiment, the use can authorize use of credit data to calculate multiple risk indicators using various risk scoring algorithms. Some risk scoring algorithms may consider the self-reported accounts in the credit score calculation, while others may not directly consider the self-reported accounts in a credit score calculation, but may indirectly consider the accounts to the extent they impact the total debt, monthly payment obligations, equity, and so forth of the user.



FIG. 23 illustrates an embodiment of a user interface 2310 that may be provided to a user after an initial scan of transaction data items has been performed. User interface 2310 indicates that the financial information of the user is rechecked periodically to determine if additional accounts can be located for addition to credit data of the user. In some embodiments, the additional transaction data items are grouped with existing transaction data item groupings, such as those that were generated during an initial account identification process. Addition of new transaction data items to an existing grouping of transaction data items may increase a confidence level in identification of a particular account type such that the account is presented for confirmation by the user for addition to credit data the user. For example, an account with only two monthly payments in the initial transaction data item grouping may not be eligible for addition to credit data of the user, but over the next month when a third transaction data items indicating a third monthly payment associated with the payee is identified and associated with the payee, the grouping of transaction data items may meet the rules for addition of the account to credit data of the user.


Example user interface 2320 provides the user with example circumstances where further information may be available to identify accounts for addition to the user's credit data. In this example, the user is provided an opportunity to connect an additional account to the account discovery system 110, such that additional transaction data items may be included in the account discovery process. For example, if the user previously authorized access to a checking account, the user may additionally authorize access to a savings account or another checking account at different financial institution, to allow analysis of additional transaction data items that may be indicative of a utility, telecom, rental, and so forth account.


Example user interface 2330 is an example request the may be made to the user in an attempt to update payee information that may be indicated in transaction data items of the user (and/or other users). Such a request may be used to obtain data from the user that enhances the system's ability to identify transactions that the user can use to boost their credit score. In some embodiments, the user may be asked to provide examples of transactions that should qualify for the boost (for example, telecom and utility payments) and/or payee identifiers in transactions that are associated with a particular payee or type of payee. This user-provided information may then be used by the account identification component 114 to better identify transactions and accounts that could be added to credit data of the user.


In the example user interface 2330, the user is requested to provide information regarding the specific payee ID that is used in the transaction name by the user's financial institution, where the specific payee ID used by the financial institution may differ from other payee IDs for the same payee that are used by other financial institutions and/or that are included in the payee database. Thus, the payee ID information provided by the user may then be added to the payee database and used when analyzing other user transaction data items to better match transaction data items from that particular financial institution and payee with the appropriate standardized payee identifier.


In some embodiments, the account identification component 114 periodically accesses additional transaction data items of the user and searches those transaction data items for new payment information associated with accounts that have previously been added to the user's credit data. For example, if a wireless account is added after an initial processing of transaction data items from a checking and savings account of a user added financial institution, those same checking and savings accounts of the user may be accessed monthly (or other time period) to search for new payments to the wireless account. After identifying payments to the wireless account, information regarding the new payment may be provided to the credit bureau as an update to status of the trade line. In this way, self-reported accounts may be added to credit data and updated on an ongoing basis with payment information, in a similar manner as traditional credit accounts are initially reported to the credit bureaus and updated with monthly payment information.


In some embodiments, ongoing access to transaction data items and providing updated payment information on self-reported tradelines may continue indefinitely. For example, as long as the account remains connected and the credentials remain active, the account discovery system may periodically access new transaction data items which may allow identification of new payments that meet criteria for addition of an account as a trade line, and user may be notified they have new boost available for them to use to increase their credit score.


Such ongoing access to transaction data items may allow new accounts for a boost to be identified as more payments are made to the corresponding payee. For example, if the user on initial scan only had one or two months of payment history identified for a particular payee, new transaction data items may be received over the following months to obtain the required threshold payment months for adding credit data. In this example, the user may be notified via email (or other communication medium) of the qualifying account based on newly received transaction data items, and the account may be added to the user's credit data at the request of the user, or automatically upon identification (for example, if the user authorized later addition of the account when the initial scan was performed).


In some embodiments, the user provides permissions for later accesses to transaction information and/or may provide subsequent permissions to access the transaction information. In some embodiments, if a new payment for a tradeline has not been identified in transaction data items for more than a threshold time period (for example, three months, six months, and so forth), the self-reported tradeline may automatically be removed from credit data of the consumer. Additionally, as noted elsewhere, the user can remove permissions to periodically access transaction data at one or more financial institutions at any time.


In some embodiments, any disruption in monthly (or other periodic) updates to self-reported accounts, such as based on accessing transaction data items that one or more financial institutions in identifying payment information on those self-reported accounts, may trigger a notification to the user. For example, if a monthly scan of transaction data items from a DDA account (where a previous 12 months of payments on a self-reported account were identified) does not result in identification of a payment on the account, an alert may be transmitted to the user. For example, a text message, push notification, email, or other notification may be transmitted to the user device to alert the user of the missing payment. In some circumstances, the user may have inadvertently missed payment on the self-reported accounts and the notification provides the user with the ability to remedy the missed payment as quickly as possible. Alternatively, if the user purposefully missed payment, perhaps in conjunction with closing the account, the notification allows the user to indicate to the account discovery system that the self-reported accounts should be removed from credit data of the user. In some embodiments, alerts may be provided to the user based on other triggers, such as if credentials associated with a DDA account with financial institution have changed (for example, the transaction data items are no longer accessible by the account access system). Such an alert may request updated credentials (and/or new account information if the account has been canceled or transferred) from the user so that the system may be re-permissioned to access the transaction data items of the user account.


Example System, Method, and User Interfaces Associated with Trade line Addition



FIG. 25 is an embodiment of a block diagram illustrating an account discovery system 2510 in communication with a financial institution 2500, a user device 2520, and a credit bureau 2530. As noted above, the account discovery system 2510 may access financial account information of the user, after receiving permission from the user to access such financial account information, that may be analyzed to identify payments indicative of a self-reported account that may be added to the credit file of the user. In the embodiment of FIG. 25, a vendor 2540, such as a telecom, utility, or rental provider, receives payments from a user via a DDA account held with the financial institution 2500. For example, the vendor 2540 may receive monthly checks from the user for wireless phone service. Such payments may be transmitted electronically to the vendor 2540 or in paper form, such as by checks automatically printed and transmitted from the financial institution 2500 or checks that are handwritten by the user. In this embodiment, the account discovery system 2510 initially communicates with the user device 2520, to receive authorization from the user to access account information of the user with the financial institution 2500, such as using processes described elsewhere herein. Wth the appropriate authorization in place to access the financial account data of the user at the financial institution 2500, transaction data items of user are accessed via a secure communication channel with the financial institution 2500. The identified accounts within the transaction data items (for example, as defined by the account identification component 114), may be validated by the user and then added to the credit data of the consumer as a trade line that is usable by credit scoring algorithms in calculating the credit score of the user. As shown in FIG. 25, account discovery system 2510 transmits a new trade line request to the credit bureau 2530, such as in a particular format that is understandable by the credit bureau 2530. Additionally, communications from the account discovery system 2510 with the credit bureau 2530 may occur periodically, such as to provide additional new trade line requests (for example, for accounts that are identified as additional transaction data items are processed by the account discovery system 2510) and to add additional payment information to the consumer's credit data for trade line that have previously been added by the account discovery system 2510. In this way, the account discovery system 2510 provides up-to-date transaction data to the credit bureau 2530 that allows the user's credit history to grow over time as payments are made to the vendor 2540.



FIG. 26 is an embodiment of a flowchart illustrating one embodiment of a method of providing a new trade line request to a credit bureau to initiate addition of a self-reported account to credit data of the user. Defendant embodiment, the method of FIG. 26 may include additional or fewer blocks and/or the blocks may be performed in order different than is illustrated. Beginning in block 2610, a request update credit data of a user is received from a user computing device. The request is particularly for self-reported accounts of the user, such as rental, utility, and telecom accounts, among others. In block 2620, after the account discovery system has identified a self-reported account to be added to the user's credit data (for example, using processes discussed herein associated with the data permissioning component 112, the account identification component 114 and/or the account verification component 116), a new trade line data package is prepared for transmission to a credit bureau. In embodiments where a new trade line request is provided to multiple credit bureaus, multiple new trade line data packages may be prepared, one for each credit bureau, formatted and including information that may be specific to the particular credit bureau for purposes of adding a new trade line to the user's credit data. Next, at block 2630, the specially prepared trade line creation data packages transmitted to the credit bureau. Advantageously, the trade line creation data package may be formatted in the same manner as a new trade line creation data package for a traditional credit account, such as a credit card or loan. Thus, the credit bureau may as the new trade line to credit data of the consumer and the credit data may be immediately usable by credit scoring algorithms.



FIG. 27 illustrates an embodiment of example user interfaces associated with addition of a new account to credit data of the user. Example user interface 2710 may be provided to a user after the user confirms that a newly identified account should be added to the user's credit data. In other embodiments, the addition of the new trade line to credit data of the consumer may be instantaneous (for example, completing in a few seconds) or may take a bit more time, such as tens of seconds or even a few minutes.


As noted above, after the new trade line has been added to the user's credit data, that new trade line is immediately usable by credit scoring algorithms. User interface 2720 illustrates a scoring interface that may be displayed to the user shortly after addition of a new trade line to the user's profile. For example, after the user selects and identified account to be added as a trade line to credit data of the user, the new trade line creation data package may be prepared and sent to the credit bureau (and a user interface such as user interface 2710 may be provided to the user), and in response to confirmation that the new trade line has been added to the credit data of the user a scoring algorithm may be executed on the updated credit data of the user to generate an updated credit score. In the example of FIG. 27, user interface 2720 indicates that, after addition of the new trade line to the user's credit data, the users credit score has increased by 22 points to a score of 691. In some embodiments, a user interface similar to user interface 2720, in addition to or instead of indicating a number of points that the credit score increased, may indicate a change in score band for the credit score, such as by indicating that the added tradeline(s) increased the user's credit score from a “fair” score band to a “good” score band. Accordingly, by optimizing communications between multiple devices, obtaining proper authorizations from the user, and for dating with credit bureaus for additions and data scoring based on new account information, the systems discussed herein provide the user with an advantage that has not previously been available.



FIG. 28A illustrates embodiments of example user interfaces that may be provided to a user to indicate availability of additional product offers, such as credit offers, in view of an increase credit score, such as may be caused by the addition of a new self-reported account to credit data of the user. For example, a credit card matching service, such as Experian's CreditMatch, may interface with the Account Discovery System to obtain updated credit scores of users which may then be used to qualify the user for additional credit offers. In example user interface 2810, a message 2812 indicates that additional credit card offers have been associated with the user in view of the 22 point increase in the consumer's credit score. For example, a credit card matching system may consider a credit score of a user as an important factor in whether a user qualifies for a particular credit card. Thus, with a credit score increase, such as the example increase of 22 points illustrated in example user interface 2810, the user may qualify for multiple credit card offers for which the user did not qualify previous to the 22 point increase. User interface 2820 similarly illustrates a particular credit card offer for which the consumer qualifies after the 22 point credit score increase, which the consumer did not qualify for prior to the credit score increase.



FIG. 28B illustrates an embodiment of an example user interface 2830 that may be provided after the consumer has boosted their credit file by adding one or more self-reported accounts. As shown in user interface 2830, information regarding newly available credit offers 2832 and 2834 is provided to the user. In this embodiment, the user did not qualify for the credit offers 2832 and 2834 prior to addition of a self-reported account, but after a self-reported account was included in tradeline data of the user, the credit score of the user increased and moved above a threshold minimum credit score requirements for credit offers 2832 and 2834.



FIG. 28C is an embodiment of an example user interface 2840 that may be provided to the user as part of an online credit report that is accessible to the user, either through a free or paid account with a credit reporting agency or other authorized credit reporting entity. In this example, the user has selected a newly added “utility self-reported” account and detailed information regarding that self-reported account is provided in user interface 2840. In some embodiments, and account detail page similar to user interface 2840 may be provided to a user immediately after addition of a new self-reported account. In the example user interface 2840, an account management button 2842, is provided to direct the user to an account dispute page where the user will have the option to remove the self-reported account from credit data. For example, selection of account management button 2842 may direct the user to a dispute center user interface, such as the example illustrated in FIG. 37.



FIG. 28D is an embodiment of another example user interface 2850 that may be provided to the user as part of an online credit report. Example user interface 2850 provides summary information of the self-reported accounts currently associated with the credit data of the user. In this example, information regarding to utility self-reported accounts, rent self-reported account, and a telecom self-reported account are displayed. The “View” element associated with the self-reported accounts may be selected to direct the user to an account detail page, such as the example user interface 2840 of FIG. 28C.


Removal of Added Trade lines


In some implementations, addition of new trade line to the user's credit data may not have the desired effect on credit score of the user. For example, in some situations, addition of a new trade line may actually cause the credit score of the user to decrease, or to not change at all. Accordingly, in some embodiments, the account discovery system 110 provides a mechanism allowing the user to remove any previously added self-reported trade line from their credit data.


In some implementations, an improvement to the credit situation of a user may be realized through addition of self-reported accounts, even if the credit score of the user decreases or stays the same. For example, a user's overall credit health could be seen as improving if addition of a self-reported account increases the total number of trade lines above a thin file threshold (for example, four or more trade lines) so that the user is seen as a thick file user. Thus, while a credit score increase is a straightforward indicator of credit health of a user, other factors associated with creditability of the user may also be considered by potential lenders, landlords, partners, and so forth. Accordingly, in some embodiments, the accounts discovery system provides educational material to the user, such as when their credit score has not increased responsive to a boost (or has actually decreased responsive to a boost), so that the user has an option to either remove the self-reported account or to maintain the self-reported account in the user's credit data because of an advantage in overall creditability of the user with the newly added self-reported account.



FIG. 29 provides embodiments of example user interfaces that may be used in a trade line removal process. The example user interface 2910 explains that the credit score of the user decreased by eight points due to addition of a new trade line (for example, that was identified by the account discovery system in transaction data items of a DDA account of the user). Furthermore, the user interface 2910 provides a brief explanation of why addition of the new trade line caused a drop in credit score of the user. For example, a credit score may decrease if a new account(s) increased debt of the user.


Example user interface 2920 provides additional information to the user regarding reasons that newly added accounts that have caused the credit score of the user to drop may still be beneficial to keep in credit data of the user. For example, user interface 2920 explains that the credit file of the user is being evaluated different now that it has additional trade line's, which may allow the user to qualify for additional offers even with a lower credit score. User interface 2930 further explains that lenders won't see newly added positive bill payments in the trade line that was added by the account discovery system, but that the user's credit score will go back up when the trade line is removed.


Should the user decide to remove one or more self-reported accounts that have been added by the account discovery system, such as by selecting user interface element 2912 or 2932, removal of the recently added account from the credit data of the user is initiated. Thus, users can remove accounts added through the account discovery system and their credit score will revert to the same score they had prior to addition of the new trade line. If the user continues to pay their utility and telecom bills on time to build positive payment history, they may later use the credit score update features again to recalculate their (hopefully increased) score,



FIG. 36 illustrates an embodiment of an example user interface 3610 that may be provided to a consumer who wishes to stop periodic reporting of payment activity for one or more self-reported accounts. Example user interface 3610 may be provided to the user in response to the user's request to stop reporting transaction data items associated with a particular pay the (for example, “So Calif Edison” an example of FIG. 36). The user interface provides information detailing how this may impact the credit file and/or the credit score of the user. The user is provided with an option to keep the trade line in the user's credit data or to remove the trade line from the user's credit data.


Example System, Method, and User Interfaces Associated with Updating Offers to the User



FIG. 30 is an embodiment of a flowchart illustrating one embodiment of a method that may be performed to provide updated offers to a user responsive to an increase in credit score of the user that is caused by addition of one or more self-reported accounts to credit data of the user. In some embodiments, the method of FIG. 30 may be performed by an offer provider, such as a credit card prescreening and/or prequalification provider, that provides credit card offers to consumers for which the consumers are likely qualified, such as based on lender criteria that may rely heavily on credit score of users. In other embodiments, the method of FIG. 30 may be performed by a credit risk agency, such as a credit bureau, that partners with credit issuers to provide prescreened credit offers as soon as possible after a consumer's credit score has changed. In other environments, the method may be performed by multiple entities and/or systems, or other entities or systems that provide other offers to consumers. Depending on the embodiment, the method of FIG. 30 may include fewer or additional blocks and/or the blocks may be performed in order different than is illustrated.


Beginning at block 3000, the offer provider determines identification information of a user, such as information that is usable to obtain a credit score of the user. In block 3010, a current risk score of the user is obtained and/or calculated. For example, identification information obtained at block 3000 (for example, first name, last name, address, Social Security number, and so forth) may be provided to a consumer reporting agency with a request for a current credit score of the user. If the offer provider has the necessary permissible purpose for obtaining credit data of the user, the consumer reporting agency will calculate and return a current credit score of the user.


Moving to block 3020, the offer provider determines a first one or more product offers available to the user based on the current risk score. For example, each of multiple credit card offers (or automobile loans, home loans, or other offers) may be associated with a minimum credit score that qualifies users for the particular credit card offer. Thus, the credit score of the user may disqualify the user from eligibility for certain credit offers. Similarly, the credit score of the user may qualify the consumer for a first one or more credit offers (for example, those credit offers having eligibility criteria including a minimum credit score that is lower than the current credit score of the user). Accordingly, the offer provider may determine a first set of offers that the user is eligible to receive (and which the user may ultimately qualify for after full application) at block 3020 and a second set of offers that the user is not ineligible to receive (and for which the user would ultimately not qualify for after full application) at block 3030.


Next, at block 3040, the offer provider provides the user with an option to initiate updates to risk data of the user, such as by allowing the user to interface with the account discovery system to potentially identify self-reported accounts that could be added to credit data of the user to increase the user's credit score. In response to the user selecting the option to initiate updates to credit data, at block 3050 the offer provider initiates communication between the user and the account discovery system. The user may then interface with the account discovery system to provide the necessary permissions to access financial data, validation of account information, and confirmation that located accounts may be added to the user's credit data.


Next, at block 3060, the account discovery system may automatically provide an updated credit score of the user to the offer provider, such as by requesting execution of a credit scoring algorithm on credit data of the user after a new trade line creation data package has been transmitted to the credit bureau. In other embodiments, after the account discovery system has interfaced with the user, a notification may be transmitted to the offer provider indicating that a new credit score of the user may be requested again. In such case, the offer provider may obtain an updated risk score of the user with a similar process as described above with reference to block 3010.


At block 3070, with the newly calculated credit score of the user, the offer provider identifies one or more of the second set of product offers (which the user was not eligible for previously) for which the user is now qualified. For example, if the user's credit score increased from 650 to 680 based on one or more added trade line's by the account discovery system, the user would not have qualified for a credit card requiring a credit score of 660 prior to the score increase, but would qualify for the credit card after the score increase (assuming the user meets any other eligibility requirements for the credit card).


At block 3080, the new credit offers for which the user now qualifies are provided to the user, so that the user can potentially apply for any of the first set of credit offers and/or any of the newly identified credit offers from the set.



FIG. 31 is an embodiment of an example user interface that may be provided by and offer provider, such as an offer provider that prescreens users for credit card offers and provides information regarding matching credit cards to the user. In the example of FIG. 31, the user has already engaged the account discovery system and received an increase in credit score. As indicated by text box 3110, a “new offer” is displayed to the user, where that particular credit card offer was not displayed to the user prior to the credit score increase initiated by addition of a new trade line to the credit data of the user.



FIG. 32 includes embodiments of example user interfaces that may be displayed on a mobile device of a user to invite the user to engage the account discovery system to potentially increase the credit score of the user and potentially allow more offers to be provided to the user. Example user interface 3210 may be triggered based on upcoming travel activity associated with the user. For this example, the user is invited to explore addition of new trade line to credit data of the user in order to increase the user's credit score and potentially qualify for a credit card that provides better mileage benefits.


The example user interface 3220 is provided to a user after detecting that the user does not have a credit score yet, which could be the case for teenagers or young adults, retired persons, ex-patriots, and so forth. With the availability of self-reported accounts to credit data of users, establishment of a credit report having one or multiple trade lines, as well as a corresponding credit score, may be significantly simplified. For example, payment history for a rental property over the course of many months or years may very quickly be added to credit data of the user.


The example user interface 3230 is provided to a user in response to the user applying for credit, perhaps prior to the user finalizing and agreement for credit. In this example, the user may increase their credit score by adding self-reported accounts to their credit data and thereby become eligible for a better credit offer than the one they previously applied for. In other embodiments, other triggers for providing invitations to explore addition of nontraditional accounts to credit data of users may be used.


System, Method, and Example User Interface Associated with Calculating Expected Score Increase



FIG. 33 is an embodiment of a flowchart illustrating one embodiment of a method that may be performed by the account discovery system to provide users with an estimated score increase that they may expect prior to adding new trade lines to their credit file. Depending on the embodiment, the method of FIG. 33 may include few or additional blocks and/or the blocks may be performed in order different than is illustrated.


Beginning at block 3310, a score impact rule indicating a plurality of account types impacting credit scores of users may be accessed. For example, the score impact rule may indicate that rental accounts, water accounts, and electrical accounts impact credit scores of users, while country club accounts do not impact credit scores of users.


At block 3320, credit data of a user is accessed, such as information regarding current trade lines and trade line types included in credit data of the user.


Next, at block 3350, the score impact rule is applied to the determined account types already in the user's credit data to identify any account types that are not already in the user's credit data. For example, if the user's credit data does not already include an electrical account, electrical account may be identified at block 3350 as a potential new account type that could be added to credit data of the user to increase credit score of the user. In one embodiment, an expected score impact may be calculated for each multiple account types, regardless of whether the user already has an account of any of the account types.


At block 3360, a score impact algorithm may be executed to determine a possible credit score change if an account of the identified account type is added to the credit data of the user. For example, with reference to the example above, the score impact algorithm may calculate a numerical credit score change that is possible if the user adds an electrical account to the user's credit data. For example, the score impact algorithm may be based on a model developed through analysis of a plurality of users each having added electrical accounts to credit data, such as via the account discovery system or similar system for identifying and adding self-reported accounts to consumer credit data. Thus, the score impact algorithm may estimate, based on realized credit score changes by those other users that also added an electrical account to their credit data, an expected credit score change for the particular user.


In some embodiments, the score impact algorithm considers other factors, such as demographic information of the user as compared to the base set of users from which the model was generated, in calculating the potential credit score change. For example, if users in general experienced a credit score increase of 12 points by addition of a rental account to their credit data, but users in northern California experienced a credit score increase of 24 points by addition of a rental account to their credit data, the calculated credit score change may be impacted based on the location of the rental unit associated with the rental account. Similarly, the score impact algorithm may vary based on number of trade line's already in the user's credit data, outstanding balances, public record information, and so forth, where, in general, the more similar a user is to a group of users that previously added an account of the same type to their credit data, the more similar the possible credit score change for the particular user will be to that group of users.



FIG. 34 includes embodiments of example user interfaces that may be provided to users to indicate possible credit score changes. Depending on the implementation, information already known about the user, and other factors, the level of specificity provided in the possible credit score change provided to the user may vary.


In the example user interface 3410, the user is notified that addition of a utility account to credit data of the user would potentially increase the user's credit score. In one embodiment, this message is provided to the user based on a determination that the user does not already have a utility account in credit data of the user. Additionally, in some embodiments the notification may only be provided if the user has the right quantity of other trade line, outstanding debt balances, and so forth, in their existing credit data, such that addition of the identified account type would actually increase the credit score of the user.


Example user interface 3420 indicates that an expected credit score increase of 22 points could be possible for the user with the addition of six months of consistent rental history. In one embodiment, the notification may be based on little information regarding the user, such as perhaps only a geographic location of the user, while in other embodiments the possible credit score change may be more precisely based on additional known information of the user, such as that the user has three trade lines on their credit report already, but no rental account in their credit data. As another example, a more precise estimate could be developed based on information associated with existing credit data of the user, such as payment history, how much each monthly payment affects their overall balance, if addition of a new tradeline would cause the credit file to move from a thin file to a thick file, and other attributes of the user's credit data.


Example user interface 3430 indicates that 87% of people with a credit file similar to the user saw an increase in their credit score with a boost (for example, with an addition of a new self-reported account to credit data of the user). In this example, the credit scoring algorithm may consider multiple attributes of the user in identifying a group of other users from which to calculate a likelihood of a credit score increase. For example, other users with a similar credit score (prior to boost), a similar quantity of trade lines, a similar amount of credit utilization, in a similar geographic region, and/or other factors, may be the basis for estimating how a new self-reported account might impact credit score of the user. In some embodiments, such estimations may be based on analytics of other users with similar credit files who have leverage the boost product (and/or other data indicative of changes to credit scores responsive to addition of self-reported accounts). FIG. 35 illustrates an embodiment of another example user interface that displays a similar estimate of credit score increase likelihood.


In one embodiment, the system provides an interactive score simulator interface that allows the user to be provided with real-time estimates of credit score changes in response to selection of hypothetical updates to credit data. For example, at block 3350 of FIG. 33, a user may identify a particular account type that could be added to the user's credit data and the system would determine an estimated score impact. In one example implementation, a simulator interface may allow the user to select one or more of a plurality of account types (for example, utility, rental, telecommunication, etc.) and, in response, be provided with an estimated credit score change for the selected account type(s). The estimated credit score change may be in various formats, such as an expected updated credit score, an expected credit score increase (or decrease), a direction of expected credit score change, and/or other indicators. In some embodiments, further details regarding accounts that may be added to credit data of the user may be provided to allow the system to generate a more precise estimated credit score change. For example, in addition to selection of a particular account type (for example, cell phone account), the user may provide other hypothetical information, such as number of on-time monthly payments, number of missed payments, range of monthly payments, etc. that may be used by a score impact algorithm provide more accurate estimated risk scores. Thus, a user may be provided with a first estimated risk score increase of zero for addition a first account type with 11 monthly payments, but a second estimated risk score increase of more than zero for addition of the same first account type with 12 monthly payments. Accordingly, the system provides information on account details for increasing credit scores as well as the general account types that may be added to increase credit scores.


In some embodiments, multiple estimated credit scores are provided simultaneously to the user, such as an estimated risk score associated with addition of each of multiple account types. The user may then be able to select an account type, such as one that has the highest estimated risk score increase, to initiate addition of transaction data associated with an account of the selected account type, such as using the systems and methods discussed herein.


Disputing Self-Reported Account Information



FIG. 37 is an embodiment of an example user interface that may be provided to the user that wishes to dispute information associated with a self-reported account, such as an account that is added as a trade line to credit data of the user by the account discovery system discussed herein. In one embodiment, any dispute to information in a self-reported trade line can be resolved by removal of the trade line from credit data of the user. In other embodiments, a user may be provided the ability to update the transaction data items used in developing the trade line overview or to fill in missing payments that may be negatively impacting the user's credit data.


System Block Diagram



FIG. 38 is a block diagram illustrating one embodiment of an account discovery system 3802 that may be used to implement certain systems and methods discussed herein, such as providing a credit report to a user, gathering transaction data regarding non-traditional credit accounts of users, verifying account information with the user, adding the accounts as a self-reported accounts in the credit data of the user, and updating users' credit scores based on newly added self-reported accounts.


In one embodiment, the account discovery system 3802 is configured to interface with multiple devices and/or data sources. The account discovery system 3802 may be configured to implement certain systems and methods described herein. The functionality provided for in the components and modules of the account discovery system 3802 may be combined into fewer components and modules or further separated into additional components and modules. The account discovery system 110, account discovery system 110A, and/or the account access system 202 may include the same or similar components as illustrated in FIG. 38.


In general, the word component or module, as used herein, refers to logic embodied in hardware or firmware, or to a collection of software instructions, possibly having entry and exit points, written in a programming language such as, for example, C, C++, C#. A software module may be complied and linked into an executable program, installed in a dynamic link library, or may be written in an interpreted programming language such as, for example, BASIC, Java, Perl, or Python. It will be appreciated that software modules may be callable from other modules or from themselves or may be invoked in response to detected events and interrupts, or both. Software instructions may be embedded in firmware, such as an EPROM. It will be further appreciated that hardware modules may be comprised of connected logic units, such as programmable gate arrays or processors. The modules described herein are preferably implemented as software modules, but may be represented in hardware or firmware. Generally, the modules described herein refer to logical modules that may be combined with other modules or devices into sub-modules despite their physical organization or storage.


In one embodiment, the account discovery system 3802 includes, for example, one or more servers or personal computers that are IBM, Macintosh, or Linux/Unix compatible. In another embodiment, the account discovery system 3802 includes one or more laptop computers, smart phones, personal digital assistants, or other computing devices. The account discovery system 3802 may include a memory 3830, which may include a random access memory (RAM) for temporary storage of information, a read only memory (ROM) for permanent storage of information, and/or a mass storage device, such as a hard drive, diskette, optical media storage device, or USB flash drive. Typically, the modules of the monitoring system are in communication with each other via a standards based bus system. In different embodiments, the standards based bus system could be Peripheral Component Interconnect (PCI), Microchannel, SCSI, Industrial Standard Architecture (ISA), and Extended ISA (EISA) architectures, for example.


The account discovery system 3802 may be generally controlled and coordinated by operating system software, such as Windows 95, 98, NT, 4000, XP, Vista, 7, 8, SunOS, Solaris, Blackberry OS, or other compatible operating systems. In Macintosh systems, the operating system may be any available operating system, such as MAC OS X. In other embodiments, the account discovery system 3802 may be controlled by a proprietary operating system. Conventional operating systems control and schedule computer processes for execution, perform memory management, provide file systems, networking, and I/O services, and provide a user interface, such as a graphical user interface (GUI), among other functions. The example account discovery system 3802, as well as the account discovery system 110 shown in FIGS. 2A and 2B, may include one or more commonly available input/output (I/O) interfaces and devices 3811, such as a keyboard, mouse, touchpad, and printer. In one embodiment, the I/O interfaces and devices 3811 include one or more display devices, such as a monitor, that allow the visual presentation of data to a user. More particularly, a display device provides for the presentation of GUIs, application software data, and multimedia presentations, for example. The account discovery system 3802 may also include one or more multimedia devices 3840, such as speakers, video cards, graphics accelerators, and microphones, for example. In one embodiment, the I/O interfaces and devices 3811 comprise devices that are in communication with modules of the account discovery system 102 via a network, such as the network 3860, or any local area network, including secured local area networks, or any combination thereof. In the embodiment of FIGS. 2A and 2B, for example, the account discovery system 3802 also includes components that may be executed by the CPU 3805. The account discovery system 3802 is configured to gather credit data about users. The credit data, which may be stored in mass storage device 3820, may include the user's credit report as well as one or more credit scores for the user, such as a FICO score, a credit score proprietary to a particular credit bureau, and/or a multi-bureau credit score, such as a VantageScore. In some embodiments, the credit score that is used by the account discovery system 3802 advantageously considers rental payment history (for example, history of rental payments for a residence of the user) and/or utility payment history (for example, history of payments to utilities providers such as gas service, electric service, and telephone service providers) in generated credit scores. Thus, in such embodiments the credit score is weighted based on the rental payment history and/or the utility payment history of the user. Credit data, which may be stored in mass storage device 3820, may also include data not typically on credit reports such as the user's income, rental payments, utility payments, or other financial information about the user, such as may be obtained using the systems and methods described herein.


The account discovery system, client computing devices, financial institutions, service providers (for example, rental service providers, telco service providers, utility service providers, and so forth) may communicate with each other over network 3860. Network 3860 may be formed from one or more networks including any combination of wired networks, wireless networks, wide-area networks such as the Internet, and local-area networks.


ADDITIONAL EMBODIMENTS

It is to be understood that not necessarily all objects or advantages may be achieved in accordance with any particular embodiment described herein. Thus, for example, those skilled in the art will recognize that certain embodiments may be configured to operate in a manner that achieves or optimizes one advantage or group of advantages as taught herein without necessarily achieving other objects or advantages as may be taught or suggested herein.


All of the processes described herein may be embodied in, and fully automated, via software code modules executed by a computing system that includes one or more computers or processors. In some embodiments, at least some of the processes may be implemented using virtualization techniques such as, for example, cloud computing, application containerization, or Lambda architecture, and so forth, alone or in combination. The code modules may be stored in any type of non-transitory computer-readable medium or other computer storage device. Some or all the methods may be embodied in specialized computer hardware.


Many other variations than those described herein will be apparent from this disclosure. For example, depending on the embodiment, certain acts, events, or functions of any of the algorithms described herein can be performed in a different sequence or can be added, merged, or left out altogether (for example, not all described acts or events are necessary for the practice of the algorithms). Moreover, in certain embodiments, acts or events can be performed concurrently, for example, through multi-threaded processing, interrupt processing, or multiple processors or processor cores or on other parallel architectures, rather than sequentially. In addition, different tasks or processes can be performed by different machines and/or computing systems that can function together.


Conditional language such as, among others, “can,” “could,” “might” or “may,” unless specifically stated otherwise, are understood within the context as used in general to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without user input or prompting, whether these features, elements and/or steps are included or are to be performed in any particular embodiment.


Disjunctive language such as the phrase “at least one of X, Y, or Z,” unless specifically stated otherwise, is understood with the context as used in general to present that an item, term, and so forth, may be either X, Y, or Z, or any combination thereof (for example, X, Y, and/or Z). Thus, such disjunctive language is not generally intended to, and should not, imply that certain embodiments require at least one of X, at least one of Y, or at least one of Z to each be present.


Any process descriptions, elements or blocks in the flow diagrams described herein and/or depicted in the attached figures should be understood as potentially representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or elements in the process. Alternate implementations are included within the scope of the embodiments described herein in which elements or functions may be deleted, executed out of order from that shown, or discussed, including substantially concurrently or in reverse order, depending on the functionality involved as would be understood by those skilled in the art.


Unless otherwise explicitly stated, articles such as “a” or “an” should generally be interpreted to include one or more described items. Accordingly, phrases such as “a device configured to” are intended to include one or more recited devices. Such one or more recited devices can also be collectively configured to carry out the stated recitations. For example, “a processor configured to carry out recitations A, B and C” can include a first processor configured to carry out recitation A working in conjunction with a second processor configured to carry out recitations B and C.


The term “remote” may include data, objects, devices, components, and/or modules not stored locally, that are not accessible via the local bus. Thus, remote devices may include a device which is physically stored in the same room and connected to the user's device via a network. In other situations, a remote device may be located in a separate geographic area, such as, for example, in a different location, country, and so forth.


Many variations and modifications may be made to the above-described embodiments, the elements of which are to be understood as being among other acceptable examples. All such modifications and variations are intended to be included herein within the scope of this disclosure.

Claims
  • 1. A computer-implemented method comprising: receiving, via network communication with a user computing device, credentials for directly accessing, by proxy on behalf of a user via an application programming interface (API), data associated with the user stored in one or more databases associated with a third-party system;transmitting at least an API token associated with the third-party system and at least a portion of the credentials to one or more databases associated with the third-party system;accessing, via an API communication channel established with the third-party system, a plurality of data items associated with the user;selecting a first data item of the plurality of data items;identifying an entity associated with the first data item;identifying, from among the plurality of data items, a subset of data items that each identify payments made from or on behalf of the user to the entity, wherein the subset of data items includes at least the first data item and one or more other data items;applying a first account identification rule to the identified subset of data items;determining, based on application of the first account identification rule, that the subset of data items meet a threshold for a first type of account;receiving, from the user computing device, a request to add an account corresponding with the entity to risk data associated with the user at a secured risk system;generating, based on portions of the plurality of data items associated with the entity, an account creation data package, the account creation data package formatted for ingestion at the secured risk system to initiate addition of the account to risk data of the user;identifying a security key associated with the secured risk system;transmitting the security key and the account creation data package to the secured risk system via a secure communication channel established with the secured risk system;requesting execution of a risk scoring algorithm using risk data of the user as stored at the secured risk system subsequent to the secured risk system processing the account creation data package;receiving, from the secured risk system, at least one of: risk score change information or a new risk score; andproviding, to the user computing device, an indication of a risk score change identified to be caused at least in part by ingestion at the secured risk system of the account creation data package.
  • 2. The computer-implemented method of claim 1, further comprising: prior to receiving the credentials from the user computing device, transmitting user interface data to the user computing device, the user interface data configured to depict a permissions interface element that is selectable to indicate authorization to access account information associated with the user; andreceiving, from the user computing device, authorization to access account information associated with the user.
  • 3. The computer-implemented method of claim 1, further comprising: transmitting user interface data to the user computing device, the user interface data configured to depict a user interface including one or more interactive elements selectable to indicate authorized uses of the data items associated with the user;receiving, from the user computing device, a selection of authorized uses of the data items; andselectively sharing, based on the authorized uses of the data items, the data items with one or more third parties.
  • 4. The computer-implemented method of claim 1, wherein identifying an entity associated with the first data item comprises: determining an entity identifier in the first data item;accessing an entity data structure storing indications of associations between entity identifiers and corresponding entities, wherein the entity is associated with a plurality of entity identifiers used by different third-party databases to identify the entity; anddetermining that the entity identifier is associated with the entity in the entity data structure.
  • 5. The computer-implemented method of claim 4, wherein associations between entity identifiers and corresponding entities are deterministic.
  • 6. The computer-implemented method of claim 4, wherein associations between entity identifiers and corresponding entities are probabilistic.
  • 7. The computer-implemented method of claim 1, wherein the account creation data package includes at least: an identifier of the entity;a data furnisher identifier of a data furnisher that provides consumer data to the secured risk system; andat least a portion of account information formatted for ingestion by the secured risk system to initiate addition of the account to risk data of the user.
  • 8. The computer-implemented method of claim 1, wherein the security key comprises an API token associated with the secured risk system.
  • 9. The computer-implemented method of claim 1, further comprising: determining a first one or more items available to the user based on a current risk score;determining a second one or more items not available to the user based on the current risk score;determining an estimated risk score of the user based on potential addition of a new account of the user to risk data of the user;in response to determining that at least one of the second one or more items would be available to the user based on the estimated risk score, providing an option to the user in an interactive user interface to initiate updates to risk data of the user;in response to receiving an indication of selection of the option in the interactive user interface on the user computing device, initiating receiving of the risk score change information via network communication with the user computing device;determining an updated risk score based at least on the risk score change information;determining at least one of the second one or more items eligible to the user based on the updated risk score; andupdating the interactive user interface to depict information regarding the at least one of the second one or more items in the interactive user interface on the user computing device.
  • 10. The computer-implemented method of claim 1, wherein a first account scoring model is configured to determine an estimated risk score change if the first account of the first account type is added to the risk data of the user, wherein the first account scoring model is based at least on actual risk score changes of a plurality of other users in response to addition of accounts of the first account type to their respective risk data.
  • 11. The computer-implemented method of claim 1, further comprising: for each of a plurality of accounts included in the risk data of the user, determining an account type from a plurality of account types;identifying a second account type of the plurality of account types that impacts risk scores of users that is not included in the determined account type of the plurality accounts of the user;executing a score impact algorithm, based at least on the second account type and the risk data of the user, to determine a possible risk score change if an account of the second account type is added to the risk data of the user; andproviding, to the user, an indication of the possible risk score change prior to receiving the request to add the account corresponding with the entity to risk data of the user at the secured risk system.
  • 12. A system comprising: a memory; andone or more hardware processors configured to: receive, via network communication with a user computing device, credentials for directly accessing, by proxy on behalf of a user via an application programming interface (API), data associated with the user stored in one or more databases associated with a third-party system;transmit at least an API token associated with the third-party system and at least a portion of the credentials to one or more databases associated with the third-party system;access, via an API communication channel established with the third-party system, a plurality of data items associated with the user;select a first data item of the plurality of data items;identify an entity associated with the first data item;identify, from among the plurality of data items, a subset of data items that each identify payments made from or on behalf of the user to the entity, wherein the subset of data items includes at least the first data item and one or more other data items;apply a first account identification rule to the identified subset of data items;determine, based on application of the first account identification rule, that the subset of data items meet a threshold for a first type of account;receive, from the user computing device, a request to add an account corresponding with the entity to risk data associated with the user at a secured risk system;generate, based on portions of the plurality of data items associated with the entity, an account creation data package, the account creation data package formatted for ingestion at the secured risk system to initiate addition of the account to risk data of the user;identify a security key associated with the secured risk system;transmit the security key and the account creation data package to the secured risk system via a secure communication channel established with the secured risk system;request execution of a risk scoring algorithm using risk data of the user at the secured risk system subsequent to the secured risk system processing the account creation data package;receive, from the secured risk system, at least one of: risk score change information or a new risk score; andprovide, to the user computing device, an indication of a risk score change identified to be caused at least in part by ingestion at the secured risk system of the account creation data package.
  • 13. The system of claim 12, wherein the subset of data items each comprise time stamps within a predetermined time period, wherein the one or more hardware processors are further configured to: determine an average number of days between time stamps of sequential data items in order to identify recurring data items.
  • 14. The system of claim 12, wherein the one or more hardware processors are further configured to determine a confidence level indicating a likelihood that the account is the first type of account, wherein determining that the subset of data items meet the threshold for the first type of account comprises determining that the confidence level for the subset of data items meets the threshold.
  • 15. The system of claim 12, wherein the secured risk system is a third party secured risk system.
  • 16. The system of claim 12, wherein the one or more hardware processors are further configured to determine a new risk score based on the received risk score change information.
  • 17. The system of claim 12, wherein the entity is a third party entity.
  • 18. The system of claim 12, wherein the subset of data items corresponds to one of: rental, utility, or telecommunications payments.
  • 19. The system of claim 12, wherein the subset of data items corresponds to recurring payments.
  • 20. The system of claim 12, wherein the one or more hardware processors are further configured to normalize portions of the plurality of data items, and wherein to generate the account creation data package comprises generating the account creation data package with normalized portions of the plurality of data items.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No. 16/445,647, filed on Jun. 19, 2019, which is a non-provisional of and claims the benefit of U.S. Provisional Application No. 62/727,479, filed on Sep. 5, 2018, and U.S. Provisional Application No. 62/826,319, filed on Mar. 29, 2019 the entirety of which is hereby incorporated herein by reference.

US Referenced Citations (3249)
Number Name Date Kind
1372397 Nies et al. Mar 1921 A
3405457 Bitzer Oct 1968 A
3762316 Spradlin Oct 1973 A
4305059 Benton Dec 1981 A
4346442 Musmanno Aug 1982 A
4578530 Zeidler Mar 1986 A
4718009 Cuervo Jan 1988 A
4734858 Schlafly Mar 1988 A
4736294 Gill Apr 1988 A
4755940 Brachtl et al. Jul 1988 A
4774664 Campbell et al. Sep 1988 A
4827508 Shear May 1989 A
4869500 Williams Sep 1989 A
4876592 Von Kohorn Oct 1989 A
4891503 Jewell Jan 1990 A
4895518 Arnold Jan 1990 A
4900903 Wright et al. Feb 1990 A
4947028 Gorog Aug 1990 A
4977595 Ohta et al. Dec 1990 A
4989141 Lyons et al. Jan 1991 A
5013038 Luxenberg et al. May 1991 A
5025138 Cuervo Jun 1991 A
5025373 Keyser, Jr. et al. Jun 1991 A
5034807 Von Kohorn Jul 1991 A
5060153 Nakagawa Oct 1991 A
5077582 Kravette et al. Dec 1991 A
5126936 Champion et al. Jun 1992 A
5148365 Dembo Sep 1992 A
5173935 Meschi Dec 1992 A
5197094 Tillery et al. Mar 1993 A
5218632 Cool Jun 1993 A
5220501 Lawlor et al. Jun 1993 A
5239462 Jones et al. Aug 1993 A
5259766 Sack Nov 1993 A
5262941 Saladin Nov 1993 A
5274547 Zoffel et al. Dec 1993 A
5317636 Vizcaino May 1994 A
5317733 Murdock May 1994 A
5326959 Perazza Jul 1994 A
5336870 Hughes et al. Aug 1994 A
5351186 Bullock et al. Sep 1994 A
5361201 Jost et al. Nov 1994 A
5383113 Kight et al. Jan 1995 A
5404518 Gilbertson et al. Apr 1995 A
5420405 Chasek May 1995 A
5423033 Yuen Jun 1995 A
5457305 Akel et al. Oct 1995 A
5500513 Langhans et al. Mar 1996 A
5537464 Lewis et al. Jul 1996 A
5561706 Fenner Oct 1996 A
5563783 Stolfo et al. Oct 1996 A
5590038 Pitroda Dec 1996 A
5592560 Deaton et al. Jan 1997 A
5611052 Dykstra et al. Mar 1997 A
5615408 Johnson Mar 1997 A
5616902 Cooley et al. Apr 1997 A
5621201 Langhans et al. Apr 1997 A
5630127 Moore et al. May 1997 A
5640577 Scharmer Jun 1997 A
5649115 Schrader et al. Jul 1997 A
5655008 Futch et al. Aug 1997 A
5659725 Levy et al. Aug 1997 A
5659731 Gustafson Aug 1997 A
5684965 Pickering Nov 1997 A
5689651 Lozman Nov 1997 A
5696907 Tom Dec 1997 A
5699527 Davidson Dec 1997 A
5699528 Hogan Dec 1997 A
5704029 Wright, Jr. Dec 1997 A
5708422 Blonder et al. Jan 1998 A
5719941 Swift et al. Feb 1998 A
5729735 Meyering Mar 1998 A
5732400 Mandler Mar 1998 A
5739512 Tognazzini Apr 1998 A
5742769 Lee et al. Apr 1998 A
5745654 Titan Apr 1998 A
5745706 Wolfberg et al. Apr 1998 A
5748098 Grace May 1998 A
5754632 Smith May 1998 A
5774533 Patel Jun 1998 A
5774870 Storey Jun 1998 A
5774883 Andersen Jun 1998 A
5774885 Delfer, III Jun 1998 A
5793972 Shane Aug 1998 A
5794221 Egendorf Aug 1998 A
5802142 Browne Sep 1998 A
5802498 Comesanas Sep 1998 A
5809143 Hughes Sep 1998 A
5809322 Akerib Sep 1998 A
5813006 Polnerow et al. Sep 1998 A
5815665 Teper et al. Sep 1998 A
5819234 Slavin et al. Oct 1998 A
5832068 Smith Nov 1998 A
5832460 Bednar et al. Nov 1998 A
5838314 Neel et al. Nov 1998 A
5842211 Horadan et al. Nov 1998 A
5844218 Kawan et al. Dec 1998 A
5850446 Berger et al. Dec 1998 A
5857174 Dugan Jan 1999 A
5864620 Pettitt Jan 1999 A
5870721 Norris Feb 1999 A
5873072 Kight et al. Feb 1999 A
5875236 Jankowitz Feb 1999 A
5878403 DeFrancesco Mar 1999 A
5881131 Farris et al. Mar 1999 A
5884287 Edesess Mar 1999 A
5884288 Chang et al. Mar 1999 A
5884302 Ho Mar 1999 A
5893077 Griffin Apr 1999 A
5903830 Joao et al. May 1999 A
5903881 Schrader et al. May 1999 A
5914472 Foladare et al. Jun 1999 A
5918217 Maggioncalda et al. Jun 1999 A
5918227 Polnerow et al. Jun 1999 A
5920848 Schutzer et al. Jul 1999 A
5924082 Silverman et al. Jul 1999 A
5926754 Cirelli et al. Jul 1999 A
5930764 Melchione et al. Jul 1999 A
5930776 Dykstra et al. Jul 1999 A
5933837 Kung Aug 1999 A
5937392 Alberts Aug 1999 A
5940812 Tengel et al. Aug 1999 A
5950172 Klingman Sep 1999 A
5953710 Fleming Sep 1999 A
5956690 Haggerson et al. Sep 1999 A
5956693 Geerlings Sep 1999 A
5956698 Lacheze et al. Sep 1999 A
5963939 McCann et al. Oct 1999 A
5966695 Melchione et al. Oct 1999 A
5974521 Akerib Oct 1999 A
5978780 Watson Nov 1999 A
5991411 Kaufman et al. Nov 1999 A
5995947 Fraser et al. Nov 1999 A
5999596 Walker et al. Dec 1999 A
6006333 Nielsen Dec 1999 A
6009412 Storey Dec 1999 A
6009415 Shurling et al. Dec 1999 A
6012044 Maggioncalda et al. Jan 2000 A
6014645 Cunningham Jan 2000 A
6021397 Jones et al. Feb 2000 A
6021943 Chastain Feb 2000 A
6026440 Shrader et al. Feb 2000 A
6029149 Dykstra et al. Feb 2000 A
6029178 Martin et al. Feb 2000 A
6032132 Nelson Feb 2000 A
6035288 Solomon Mar 2000 A
6038551 Barlow et al. Mar 2000 A
6041319 Bass et al. Mar 2000 A
6043815 Simonoff et al. Mar 2000 A
6044362 Neely Mar 2000 A
6049786 Smorodinsky Apr 2000 A
6052671 Crooks et al. Apr 2000 A
6055570 Nielsen Apr 2000 A
6061668 Sharrow May 2000 A
6064987 Walker May 2000 A
6064990 Goldsmith May 2000 A
6070141 Houvener May 2000 A
6070147 Harms et al. May 2000 A
6072894 Payne Jun 2000 A
6073140 Morgan et al. Jun 2000 A
6076070 Stack Jun 2000 A
6078907 Lamm Jun 2000 A
6078922 Johnson et al. Jun 2000 A
6085242 Chandra Jul 2000 A
6088686 Walker et al. Jul 2000 A
6094643 Anderson et al. Jul 2000 A
6098052 Kosiba et al. Aug 2000 A
6105007 Norris Aug 2000 A
6108691 Lee et al. Aug 2000 A
6112190 Fletcher et al. Aug 2000 A
6115690 Wong Sep 2000 A
6115694 Cheetham et al. Sep 2000 A
6119103 Basch et al. Sep 2000 A
6128599 Walker Oct 2000 A
6128602 Northington et al. Oct 2000 A
6128603 Dent Oct 2000 A
6144726 Cross Nov 2000 A
6145088 Stevens Nov 2000 A
6149441 Pellegrino et al. Nov 2000 A
6154729 Cannon et al. Nov 2000 A
6157707 Baulier et al. Dec 2000 A
6161139 Win et al. Dec 2000 A
6173272 Thomas et al. Jan 2001 B1
6178420 Sassano Jan 2001 B1
6182068 Culliss Jan 2001 B1
6182229 Nielsen Jan 2001 B1
6185543 Galperin et al. Feb 2001 B1
6195660 Polnerow et al. Feb 2001 B1
6195738 Akerib Feb 2001 B1
6199077 Inala et al. Mar 2001 B1
6202053 Christiansen et al. Mar 2001 B1
6202067 Blood et al. Mar 2001 B1
6208998 Marcus Mar 2001 B1
6230188 Marcus May 2001 B1
6233566 Levine et al. May 2001 B1
6233588 Marchoili et al. May 2001 B1
6247000 Hawkins et al. Jun 2001 B1
6249770 Erwin et al. Jun 2001 B1
6253203 O'Flaherty et al. Jun 2001 B1
6254000 Degen et al. Jul 2001 B1
6263447 French et al. Jul 2001 B1
6269325 Lee et al. Jul 2001 B1
6275824 O'Flaherty et al. Aug 2001 B1
6278993 Kumar et al. Aug 2001 B1
6282658 French et al. Aug 2001 B2
6285987 Roth et al. Sep 2001 B1
6289323 Gordon et al. Sep 2001 B1
6289452 Arnold et al. Sep 2001 B1
6292789 Schutzer Sep 2001 B1
6295528 Marcus et al. Sep 2001 B1
6295541 Bodnar et al. Sep 2001 B1
6298348 Eldering Oct 2001 B1
6304850 Keller et al. Oct 2001 B1
6304860 Martin et al. Oct 2001 B1
6311169 Duhon Oct 2001 B2
6317783 Freishtat et al. Nov 2001 B1
6321339 French et al. Nov 2001 B1
6324516 Shults et al. Nov 2001 B1
6324524 Lent et al. Nov 2001 B1
6327578 Linehan Dec 2001 B1
6330546 Gopinathan et al. Dec 2001 B1
6330551 Burchetta et al. Dec 2001 B1
6330575 Moore et al. Dec 2001 B1
6334116 Ganesan et al. Dec 2001 B1
6337901 Rome et al. Jan 2002 B1
6339790 Inoue Jan 2002 B1
6341272 Randle Jan 2002 B1
6343279 Bissonette et al. Jan 2002 B1
6343284 Ishikawa et al. Jan 2002 B1
6347375 Reinert et al. Feb 2002 B1
6353778 Brown Mar 2002 B1
6353795 Ranjan Mar 2002 B1
6356937 Montville et al. Mar 2002 B1
6374262 Kodama Apr 2002 B1
6374264 Bohannon et al. Apr 2002 B1
6384844 Stewart et al. May 2002 B1
6385594 Lebda et al. May 2002 B1
6385595 Kolling et al. May 2002 B1
6386444 Sullivan May 2002 B1
6397197 Gindlesperger May 2002 B1
6397212 Biffar May 2002 B1
6397224 Zubeldia et al. May 2002 B1
6401118 Thomas Jun 2002 B1
6405173 Honarvar Jun 2002 B1
6405181 Lent et al. Jun 2002 B2
6405245 Burson et al. Jun 2002 B1
6408282 Buist Jun 2002 B1
6412073 Rangan Jun 2002 B1
6421675 Ryan et al. Jul 2002 B1
6421729 Paltenghe et al. Jul 2002 B1
6421768 Purpura Jul 2002 B1
6422462 Cohen Jul 2002 B1
6424840 Fitch et al. Jul 2002 B1
6430539 Lazarus et al. Aug 2002 B1
6431439 Suer et al. Aug 2002 B1
6438527 Powar Aug 2002 B1
6438601 Hardy Aug 2002 B1
6442590 Inala et al. Aug 2002 B1
6453353 Win et al. Sep 2002 B1
6457012 Jatkowski Sep 2002 B1
6460127 Akerib Oct 2002 B1
6473740 Cockril et al. Oct 2002 B2
6477509 Hammons et al. Nov 2002 B1
6477565 Daswani et al. Nov 2002 B1
6487540 Smith et al. Nov 2002 B1
6496936 French et al. Dec 2002 B1
6505168 Rothman et al. Jan 2003 B1
6510451 Wu et al. Jan 2003 B2
6516190 Linkola Feb 2003 B1
6517587 Satyavolu et al. Feb 2003 B2
6523021 Monberg et al. Feb 2003 B1
6523041 Morgan et al. Feb 2003 B1
6529880 McKeen et al. Mar 2003 B1
6532450 Brown et al. Mar 2003 B1
6539377 Culliss Mar 2003 B1
6539392 Rebane Mar 2003 B1
6542894 Lee et al. Apr 2003 B1
6543683 Hoffman Apr 2003 B2
6546413 Northrup Apr 2003 B1
6549770 Marran Apr 2003 B1
6549904 Ortega et al. Apr 2003 B1
6552670 Sundaravel et al. Apr 2003 B2
6556979 Liu et al. Apr 2003 B1
6564210 Korda et al. May 2003 B1
6567791 Lent et al. May 2003 B2
6567850 Freishtat et al. May 2003 B1
6571236 Ruppelt May 2003 B1
6574736 Andrews Jun 2003 B1
6574798 Bradley et al. Jun 2003 B1
6578012 Storey Jun 2003 B1
6581025 Lehman Jun 2003 B2
6581075 Guturu et al. Jun 2003 B1
6587841 DeFrancesco Jul 2003 B1
6594766 Rangan et al. Jul 2003 B2
6611816 Lebda et al. Aug 2003 B2
6615193 Kingdon et al. Sep 2003 B1
6622131 Brown et al. Sep 2003 B1
6622266 Goddard et al. Sep 2003 B1
6629245 Stone et al. Sep 2003 B1
6633910 Rajan et al. Oct 2003 B1
6636803 Hartz, Jr. et al. Oct 2003 B1
6647383 August et al. Nov 2003 B1
6655583 Walsh et al. Dec 2003 B2
6658393 Basch et al. Dec 2003 B1
6665715 Houri Dec 2003 B1
6678694 Zimmermann et al. Jan 2004 B1
6684197 Kolls Jan 2004 B1
6694353 Sommerer Feb 2004 B2
6701348 Sommerer Mar 2004 B2
6703930 Skinner Mar 2004 B2
6704039 Pena Mar 2004 B2
6711665 Akerib et al. Mar 2004 B1
6714944 Shapiro et al. Mar 2004 B1
6718313 Lent et al. Apr 2004 B1
6721716 Gross Apr 2004 B1
6725381 Smith et al. Apr 2004 B1
6725425 Rajan et al. Apr 2004 B1
6738804 Lo May 2004 B1
6745196 Colyer et al. Jun 2004 B1
6745938 Sullivan Jun 2004 B2
6748367 Lee et al. Jun 2004 B1
6748426 Shaffer et al. Jun 2004 B1
6750985 Rhoads Jun 2004 B2
6754564 Newport Jun 2004 B2
6766304 Kemp et al. Jul 2004 B2
6766327 Morgan, Jr. et al. Jul 2004 B2
6772132 Kemp et al. Aug 2004 B1
6775519 Wiedman et al. Aug 2004 B1
6781608 Crawford Aug 2004 B1
6782370 Stack Aug 2004 B1
6782379 Lee Aug 2004 B2
6782390 Lee et al. Aug 2004 B2
6792088 Takeuchi Sep 2004 B2
6792263 Kite Sep 2004 B1
6795812 Lent et al. Sep 2004 B1
6796497 Benkert et al. Sep 2004 B2
6802042 Rangan et al. Oct 2004 B2
6804346 Mewhinney Oct 2004 B1
6804720 Vilander et al. Oct 2004 B1
6805287 Bishop et al. Oct 2004 B2
6807533 Land et al. Oct 2004 B1
6810323 Bullock et al. Oct 2004 B1
6816850 Culliss Nov 2004 B2
6816871 Lee Nov 2004 B2
6823319 Lynch et al. Nov 2004 B1
6826707 Stevens Nov 2004 B1
6829596 Frazee Dec 2004 B1
6829639 Lawson et al. Dec 2004 B1
6832212 Zenner et al. Dec 2004 B1
6832229 Reed Dec 2004 B2
6839690 Foth et al. Jan 2005 B1
6842740 Jeran et al. Jan 2005 B1
6842782 Malik et al. Jan 2005 B1
6845448 Chaganti et al. Jan 2005 B1
6847966 Sommer et al. Jan 2005 B1
6847974 Wachtel Jan 2005 B2
6850918 Burchetta et al. Feb 2005 B1
6856974 Ganesan et al. Feb 2005 B1
6857073 French et al. Feb 2005 B2
6859212 Kumar et al. Feb 2005 B2
6865680 Wu et al. Mar 2005 B1
6871220 Rajan et al. Mar 2005 B1
6871287 Ellingson Mar 2005 B1
6871789 Hilton et al. Mar 2005 B2
6873972 Marcial et al. Mar 2005 B1
6880751 Okamura et al. Apr 2005 B2
6882986 Heinemann et al. Apr 2005 B1
6892307 Wood et al. May 2005 B1
6898279 Baker et al. May 2005 B1
6898574 Regan May 2005 B1
6900731 Kreiner et al. May 2005 B2
6901406 Nabe et al. May 2005 B2
6910624 Natsuno Jun 2005 B1
6912483 Frederick Jun 2005 B2
6928487 Eggebraaten et al. Aug 2005 B2
6932268 McCoy et al. Aug 2005 B1
6934691 Simpson Aug 2005 B1
6934714 Meinig Aug 2005 B2
6938011 Kemp et al. Aug 2005 B1
6938821 Gangi Sep 2005 B2
6941323 Galperin Sep 2005 B1
6947989 Gullotta et al. Sep 2005 B2
6950807 Brock Sep 2005 B2
6954630 Offer Oct 2005 B2
6954741 Burchetta et al. Oct 2005 B1
6954757 Zargham et al. Oct 2005 B2
6957336 Wheeler et al. Oct 2005 B2
6962336 Glass Nov 2005 B2
6963857 Johnson Nov 2005 B1
6965881 Brickell et al. Nov 2005 B1
6968319 Remington et al. Nov 2005 B1
6970864 Marcus et al. Nov 2005 B2
6973462 Dattero et al. Dec 2005 B2
6983320 Thomas et al. Jan 2006 B1
6985183 Jan et al. Jan 2006 B2
6985887 Sunstein et al. Jan 2006 B1
6988082 Williams et al. Jan 2006 B1
6988085 Hedy Jan 2006 B2
6990591 Pearson Jan 2006 B1
6993504 Friesen et al. Jan 2006 B1
6993510 Guy et al. Jan 2006 B2
6993572 Ross, Jr. et al. Jan 2006 B2
6993596 Hinton et al. Jan 2006 B2
6996542 Landry Feb 2006 B1
6999941 Agarwal Feb 2006 B1
7003476 Samra et al. Feb 2006 B1
7013310 Messing et al. Mar 2006 B2
7013315 Boothby Mar 2006 B1
7013323 Thomas et al. Mar 2006 B1
7016870 Jones et al. Mar 2006 B1
7016907 Boreham et al. Mar 2006 B2
7024174 Nagy et al. Apr 2006 B2
7024548 O'Toole, Jr. Apr 2006 B1
7024689 O'Donnell et al. Apr 2006 B2
7028013 Saeki Apr 2006 B2
7028052 Chapman et al. Apr 2006 B2
7039607 Watarai et al. May 2006 B2
7039656 Tsai et al. May 2006 B1
7043476 Robson May 2006 B2
7046139 Kuhn et al. May 2006 B2
7047258 Balogh et al. May 2006 B2
7050989 Hurt et al. May 2006 B1
7058386 McGregor et al. Jun 2006 B2
7058817 Ellmore Jun 2006 B1
7062458 Maggioncalda et al. Jun 2006 B2
7062475 Szabo et al. Jun 2006 B1
7065526 Wissner et al. Jun 2006 B2
7065566 Menard et al. Jun 2006 B2
7069240 Spero et al. Jun 2006 B2
7069249 Stolfo et al. Jun 2006 B2
7072856 Nachom Jul 2006 B1
7072909 Polk Jul 2006 B2
7076462 Nelson et al. Jul 2006 B1
7076475 Honarvar et al. Jul 2006 B2
7083087 Gangi Aug 2006 B1
7085727 VanOrman Aug 2006 B2
7085997 Wu et al. Aug 2006 B1
7086586 Sullivan Aug 2006 B1
7089594 Lal et al. Aug 2006 B2
7092905 Behrenbrinker et al. Aug 2006 B2
7103473 Ranjan Sep 2006 B2
7103602 Black et al. Sep 2006 B2
7107241 Pinto Sep 2006 B1
7107243 McDonald et al. Sep 2006 B1
7107244 Kight et al. Sep 2006 B2
7107249 Dively et al. Sep 2006 B2
7107285 Von Kaenel et al. Sep 2006 B2
7110978 Chin Sep 2006 B1
7117172 Black Oct 2006 B1
7117529 O'Donnell et al. Oct 2006 B1
7120599 Keyes Oct 2006 B2
7124144 Christianson et al. Oct 2006 B2
7127068 Sundaravel et al. Oct 2006 B2
7127424 Kemp et al. Oct 2006 B2
7131144 Rabin et al. Oct 2006 B2
RE39376 Biggs, Jr. et al. Nov 2006 E
7133852 Kurokawa et al. Nov 2006 B2
7139728 Rigole Nov 2006 B2
7139734 Nathans et al. Nov 2006 B2
7143063 Lent Nov 2006 B2
7149782 Sommerer Dec 2006 B2
7155203 Brewer et al. Dec 2006 B2
7155508 Sankuratripati et al. Dec 2006 B2
7155725 Kister et al. Dec 2006 B1
7155739 Bari et al. Dec 2006 B2
7165037 Lazarus et al. Jan 2007 B2
7174455 Arnold et al. Feb 2007 B1
7177830 Shields et al. Feb 2007 B2
7178096 Rangan et al. Feb 2007 B2
7181418 Zucker et al. Feb 2007 B1
7181427 DeFrancesco Feb 2007 B1
7194416 Provost et al. Mar 2007 B1
7200551 Senez Apr 2007 B1
7200602 Jonas Apr 2007 B2
7200804 Khavari et al. Apr 2007 B1
7203315 Livesay Apr 2007 B1
7206768 deGroeve et al. Apr 2007 B1
7209895 Kundtz et al. Apr 2007 B2
7209911 Boothby et al. Apr 2007 B2
7212995 Schulkins May 2007 B2
7212999 Friesen et al. May 2007 B2
7213003 Kight et al. May 2007 B1
7213064 Smith et al. May 2007 B2
7216104 Mason May 2007 B2
7218912 Erskine et al. May 2007 B2
7219107 Beringer May 2007 B2
7222085 Stack May 2007 B2
7222369 Vering et al. May 2007 B2
7225464 Satyavolu et al. May 2007 B2
7227935 Creamer et al. Jun 2007 B2
7228289 Brumfield et al. Jun 2007 B2
7228335 Caughey Jun 2007 B2
7229006 Babbi et al. Jun 2007 B2
7234156 French et al. Jun 2007 B2
7236950 Savage et al. Jun 2007 B2
7240031 Kight et al. Jul 2007 B1
7240363 Ellingson Jul 2007 B1
7243075 Shaffer et al. Jul 2007 B1
7243369 Bhat et al. Jul 2007 B2
7246361 Scalora et al. Jul 2007 B1
7246740 Swift et al. Jul 2007 B2
7249076 Pendleton et al. Jul 2007 B1
7249080 Hoffman et al. Jul 2007 B1
7249096 Lasater et al. Jul 2007 B1
7249113 Continelli et al. Jul 2007 B1
7254558 Hinkle et al. Aug 2007 B2
7263497 Wiser et al. Aug 2007 B1
7263548 Daswani et al. Aug 2007 B2
7280980 Hoadley et al. Oct 2007 B1
7280983 Kuroda et al. Oct 2007 B2
7281652 Foss Oct 2007 B2
7289971 O'Neil et al. Oct 2007 B1
7292840 Kissner et al. Nov 2007 B2
7296004 Garrison et al. Nov 2007 B1
7296734 Pliha Nov 2007 B2
7302272 Ackley Nov 2007 B2
7302411 Ganesan et al. Nov 2007 B2
7302420 Aggarwal et al. Nov 2007 B2
7305233 Paul et al. Dec 2007 B2
7308417 Nathan Dec 2007 B1
7310611 Shibuya et al. Dec 2007 B2
7310617 Cunningham Dec 2007 B1
7310618 Libman Dec 2007 B2
7313813 Rangan et al. Dec 2007 B2
7314166 Anderson et al. Jan 2008 B2
7314167 Kiliccote Jan 2008 B1
7315837 Sloan et al. Jan 2008 B2
7318224 Honarvar et al. Jan 2008 B2
7328233 Salim et al. Feb 2008 B2
7328435 Trifon Feb 2008 B2
7330717 Gidron et al. Feb 2008 B2
7330831 Biondi et al. Feb 2008 B2
7330835 Deggendorf Feb 2008 B2
7331518 Rable Feb 2008 B2
7333635 Tsantes et al. Feb 2008 B2
7333937 Baldwin, Jr. et al. Feb 2008 B2
7334020 Caughey Feb 2008 B2
7337133 Bezos et al. Feb 2008 B1
7337468 Metzger Feb 2008 B2
7340042 Cluff et al. Mar 2008 B2
7340679 Botscheck et al. Mar 2008 B2
7343149 Benco Mar 2008 B2
7343295 Pomerance Mar 2008 B2
7346576 Lent et al. Mar 2008 B2
7349885 Gangi Mar 2008 B2
7353203 Kriplani et al. Apr 2008 B1
7356503 Johnson et al. Apr 2008 B1
7356506 Watson et al. Apr 2008 B2
7356516 Richey et al. Apr 2008 B2
7357305 Ahn et al. Apr 2008 B2
7363257 Kunz et al. Apr 2008 B2
7366495 Magnotta et al. Apr 2008 B1
7366694 Lazerson Apr 2008 B2
7366696 Ganesan et al. Apr 2008 B1
7366759 Trevithick Apr 2008 B2
7370014 Vasavada et al. May 2008 B1
7370044 Mulhern et al. May 2008 B2
7370794 Trane May 2008 B2
7373324 Engin et al. May 2008 B1
7376603 Mayr et al. May 2008 B1
7379978 Anderson et al. May 2008 B2
7383215 Navarro et al. Jun 2008 B1
7383225 Hallihan Jun 2008 B2
7383226 Kight et al. Jun 2008 B2
7383988 Slonecker, Jr. Jun 2008 B2
7386466 McLean et al. Jun 2008 B2
7386511 Buchanan et al. Jun 2008 B2
7386597 Takeuchi et al. Jun 2008 B2
7386786 Davis et al. Jun 2008 B2
7389913 Starrs Jun 2008 B2
7392223 Ganesan et al. Jun 2008 B1
7395232 Pilato Jul 2008 B1
7395241 Cook et al. Jul 2008 B1
7395243 Zielke et al. Jul 2008 B1
7395273 Khan et al. Jul 2008 B2
7400883 Rivers et al. Jul 2008 B2
7401050 O'Neill Jul 2008 B2
7403602 Khan Jul 2008 B2
7403919 Chacko et al. Jul 2008 B2
7403923 Elliott et al. Jul 2008 B2
7403942 Bayliss Jul 2008 B1
7409369 Homuth et al. Aug 2008 B1
7412228 Barclay et al. Aug 2008 B2
7412487 Caughey Aug 2008 B2
7413113 Zhu Aug 2008 B1
7418417 Chacko et al. Aug 2008 B2
7424520 Daswani et al. Sep 2008 B2
7430520 Haugen et al. Sep 2008 B1
7433836 August et al. Oct 2008 B1
7433864 Malik Oct 2008 B2
7437324 Goodwin, III et al. Oct 2008 B1
7437679 Uemura et al. Oct 2008 B2
7444518 Dharmarajan et al. Oct 2008 B1
7447663 Barker et al. Nov 2008 B1
7451095 Bradley et al. Nov 2008 B1
7451113 Kasower Nov 2008 B1
7458508 Shao et al. Dec 2008 B1
7464067 Chestnut Dec 2008 B2
7467401 Cicchitto Dec 2008 B2
7472089 Hu et al. Dec 2008 B2
7475032 Patnode et al. Jan 2009 B1
7479949 Jobs et al. Jan 2009 B2
7480631 Merced et al. Jan 2009 B1
7483892 Sommer et al. Jan 2009 B1
7486784 Creamer et al. Feb 2009 B2
7490356 Lieblich et al. Feb 2009 B2
RE40692 Rose, Jr. Mar 2009 E
7499875 May et al. Mar 2009 B1
7503489 Heffez Mar 2009 B2
7505931 Silva Mar 2009 B2
7505939 Lent et al. Mar 2009 B2
7509117 Yum Mar 2009 B2
7509278 Jones Mar 2009 B2
7512221 Toms Mar 2009 B2
7516101 Remington et al. Apr 2009 B2
7526448 Zielke et al. Apr 2009 B2
7529698 Joao May 2009 B2
7530097 Casco-Arias et al. May 2009 B2
7536329 Goldberg et al. May 2009 B2
7536348 Shao et al. May 2009 B2
7536354 deGroeve et al. May 2009 B1
7537152 Chakiris et al. May 2009 B2
7537153 Hurwitz et al. May 2009 B2
7542468 Begley et al. Jun 2009 B1
7542922 Bennett et al. Jun 2009 B2
7542993 Satterfield et al. Jun 2009 B2
7543739 Brown et al. Jun 2009 B2
7546266 Beirne et al. Jun 2009 B2
7546271 Chmielewski et al. Jun 2009 B1
7548886 Kirkland et al. Jun 2009 B2
7552060 Vest Jun 2009 B2
7552080 Willard et al. Jun 2009 B1
7552086 Rajasekar et al. Jun 2009 B1
7552089 Bruer et al. Jun 2009 B2
7552190 Freishtat et al. Jun 2009 B1
7552467 Lindsay Jun 2009 B2
7555459 Dhar et al. Jun 2009 B2
7556192 Wokaty, Jr. Jul 2009 B2
7558748 Ehring et al. Jul 2009 B2
7558777 Santos Jul 2009 B1
7558795 Malik et al. Jul 2009 B2
7559217 Bass Jul 2009 B2
7562184 Henmi et al. Jul 2009 B2
7562382 Hinton et al. Jul 2009 B2
7562814 Shao et al. Jul 2009 B1
7571138 Miri et al. Aug 2009 B2
7571143 Circenis et al. Aug 2009 B2
7571322 Karoubi Aug 2009 B2
7571473 Boydstun et al. Aug 2009 B1
7575152 Graves et al. Aug 2009 B2
7575157 Barnhardt et al. Aug 2009 B2
7577665 Ramer et al. Aug 2009 B2
7577934 Anonsen et al. Aug 2009 B2
7580884 Cook Aug 2009 B2
7581112 Brown et al. Aug 2009 B2
7583682 Hopkins Sep 2009 B2
7584126 White Sep 2009 B1
7584127 Byrne et al. Sep 2009 B2
7584146 Duhon Sep 2009 B1
7587363 Cataline et al. Sep 2009 B2
7587368 Felsher Sep 2009 B2
7593891 Kornegay et al. Sep 2009 B2
7593892 Balk et al. Sep 2009 B2
7594019 Clapper Sep 2009 B2
7596512 Raines et al. Sep 2009 B1
7596716 Frost et al. Sep 2009 B2
7603314 Siksa Oct 2009 B2
7603317 Adler et al. Oct 2009 B2
7606355 Hutchison et al. Oct 2009 B2
7606752 Hazlehurst et al. Oct 2009 B2
7610216 May et al. Oct 2009 B1
7610229 Kornegay Oct 2009 B1
7613600 Krane Nov 2009 B2
7613656 Stanley et al. Nov 2009 B2
7620383 Taglienti et al. Nov 2009 B2
7620592 O'Mara et al. Nov 2009 B2
7620596 Knudson et al. Nov 2009 B2
7620602 Jakstadt et al. Nov 2009 B2
7620653 Swartz Nov 2009 B1
7623844 Herrmann et al. Nov 2009 B2
7624068 Heasley et al. Nov 2009 B1
7624433 Clark et al. Nov 2009 B1
7627524 Bennett et al. Dec 2009 B2
7627527 Hildebrand Dec 2009 B1
7630903 Vaidyanathan Dec 2009 B1
7630932 Danaher et al. Dec 2009 B2
7630933 Peterson et al. Dec 2009 B2
7631803 Peyret et al. Dec 2009 B2
7634651 Gerde et al. Dec 2009 B1
7634737 Beringer et al. Dec 2009 B2
7636686 Pierdinock et al. Dec 2009 B2
7636689 Dent et al. Dec 2009 B2
7640200 Gardner et al. Dec 2009 B2
7640209 Brooks et al. Dec 2009 B1
7644023 Kumar et al. Jan 2010 B2
7644035 Biffle et al. Jan 2010 B1
7644036 McCoy et al. Jan 2010 B2
7644285 Murray et al. Jan 2010 B1
7647274 Peterson et al. Jan 2010 B2
7647344 Skurtovich, Jr. et al. Jan 2010 B2
7653187 Clark et al. Jan 2010 B2
7653591 Dabney Jan 2010 B1
7653592 Flaxman et al. Jan 2010 B1
7653593 Zarikian et al. Jan 2010 B2
7653600 Gustin Jan 2010 B2
7653613 DeGraaff et al. Jan 2010 B1
7653688 Bittner Jan 2010 B2
7657484 Ganesan et al. Feb 2010 B2
7660771 Orcutt Feb 2010 B2
7664725 Murray et al. Feb 2010 B2
7665657 Huh Feb 2010 B2
7668738 Wiggins Feb 2010 B2
7668766 Goodwin, III et al. Feb 2010 B1
7672833 Blume et al. Mar 2010 B2
7672865 Kumar et al. Mar 2010 B2
7672879 Kumar et al. Mar 2010 B1
7672944 Holladay et al. Mar 2010 B1
7676410 Petralia Mar 2010 B2
7676418 Chung et al. Mar 2010 B1
7676463 Thompson et al. Mar 2010 B2
7680772 Kronberg Mar 2010 B2
7685209 Norton et al. Mar 2010 B1
7685525 Kumar et al. Mar 2010 B2
7686214 Shao et al. Mar 2010 B1
7688813 Shin et al. Mar 2010 B2
7689451 Vives Mar 2010 B2
7689487 Britto et al. Mar 2010 B1
7689505 Kasower Mar 2010 B2
7689506 Fei et al. Mar 2010 B2
7689563 Jacobson Mar 2010 B1
7689716 Short et al. Mar 2010 B2
7690032 Peirce Mar 2010 B1
7693787 Provinse Apr 2010 B2
7693790 Lawlor et al. Apr 2010 B2
7697520 Hopkins Apr 2010 B2
7698214 Lindgren Apr 2010 B1
7698217 Phillips et al. Apr 2010 B1
7702576 Fahner et al. Apr 2010 B2
7702579 Neely Apr 2010 B2
7707109 Odijk et al. Apr 2010 B2
7707117 Jimenez et al. Apr 2010 B1
7707122 Hull et al. Apr 2010 B2
7707271 Rudkin et al. Apr 2010 B2
7708190 Brandt et al. May 2010 B2
7708191 Vega May 2010 B2
7708196 Palmieri et al. May 2010 B2
7711626 Nanjundamoorthy et al. May 2010 B2
7711635 Steele et al. May 2010 B2
7711636 Robida et al. May 2010 B2
7711645 Morello May 2010 B2
7711690 Garrison et al. May 2010 B1
7711707 Kelley May 2010 B2
7715832 Zhou May 2010 B2
7716132 Spies et al. May 2010 B1
7720705 Stein May 2010 B2
7720750 Brody May 2010 B2
7720760 Cook et al. May 2010 B1
7720846 Bayliss May 2010 B1
7725330 Rao et al. May 2010 B2
7725385 Royer et al. May 2010 B2
7729283 Ferguson et al. Jun 2010 B2
7729959 Wells et al. Jun 2010 B1
7729969 Smith, III et al. Jun 2010 B1
7729983 Ellis Jun 2010 B1
7730078 Schwabe et al. Jun 2010 B2
7734522 Johnson et al. Jun 2010 B2
7734541 Kumar et al. Jun 2010 B2
7734543 Braco Jun 2010 B2
7734637 Greifeneder et al. Jun 2010 B2
7739193 Zimmer et al. Jun 2010 B2
7739707 Sie et al. Jun 2010 B2
7746496 Henry et al. Jun 2010 B2
7747520 Livermore et al. Jun 2010 B2
7747521 Serio Jun 2010 B2
7752095 Laracey et al. Jul 2010 B1
7752130 Byrd et al. Jul 2010 B2
7752132 Stewart et al. Jul 2010 B2
7752179 Brown Jul 2010 B1
7752286 Anderson et al. Jul 2010 B2
7756787 Hilton Jul 2010 B1
7756789 Welker et al. Jul 2010 B2
7757944 Cline et al. Jul 2010 B2
7761373 Metz Jul 2010 B2
7761384 Madhogarhia Jul 2010 B2
7761569 Hopkins Jul 2010 B2
7765148 German et al. Jul 2010 B2
7765166 Beringer et al. Jul 2010 B2
7765279 Kaib et al. Jul 2010 B1
7765525 Davidson et al. Jul 2010 B1
7769651 Fine et al. Aug 2010 B2
7769657 Chacko et al. Aug 2010 B2
7769697 Fieschi et al. Aug 2010 B2
7769998 Lynch et al. Aug 2010 B2
7770002 Weber Aug 2010 B2
7774257 Maggioncalda et al. Aug 2010 B2
7774270 MacCloskey Aug 2010 B1
7778868 Haugen et al. Aug 2010 B2
7778901 Ganesan et al. Aug 2010 B2
7780075 Cooper et al. Aug 2010 B2
7783515 Kumar et al. Aug 2010 B1
7783749 Hopkins Aug 2010 B2
7787869 Rice et al. Aug 2010 B2
7788040 Haskell et al. Aug 2010 B2
7788147 Haggerty et al. Aug 2010 B2
7788152 Haggerty et al. Aug 2010 B2
7788155 Jones et al. Aug 2010 B2
7788172 Kight et al. Aug 2010 B2
7792715 Kasower Sep 2010 B1
7792716 Gooding et al. Sep 2010 B2
7792725 Booraem et al. Sep 2010 B2
7792732 Haggerty et al. Sep 2010 B2
7792743 Koningstein et al. Sep 2010 B2
7792747 Chin Sep 2010 B2
7792749 Ganesan Sep 2010 B2
7792903 Fischer et al. Sep 2010 B2
7793835 Coggeshall et al. Sep 2010 B1
7797224 Barone et al. Sep 2010 B2
7797252 Rosskamm et al. Sep 2010 B2
7797644 Bhojan Sep 2010 B1
7797734 Babi et al. Sep 2010 B2
7801807 DeFrancesco et al. Sep 2010 B2
7801811 Merrell et al. Sep 2010 B1
7801812 Conlin et al. Sep 2010 B2
7801828 Candella et al. Sep 2010 B2
7801896 Szabo Sep 2010 B2
7801956 Cumberbatch et al. Sep 2010 B1
7802104 Dickinson Sep 2010 B2
7805348 Nanjundamoorthy et al. Sep 2010 B2
7805362 Merrell et al. Sep 2010 B1
7805439 Elliott et al. Sep 2010 B2
7809398 Pearson Oct 2010 B2
7809624 Smith, III et al. Oct 2010 B1
7809797 Cooley et al. Oct 2010 B2
7810036 Bales et al. Oct 2010 B2
7813943 Lefco et al. Oct 2010 B1
7814002 DeFrancesco et al. Oct 2010 B2
7814004 Haggerty et al. Oct 2010 B2
7814005 Imrey et al. Oct 2010 B2
7814431 Quinn et al. Oct 2010 B1
7818228 Coulter Oct 2010 B1
7818229 Imrey et al. Oct 2010 B2
7818382 Sommerer Oct 2010 B2
7822624 Erdmann et al. Oct 2010 B2
7822667 Smith, III et al. Oct 2010 B1
7827108 Perlman et al. Nov 2010 B2
7827115 Weller et al. Nov 2010 B2
7831521 Ball et al. Nov 2010 B1
7831609 Alexander Nov 2010 B1
7832006 Chen et al. Nov 2010 B2
7835983 Lefner et al. Nov 2010 B2
7835990 Coleman Nov 2010 B2
7836111 Shan Nov 2010 B1
7836197 Isaac et al. Nov 2010 B2
7840484 Haggerty et al. Nov 2010 B2
7840597 Showalter et al. Nov 2010 B2
7840674 Sterling Nov 2010 B1
7841004 Balducci et al. Nov 2010 B1
7841008 Cole et al. Nov 2010 B1
7844520 Franklin Nov 2010 B1
7844522 Fong Nov 2010 B2
7844604 Baio et al. Nov 2010 B2
7848972 Sharma Dec 2010 B1
7848974 Sheehan Dec 2010 B1
7848978 Imrey et al. Dec 2010 B2
7849004 Choudhuri et al. Dec 2010 B2
7849014 Erikson Dec 2010 B2
7849397 Ahmed Dec 2010 B1
7853436 McConnell et al. Dec 2010 B2
7853493 DeBie et al. Dec 2010 B2
7853522 Chin Dec 2010 B2
7853998 Blaisdell et al. Dec 2010 B2
7856203 Lipovski Dec 2010 B2
7856376 Storey Dec 2010 B2
7856386 Hazlehurst et al. Dec 2010 B2
7856453 Malik et al. Dec 2010 B2
7860769 Benson Dec 2010 B2
7860782 Cash et al. Dec 2010 B2
7860790 Monk Dec 2010 B2
7861287 Pomerantz Dec 2010 B2
7865412 Weiss et al. Jan 2011 B1
7866548 Reed et al. Jan 2011 B2
7870025 English Jan 2011 B2
7870066 Lin et al. Jan 2011 B2
7870068 Chin Jan 2011 B2
7870077 Woo et al. Jan 2011 B2
7870078 Clark et al. Jan 2011 B2
7870485 Seliutin et al. Jan 2011 B2
7870491 Henderson et al. Jan 2011 B1
7873441 Synesiou et al. Jan 2011 B2
7873563 Barone et al. Jan 2011 B2
7873573 Realini Jan 2011 B2
7873677 Messing et al. Jan 2011 B2
7877304 Coulter Jan 2011 B1
7877402 Weiss et al. Jan 2011 B1
7877784 Chow et al. Jan 2011 B2
RE42154 Walker et al. Feb 2011 E
7880728 de los Reyes et al. Feb 2011 B2
7885637 Immonen et al. Feb 2011 B2
7890358 Dutta et al. Feb 2011 B2
7890371 Chao Feb 2011 B2
7890403 Smith Feb 2011 B1
7890420 Haggerty et al. Feb 2011 B2
7895107 Lapstun et al. Feb 2011 B2
7895227 Henderson Feb 2011 B1
7899750 Klieman et al. Mar 2011 B1
7899757 Talan et al. Mar 2011 B1
7900052 Joans Mar 2011 B2
7904306 Johnson et al. Mar 2011 B2
7904354 Pepe et al. Mar 2011 B2
7904367 Chung et al. Mar 2011 B2
7904447 Russell et al. Mar 2011 B1
7904899 Robalewski et al. Mar 2011 B2
7908242 Achanta Mar 2011 B1
7909246 Hogg et al. Mar 2011 B2
7911673 Yap Mar 2011 B1
7912770 Haggerty et al. Mar 2011 B2
7912778 Nanjundamoorthy Mar 2011 B2
7912842 Bayliss et al. Mar 2011 B1
7912865 Akerman et al. Mar 2011 B2
7913173 Hebard et al. Mar 2011 B2
7917410 Morimoto Mar 2011 B2
7917412 Wang et al. Mar 2011 B1
7917435 Hall et al. Mar 2011 B2
7917754 Harrison et al. Mar 2011 B1
7925285 Indirabhai Apr 2011 B2
7925578 Hong et al. Apr 2011 B1
7925582 Kornegay et al. Apr 2011 B1
7925982 Parker Apr 2011 B2
7930239 Pierdinock et al. Apr 2011 B2
7930252 Bender et al. Apr 2011 B2
7930285 Abraham et al. Apr 2011 B2
7930302 Bandaru et al. Apr 2011 B2
7930411 Hayward Apr 2011 B1
7933834 Kumar et al. Apr 2011 B2
7937323 Wagner et al. May 2011 B2
7937325 Kumar et al. May 2011 B2
7937416 Hossfeld et al. May 2011 B2
7941365 Bradley et al. May 2011 B1
7941560 Friesen et al. May 2011 B1
7945240 Klock et al. May 2011 B1
7945491 Sharma May 2011 B2
7945510 Bradley et al. May 2011 B1
7949609 Colella May 2011 B2
7953213 Babi et al. May 2011 B2
7953660 Ganesan et al. May 2011 B2
7954698 Pliha Jun 2011 B1
7958046 Doerner et al. Jun 2011 B2
7958049 Jamison et al. Jun 2011 B2
7962361 Ramchandani et al. Jun 2011 B2
7962410 Tosswill Jun 2011 B2
7965275 Lew Jun 2011 B1
7966192 Pagliari et al. Jun 2011 B2
7966255 Wong et al. Jun 2011 B2
7966325 Singh Jun 2011 B2
7970669 Santos Jun 2011 B1
7970676 Feinstein Jun 2011 B2
7970679 Kasower Jun 2011 B2
7970698 Gupta et al. Jun 2011 B2
7970701 Lewis et al. Jun 2011 B2
7970796 Narayanan Jun 2011 B1
7971141 Quinn et al. Jun 2011 B1
7974919 Conlin et al. Jul 2011 B2
7975299 Balducci et al. Jul 2011 B1
7979908 Millwee Jul 2011 B2
7983932 Kane Jul 2011 B2
7983975 Jones et al. Jul 2011 B2
7983979 Holland, IV Jul 2011 B2
7984436 Murray Jul 2011 B1
7987124 Holden et al. Jul 2011 B1
7987173 Alexander Jul 2011 B2
7987501 Miller et al. Jul 2011 B2
7990895 Ferguson et al. Aug 2011 B2
7991673 Kumar et al. Aug 2011 B2
7991688 Phelan et al. Aug 2011 B2
7995991 Johnson et al. Aug 2011 B2
7996310 Edwards et al. Aug 2011 B1
8001034 Chung et al. Aug 2011 B2
8001041 Hoadley et al. Aug 2011 B2
8001045 McClinton Aug 2011 B1
8001153 Skurtovich, Jr. et al. Aug 2011 B2
8001235 Russ et al. Aug 2011 B2
8001582 Hulten et al. Aug 2011 B2
8005738 Chacko et al. Aug 2011 B2
8005754 McCoy et al. Aug 2011 B2
8005755 Freishtat et al. Aug 2011 B2
8005759 Hirtenstein et al. Aug 2011 B2
8005795 Galipeau et al. Aug 2011 B2
8006261 Haberman et al. Aug 2011 B1
8010422 Lascelles et al. Aug 2011 B1
8010674 Fong Aug 2011 B2
8014756 Henderson Sep 2011 B1
8015083 Sterling et al. Sep 2011 B1
8015107 Kornegay et al. Sep 2011 B2
8019066 Efrati et al. Sep 2011 B1
8024263 Zarikian et al. Sep 2011 B2
8024660 Quinn et al. Sep 2011 B1
8024778 Cash et al. Sep 2011 B2
8027975 Gabriel et al. Sep 2011 B2
8032822 Artamonov et al. Oct 2011 B1
8032930 Hicks Oct 2011 B2
8032932 Speyer et al. Oct 2011 B2
8036941 Bennett et al. Oct 2011 B2
8036961 Ducolon et al. Oct 2011 B2
8037097 Guo et al. Oct 2011 B2
8037115 Scalora et al. Oct 2011 B1
8037176 Hopkins Oct 2011 B2
8037506 Cooper et al. Oct 2011 B2
8041127 Whitelaw Oct 2011 B2
8051074 Eom et al. Nov 2011 B2
8055579 Davies et al. Nov 2011 B2
8055904 Cato et al. Nov 2011 B1
8060404 Storey Nov 2011 B2
8060424 Kasower Nov 2011 B2
8060438 Dhar et al. Nov 2011 B2
8060441 Stewart et al. Nov 2011 B2
8060508 Gabriel et al. Nov 2011 B2
8060532 White et al. Nov 2011 B2
8060916 Bajaj et al. Nov 2011 B2
8065175 Lewis Nov 2011 B1
8065233 Lee et al. Nov 2011 B2
8065367 Stanley Nov 2011 B1
8069066 Stevens et al. Nov 2011 B2
8069213 Bloch et al. Nov 2011 B2
8069407 Armandpour et al. Nov 2011 B1
8073768 Haggerty et al. Dec 2011 B2
8073773 Kozee et al. Dec 2011 B2
8073774 Pousti Dec 2011 B2
8073777 Barry et al. Dec 2011 B2
8073785 Candella et al. Dec 2011 B1
8078453 Shaw Dec 2011 B2
8078516 Weiss et al. Dec 2011 B1
8078524 Crawford et al. Dec 2011 B2
8078527 Cerise et al. Dec 2011 B2
8078528 Vicente et al. Dec 2011 B1
8078881 Liu Dec 2011 B1
8078986 Rhyne et al. Dec 2011 B1
8086219 O'Neil et al. Dec 2011 B2
8086508 Dheer et al. Dec 2011 B2
8086523 Palmer Dec 2011 B1
8086524 Craig et al. Dec 2011 B1
8086525 Atwood et al. Dec 2011 B2
8090794 Kilat et al. Jan 2012 B1
8095443 DeBie Jan 2012 B2
8095458 Peterson et al. Jan 2012 B2
8095534 Alexander Jan 2012 B1
8095614 Hopkins Jan 2012 B2
8098239 Moore Jan 2012 B1
8099298 Coleman et al. Jan 2012 B2
8099309 Bober Jan 2012 B1
8099341 Varghese Jan 2012 B2
8099356 Feinstein et al. Jan 2012 B2
8099376 Serrano-Morales et al. Jan 2012 B2
8103587 Kumar et al. Jan 2012 B2
8104671 Besecker et al. Jan 2012 B2
8104679 Brown Jan 2012 B2
8108272 Sorbe et al. Jan 2012 B2
8108301 Gupta et al. Jan 2012 B2
8112354 Lalwani et al. Feb 2012 B2
8117077 Lin Feb 2012 B2
8117100 Hopkins Feb 2012 B1
8117648 Slaton et al. Feb 2012 B2
8121894 Mason Feb 2012 B2
8121945 Rackley, III et al. Feb 2012 B2
8121947 Barth et al. Feb 2012 B1
8122133 Hopkins Feb 2012 B2
8126456 Lotter et al. Feb 2012 B2
8126820 Talan et al. Feb 2012 B1
8127982 Casey et al. Mar 2012 B1
8127986 Taylor et al. Mar 2012 B1
8130075 Hingole Mar 2012 B1
8131598 Goolkasian et al. Mar 2012 B2
8131614 Haggerty et al. Mar 2012 B2
8131685 Gedalius et al. Mar 2012 B1
8131777 McCullouch Mar 2012 B2
8131846 Hernacki et al. Mar 2012 B1
8140432 Johnson Mar 2012 B2
8140649 Durand et al. Mar 2012 B2
8140847 Wu Mar 2012 B1
8145188 Park et al. Mar 2012 B2
8145189 Power et al. Mar 2012 B2
8145554 Kumar et al. Mar 2012 B2
8145568 Rackley, III et al. Mar 2012 B2
8150161 Laaser et al. Apr 2012 B2
8150754 Leggatt et al. Apr 2012 B2
8151343 Wang et al. Apr 2012 B1
8151344 Channakeshava Apr 2012 B1
8152061 Wolfe et al. Apr 2012 B2
8155950 Bickerstaff Apr 2012 B1
8156175 Hopkins Apr 2012 B2
8160624 Kumar et al. Apr 2012 B2
8160959 Rackley, III et al. Apr 2012 B2
8160960 Fei et al. Apr 2012 B1
8165940 Meimes et al. Apr 2012 B2
8165962 LeKachman Apr 2012 B1
8170931 Ross et al. May 2012 B2
8171471 Daly May 2012 B1
8175889 Girulat et al. May 2012 B1
8175969 Yang et al. May 2012 B2
8180686 Ryu et al. May 2012 B2
8180691 Cao et al. May 2012 B2
8185472 Boyd et al. May 2012 B1
8194956 Chandler Jun 2012 B2
8195549 Kasower Jun 2012 B2
8195566 Tsui et al. Jun 2012 B2
8195567 Cinelli et al. Jun 2012 B2
8196113 Miller et al. Jun 2012 B2
8200966 Grinberg et al. Jun 2012 B2
8201257 Andres et al. Jun 2012 B1
8204774 Chwast et al. Jun 2012 B2
8204788 Ivankovich et al. Jun 2012 B1
8204812 Stewart et al. Jun 2012 B2
8209659 Mathew Jun 2012 B2
8219473 Gardner et al. Jul 2012 B2
8219771 Le Neel Jul 2012 B2
8224723 Bosch et al. Jul 2012 B2
8224747 Kumar et al. Jul 2012 B2
8224974 Flora et al. Jul 2012 B1
8225270 Frasher et al. Jul 2012 B2
8225288 Miller et al. Jul 2012 B2
8225383 Channakeshava et al. Jul 2012 B1
8225395 Atwood et al. Jul 2012 B2
8229762 Romans Jul 2012 B2
8229850 Dilip et al. Jul 2012 B2
8229911 Bennett Jul 2012 B2
8234498 Britti et al. Jul 2012 B2
8244609 Prakash et al. Aug 2012 B2
8244635 Freishtat et al. Aug 2012 B2
8244646 Johnston et al. Aug 2012 B2
8244848 Narayanan et al. Aug 2012 B1
8249961 Hopkins Aug 2012 B1
8249965 Tumminaro Aug 2012 B2
8249968 Oldham et al. Aug 2012 B1
8255298 Nesladek Aug 2012 B1
8255327 Kemper et al. Aug 2012 B2
8255868 Robalewski Aug 2012 B1
8255971 Webb et al. Aug 2012 B1
8255978 Dick Aug 2012 B2
8256013 Hernacki et al. Aug 2012 B1
8260649 Ramanujan et al. Sep 2012 B2
8260682 Rigole Sep 2012 B2
8260694 Lauer et al. Sep 2012 B1
8260699 Smith et al. Sep 2012 B2
8260805 Venu et al. Sep 2012 B1
8261204 Huynh et al. Sep 2012 B1
8261334 Hazlehurst et al. Sep 2012 B2
8261970 Suginaka Sep 2012 B2
8261974 Hull Sep 2012 B2
8265591 Abidogun et al. Sep 2012 B1
8266065 Dilip et al. Sep 2012 B2
8266515 Satyavolu Sep 2012 B2
8271362 Fasching Sep 2012 B2
8271393 Twining et al. Sep 2012 B2
8271650 Alexander Sep 2012 B2
8271894 Mayers Sep 2012 B1
8271899 Blackburn et al. Sep 2012 B1
8271906 Fong Sep 2012 B1
8271961 Chithambaram Sep 2012 B1
8275636 Berg et al. Sep 2012 B2
8275683 Wolfson et al. Sep 2012 B2
8275710 Hildebrand Sep 2012 B1
8280723 Laaser Oct 2012 B1
8280789 Menzel Oct 2012 B2
8280792 Rajan et al. Oct 2012 B2
8280810 Grandcolas et al. Oct 2012 B2
8280879 Alexander Oct 2012 B2
8281372 Vidal Oct 2012 B1
8285613 Coulter Oct 2012 B1
8285640 Scipioni Oct 2012 B2
8285641 Cataline et al. Oct 2012 B2
8285656 Chang et al. Oct 2012 B1
8290835 Homer et al. Oct 2012 B2
8290840 Kasower Oct 2012 B2
8290845 Leibon et al. Oct 2012 B2
8290856 Kasower Oct 2012 B1
8290865 Lawrence et al. Oct 2012 B2
8290941 Alexander Oct 2012 B2
8296206 Del Favero et al. Oct 2012 B1
8296229 Yellin et al. Oct 2012 B1
8306255 Degnan Nov 2012 B1
8306861 Dunsmore et al. Nov 2012 B2
8306889 Leibon et al. Nov 2012 B2
8311792 Podgorny et al. Nov 2012 B1
8311936 Haggerty et al. Nov 2012 B2
8311942 Mason Nov 2012 B1
8312033 McMillan Nov 2012 B1
8315942 Haggerty et al. Nov 2012 B2
8315945 Gupta Nov 2012 B1
8320944 Gibson et al. Nov 2012 B1
8321334 Kornegay et al. Nov 2012 B1
8321339 Imrey et al. Nov 2012 B2
8321413 Gabriel et al. Nov 2012 B2
8324080 Yang et al. Dec 2012 B2
8326725 Elwell et al. Dec 2012 B2
8326747 Ang et al. Dec 2012 B2
8326770 Weisman Dec 2012 B1
8327429 Speyer et al. Dec 2012 B2
8332241 Harrell et al. Dec 2012 B2
8335739 Bol et al. Dec 2012 B1
8335741 Kornegay et al. Dec 2012 B2
8341545 Hebard Dec 2012 B2
8346226 Gibson et al. Jan 2013 B2
8346615 Connors et al. Jan 2013 B2
8347364 Babi et al. Jan 2013 B2
8352365 Goldberg et al. Jan 2013 B1
8352564 Campise et al. Jan 2013 B1
8353027 Dennis et al. Jan 2013 B2
8353029 Morgan et al. Jan 2013 B2
8353448 Miller et al. Jan 2013 B1
8355935 Hellman et al. Jan 2013 B2
8355966 Vu et al. Jan 2013 B1
8355967 Debie et al. Jan 2013 B2
8359003 Gailloux et al. Jan 2013 B1
8359266 Seale, III et al. Jan 2013 B2
8359278 Domenikos et al. Jan 2013 B2
8364662 Moyer et al. Jan 2013 B1
8364711 Wilkins et al. Jan 2013 B2
8364969 King Jan 2013 B2
8370229 Moduga et al. Feb 2013 B2
8370256 Murphy Feb 2013 B1
8370340 Yu et al. Feb 2013 B1
8374885 Stibel et al. Feb 2013 B2
8374962 Abelman et al. Feb 2013 B2
8374973 Herbrich et al. Feb 2013 B2
8375331 Mayers Feb 2013 B1
8380803 Stibel et al. Feb 2013 B1
8381120 Stibel et al. Feb 2013 B2
8385521 Rustagi et al. Feb 2013 B2
8386341 Bennett et al. Feb 2013 B2
8386377 Xiong et al. Feb 2013 B1
8386966 Attinasi et al. Feb 2013 B1
8391846 Mankovich Mar 2013 B1
8392230 Stibel et al. Mar 2013 B2
8392272 Lin Mar 2013 B2
8392300 Battula et al. Mar 2013 B1
8392334 Hirtenstein et al. Mar 2013 B2
8392969 Park et al. Mar 2013 B1
8396743 Alvin Mar 2013 B2
8396747 Bachenheimer Mar 2013 B2
8400970 Bajar et al. Mar 2013 B2
8401875 Fish et al. Mar 2013 B2
8401941 Havemose Mar 2013 B1
8401965 Johnson et al. Mar 2013 B2
8401966 Stewart et al. Mar 2013 B2
8402526 Ahn Mar 2013 B2
8407141 Mullen et al. Mar 2013 B2
8407194 Chaput et al. Mar 2013 B1
8412593 Song et al. Apr 2013 B1
8413239 Sutton et al. Apr 2013 B2
8417627 Cerise et al. Apr 2013 B2
8417635 Kalra et al. Apr 2013 B2
8417644 Ferguson et al. Apr 2013 B2
8423285 Paterson et al. Apr 2013 B2
8423387 Mirza Apr 2013 B1
8423452 Ley et al. Apr 2013 B1
8423461 Mukherjee Apr 2013 B2
8423463 Matthews et al. Apr 2013 B1
8423563 Chang et al. Apr 2013 B2
8423653 Chang et al. Apr 2013 B2
8429073 Ferguson et al. Apr 2013 B2
8432275 Patel et al. Apr 2013 B2
8433654 Subbarao et al. Apr 2013 B2
8438063 Albisu May 2013 B2
8443202 White et al. May 2013 B2
8447667 Dinamani May 2013 B1
8452704 Barbara et al. May 2013 B2
8452708 Birenbaum et al. May 2013 B1
8453068 Stibel et al. May 2013 B2
8453218 Lan et al. May 2013 B2
8453940 Diamond Jun 2013 B2
8456293 Trundle et al. Jun 2013 B1
8458062 Dutt et al. Jun 2013 B2
8463595 Rehling et al. Jun 2013 B1
8463831 Harris et al. Jun 2013 B2
8463939 Galvin Jun 2013 B1
8464939 Taylor et al. Jun 2013 B1
8468028 Stibel et al. Jun 2013 B2
8473318 Nielson et al. Jun 2013 B2
8473353 Matsuda et al. Jun 2013 B2
8473394 Marshall Jun 2013 B2
8467766 Rackley, III et al. Jul 2013 B2
8478674 Kapczynski et al. Jul 2013 B1
8478686 Giles Jul 2013 B1
8483473 Roach et al. Jul 2013 B2
8484104 Hurlbutt et al. Jul 2013 B1
8484131 Kelly et al. Jul 2013 B2
8484186 Kapczynski et al. Jul 2013 B1
8489067 Rackley, III et al. Jul 2013 B2
8489480 Kassir Jul 2013 B2
8489502 Morris et al. Jul 2013 B2
8489504 Gupta Jul 2013 B1
8489513 Bishop et al. Jul 2013 B2
8489720 Morford et al. Jul 2013 B1
8490126 Walter et al. Jul 2013 B2
8490197 Herz Jul 2013 B2
8490871 Miller et al. Jul 2013 B1
8494958 Schoenberg et al. Jul 2013 B2
8494973 Dignan et al. Jul 2013 B1
8498613 Aebi Jul 2013 B2
8498900 Spirin et al. Jul 2013 B1
8498914 Hazelhurst Jul 2013 B2
8498932 Matthews Jul 2013 B2
8498944 Solomon Jul 2013 B2
8499348 Rubin Jul 2013 B1
8500006 Carlson et al. Aug 2013 B2
8504394 Nutkiewicz et al. Aug 2013 B2
8504470 Chirehdast Aug 2013 B1
8504474 Armes et al. Aug 2013 B2
8510220 Rackley, III et al. Aug 2013 B2
8510223 Blair et al. Aug 2013 B2
8515825 Ross, Jr. et al. Aug 2013 B1
8515828 Wolf et al. Aug 2013 B1
8515842 Papadimitriou Aug 2013 B2
8515844 Kasower Aug 2013 B2
8521657 Kuebert et al. Aug 2013 B2
8527357 Ganesan Sep 2013 B1
8527377 D'Englere Sep 2013 B2
8527410 Markki et al. Sep 2013 B2
8527413 Heller Sep 2013 B2
8527596 Long et al. Sep 2013 B2
8528813 Blossom Sep 2013 B1
8533118 Weller et al. Sep 2013 B2
8538871 Portillo et al. Sep 2013 B2
8538874 Thomas Sep 2013 B2
8538878 Meier et al. Sep 2013 B2
8539599 Gomez et al. Sep 2013 B2
8543498 Silbernagel et al. Sep 2013 B2
8544091 Stibel Sep 2013 B2
8458907 Campbell Oct 2013 B1
8548832 Ika et al. Oct 2013 B2
8548903 Becker Oct 2013 B2
8548907 Campbell Oct 2013 B1
8554584 Hargroder Oct 2013 B2
8555357 Gauvin Oct 2013 B1
8560161 Kator et al. Oct 2013 B1
8560410 Narkar Oct 2013 B2
8560436 Ingram et al. Oct 2013 B2
8560438 Hankey et al. Oct 2013 B2
8560444 Rosenblatt et al. Oct 2013 B2
8560447 Hinghole et al. Oct 2013 B1
8560450 Kumar et al. Oct 2013 B2
8566187 Keld et al. Oct 2013 B2
8571971 Brown et al. Oct 2013 B1
8572083 Snell et al. Oct 2013 B1
8578036 Holfelder et al. Nov 2013 B1
8578496 Krishnappa Nov 2013 B1
8589286 Kornegay et al. Nov 2013 B1
8595101 Daukas et al. Nov 2013 B1
8600768 Stibel et al. Dec 2013 B2
8600886 Ramavarjula et al. Dec 2013 B2
8601602 Zheng Dec 2013 B1
8606694 Campbell et al. Dec 2013 B2
8606869 Stibel et al. Dec 2013 B2
8626137 Devitt et al. Jan 2014 B1
8626637 Gooch et al. Jan 2014 B1
8630893 Stibel et al. Jan 2014 B2
8630938 Cheng et al. Jan 2014 B2
8639930 Stibel et al. Jan 2014 B2
8646051 Paden et al. Feb 2014 B2
8650189 Fertik et al. Feb 2014 B2
8660541 Beresniewicz et al. Feb 2014 B1
8660919 Kasower Feb 2014 B2
8671115 Skurtovich, Jr. et al. Mar 2014 B2
8676684 Newman et al. Mar 2014 B2
8688543 Dominquez Apr 2014 B2
8689001 Satish Apr 2014 B1
8694420 Oliai Apr 2014 B1
8705718 Baniak et al. Apr 2014 B2
8706599 Koenig et al. Apr 2014 B1
8706616 Flynn Apr 2014 B1
8712789 Stibel et al. Apr 2014 B2
8712907 Stibel et al. Apr 2014 B1
8713651 Stibel Apr 2014 B1
8725605 Plunkett May 2014 B1
8725613 Celka et al. May 2014 B1
8732004 Ramos et al. May 2014 B1
8732803 Stibel et al. May 2014 B2
8738449 Cupps et al. May 2014 B1
8738516 Dean et al. May 2014 B1
8744956 DiChiara et al. Jun 2014 B1
8745698 Ashfield et al. Jun 2014 B1
8751378 Dornhelm et al. Jun 2014 B2
8760417 Haug Jun 2014 B2
8762243 Jenkins et al. Jun 2014 B2
8768914 Scriffignano et al. Jul 2014 B2
8775299 Achanta et al. Jul 2014 B2
8781951 Lewis et al. Jul 2014 B2
8781953 Kasower Jul 2014 B2
8782217 Arone et al. Jul 2014 B1
8818888 Kapczynski et al. Aug 2014 B1
8819789 Orttung et al. Aug 2014 B2
8825544 Imrey et al. Sep 2014 B2
8856894 Dean et al. Oct 2014 B1
8856945 Carter et al. Oct 2014 B2
8860763 Privault et al. Oct 2014 B2
8868914 Teppler Oct 2014 B2
8882509 Nunamaker Nov 2014 B1
8930216 Johnson et al. Jan 2015 B1
8930251 DeBie Jan 2015 B2
8930263 Mahacek et al. Jan 2015 B1
8930383 Dekker et al. Jan 2015 B2
8938399 Herman Jan 2015 B1
8949981 Trollope et al. Feb 2015 B1
8954459 McMillan et al. Feb 2015 B1
8972400 Kapczynski et al. Mar 2015 B1
8983867 Stibel et al. Mar 2015 B2
8996391 Stibel et al. Mar 2015 B2
9002753 Anschutz et al. Apr 2015 B2
9015171 Bayliss Apr 2015 B2
9053589 Kator et al. Jun 2015 B1
9053590 Kator et al. Jun 2015 B1
9058627 Wasser et al. Jun 2015 B1
9076276 Kator et al. Jul 2015 B1
9092616 Kumar et al. Jul 2015 B2
9106691 Burger et al. Aug 2015 B1
9111281 Stibel et al. Aug 2015 B2
9116918 Kim Aug 2015 B1
9118614 Rogers et al. Aug 2015 B1
9147042 Haller et al. Sep 2015 B1
9218481 Belisario Oct 2015 B2
9183377 Sobel et al. Nov 2015 B1
9202200 Stibel et al. Dec 2015 B2
9213461 Eraker et al. Dec 2015 B2
9225704 Johansson et al. Dec 2015 B1
9230283 Taylor et al. Jan 2016 B1
9256624 Skurtovich, Jr. et al. Feb 2016 B2
9256904 Haller et al. Feb 2016 B1
9324080 Shafron et al. Apr 2016 B2
9348896 Faith et al. May 2016 B2
9349145 Rozman et al. May 2016 B2
9400589 Wasser et al. Jul 2016 B1
9406085 Hunt, III et al. Aug 2016 B1
9418213 Roth et al. Aug 2016 B1
9443268 Kapczynski et al. Sep 2016 B1
9449346 Hockey et al. Sep 2016 B1
9477737 Charyk et al. Oct 2016 B1
9479471 Schoenrock Oct 2016 B2
9483606 Dean et al. Nov 2016 B1
9501583 Nordstrom et al. Nov 2016 B2
9536238 Garrett et al. Jan 2017 B2
9536263 Dean et al. Jan 2017 B1
9542553 Burger et al. Jan 2017 B1
9542682 Taylor et al. Jan 2017 B1
9558519 Burger Jan 2017 B1
9569797 Rohn et al. Feb 2017 B1
9589266 Pourgallah et al. Mar 2017 B2
9595023 Hockey et al. Mar 2017 B1
9607336 Dean et al. Mar 2017 B1
9613382 Newstadt et al. Apr 2017 B1
9619751 Woon et al. Apr 2017 B2
9652802 Kasower May 2017 B1
9654541 Kapczynski et al. May 2017 B1
9665854 Burger et al. May 2017 B1
9690820 Girulat, Jr. Jun 2017 B1
9697568 Hunt, III Jul 2017 B1
9704107 Baker, IV et al. Jul 2017 B1
9710523 Skurtovich, Jr. et al. Jul 2017 B2
9710852 Olson et al. Jul 2017 B1
9767513 Taylor et al. Sep 2017 B1
9824199 Kshirsagar et al. Nov 2017 B2
9830646 Wasser et al. Nov 2017 B1
9853959 Kapczynski et al. Dec 2017 B1
9870589 Arnold et al. Jan 2018 B1
9892457 Kapczynski Feb 2018 B1
9916621 Wasser et al. Mar 2018 B1
9972048 Dean et al. May 2018 B1
9990674 Taylor et al. Jun 2018 B1
10002075 O'Leary et al. Jun 2018 B1
10003591 Hockey et al. Jun 2018 B2
10025842 Charyk et al. Jul 2018 B1
10043214 Hunt, III Aug 2018 B1
10061936 Burger et al. Aug 2018 B1
10075446 McMillan et al. Sep 2018 B2
10102570 Kapczynski et al. Oct 2018 B1
10104059 Hockey et al. Oct 2018 B2
10176233 Dean et al. Jan 2019 B1
10187341 Schoenrock Jan 2019 B2
10235965 Horneff et al. Mar 2019 B2
10255598 Dean et al. Apr 2019 B1
10262364 Taylor et al. Apr 2019 B2
10269065 Kapczynski et al. Apr 2019 B1
10277659 Kapczynski et al. Apr 2019 B1
D847840 Poschel et al. May 2019 S
D851126 Tauban Jun 2019 S
D851127 Tauban Jun 2019 S
D851128 Tauban Jun 2019 S
10319029 Hockey et al. Jun 2019 B1
10325314 Kapczynski et al. Jun 2019 B1
10366450 Mahacek et al. Jul 2019 B1
10380654 Hirtenstein et al. Aug 2019 B2
10482532 Kapczynski Nov 2019 B1
10523653 Hockey et al. Dec 2019 B2
10528545 Girulat, Jr. Jan 2020 B1
10530761 Hockey et al. Jan 2020 B2
10565643 Rohn et al. Feb 2020 B2
10586279 Ramos et al. Mar 2020 B1
10614463 Hockey et al. Apr 2020 B1
10614519 Taylor et al. Apr 2020 B2
10621657 Kasower Apr 2020 B2
10628448 Charyk et al. Apr 2020 B1
10642999 Burger et al. May 2020 B2
10671749 Felice-Steele et al. Jun 2020 B2
10685398 Olson et al. Jun 2020 B1
10686773 Britti et al. Jun 2020 B2
10706453 Morin et al. Jul 2020 B1
10726491 Hockey et al. Jul 2020 B1
10757154 Jacobs et al. Aug 2020 B1
10798113 Muddu et al. Oct 2020 B2
10798197 Dean et al. Oct 2020 B2
10839446 Mupkala et al. Nov 2020 B1
10878499 Taylor et al. Dec 2020 B2
10880313 Manna et al. Dec 2020 B2
10891691 Courbage et al. Jan 2021 B2
10916220 Ngo Feb 2021 B2
10929925 Hunt, III Feb 2021 B1
10937090 Debie et al. Mar 2021 B1
10949428 Poirel et al. Mar 2021 B2
10963959 Wasser et al. Mar 2021 B2
11012491 Kapczynski et al. May 2021 B1
11025629 Chasman et al. Jun 2021 B2
11025638 Ford et al. Jun 2021 B2
11050767 Black et al. Jun 2021 B2
11087022 Burger et al. Aug 2021 B2
11113759 Kapczynski et al. Sep 2021 B1
11132742 Wasser et al. Sep 2021 B1
11157872 McMillan et al. Oct 2021 B2
11157997 Robida et al. Oct 2021 B2
11159593 Jacobs et al. Oct 2021 B1
11200620 Dean et al. Dec 2021 B2
11238656 Lin et al. Feb 2022 B1
11265324 Felice-Steele et al. Mar 2022 B2
11308551 Mahacek et al. Apr 2022 B1
11315179 Rehder et al. Apr 2022 B1
11347715 Girulat, Jr. May 2022 B2
11356430 Kapczynski et al. Jun 2022 B1
11373109 Zoldi et al. Jun 2022 B2
11373261 Ramos et al. Jun 2022 B1
11379916 Taylor et al. Jul 2022 B1
11399029 Manna et al. Jul 2022 B2
11410230 Olson et al. Aug 2022 B1
11425144 Bondugula et al. Aug 2022 B2
11436626 Lawrence et al. Sep 2022 B2
11461364 Charyk et al. Oct 2022 B1
11489834 Carroll et al. Nov 2022 B1
11514519 Hunt, III Nov 2022 B1
11562457 Ramos et al. Jan 2023 B2
11580598 Rehder et al. Feb 2023 B1
11631130 Taylor et al. Apr 2023 B1
11651426 Wasser et al. May 2023 B1
11665253 Dean et al. May 2023 B1
11729230 Jacobs et al. Aug 2023 B1
11769112 McMillan et al. Sep 2023 B2
11769200 Kapczynski et al. Sep 2023 B1
11842454 Lin et al. Dec 2023 B1
11863310 Kapczynski et al. Jan 2024 B1
20010005840 Verkama Jun 2001 A1
20010011247 O'Flaherty et al. Aug 2001 A1
20010014878 Mitra et al. Aug 2001 A1
20010027413 Bhutta Oct 2001 A1
20010029470 Schultz et al. Oct 2001 A1
20010029482 Tealdi et al. Oct 2001 A1
20010032181 Jakstadt et al. Oct 2001 A1
20010034618 Kessler et al. Oct 2001 A1
20010034631 Kiselik Oct 2001 A1
20010037204 Horn et al. Nov 2001 A1
20010037289 Mayr et al. Nov 2001 A1
20010037295 Olsen Nov 2001 A1
20010037297 McNair Nov 2001 A1
20010039523 Iwamoto Nov 2001 A1
20010039532 Coleman, Jr. et al. Nov 2001 A1
20010039563 Tian Nov 2001 A1
20010042785 Walker et al. Nov 2001 A1
20010044729 Pomerance Nov 2001 A1
20010044756 Watkins et al. Nov 2001 A1
20010044764 Arnold Nov 2001 A1
20010047307 Bennett et al. Nov 2001 A1
20010047332 Gonen-Friedman et al. Nov 2001 A1
20010049274 Degraeve Dec 2001 A1
20010053989 Keller et al. Dec 2001 A1
20010056390 Varadarajan et al. Dec 2001 A1
20020010616 Itzaki Jan 2002 A1
20020010635 Tokiwa Jan 2002 A1
20020013827 Edstrom et al. Jan 2002 A1
20020013899 Faul Jan 2002 A1
20020016767 Johnston Feb 2002 A1
20020016771 Carothers et al. Feb 2002 A1
20020023108 Daswani et al. Feb 2002 A1
20020026423 Maritzen et al. Feb 2002 A1
20020029192 Nakagawa et al. Mar 2002 A1
20020032611 Khan Mar 2002 A1
20020032635 Harris et al. Mar 2002 A1
20020032645 Nozaki et al. Mar 2002 A1
20020032647 Delinsky et al. Mar 2002 A1
20020033846 Balasubramanian et al. Mar 2002 A1
20020035480 Gordon et al. Mar 2002 A1
20020035511 Haji et al. Mar 2002 A1
20020035520 Weiss Mar 2002 A1
20020040312 Dhar et al. Apr 2002 A1
20020040355 Weiner Apr 2002 A1
20020042715 Kelley Apr 2002 A1
20020045154 Wood et al. Apr 2002 A1
20020046185 Villart et al. Apr 2002 A1
20020049624 Raveis, Jr. Apr 2002 A1
20020052836 Galperin et al. May 2002 A1
20020052841 Guthrie et al. May 2002 A1
20020055906 Katz et al. May 2002 A1
20020059139 Evans May 2002 A1
20020059201 Work May 2002 A1
20020062249 Iannacci May 2002 A1
20020065772 Saliba et al. May 2002 A1
20020069122 Yun et al. Jun 2002 A1
20020069165 O'Neil Jun 2002 A1
20020069168 Lee et al. Jun 2002 A1
20020069182 Dwyer Jun 2002 A1
20020073017 Robertson Jun 2002 A1
20020077964 Brody et al. Jun 2002 A1
20020077978 O'Leary et al. Jun 2002 A1
20020087460 Hornung Jul 2002 A1
20020087488 Fordahl et al. Jul 2002 A1
20020091635 Dilip et al. Jul 2002 A1
20020091650 Ellis Jul 2002 A1
20020099612 Seaman et al. Jul 2002 A1
20020099635 Guiragosian Jul 2002 A1
20020099641 Mills et al. Jul 2002 A1
20020099824 Bender et al. Jul 2002 A1
20020103933 Garon et al. Aug 2002 A1
20020107765 Walker Aug 2002 A1
20020111816 Lortscher et al. Aug 2002 A1
20020111890 Sloan et al. Aug 2002 A1
20020116247 Tucker et al. Aug 2002 A1
20020116331 Cataline et al. Aug 2002 A1
20020120537 Morea et al. Aug 2002 A1
20020120581 Schiavone et al. Aug 2002 A1
20020120757 Sutherland et al. Aug 2002 A1
20020120846 Stewart et al. Aug 2002 A1
20020126449 Casebolt Sep 2002 A1
20020128917 Grounds Sep 2002 A1
20020128962 Kasower Sep 2002 A1
20020130894 Young et al. Sep 2002 A1
20020133365 Grey et al. Sep 2002 A1
20020133462 Shteyn Sep 2002 A1
20020133504 Vlahos et al. Sep 2002 A1
20020138409 Bass Sep 2002 A1
20020138470 Zhou Sep 2002 A1
20020143674 Beckman Oct 2002 A1
20020143943 Lee et al. Oct 2002 A1
20020147669 Taylor et al. Oct 2002 A1
20020147695 Khedkar et al. Oct 2002 A1
20020147801 Gullotta et al. Oct 2002 A1
20020149794 Yoshioka et al. Oct 2002 A1
20020152166 Dutta et al. Oct 2002 A1
20020156676 Ahrens et al. Oct 2002 A1
20020161664 Shaya et al. Oct 2002 A1
20020165757 Lisser Nov 2002 A1
20020165839 Taylor et al. Nov 2002 A1
20020169747 Chapman et al. Nov 2002 A1
20020173994 Ferguson, III Nov 2002 A1
20020174010 Rice Nov 2002 A1
20020174016 Cuervo Nov 2002 A1
20020174048 Dheer et al. Nov 2002 A1
20020174061 Srinivasan et al. Nov 2002 A1
20020174124 Haas et al. Nov 2002 A1
20020178146 Akella et al. Nov 2002 A1
20020188511 Johnson et al. Dec 2002 A1
20020194117 Nabe et al. Dec 2002 A1
20020194120 Russell et al. Dec 2002 A1
20020194140 Makuck Dec 2002 A1
20020198736 Harrison Dec 2002 A1
20020198798 Ludwig et al. Dec 2002 A1
20020198800 Shamrakov Dec 2002 A1
20020198806 Blagg et al. Dec 2002 A1
20020198822 Munoz et al. Dec 2002 A1
20020198824 Cook Dec 2002 A1
20020198828 Ludwig et al. Dec 2002 A1
20020198829 Ludwig et al. Dec 2002 A1
20020198830 Randell et al. Dec 2002 A1
20020198835 Watson et al. Dec 2002 A1
20030002671 Inchalik et al. Jan 2003 A1
20030004853 Ram et al. Jan 2003 A1
20030004855 Dutta et al. Jan 2003 A1
20030004922 Schmidt et al. Jan 2003 A1
20030007283 Ostwald et al. Jan 2003 A1
20030009301 Anand et al. Jan 2003 A1
20030009411 Ram et al. Jan 2003 A1
20030009415 Lutnick et al. Jan 2003 A1
20030009418 Green et al. Jan 2003 A1
20030009426 Ruiz-Sanchez Jan 2003 A1
20030018549 Fei et al. Jan 2003 A1
20030018578 Schultz Jan 2003 A1
20030023531 Fergusson Jan 2003 A1
20030023555 Rees Jan 2003 A1
20030028466 Jenson et al. Feb 2003 A1
20030028477 Stevenson et al. Feb 2003 A1
20030028529 Cheung Feb 2003 A1
20030033231 Turner et al. Feb 2003 A1
20030036952 Panttaja et al. Feb 2003 A1
20030036995 Lazerson Feb 2003 A1
20030041019 Vagim, III et al. Feb 2003 A1
20030041021 Kogler et al. Feb 2003 A1
20030041031 Hedy Feb 2003 A1
20030046222 Bard et al. Mar 2003 A1
20030046311 Baidya et al. Mar 2003 A1
20030048294 Arnold Mar 2003 A1
20030050929 Bookman et al. Mar 2003 A1
20030061104 Thomson et al. Mar 2003 A1
20030061155 Chin Mar 2003 A1
20030061163 Durfield Mar 2003 A1
20030064705 Desierio Apr 2003 A1
20030065563 Elliott et al. Apr 2003 A1
20030069839 Whittington et al. Apr 2003 A1
20030069943 Bahrs et al. Apr 2003 A1
20030078897 Florance et al. Apr 2003 A1
20030078926 Uthe et al. Apr 2003 A1
20030088472 Offutt et al. May 2003 A1
20030090586 Jan et al. May 2003 A1
20030093289 Thornley et al. May 2003 A1
20030093311 Knowlson May 2003 A1
20030097342 Whittingtom May 2003 A1
20030097380 Mulhern et al. May 2003 A1
20030101111 Dang et al. May 2003 A1
20030101344 Wheeler et al. May 2003 A1
20030105646 Siepser Jun 2003 A1
20030105710 Barbara et al. Jun 2003 A1
20030105733 Boreham Jun 2003 A1
20030105742 Boreham et al. Jun 2003 A1
20030115122 Slater et al. Jun 2003 A1
20030115133 Bian Jun 2003 A1
20030130892 Taono et al. Jul 2003 A1
20030144907 Cohen, Jr. et al. Jul 2003 A1
20030144933 Huang Jul 2003 A1
20030154122 Jackson, Jr. et al. Aug 2003 A1
20030154162 Danaher et al. Aug 2003 A1
20030158960 Engberg Aug 2003 A1
20030163418 Marks Aug 2003 A1
20030163435 Payone Aug 2003 A1
20030163513 Schaeck et al. Aug 2003 A1
20030163733 Barriga-Caceres et al. Aug 2003 A1
20030167229 Ludwig et al. Sep 2003 A1
20030171942 Gaito Sep 2003 A1
20030172039 Guy Sep 2003 A1
20030177090 Eden Sep 2003 A1
20030177091 Paglin Sep 2003 A1
20030186200 Selix Oct 2003 A1
20030187768 Ryan et al. Oct 2003 A1
20030187780 Arthus et al. Oct 2003 A1
20030187837 Culliss Oct 2003 A1
20030191701 Haseltine et al. Oct 2003 A1
20030191711 Jamison et al. Oct 2003 A1
20030191731 Stewart et al. Oct 2003 A1
20030195805 Storey Oct 2003 A1
20030195830 Merkoulovitch et al. Oct 2003 A1
20030195859 Lawrence Oct 2003 A1
20030196109 Raley et al. Oct 2003 A1
20030200142 Hicks et al. Oct 2003 A1
20030204429 Botscheck et al. Oct 2003 A1
20030204752 Garrison Oct 2003 A1
20030208412 Hillestad et al. Nov 2003 A1
20030212618 Keyes et al. Nov 2003 A1
20030212745 Caughey Nov 2003 A1
20030212909 Chandrashekhar Nov 2003 A1
20030214775 Fukuta et al. Nov 2003 A1
20030217000 Wichman Nov 2003 A1
20030219709 Olenick et al. Nov 2003 A1
20030220858 Lam et al. Nov 2003 A1
20030220871 Clarke et al. Nov 2003 A1
20030225729 Maloche et al. Dec 2003 A1
20030225742 Tenner et al. Dec 2003 A1
20030229504 Hollister Dec 2003 A1
20030229580 Gass et al. Dec 2003 A1
20030229589 Rosenblatt et al. Dec 2003 A1
20030229590 Byrne et al. Dec 2003 A1
20030236701 Rowney et al. Dec 2003 A1
20030236738 Lange et al. Dec 2003 A1
20040001565 Jones et al. Jan 2004 A1
20040002907 Tosswill Jan 2004 A1
20040002916 Timmerman et al. Jan 2004 A1
20040006536 Kawashima et al. Jan 2004 A1
20040010458 Friedman Jan 2004 A1
20040015714 Abraham et al. Jan 2004 A1
20040015715 Brown Jan 2004 A1
20040019549 Gulbrandsen Jan 2004 A1
20040019799 Vering et al. Jan 2004 A1
20040023637 Johnson et al. Feb 2004 A1
20040024671 Freund Feb 2004 A1
20040024702 Angel et al. Feb 2004 A1
20040024709 Yu et al. Feb 2004 A1
20040024717 Angel et al. Feb 2004 A1
20040030574 DiCostanzo et al. Feb 2004 A1
20040030621 Cobb Feb 2004 A1
20040030629 Freeman et al. Feb 2004 A1
20040030649 Nelson et al. Feb 2004 A1
20040030667 Xu et al. Feb 2004 A1
20040039586 Garvey et al. Feb 2004 A1
20040039688 Sulkowski et al. Feb 2004 A1
20040044563 Stein Mar 2004 A1
20040044601 Kim et al. Mar 2004 A1
20040044615 Xue et al. Mar 2004 A1
20040044617 Lu Mar 2004 A1
20040044628 Mathew et al. Mar 2004 A1
20040044673 Brady et al. Mar 2004 A1
20040045028 Harris Mar 2004 A1
20040046033 Kolodziej et al. Mar 2004 A1
20040059786 Caughey Mar 2004 A1
20040062213 Koss Apr 2004 A1
20040078424 Yairi et al. Apr 2004 A1
20040083159 Crosby et al. Apr 2004 A1
20040083230 Caughey Apr 2004 A1
20040088237 Moenickheim et al. May 2004 A1
20040088255 Zielke et al. May 2004 A1
20040093278 Burchetta et al. May 2004 A1
20040098418 Hein May 2004 A1
20040098546 Bashant et al. May 2004 A1
20040102197 Dietz May 2004 A1
20040107250 Marciano Jun 2004 A1
20040110119 Riconda et al. Jun 2004 A1
20040111292 Hutchins Jun 2004 A1
20040111358 Lange et al. Jun 2004 A1
20040111359 Hudock Jun 2004 A1
20040111363 Trench et al. Jun 2004 A1
20040117302 Weichert et al. Jun 2004 A1
20040122681 Ruvolo et al. Jun 2004 A1
20040122696 Beringer Jun 2004 A1
20040122697 Becerra et al. Jun 2004 A1
20040122766 Brooks et al. Jun 2004 A1
20040128150 Lundegren Jul 2004 A1
20040128156 Beringer et al. Jul 2004 A1
20040128215 Florance et al. Jul 2004 A1
20040133440 Carolan et al. Jul 2004 A1
20040133460 Berlin et al. Jul 2004 A1
20040133493 Ford et al. Jul 2004 A1
20040133509 McCoy et al. Jul 2004 A1
20040133513 McCoy et al. Jul 2004 A1
20040133514 Zielke et al. Jul 2004 A1
20040133515 McCoy et al. Jul 2004 A1
20040138935 Johnson et al. Jul 2004 A1
20040138992 DeFrancesco et al. Jul 2004 A1
20040138994 DeFrancesco et al. Jul 2004 A1
20040138995 Hershkowitz et al. Jul 2004 A1
20040138997 DeFrancesco et al. Jul 2004 A1
20040139005 Ganesan Jul 2004 A1
20040141005 Banatwala et al. Jul 2004 A1
20040143546 Wood et al. Jul 2004 A1
20040143547 Mersky Jul 2004 A1
20040143596 Sirkin Jul 2004 A1
20040148200 Hodges Jul 2004 A1
20040153437 Buchan Aug 2004 A1
20040158521 Newton Aug 2004 A1
20040158723 Root Aug 2004 A1
20040159700 Khan et al. Aug 2004 A1
20040167793 Masuoka et al. Aug 2004 A1
20040167823 Neely et al. Aug 2004 A1
20040172360 Mabrey et al. Sep 2004 A1
20040177035 Silva Sep 2004 A1
20040186807 Nathans et al. Sep 2004 A1
20040190694 Schelberg, Jr. et al. Sep 2004 A1
20040193535 Barazesh Sep 2004 A1
20040193538 Raines Sep 2004 A1
20040193891 Ollila Sep 2004 A1
20040198386 Dupray Oct 2004 A1
20040199456 Flint et al. Oct 2004 A1
20040199789 Shaw et al. Oct 2004 A1
20040210661 Thompson Oct 2004 A1
20040215584 Yao Oct 2004 A1
20040215673 Furukawa et al. Oct 2004 A1
20040220865 Lozowski et al. Nov 2004 A1
20040220918 Scriffignano et al. Nov 2004 A1
20040225545 Turner et al. Nov 2004 A1
20040225609 Greene Nov 2004 A1
20040225643 Alpha et al. Nov 2004 A1
20040230499 Stack Nov 2004 A1
20040230524 Meiners Nov 2004 A1
20040230527 Hansen et al. Nov 2004 A1
20040236678 Johns et al. Nov 2004 A1
20040236688 Bozeman Nov 2004 A1
20040243450 Bernard, Jr. et al. Dec 2004 A1
20040243506 Das Dec 2004 A1
20040243508 Samson et al. Dec 2004 A1
20040243588 Tanner et al. Dec 2004 A1
20040249532 Kelly et al. Dec 2004 A1
20040249789 Kapoor et al. Dec 2004 A1
20040249811 Shostack Dec 2004 A1
20040250107 Guo Dec 2004 A1
20040253988 Goldman Dec 2004 A1
20040254935 Chagoly et al. Dec 2004 A1
20040255127 Arnouse Dec 2004 A1
20040267646 Chandhok et al. Dec 2004 A1
20040267714 Frid et al. Dec 2004 A1
20040267818 Hartenstine Dec 2004 A1
20050004855 Jenson et al. Jan 2005 A1
20050004864 Lent et al. Jan 2005 A1
20050010474 Desai et al. Jan 2005 A1
20050010494 Mourad et al. Jan 2005 A1
20050010513 Duckworth et al. Jan 2005 A1
20050010523 Myklebust et al. Jan 2005 A1
20050015273 Iyer Jan 2005 A1
20050015338 Lee Jan 2005 A1
20050021353 Aviles et al. Jan 2005 A1
20050021457 Johnson et al. Jan 2005 A1
20050021476 Candella et al. Jan 2005 A1
20050021551 Silva et al. Jan 2005 A1
20050027632 Zeitoun et al. Feb 2005 A1
20050027633 Fortuna et al. Feb 2005 A1
20050027666 Beck Feb 2005 A1
20050027817 Novik et al. Feb 2005 A1
20050027983 Klawon Feb 2005 A1
20050033651 Kogan et al. Feb 2005 A1
20050033660 Solomon Feb 2005 A1
20050033690 Antognini et al. Feb 2005 A1
20050042983 Borgward Feb 2005 A1
20050050027 Yeh et al. Mar 2005 A1
20050055231 Lee Mar 2005 A1
20050055275 Newman et al. Mar 2005 A1
20050055296 Hattersley et al. Mar 2005 A1
20050058262 Timmins et al. Mar 2005 A1
20050060244 Goolkasian et al. Mar 2005 A1
20050060332 Bernstein et al. Mar 2005 A1
20050065893 Josephson Mar 2005 A1
20050071328 Lawrence Mar 2005 A1
20050080697 Foss et al. Apr 2005 A1
20050080716 Belyi et al. Apr 2005 A1
20050080723 Burchetta et al. Apr 2005 A1
20050080796 Midgley Apr 2005 A1
20050080821 Breil et al. Apr 2005 A1
20050085931 Willeby Apr 2005 A1
20050086126 Patterson Apr 2005 A1
20050086176 Dahlgren Apr 2005 A1
20050086261 Mammone Apr 2005 A1
20050091159 Ichikawa et al. Apr 2005 A1
20050091164 Varble Apr 2005 A1
20050096950 Caplan et al. May 2005 A1
20050097017 Hanratty May 2005 A1
20050097039 Kulcsar et al. May 2005 A1
20050097320 Golan et al. May 2005 A1
20050102180 Gailey et al. May 2005 A1
20050102209 Sagrillo et al. May 2005 A1
20050102226 Oppenheimer et al. May 2005 A1
20050105719 Huda May 2005 A1
20050108396 Bittner May 2005 A1
20050108631 Amorin et al. May 2005 A1
20050114335 Wesinger, Jr. et al. May 2005 A1
20050114344 Wesinger, Jr. et al. May 2005 A1
20050114345 Wesinger, Jr. et al. May 2005 A1
20050125291 Demkiw Grayson et al. Jun 2005 A1
20050125347 Akialis et al. Jun 2005 A1
20050125350 Tidwell et al. Jun 2005 A1
20050125397 Gross et al. Jun 2005 A1
20050125686 Brandt Jun 2005 A1
20050130704 McParland et al. Jun 2005 A1
20050137899 Davies et al. Jun 2005 A1
20050137948 Kissner et al. Jun 2005 A1
20050137963 Ricketts et al. Jun 2005 A1
20050137978 Ganesan et al. Jun 2005 A1
20050144143 Freiberg Jun 2005 A1
20050149354 Cyr et al. Jul 2005 A1
20050149355 Cyr et al. Jul 2005 A1
20050149356 Cyr et al. Jul 2005 A1
20050149378 Cyr et al. Jul 2005 A1
20050149379 Cyr et al. Jul 2005 A1
20050154617 Ruggieri et al. Jul 2005 A1
20050154664 Guy et al. Jul 2005 A1
20050154665 Kerr Jul 2005 A1
20050154769 Eckart et al. Jul 2005 A1
20050160051 Johnson Jul 2005 A1
20050160280 Caslin et al. Jul 2005 A1
20050165638 Piller Jul 2005 A1
20050165681 Heinemann et al. Jul 2005 A1
20050171850 Yueh Aug 2005 A1
20050171884 Arnott Aug 2005 A1
20050171900 Onneken Aug 2005 A1
20050177480 Huang Aug 2005 A1
20050177518 Brown Aug 2005 A1
20050192839 St. Jacques et al. Sep 2005 A1
20050198377 Ferguson et al. Sep 2005 A1
20050203768 Florance Sep 2005 A1
20050203844 Ferguson et al. Sep 2005 A1
20050203864 Schmidt et al. Sep 2005 A1
20050208461 Krebs et al. Sep 2005 A1
20050216434 Haveliwala et al. Sep 2005 A1
20050216524 Gomes et al. Sep 2005 A1
20050216953 Ellingson Sep 2005 A1
20050216955 Wilkins et al. Sep 2005 A1
20050226224 Lee et al. Oct 2005 A1
20050240526 Hill Oct 2005 A1
20050240578 Biederman et al. Oct 2005 A1
20050251474 Shinn et al. Nov 2005 A1
20050256766 Garcia et al. Nov 2005 A1
20050267823 Hartmann Dec 2005 A1
20050267840 Holm-Blagg et al. Dec 2005 A1
20050273431 Abel et al. Dec 2005 A1
20050278250 Zair Dec 2005 A1
20050283414 Fernandes et al. Dec 2005 A1
20050283415 Studnitzer et al. Dec 2005 A1
20050288998 Verma et al. Dec 2005 A1
20060004623 Jasti Jan 2006 A1
20060004626 Holmen et al. Jan 2006 A1
20060010057 Bradway et al. Jan 2006 A1
20060010391 Uemura et al. Jan 2006 A1
20060014129 Coleman et al. Jan 2006 A1
20060031158 Orman Feb 2006 A1
20060031177 Rule Feb 2006 A1
20060032909 Seegar Feb 2006 A1
20060036543 Blagg et al. Feb 2006 A1
20060036619 Fuerst et al. Feb 2006 A1
20060036748 Nusbaum et al. Feb 2006 A1
20060041464 Powers et al. Feb 2006 A1
20060041670 Musseleck et al. Feb 2006 A1
20060044599 Lipowitz et al. Mar 2006 A1
20060047605 Ahmad Mar 2006 A1
20060059062 Wood et al. Mar 2006 A1
20060059073 Walzak Mar 2006 A1
20060059083 Friesen et al. Mar 2006 A1
20060059110 Madhok et al. Mar 2006 A1
20060059362 Paden et al. Mar 2006 A1
20060064377 Ganesan et al. Mar 2006 A1
20060074986 Mallalieu et al. Apr 2006 A1
20060074991 Lussier et al. Apr 2006 A1
20060079211 Degraeve Apr 2006 A1
20060080210 Mourad et al. Apr 2006 A1
20060080216 Hausman et al. Apr 2006 A1
20060080230 Freiberg Apr 2006 A1
20060080235 Fukuda et al. Apr 2006 A1
20060080251 Fried et al. Apr 2006 A1
20060080263 Willis et al. Apr 2006 A1
20060080274 Mourad Apr 2006 A1
20060085334 Murphy Apr 2006 A1
20060085337 Conforti et al. Apr 2006 A1
20060085361 Hoerle et al. Apr 2006 A1
20060095289 Bunning May 2006 A1
20060095363 May May 2006 A1
20060100954 Schoen May 2006 A1
20060101508 Taylor May 2006 A1
20060106670 Cai et al. May 2006 A1
20060106685 Cheng et al. May 2006 A1
20060116931 Storey Jun 2006 A1
20060116932 Storey Jun 2006 A1
20060121880 Cowsar et al. Jun 2006 A1
20060122932 Birtwell et al. Jun 2006 A1
20060123461 Lunt et al. Jun 2006 A1
20060129419 Flaxer et al. Jun 2006 A1
20060129472 Harrington Jun 2006 A1
20060129481 Bhatt et al. Jun 2006 A1
20060129533 Purvis Jun 2006 A1
20060131390 Kim Jun 2006 A1
20060136180 Hansen et al. Jun 2006 A1
20060136524 Wohlers et al. Jun 2006 A1
20060136595 Satyavolu Jun 2006 A1
20060143095 Sandus et al. Jun 2006 A1
20060149674 Cook et al. Jul 2006 A1
20060155639 Lynch et al. Jul 2006 A1
20060155780 Sakairi et al. Jul 2006 A1
20060161435 Atef et al. Jul 2006 A1
20060161478 Turner et al. Jul 2006 A1
20060161554 Lucovsky et al. Jul 2006 A1
20060163347 Foss et al. Jul 2006 A1
20060169766 Hoch Aug 2006 A1
20060173772 Hayes et al. Aug 2006 A1
20060173775 Cullen, III et al. Aug 2006 A1
20060173776 Shalley et al. Aug 2006 A1
20060173778 Lipsky et al. Aug 2006 A1
20060173792 Glass Aug 2006 A1
20060178971 Owen et al. Aug 2006 A1
20060178983 Nice et al. Aug 2006 A1
20060179050 Giang et al. Aug 2006 A1
20060184410 Ramamurthy et al. Aug 2006 A1
20060184585 Grear et al. Aug 2006 A1
20060190334 Smith Aug 2006 A1
20060190394 Fraser et al. Aug 2006 A1
20060195351 Bayburtian Aug 2006 A1
20060195391 Stanelle Aug 2006 A1
20060195395 Ganesan et al. Aug 2006 A1
20060195396 Ganesan et al. Aug 2006 A1
20060195397 Ganesan et al. Aug 2006 A1
20060195398 Dheer et al. Aug 2006 A1
20060200583 Le Lann et al. Sep 2006 A1
20060202012 Grano et al. Sep 2006 A1
20060206425 Sharma Sep 2006 A1
20060212386 Willey et al. Sep 2006 A1
20060212407 Lyon Sep 2006 A1
20060212486 Kennis et al. Sep 2006 A1
20060213985 Walker et al. Sep 2006 A1
20060218407 Toms Sep 2006 A1
20060223043 Dancy-Edwards et al. Oct 2006 A1
20060224469 Kunz et al. Oct 2006 A1
20060224498 Chin Oct 2006 A1
20060229799 Nimmo et al. Oct 2006 A1
20060229943 Mathias et al. Oct 2006 A1
20060229961 Lyftogt et al. Oct 2006 A1
20060229996 Keithley et al. Oct 2006 A1
20060230343 Armandpour et al. Oct 2006 A1
20060233332 Toms Oct 2006 A1
20060235775 Pollin Oct 2006 A1
20060235935 Ng Oct 2006 A1
20060239512 Petrillo Oct 2006 A1
20060241923 Xu et al. Oct 2006 A1
20060245731 Lai Nov 2006 A1
20060248021 Jain et al. Nov 2006 A1
20060248048 Jain et al. Nov 2006 A1
20060248106 Milne et al. Nov 2006 A1
20060248525 Hopkins Nov 2006 A1
20060253358 Delgrosso et al. Nov 2006 A1
20060253463 Wu et al. Nov 2006 A1
20060259364 Strock et al. Nov 2006 A1
20060259427 Randell et al. Nov 2006 A1
20060262929 Vatanen et al. Nov 2006 A1
20060265323 Winter et al. Nov 2006 A1
20060267999 Cash et al. Nov 2006 A1
20060271456 Romain et al. Nov 2006 A1
20060271457 Romain et al. Nov 2006 A1
20060271633 Adler Nov 2006 A1
20060277089 Hubbard et al. Dec 2006 A1
20060277102 Agliozzo Dec 2006 A1
20060282359 Nobili et al. Dec 2006 A1
20060282373 Stone Dec 2006 A1
20060282374 Stone Dec 2006 A1
20060282429 Hernandez-Sherrington et al. Dec 2006 A1
20060282819 Graham et al. Dec 2006 A1
20060282886 Gaug Dec 2006 A1
20060287764 Kraft Dec 2006 A1
20060287765 Kraft Dec 2006 A1
20060287766 Kraft Dec 2006 A1
20060287767 Kraft Dec 2006 A1
20060288090 Kraft Dec 2006 A1
20060293979 Cash et al. Dec 2006 A1
20060293987 Shapiro Dec 2006 A1
20060294199 Bertholf Dec 2006 A1
20070005508 Chiang Jan 2007 A1
20070005984 Florencio et al. Jan 2007 A1
20070011093 Tree Jan 2007 A1
20070016500 Chatterji et al. Jan 2007 A1
20070016501 Chatterji et al. Jan 2007 A1
20070016518 Atkinson et al. Jan 2007 A1
20070022027 Gupta et al. Jan 2007 A1
20070022141 Singleton et al. Jan 2007 A1
20070027816 Writer Feb 2007 A1
20070032240 Finnegan et al. Feb 2007 A1
20070033393 Ganesan et al. Feb 2007 A1
20070038563 Ryzerski Feb 2007 A1
20070038568 Greene et al. Feb 2007 A1
20070039049 Kupferman et al. Feb 2007 A1
20070040015 Carlson et al. Feb 2007 A1
20070043577 Kasower Feb 2007 A1
20070043661 Kass et al. Feb 2007 A1
20070047714 Baniak et al. Mar 2007 A1
20070050777 Hutchinson et al. Mar 2007 A1
20070055621 Tischler et al. Mar 2007 A1
20070057947 Yokoyama Mar 2007 A1
20070061260 deGroeve et al. Mar 2007 A1
20070067235 Nathans et al. Mar 2007 A1
20070067239 Dheer et al. Mar 2007 A1
20070067297 Kublickis Mar 2007 A1
20070072190 Aggarwal Mar 2007 A1
20070073577 Krause Mar 2007 A1
20070073889 Morris Mar 2007 A1
20070078741 Haggerty et al. Apr 2007 A1
20070078908 Rohatgi et al. Apr 2007 A1
20070078985 Shao et al. Apr 2007 A1
20070078990 Hopkins Apr 2007 A1
20070080826 Chang Apr 2007 A1
20070083460 Bachenheimer Apr 2007 A1
20070083463 Kraft Apr 2007 A1
20070083465 Ciurea et al. Apr 2007 A1
20070088507 Haberlen et al. Apr 2007 A1
20070088821 Sankuratripati et al. Apr 2007 A1
20070093234 Willis et al. Apr 2007 A1
20070094230 Subramaniam et al. Apr 2007 A1
20070094241 Blackwell et al. Apr 2007 A1
20070100748 Dheer et al. May 2007 A1
20070100749 Bachu et al. May 2007 A1
20070100770 Grinberg et al. May 2007 A1
20070112667 Rucker May 2007 A1
20070112668 Celano et al. May 2007 A1
20070112670 DeFrancesco et al. May 2007 A1
20070121843 Atazky et al. May 2007 A1
20070124235 Chakraborty et al. May 2007 A1
20070124256 Crooks et al. May 2007 A1
20070130347 Rangan et al. Jun 2007 A1
20070131755 Chang Jun 2007 A1
20070136109 Yager et al. Jun 2007 A1
20070143123 Goldberg et al. Jun 2007 A1
20070149184 Viegers et al. Jun 2007 A1
20070150321 Zhao et al. Jun 2007 A1
20070152068 Kurita Jul 2007 A1
20070153085 Chang Jul 2007 A1
20070153710 Hopkins Jul 2007 A1
20070156554 Nikoley et al. Jul 2007 A1
20070156581 Imrey et al. Jul 2007 A1
20070156692 Rosewarne Jul 2007 A1
20070156718 Hossfeld et al. Jul 2007 A1
20070157107 Bishop Jul 2007 A1
20070160458 Yen Jul 2007 A1
20070162369 Hardison Jul 2007 A1
20070162458 Fasciano Jul 2007 A1
20070168267 Zimmerman et al. Jul 2007 A1
20070168279 D'Angelo Jul 2007 A1
20070174166 Jones Jul 2007 A1
20070174186 Hokland Jul 2007 A1
20070174448 Ahuja et al. Jul 2007 A1
20070174903 Greff Jul 2007 A1
20070179798 Inbarajan Aug 2007 A1
20070180380 Khavari et al. Aug 2007 A1
20070192167 Lei et al. Aug 2007 A1
20070198336 Thompson Aug 2007 A1
20070198432 Pitroda et al. Aug 2007 A1
20070203954 Vargas et al. Aug 2007 A1
20070204033 Bookbinder et al. Aug 2007 A1
20070204212 Chamberlain et al. Aug 2007 A1
20070204338 Aiello et al. Aug 2007 A1
20070205266 Carr et al. Sep 2007 A1
20070206917 Ono et al. Sep 2007 A1
20070208640 Banasiak et al. Sep 2007 A1
20070214000 Shahrabi et al. Sep 2007 A1
20070214078 Coppinger Sep 2007 A1
20070219881 Peterson et al. Sep 2007 A1
20070219966 Baylis et al. Sep 2007 A1
20070220003 Chern et al. Sep 2007 A1
20070220092 Heitzeberg et al. Sep 2007 A1
20070220275 Heitzeberg et al. Sep 2007 A1
20070220581 Chang Sep 2007 A1
20070226047 Ward Sep 2007 A1
20070226093 Chan et al. Sep 2007 A1
20070226114 Haggerty et al. Sep 2007 A1
20070226122 Burrell et al. Sep 2007 A1
20070228148 Rable Oct 2007 A1
20070233591 Newton Oct 2007 A1
20070236562 Chang Oct 2007 A1
20070239493 Sweetland et al. Oct 2007 A1
20070240206 Wu et al. Oct 2007 A1
20070244732 Chatterji et al. Oct 2007 A1
20070244807 Andringa et al. Oct 2007 A1
20070245245 Blue et al. Oct 2007 A1
20070250441 Paulsen et al. Oct 2007 A1
20070250459 Schwarz et al. Oct 2007 A1
20070260539 Delinsky Nov 2007 A1
20070262140 Long, Sr. Nov 2007 A1
20070265958 Petralia Nov 2007 A1
20070266439 Kraft Nov 2007 A1
20070273558 Smith Nov 2007 A1
20070276750 Stuart Nov 2007 A1
20070276780 Iriyama et al. Nov 2007 A1
20070282736 Conlin et al. Dec 2007 A1
20070282743 Lovelett Dec 2007 A1
20070287415 Yamada Dec 2007 A1
20070288338 Hoadley Dec 2007 A1
20070288355 Roland et al. Dec 2007 A1
20070288360 Seeklus Dec 2007 A1
20070288490 Longshaw Dec 2007 A1
20070294195 Curry et al. Dec 2007 A1
20070295804 Garvey et al. Dec 2007 A1
20070299770 Delinsky Dec 2007 A1
20070299771 Brody Dec 2007 A1
20070299772 Mastie et al. Dec 2007 A1
20080004957 Hildreth et al. Jan 2008 A1
20080005760 Kay et al. Jan 2008 A1
20080010191 Rackley, III et al. Jan 2008 A1
20080010203 Grant Jan 2008 A1
20080010204 Rackley, III et al. Jan 2008 A1
20080010206 Coleman Jan 2008 A1
20080010687 Gonen et al. Jan 2008 A1
20080015919 Busse et al. Jan 2008 A1
20080015954 Huber et al. Jan 2008 A1
20080015979 Bentley Jan 2008 A1
20080015982 Sokolic et al. Jan 2008 A1
20080015985 Abhari et al. Jan 2008 A1
20080021761 Rable Jan 2008 A1
20080021802 Pendleton Jan 2008 A1
20080021816 Lent et al. Jan 2008 A1
20080027841 Eder Jan 2008 A1
20080027859 Nathans et al. Jan 2008 A1
20080028435 Strickland et al. Jan 2008 A1
20080028446 Burgoyne Jan 2008 A1
20080033956 Saha et al. Feb 2008 A1
20080040176 Ehling Feb 2008 A1
20080040475 Bosworth et al. Feb 2008 A1
20080040610 Fergusson Feb 2008 A1
20080046363 Ali et al. Feb 2008 A1
20080047017 Renaud Feb 2008 A1
20080052170 Storey Feb 2008 A1
20080052182 Marshall Feb 2008 A1
20080052208 Neece et al. Feb 2008 A1
20080052224 Parker Feb 2008 A1
20080052244 Tsuei et al. Feb 2008 A1
20080059317 Chandran et al. Mar 2008 A1
20080059352 Chandran Mar 2008 A1
20080059364 Tidwell et al. Mar 2008 A1
20080059447 Winner et al. Mar 2008 A1
20080060054 Srivastava Mar 2008 A1
20080065530 Talbert et al. Mar 2008 A1
20080065774 Keeler Mar 2008 A1
20080066188 Kwak Mar 2008 A1
20080072316 Chang et al. Mar 2008 A1
20080077526 Arumugam Mar 2008 A1
20080079809 Chang Apr 2008 A1
20080082536 Schwabe et al. Apr 2008 A1
20080083021 Doane et al. Apr 2008 A1
20080086400 Ardelean et al. Apr 2008 A1
20080086431 Robinson et al. Apr 2008 A1
20080091519 Foss Apr 2008 A1
20080091530 Egnatios et al. Apr 2008 A1
20080091818 Bailey et al. Apr 2008 A1
20080097822 Schigel et al. Apr 2008 A1
20080103798 Domenikos et al. May 2008 A1
20080103799 Domenikos et al. May 2008 A1
20080103800 Domenikos et al. May 2008 A1
20080103836 Park et al. May 2008 A1
20080103972 Lanc May 2008 A1
20080109308 Storey May 2008 A1
20080109355 Dutta et al. May 2008 A1
20080109422 Dedhia May 2008 A1
20080109740 Prinsen et al. May 2008 A1
20080110973 Nathans et al. May 2008 A1
20080114657 Forzley May 2008 A1
20080114670 Friesen May 2008 A1
20080114855 Welingkar et al. May 2008 A1
20080115226 Welingkar et al. May 2008 A1
20080120155 Pliha May 2008 A1
20080120204 Conner et al. May 2008 A1
20080120416 Hopkins et al. May 2008 A1
20080120569 Mann et al. May 2008 A1
20080120716 Hall et al. May 2008 A1
20080122920 Chang May 2008 A1
20080126136 Nighan May 2008 A1
20080126233 Hogan May 2008 A1
20080133273 Marshall Jun 2008 A1
20080133278 Stanfield Jun 2008 A1
20080133322 Kalia et al. Jun 2008 A1
20080133657 Pennington Jun 2008 A1
20080140476 Anand et al. Jun 2008 A1
20080140507 Hamlisch et al. Jun 2008 A1
20080140734 Wagner Jun 2008 A1
20080140780 Hopkins et al. Jun 2008 A1
20080141346 Kay et al. Jun 2008 A1
20080147523 Mulry et al. Jun 2008 A1
20080148368 Zurko et al. Jun 2008 A1
20080148392 Akens Jun 2008 A1
20080154758 Schattmaier et al. Jun 2008 A1
20080162236 Sommerer Jul 2008 A1
20080162317 Banaugh et al. Jul 2008 A1
20080162350 Allen-Rouman et al. Jul 2008 A1
20080162383 Kraft Jul 2008 A1
20080172304 Berkowitz Jul 2008 A1
20080172324 Johnson Jul 2008 A1
20080175360 Schwarz et al. Jul 2008 A1
20080177630 Maghfourian et al. Jul 2008 A1
20080177655 Zalik Jul 2008 A1
20080183480 Carlson et al. Jul 2008 A1
20080183504 Highley Jul 2008 A1
20080183585 Vianello Jul 2008 A1
20080184351 Gephart Jul 2008 A1
20080195548 Chu et al. Aug 2008 A1
20080201257 Lewis et al. Aug 2008 A1
20080201401 Pugh et al. Aug 2008 A1
20080205774 Brinker et al. Aug 2008 A1
20080208548 Metzger et al. Aug 2008 A1
20080208726 Tsantes et al. Aug 2008 A1
20080208735 Balet et al. Aug 2008 A1
20080210752 March Sep 2008 A1
20080212845 Lund Sep 2008 A1
20080215640 Hartz et al. Sep 2008 A1
20080216156 Kosaka Sep 2008 A1
20080221972 Megdal et al. Sep 2008 A1
20080222015 Megdal et al. Sep 2008 A1
20080222027 Megdal et al. Sep 2008 A1
20080222706 Renaud et al. Sep 2008 A1
20080228556 Megdal et al. Sep 2008 A1
20080228775 Abhyanker et al. Sep 2008 A1
20080229415 Kapoor et al. Sep 2008 A1
20080235091 Holliday Sep 2008 A1
20080243650 Yoon Oct 2008 A1
20080249869 Angell et al. Oct 2008 A1
20080249925 Nazari et al. Oct 2008 A1
20080249936 Miller et al. Oct 2008 A1
20080255992 Lin Oct 2008 A1
20080263013 Hopkins Oct 2008 A1
20080263638 McMurtry et al. Oct 2008 A1
20080270038 Partovi et al. Oct 2008 A1
20080270209 Mauseth et al. Oct 2008 A1
20080270292 Ghosh et al. Oct 2008 A1
20080270294 Lent et al. Oct 2008 A1
20080270295 Lent et al. Oct 2008 A1
20080270304 Brown Oct 2008 A1
20080275812 Stone Nov 2008 A1
20080275816 Hazlehurst Nov 2008 A1
20080277465 Pletz et al. Nov 2008 A1
20080281737 Fajardo Nov 2008 A1
20080282324 Hoal Nov 2008 A1
20080284586 Chang Nov 2008 A1
20080288283 Baldwin, Jr. et al. Nov 2008 A1
20080288299 Schultz Nov 2008 A1
20080288400 Panthaki et al. Nov 2008 A1
20080291932 Mukherjee Nov 2008 A1
20080294501 Rennich et al. Nov 2008 A1
20080294996 Hunt et al. Nov 2008 A1
20080297602 Chang Dec 2008 A1
20080301016 Durvasula et al. Dec 2008 A1
20080306846 Ferguson Dec 2008 A1
20080307063 Caughey Dec 2008 A1
20080312969 Raines et al. Dec 2008 A1
20080316010 Chang Dec 2008 A1
20080319861 Hopkins Dec 2008 A1
20080319889 Hammad Dec 2008 A1
20080319896 Carlson et al. Dec 2008 A1
20090006230 Lyda et al. Jan 2009 A1
20090006582 Daswani et al. Jan 2009 A1
20090007231 Kaiser et al. Jan 2009 A1
20090012889 Finch Jan 2009 A1
20090018986 Alcorn et al. Jan 2009 A1
20090018996 Hunt et al. Jan 2009 A1
20090024462 Lin Jan 2009 A1
20090024484 Walker et al. Jan 2009 A1
20090024485 Haugen et al. Jan 2009 A1
20090030776 Walker et al. Jan 2009 A1
20090037279 Chockalingam et al. Feb 2009 A1
20090037323 Feinstein et al. Feb 2009 A1
20090037332 Cheung et al. Feb 2009 A1
20090043691 Kasower Feb 2009 A1
20090043696 Ornce et al. Feb 2009 A1
20090047992 Ortiz et al. Feb 2009 A1
20090048957 Celano Feb 2009 A1
20090048999 Gupta et al. Feb 2009 A1
20090055287 Chin Feb 2009 A1
20090055312 Chin Feb 2009 A1
20090055322 Bykov et al. Feb 2009 A1
20090055404 Heiden et al. Feb 2009 A1
20090058676 Orlosky Mar 2009 A1
20090063330 Cerise et al. Mar 2009 A1
20090064297 Selgas et al. Mar 2009 A1
20090069000 Kindberg et al. Mar 2009 A1
20090070148 Skocic Mar 2009 A1
20090076950 Chang et al. Mar 2009 A1
20090076966 Bishop et al. Mar 2009 A1
20090089190 Girulat Apr 2009 A1
20090089193 Palantin Apr 2009 A1
20090089205 Bayne Apr 2009 A1
20090089869 Varghese Apr 2009 A1
20090094156 Wright et al. Apr 2009 A1
20090094237 Churi et al. Apr 2009 A1
20090094675 Powers Apr 2009 A1
20090098854 Park et al. Apr 2009 A1
20090099941 Berkowitz Apr 2009 A1
20090099960 Robida et al. Apr 2009 A1
20090100047 Jones et al. Apr 2009 A1
20090106141 Becker Apr 2009 A1
20090106150 Pelegero et al. Apr 2009 A1
20090106846 Dupray et al. Apr 2009 A1
20090112650 Iwane Apr 2009 A1
20090112746 Fong Apr 2009 A1
20090119116 Steen May 2009 A1
20090119199 Salahi May 2009 A1
20090119299 Rhodes May 2009 A1
20090125369 Kloostra et al. May 2009 A1
20090125439 Zarikian et al. May 2009 A1
20090125972 Hinton et al. May 2009 A1
20090132312 Reinheimer et al. May 2009 A1
20090132347 Anderson et al. May 2009 A1
20090132813 Schibuk May 2009 A1
20090144160 Haggerty et al. Jun 2009 A1
20090146879 Chang Jun 2009 A1
20090147774 Caughey Jun 2009 A1
20090157517 Davis Jun 2009 A1
20090157564 Cross Jun 2009 A1
20090157693 Palahnuk Jun 2009 A1
20090158030 Rasti Jun 2009 A1
20090164380 Brown Jun 2009 A1
20090164582 Dasgupta et al. Jun 2009 A1
20090164929 Chen et al. Jun 2009 A1
20090171723 Jenkins Jul 2009 A1
20090171817 Cassis Jul 2009 A1
20090171838 Liu et al. Jul 2009 A1
20090172788 Veldula et al. Jul 2009 A1
20090172795 Ritari et al. Jul 2009 A1
20090177529 Hadi Jul 2009 A1
20090177562 Peace et al. Jul 2009 A1
20090177670 Grenier et al. Jul 2009 A1
20090183259 Rinek et al. Jul 2009 A1
20090187607 Yoo et al. Jul 2009 A1
20090195377 Chang Aug 2009 A1
20090198557 Wang et al. Aug 2009 A1
20090198572 Jurgens Aug 2009 A1
20090198602 Wang et al. Aug 2009 A1
20090199094 Jurgens et al. Aug 2009 A1
20090199294 Schneider Aug 2009 A1
20090204435 Gale Aug 2009 A1
20090204514 Bhogal et al. Aug 2009 A1
20090204519 Randell et al. Aug 2009 A1
20090204522 Meyer et al. Aug 2009 A1
20090204599 Morris et al. Aug 2009 A1
20090210241 Calloway Aug 2009 A1
20090210807 Xiao et al. Aug 2009 A1
20090210886 Bhojwani et al. Aug 2009 A1
20090216640 Masi Aug 2009 A1
20090217342 Nadler Aug 2009 A1
20090222364 McGlynn et al. Sep 2009 A1
20090222375 Choudhuri et al. Sep 2009 A1
20090222377 Choudhuri et al. Sep 2009 A1
20090222379 Choudhuri et al. Sep 2009 A1
20090222449 Hom et al. Sep 2009 A1
20090222527 Arconati et al. Sep 2009 A1
20090228295 Lowy Sep 2009 A1
20090228392 Pinson, III Sep 2009 A1
20090228918 Rolff et al. Sep 2009 A1
20090228966 Parfene et al. Sep 2009 A1
20090228990 Chen et al. Sep 2009 A1
20090233579 Castell et al. Sep 2009 A1
20090234665 Conkel Sep 2009 A1
20090234775 Whitney et al. Sep 2009 A1
20090234814 Boerries et al. Sep 2009 A1
20090234876 Schigel et al. Sep 2009 A1
20090240567 Kinkead et al. Sep 2009 A1
20090240610 Barsade Sep 2009 A1
20090240624 James et al. Sep 2009 A1
20090244600 Haycock et al. Oct 2009 A1
20090247122 Fitzgerald et al. Oct 2009 A1
20090248573 Haggerty et al. Oct 2009 A1
20090249451 Su et al. Oct 2009 A1
20090254375 Martinez et al. Oct 2009 A1
20090254476 Sharma et al. Oct 2009 A1
20090254656 Vignisson et al. Oct 2009 A1
20090254971 Herz et al. Oct 2009 A1
20090258334 Pyne Oct 2009 A1
20090260064 Mcdowell et al. Oct 2009 A1
20090271248 Sherman et al. Oct 2009 A1
20090271265 Lay et al. Oct 2009 A1
20090276368 Martin et al. Nov 2009 A1
20090280467 Ahart Nov 2009 A1
20090281816 Houga et al. Nov 2009 A1
20090281941 Worth Nov 2009 A1
20090281951 Shakkarwar Nov 2009 A1
20090282479 Smith et al. Nov 2009 A1
20090288012 Hertel et al. Nov 2009 A1
20090289110 Regen et al. Nov 2009 A1
20090292603 Wallach Nov 2009 A1
20090292642 Han Nov 2009 A1
20090299911 Abrahams et al. Dec 2009 A1
20090300066 Guo et al. Dec 2009 A1
20090300604 Barringer Dec 2009 A1
20090300641 Friedman et al. Dec 2009 A1
20090300668 Campagna et al. Dec 2009 A1
20090307778 Mardikar Dec 2009 A1
20090313562 Appleyard et al. Dec 2009 A1
20090319294 Phillips et al. Dec 2009 A1
20090319648 Dutta et al. Dec 2009 A1
20090327054 Yao et al. Dec 2009 A1
20090327108 Swierz, III et al. Dec 2009 A1
20090327120 Eze et al. Dec 2009 A1
20090327270 Teevan et al. Dec 2009 A1
20090327487 Olson et al. Dec 2009 A1
20100005024 Schmitz et al. Jan 2010 A1
20100009320 Wilkelis Jan 2010 A1
20100009332 Yaskin et al. Jan 2010 A1
20100010935 Shelton Jan 2010 A1
20100010993 Hussey, Jr. et al. Jan 2010 A1
20100011428 Atwood et al. Jan 2010 A1
20100023434 Bond Jan 2010 A1
20100023440 Fraser et al. Jan 2010 A1
20100023448 Eze Jan 2010 A1
20100023506 Sahni et al. Jan 2010 A1
20100025820 Suekawa Feb 2010 A1
20100030578 Siddique et al. Feb 2010 A1
20100030649 Ubelhor Feb 2010 A1
20100030675 Hanan et al. Feb 2010 A1
20100030677 Melik-Aslanian et al. Feb 2010 A1
20100036697 Kelnar Feb 2010 A1
20100036769 Winters et al. Feb 2010 A1
20100042537 Smith et al. Feb 2010 A1
20100042539 Dheer et al. Feb 2010 A1
20100042542 Rose et al. Feb 2010 A1
20100042732 Hopkins Feb 2010 A1
20100043055 Baumgart Feb 2010 A1
20100049642 Agisim et al. Feb 2010 A1
20100049643 Mitchell et al. Feb 2010 A1
20100049803 Ogilvie et al. Feb 2010 A1
20100063906 Nelsen et al. Mar 2010 A1
20100063942 Arnott et al. Mar 2010 A1
20100063993 Higgins et al. Mar 2010 A1
20100076833 Nelsen Mar 2010 A1
20100076880 Williams et al. Mar 2010 A1
20100076966 Strutton et al. Mar 2010 A1
20100077483 Stolfo et al. Mar 2010 A1
20100082445 Hodge et al. Apr 2010 A1
20100082476 Bowman Apr 2010 A1
20100083371 Bennetts et al. Apr 2010 A1
20100088188 Kumar et al. Apr 2010 A1
20100094768 Miltonberger Apr 2010 A1
20100094774 Jackowitz et al. Apr 2010 A1
20100094910 Bayliss Apr 2010 A1
20100100480 Altman et al. Apr 2010 A1
20100100945 Ozzie et al. Apr 2010 A1
20100114724 Ghosh et al. May 2010 A1
20100114744 Gonen May 2010 A1
20100114766 Gustin et al. May 2010 A1
20100114768 Duke et al. May 2010 A1
20100114776 Weller et al. May 2010 A1
20100122316 Lyon May 2010 A1
20100122324 Welingkar et al. May 2010 A1
20100122333 Noe et al. May 2010 A1
20100125521 Hanan et al. May 2010 A1
20100130172 Vendrow et al. May 2010 A1
20100131396 Roach May 2010 A1
20100136956 Drachev et al. Jun 2010 A1
20100138314 Li et al. Jun 2010 A1
20100145836 Baker et al. Jun 2010 A1
20100153227 Medvinsky et al. Jun 2010 A1
20100153278 Farsedakis Jun 2010 A1
20100153290 Duggan Jun 2010 A1
20100161466 Gilder Jun 2010 A1
20100161486 Liu et al. Jun 2010 A1
20100161816 Kraft et al. Jun 2010 A1
20100169159 Rose et al. Jul 2010 A1
20100174638 Debie et al. Jul 2010 A1
20100174813 Hildreth et al. Jul 2010 A1
20100179906 Hawkes Jul 2010 A1
20100185546 Pollard Jul 2010 A1
20100188684 Kumara Jul 2010 A1
20100198636 Choudhary et al. Aug 2010 A1
20100205076 Parson et al. Aug 2010 A1
20100205662 Ibrahim et al. Aug 2010 A1
20100211445 Bodington Aug 2010 A1
20100211636 Starkenburg et al. Aug 2010 A1
20100214090 Sartini et al. Aug 2010 A1
20100215270 Manohar et al. Aug 2010 A1
20100217706 Griffin et al. Aug 2010 A1
20100217837 Ansari et al. Aug 2010 A1
20100223160 Brown Sep 2010 A1
20100223168 Haggerty et al. Sep 2010 A1
20100223184 Perlman Sep 2010 A1
20100223192 Levine et al. Sep 2010 A1
20100223211 Johnson et al. Sep 2010 A1
20100228658 Ketelsen et al. Sep 2010 A1
20100229245 Singhal Sep 2010 A1
20100241535 Nightengale et al. Sep 2010 A1
20100248681 Phills Sep 2010 A1
20100250338 Banerjee et al. Sep 2010 A1
20100250376 Nandiraju Sep 2010 A1
20100250394 Lin Sep 2010 A1
20100250410 Song et al. Sep 2010 A1
20100250411 Ogrodski Sep 2010 A1
20100250416 Hazlehurst Sep 2010 A1
20100250509 Andersen Sep 2010 A1
20100253686 Alsbury et al. Oct 2010 A1
20100257102 Perlman Oct 2010 A1
20100257234 Caughey Oct 2010 A1
20100257577 Grandison et al. Oct 2010 A1
20100258623 Beemer et al. Oct 2010 A1
20100258625 Stanfield et al. Oct 2010 A1
20100259373 Chang Oct 2010 A1
20100262339 Chang Oct 2010 A1
20100262535 Lent et al. Oct 2010 A1
20100262606 Bedolla et al. Oct 2010 A1
20100262932 Pan Oct 2010 A1
20100268557 Faith et al. Oct 2010 A1
20100268660 Ekdahl Oct 2010 A1
20100268768 Kurtenbach et al. Oct 2010 A1
20100274815 Vanasco Oct 2010 A1
20100280914 Carlson Nov 2010 A1
20100280944 Low et al. Nov 2010 A1
20100281020 Drubner Nov 2010 A1
20100293090 Domenikos et al. Nov 2010 A1
20100299186 Cameo et al. Nov 2010 A1
20100299251 Thomas Nov 2010 A1
20100299252 Thomas Nov 2010 A1
20100299260 Thomas Nov 2010 A1
20100306103 Hankins et al. Dec 2010 A1
20100306834 Grandison et al. Dec 2010 A1
20100312691 Johnson, Jr. Dec 2010 A1
20100318460 Stewart et al. Dec 2010 A1
20100323446 Barnett et al. Dec 2010 A1
20100324986 Thomas Dec 2010 A1
20100324999 Conway et al. Dec 2010 A1
20100325036 Thomas Dec 2010 A1
20100325045 Johnson Dec 2010 A1
20100325048 Carlson et al. Dec 2010 A1
20100332393 Weller et al. Dec 2010 A1
20110004498 Readshaw Jan 2011 A1
20110004514 Thomas Jan 2011 A1
20110004546 Thomas Jan 2011 A1
20110010283 Williams Jan 2011 A1
20110022515 Tallitsch et al. Jan 2011 A1
20110022516 Gao et al. Jan 2011 A1
20110023115 Wright Jan 2011 A1
20110029388 Kendall et al. Feb 2011 A1
20110029427 Haggerty et al. Feb 2011 A1
20110029566 Grandison et al. Feb 2011 A1
20110029660 Hopkins Feb 2011 A1
20110035305 Imrey et al. Feb 2011 A1
20110035315 Langley Feb 2011 A1
20110035452 Gittleman Feb 2011 A1
20110040629 Chiu et al. Feb 2011 A1
20110047086 Heisterkamp et al. Feb 2011 A1
20110047606 Blomquist Feb 2011 A1
20110060654 Elliott et al. Mar 2011 A1
20110060673 Delinsky et al. Mar 2011 A1
20110066495 Ayloo et al. Mar 2011 A1
20110066618 Sigurbjornsson et al. Mar 2011 A1
20110066695 Hopkins Mar 2011 A1
20110071950 Ivanovic Mar 2011 A1
20110078073 Annappindi et al. Mar 2011 A1
20110082733 Goldman et al. Apr 2011 A1
20110082736 Goldman et al. Apr 2011 A1
20110082788 Itwaru Apr 2011 A1
20110083181 Nazarov Apr 2011 A1
20110093387 Fuerstenberg et al. Apr 2011 A1
20110107265 Buchanan et al. May 2011 A1
20110107400 Shankaranarayanan et al. May 2011 A1
20110112851 Poley May 2011 A1
20110112899 Strutton et al. May 2011 A1
20110112919 Gray May 2011 A1
20110113084 Ramnani May 2011 A1
20110113086 Long et al. May 2011 A1
20110119169 Passero et al. May 2011 A1
20110119182 Smolkin May 2011 A1
20110119765 Hering et al. May 2011 A1
20110125632 Neel May 2011 A1
20110125924 McAleer May 2011 A1
20110126275 Anderson et al. May 2011 A1
20110131123 Griffin et al. Jun 2011 A1
20110136468 McNamara et al. Jun 2011 A1
20110137760 Rudie et al. Jun 2011 A1
20110137765 Nonaka Jun 2011 A1
20110137924 Hunt et al. Jun 2011 A1
20110142213 Baniak et al. Jun 2011 A1
20110143711 Hirson et al. Jun 2011 A1
20110145049 Hertel et al. Jun 2011 A1
20110145064 Anderson et al. Jun 2011 A1
20110145899 Cao et al. Jun 2011 A1
20110148625 Velusamy Jun 2011 A1
20110153368 Pierre et al. Jun 2011 A1
20110161155 Wilhem et al. Jun 2011 A1
20110161218 Swift Jun 2011 A1
20110166889 Bain Jul 2011 A1
20110166988 Coulter Jul 2011 A1
20110167011 Paltenghe et al. Jul 2011 A1
20110173116 Yan et al. Jul 2011 A1
20110178841 Rane et al. Jul 2011 A1
20110178860 Imrey et al. Jul 2011 A1
20110178899 Huszar Jul 2011 A1
20110179139 Starkenburg et al. Jul 2011 A1
20110184780 Alderson et al. Jul 2011 A1
20110184863 Coleman et al. Jul 2011 A1
20110191196 Orr et al. Aug 2011 A1
20110191209 Gould et al. Aug 2011 A1
20110191241 Blain et al. Aug 2011 A1
20110193704 Harper et al. Aug 2011 A1
20110196791 Dominguez Aug 2011 A1
20110196795 Pointer Aug 2011 A1
20110208601 Ferguson et al. Aug 2011 A1
20110208659 Easterly et al. Aug 2011 A1
20110211445 Chen Sep 2011 A1
20110213670 Strutton et al. Sep 2011 A1
20110214187 Wittenstein et al. Sep 2011 A1
20110218863 Roh et al. Sep 2011 A1
20110243406 Chandler Oct 2011 A1
20110246244 O'Rourke Oct 2011 A1
20110246361 Geering Oct 2011 A1
20110251953 Trende et al. Oct 2011 A1
20110252071 Cidon Oct 2011 A1
20110258001 Green et al. Oct 2011 A1
20110264531 Bhatia et al. Oct 2011 A1
20110264566 Brown Oct 2011 A1
20110264581 Clyne Oct 2011 A1
20110264582 Kim et al. Oct 2011 A1
20110270618 Banerjee et al. Nov 2011 A1
20110270749 Bennett et al. Nov 2011 A1
20110270754 Kelly et al. Nov 2011 A1
20110271329 Hulten et al. Nov 2011 A1
20110276382 Ramchandani et al. Nov 2011 A1
20110276396 Rathod Nov 2011 A1
20110276604 Hom et al. Nov 2011 A1
20110282711 Freishtat et al. Nov 2011 A1
20110282779 Megdal et al. Nov 2011 A1
20110282783 Ferguson et al. Nov 2011 A1
20110282943 Anderson et al. Nov 2011 A1
20110288973 Pazdziora et al. Nov 2011 A1
20110289094 Fisher Nov 2011 A1
20110289151 Hopkins Nov 2011 A1
20110289209 Hopkins Nov 2011 A1
20110295662 Harris Dec 2011 A1
20110295733 Megdal et al. Dec 2011 A1
20110295750 Rammal Dec 2011 A1
20110296003 McCann et al. Dec 2011 A1
20110302055 Drake Dec 2011 A1
20110302067 Washington Dec 2011 A1
20110302083 Bhinder Dec 2011 A1
20110302122 Klein et al. Dec 2011 A1
20110302653 Frantz et al. Dec 2011 A1
20110304646 Kato Dec 2011 A1
20110307397 Benmbarek Dec 2011 A1
20110307434 Rostampour et al. Dec 2011 A1
20110307474 Hom et al. Dec 2011 A1
20110307494 Snow Dec 2011 A1
20110307938 Reeves, Jr. et al. Dec 2011 A1
20110307957 Barcelo et al. Dec 2011 A1
20110313915 Tang Dec 2011 A1
20110313921 Dheer et al. Dec 2011 A1
20110314100 Hopkins Dec 2011 A1
20110314383 Abdo et al. Dec 2011 A1
20110320342 Kremen Dec 2011 A1
20110320582 Lewis Dec 2011 A1
20110321137 Iida et al. Dec 2011 A1
20120005070 McFall et al. Jan 2012 A1
20120005221 Ickman et al. Jan 2012 A1
20120005542 Petersen et al. Jan 2012 A1
20120010927 Attenberg et al. Jan 2012 A1
20120011027 Okuyama Jan 2012 A1
20120011063 Killian et al. Jan 2012 A1
20120011158 Avner et al. Jan 2012 A1
20120011432 Strutton Jan 2012 A1
20120015717 Mosites et al. Jan 2012 A1
20120016800 Stewart et al. Jan 2012 A1
20120016948 Sinha Jan 2012 A1
20120022990 Kasower Jan 2012 A1
20120030216 Churi et al. Feb 2012 A1
20120030771 Pierson et al. Feb 2012 A1
20120036053 Miller Feb 2012 A1
20120036065 Orttung et al. Feb 2012 A1
20120036127 Work et al. Feb 2012 A1
20120036565 Gamez et al. Feb 2012 A1
20120041879 Kim et al. Feb 2012 A1
20120042237 Armandpour et al. Feb 2012 A1
20120046974 Eshleman et al. Feb 2012 A1
20120047174 Avner et al. Feb 2012 A1
20120047219 Feng et al. Feb 2012 A1
20120054088 Edrington et al. Mar 2012 A1
20120054224 Eskin Mar 2012 A1
20120054592 Jaffe et al. Mar 2012 A1
20120060105 Brown et al. Mar 2012 A1
20120066044 Honnef et al. Mar 2012 A1
20120066046 Satyavolu et al. Mar 2012 A1
20120066050 Satyavolu et al. Mar 2012 A1
20120066106 Papadimitriou Mar 2012 A1
20120066119 Carion Mar 2012 A1
20120072338 Sorbe Mar 2012 A1
20120072382 Pearson et al. Mar 2012 A1
20120078764 Ross et al. Mar 2012 A1
20120078766 Rose et al. Mar 2012 A1
20120078781 Ross et al. Mar 2012 A1
20120079598 Brock et al. Mar 2012 A1
20120084162 Smith et al. Apr 2012 A1
20120084210 Farahmand Apr 2012 A1
20120084866 Stolfo Apr 2012 A1
20120089438 Tavares et al. Apr 2012 A1
20120089521 Abrevaya et al. Apr 2012 A1
20120101938 Kasower Apr 2012 A1
20120101939 Kasower Apr 2012 A1
20120109752 Strutton et al. May 2012 A1
20120110467 Blake et al. May 2012 A1
20120110677 Abendroth et al. May 2012 A1
20120116913 Goolkasian May 2012 A1
20120116951 Chung et al. May 2012 A1
20120116963 Klein et al. May 2012 A1
20120116969 Kumar et al. May 2012 A1
20120123931 Megdal et al. May 2012 A1
20120124033 Gabriel et al. May 2012 A1
20120124498 Santoro et al. May 2012 A1
20120130785 Postrel May 2012 A1
20120131009 Nath et al. May 2012 A1
20120131656 Slaton et al. May 2012 A1
20120135705 Thaker May 2012 A1
20120136699 Martin et al. May 2012 A1
20120136763 Megdal et al. May 2012 A1
20120136774 Imrey et al. May 2012 A1
20120136780 El-Awady et al. May 2012 A1
20120143767 Abadir Jun 2012 A1
20120143772 Abadir Jun 2012 A1
20120144461 Rathbun Jun 2012 A1
20120150736 Dickerson et al. Jun 2012 A1
20120151045 Anakata et al. Jun 2012 A1
20120151046 Weiss et al. Jun 2012 A1
20120158562 Kassir Jun 2012 A1
20120158654 Behren et al. Jun 2012 A1
20120166264 Shum et al. Jun 2012 A1
20120173339 Flynt et al. Jul 2012 A1
20120173396 Melby et al. Jul 2012 A1
20120173417 Lohman et al. Jul 2012 A1
20120179605 Blain et al. Jul 2012 A1
20120185515 Ferrel et al. Jul 2012 A1
20120191595 Evans Jul 2012 A1
20120191596 Kremen et al. Jul 2012 A1
20120191602 Wright et al. Jul 2012 A1
20120191693 Alexander Jul 2012 A1
20120195412 Smith Aug 2012 A1
20120197788 Sanghvi et al. Aug 2012 A1
20120198556 Patel et al. Aug 2012 A1
20120203680 Wehunt et al. Aug 2012 A1
20120203693 Morgan et al. Aug 2012 A1
20120203696 Morgan et al. Aug 2012 A1
20120203733 Zhang Aug 2012 A1
20120208495 Lawson et al. Aug 2012 A1
20120209766 Kitchen et al. Aug 2012 A1
20120215584 Narsude et al. Aug 2012 A1
20120215682 Lent et al. Aug 2012 A1
20120215690 Grinberg et al. Aug 2012 A1
20120215719 Verlander Aug 2012 A1
20120216125 Pierce Aug 2012 A1
20120221467 Hamzeh Aug 2012 A1
20120233066 Vallabhaneni Sep 2012 A1
20120235897 Hirota Sep 2012 A1
20120239417 Pourfallah et al. Sep 2012 A1
20120239497 Nuzzi Sep 2012 A1
20120239553 Gonen et al. Sep 2012 A1
20120239560 Pourfallah et al. Sep 2012 A1
20120239583 Dobrowolski Sep 2012 A1
20120240223 Tu Sep 2012 A1
20120242473 Choi Sep 2012 A1
20120246048 Cohen et al. Sep 2012 A1
20120246060 Conyack, Jr. et al. Sep 2012 A1
20120246092 Stibel et al. Sep 2012 A1
20120246093 Stibel et al. Sep 2012 A1
20120253852 Pourfallah et al. Oct 2012 A1
20120254018 Davies et al. Oct 2012 A1
20120259763 Pessin Oct 2012 A1
20120262386 Kwon et al. Oct 2012 A1
20120262472 Garr et al. Oct 2012 A1
20120265661 Megdal et al. Oct 2012 A1
20120271660 Harris et al. Oct 2012 A1
20120271712 Katzin et al. Oct 2012 A1
20120278217 Sui et al. Nov 2012 A1
20120278226 Kolo Nov 2012 A1
20120278249 Duggal et al. Nov 2012 A1
20120278767 Stibel et al. Nov 2012 A1
20120284280 Kumar Nov 2012 A1
20120290451 Jones et al. Nov 2012 A1
20120290486 Dobrowolski et al. Nov 2012 A1
20120290660 Rao et al. Nov 2012 A1
20120290740 Tewari et al. Nov 2012 A1
20120295583 Kim et al. Nov 2012 A1
20120296804 Stibel et al. Nov 2012 A1
20120297484 Srivastava Nov 2012 A1
20120310825 Freishtat et al. Dec 2012 A1
20120311433 Pasupulati et al. Dec 2012 A1
20120317005 Hutson et al. Dec 2012 A1
20120317013 Luk et al. Dec 2012 A1
20120317014 Cerise et al. Dec 2012 A1
20120321202 Fertik et al. Dec 2012 A1
20120323695 Stibel Dec 2012 A1
20120323775 Weinstein et al. Dec 2012 A1
20120324388 Rao et al. Dec 2012 A1
20120330689 McLaughlin et al. Dec 2012 A1
20130006782 Schwarzkopf et al. Jan 2013 A1
20130006825 Robida et al. Jan 2013 A1
20130006843 Tralvex Jan 2013 A1
20130006844 Kremen Jan 2013 A1
20130007012 Selkowe Fertik et al. Jan 2013 A1
20130007014 Fertik et al. Jan 2013 A1
20130007891 Mogaki Jan 2013 A1
20130013501 Perlman Jan 2013 A1
20130013513 Ledbetter et al. Jan 2013 A1
20130013533 Agarwal et al. Jan 2013 A1
20130013553 Stibel et al. Jan 2013 A1
20130018785 Dolphin et al. Jan 2013 A1
20130018795 Kolhatkar et al. Jan 2013 A1
20130018798 Scipioni Jan 2013 A1
20130018811 Britti et al. Jan 2013 A1
20130018838 Parnaby et al. Jan 2013 A1
20130018877 Gabriel et al. Jan 2013 A1
20130018892 Castellanos et al. Jan 2013 A1
20130018957 Parnaby et al. Jan 2013 A1
20130024367 Bellefeuille et al. Jan 2013 A1
20130024520 Siminoff Jan 2013 A1
20130024813 Schnorr et al. Jan 2013 A1
20130030826 Blom Jan 2013 A1
20130030994 Calman et al. Jan 2013 A1
20130030996 MacKouse Jan 2013 A1
20130031105 Stibel et al. Jan 2013 A1
20130031109 Roulson et al. Jan 2013 A1
20130031624 Britti et al. Jan 2013 A1
20130036000 Giordano et al. Feb 2013 A1
20130036046 Rom et al. Feb 2013 A1
20130036466 Penta et al. Feb 2013 A1
20130040619 Grube et al. Feb 2013 A1
20130041798 Unger Feb 2013 A1
20130041810 Murrell et al. Feb 2013 A1
20130041949 Biesecker et al. Feb 2013 A1
20130043305 Zhou et al. Feb 2013 A1
20130054345 Ross et al. Feb 2013 A1
20130054357 Mager et al. Feb 2013 A1
20130054393 Francisco et al. Feb 2013 A1
20130054452 Au et al. Feb 2013 A1
20130060694 Oskolkov et al. Mar 2013 A1
20130061335 Schwabe Mar 2013 A1
20130066716 Chen et al. Mar 2013 A1
20130066775 Milam Mar 2013 A1
20130066884 Kast et al. Mar 2013 A1
20130066922 Jang et al. Mar 2013 A1
20130067582 Donovan et al. Mar 2013 A1
20130073366 Heath Mar 2013 A1
20130073445 Meszaros Mar 2013 A1
20130073457 Sander et al. Mar 2013 A1
20130080322 Adolphe Mar 2013 A1
20130080467 Carson et al. Mar 2013 A1
20130085804 Leff et al. Apr 2013 A1
20130085894 Chan et al. Apr 2013 A1
20130085936 Law et al. Apr 2013 A1
20130085939 Colak et al. Apr 2013 A1
20130085953 Bhola et al. Apr 2013 A1
20130086075 Scott et al. Apr 2013 A1
20130090982 Ross Apr 2013 A1
20130095810 Moreton et al. Apr 2013 A1
20130103464 Kuznetsov Apr 2013 A1
20130103571 Chung et al. Apr 2013 A1
20130103580 Ventura Apr 2013 A1
20130104216 Dennis et al. Apr 2013 A1
20130110557 Kasower May 2013 A1
20130110565 Means et al. May 2013 A1
20130110585 Nesbitt et al. May 2013 A1
20130110668 Hart et al. May 2013 A1
20130111436 Phan et al. May 2013 A1
20130117072 Nish May 2013 A1
20130117087 Coppinger May 2013 A1
20130117177 MacMillan et al. May 2013 A1
20130124406 Poplawski et al. May 2013 A1
20130124855 Varadarajan et al. May 2013 A1
20130125010 Strandell May 2013 A1
20130130778 Anderson et al. May 2013 A1
20130132151 Stibel et al. May 2013 A1
20130132181 Fisher May 2013 A1
20130132219 Liberty May 2013 A1
20130132235 Gandhi May 2013 A1
20130132245 Hsieh et al. May 2013 A1
20130138494 Levine May 2013 A1
20130159411 Bowen Jun 2013 A1
20130173447 Rothschild Jul 2013 A1
20130173449 Ng et al. Jul 2013 A1
20130173451 Kornegay et al. Jul 2013 A1
20130173463 Stewart et al. Jul 2013 A1
20130173465 Talimaa et al. Jul 2013 A1
20130173468 Ross Jul 2013 A1
20130173481 Hirtenstein et al. Jul 2013 A1
20130179312 Al-Hilali Jul 2013 A1
20130179332 Allen et al. Jul 2013 A1
20130179337 Ochynski Jul 2013 A1
20130179338 Evans Jul 2013 A1
20130179348 Crofts et al. Jul 2013 A1
20130185205 Boss et al. Jul 2013 A1
20130185210 Dodson et al. Jul 2013 A1
20130185293 Boback Jul 2013 A1
20130187923 Yoshimoto et al. Jul 2013 A1
20130191231 Gazdzinski Jul 2013 A1
20130191261 Chandler et al. Jul 2013 A1
20130191270 Carragher Jul 2013 A1
20130191272 Cochran et al. Jul 2013 A1
20130191278 O'Leary et al. Jul 2013 A1
20130198066 Wall et al. Aug 2013 A1
20130198514 Grinberg et al. Aug 2013 A1
20130204745 Martin Aug 2013 A1
20130204753 Wallace Aug 2013 A1
20130204762 Harris et al. Aug 2013 A1
20130205135 Lutz Aug 2013 A1
20130211986 Debie et al. Aug 2013 A1
20130212016 Davis et al. Aug 2013 A1
20130212187 Mortazavi et al. Aug 2013 A1
20130226784 He et al. Aug 2013 A1
20130232018 Keithley et al. Sep 2013 A1
20130238387 Stibel et al. Sep 2013 A1
20130246254 Crooks Sep 2013 A1
20130254049 Todd Sep 2013 A1
20130262226 LaChapelle et al. Oct 2013 A1
20130262291 Ricci Oct 2013 A1
20130267171 Sarkar et al. Oct 2013 A1
20130268378 Yovin Oct 2013 A1
20130268434 Mohsenzadeh Oct 2013 A1
20130275294 Liu et al. Oct 2013 A1
20130278515 Kikuchi Oct 2013 A1
20130279676 Baniak et al. Oct 2013 A1
20130282819 Mehta et al. Oct 2013 A1
20130290164 Salm Oct 2013 A1
20130293363 Plymouth Nov 2013 A1
20130297485 Whitney Nov 2013 A1
20130297499 Mukherjee Nov 2013 A1
20130298238 Shah et al. Nov 2013 A1
20130304596 Munif Nov 2013 A1
20130317954 Psota et al. Nov 2013 A1
20130332338 Yan et al. Dec 2013 A1
20130332340 Papadimitriou Dec 2013 A1
20130332341 Papadimitriou Dec 2013 A1
20130332342 Kasower Dec 2013 A1
20130332352 Imrey et al. Dec 2013 A1
20130339141 Stibel et al. Dec 2013 A1
20130339249 Weller et al. Dec 2013 A1
20130347059 Fong et al. Dec 2013 A1
20140012733 Vidal Jan 2014 A1
20140012734 Megdal et al. Jan 2014 A1
20140012737 Evans Jan 2014 A1
20140015860 Kim et al. Jan 2014 A1
20140019333 Morris et al. Jan 2014 A1
20140019348 Daley Jan 2014 A1
20140025562 Rothrock et al. Jan 2014 A1
20140032300 Zhang et al. Jan 2014 A1
20140032723 Nema Jan 2014 A1
20140046872 Arnott et al. Feb 2014 A1
20140052732 Softky Feb 2014 A1
20140061302 Hammad Mar 2014 A1
20140074689 Lund et al. Mar 2014 A1
20140081835 Choudhuri et al. Mar 2014 A1
20140089166 Padawer Mar 2014 A1
20140089167 Kasower Mar 2014 A1
20140089191 Brown Mar 2014 A1
20140095640 Stibel et al. Apr 2014 A1
20140096249 Dupont et al. Apr 2014 A1
20140098142 Lee et al. Apr 2014 A1
20140098229 Lu et al. Apr 2014 A1
20140110477 Hammad Apr 2014 A1
20140114735 Isaacson et al. Apr 2014 A1
20140122354 Stibel et al. May 2014 A1
20140129942 Rathod May 2014 A1
20140156500 Lassen et al. Jun 2014 A1
20140156501 Howe Jun 2014 A1
20140156503 Lassen et al. Jun 2014 A1
20140164112 Kala Jun 2014 A1
20140164398 Smith et al. Jun 2014 A1
20140164519 Shah Jun 2014 A1
20140172681 Lamp et al. Jun 2014 A1
20140173732 Stibel Jun 2014 A1
20140180919 Brown Jun 2014 A1
20140181285 Stevens et al. Jun 2014 A1
20140237377 Meissner Aug 2014 A1
20140258083 Achanta et al. Sep 2014 A1
20140258084 Padawer et al. Sep 2014 A1
20140258089 Pearson et al. Sep 2014 A1
20140279329 Dancel Sep 2014 A1
20140279382 Drakeley et al. Sep 2014 A1
20140279391 Gallo et al. Sep 2014 A1
20140282977 Madhu et al. Sep 2014 A1
20140298485 Gardner Oct 2014 A1
20140310151 Shishkov et al. Oct 2014 A1
20140317023 Kim Oct 2014 A1
20140372367 McLean et al. Dec 2014 A1
20140379554 Grossman et al. Dec 2014 A1
20150026014 Kasower Jan 2015 A1
20150026060 Krietzman et al. Jan 2015 A1
20150073929 Psota et al. Mar 2015 A1
20150112874 Serio et al. Apr 2015 A1
20150127490 Puertas May 2015 A1
20150134506 King et al. May 2015 A1
20150135305 Cabrera et al. May 2015 A1
20150142639 Padawer May 2015 A1
20150161228 Davies Jun 2015 A1
20150161738 Stempora Jun 2015 A1
20150178829 Weiss Jun 2015 A1
20150186529 Rope Jul 2015 A1
20150199757 Lindholme et al. Jul 2015 A1
20150200948 Cairns et al. Jul 2015 A1
20150228016 Chandler Aug 2015 A1
20150235562 Klein Aug 2015 A1
20150262249 Wical Sep 2015 A1
20150278277 Agrawal et al. Oct 2015 A1
20150302521 Bartmann Oct 2015 A1
20150310543 DeBie Oct 2015 A1
20150324920 Wilson et al. Nov 2015 A1
20160070758 Thomson et al. Mar 2016 A1
20160125412 Cannon May 2016 A1
20160224996 Hunt et al. Aug 2016 A1
20160232546 Ranft et al. Aug 2016 A1
20160232605 Zhang Aug 2016 A1
20170070500 Hockey et al. Mar 2017 A1
20170131964 Baek et al. May 2017 A1
20170132700 Kazerani et al. May 2017 A1
20170161486 Jeon et al. Jun 2017 A1
20170200223 Kasower Jul 2017 A1
20170221121 Davis et al. Aug 2017 A1
20170228820 Rohn Aug 2017 A1
20170262758 Boyapalle et al. Sep 2017 A1
20170262821 Imrey et al. Sep 2017 A1
20170323063 Krause et al. Nov 2017 A1
20170323358 Psota et al. Nov 2017 A1
20170352014 Smith et al. Dec 2017 A1
20170352186 Dauphiny et al. Dec 2017 A1
20170359346 Parab et al. Dec 2017 A1
20180040063 Buechler et al. Feb 2018 A1
20180082371 Chandler Mar 2018 A1
20180082372 Diana Mar 2018 A1
20180089935 Froy, Jr. Mar 2018 A1
20180097828 Coskun Apr 2018 A1
20180101994 Da Veiga et al. Apr 2018 A1
20180129325 Shreve May 2018 A1
20180164877 Miller et al. Jun 2018 A1
20180176267 Malatesha et al. Jun 2018 A1
20180204279 Painter et al. Jul 2018 A1
20180218069 Rege et al. Aug 2018 A1
20180218448 Thomas et al. Aug 2018 A1
20180225756 Wasser et al. Aug 2018 A1
20180285886 Yan et al. Oct 2018 A1
20180285981 Andringa et al. Oct 2018 A1
20180343265 McMillan et al. Nov 2018 A1
20180349992 Dean et al. Dec 2018 A1
20180365445 Burger et al. Dec 2018 A1
20190019185 Chitalia et al. Jan 2019 A1
20190034625 Ford et al. Jan 2019 A1
20190051305 Liddell et al. Feb 2019 A1
20190066203 Smith et al. Feb 2019 A1
20190102438 Murray et al. Apr 2019 A1
20190102832 Robida et al. Apr 2019 A1
20190147366 Sankaran et al. May 2019 A1
20190156227 Duke et al. May 2019 A1
20190188717 Putnam et al. Jun 2019 A1
20190188781 O'Brien et al. Jun 2019 A1
20190197528 Dean et al. Jun 2019 A1
20190197618 Taylor et al. Jun 2019 A1
20190258818 Yu et al. Aug 2019 A1
20190260843 Dean et al. Aug 2019 A1
20190295165 Kapczynski et al. Sep 2019 A1
20190296804 Eitan et al. Sep 2019 A1
20190318122 Hockey et al. Oct 2019 A1
20190332400 Spoor et al. Oct 2019 A1
20190355362 Brown et al. Nov 2019 A1
20200013053 Amin Jan 2020 A1
20200034927 Smith et al. Jan 2020 A1
20200051115 Lawrence et al. Feb 2020 A1
20200051527 Ngo Feb 2020 A1
20200074100 Raneri et al. Mar 2020 A1
20200074541 Finneran et al. Mar 2020 A1
20200074542 Manna et al. Mar 2020 A1
20200074745 Lyren Mar 2020 A1
20200076813 Felice-Steele et al. Mar 2020 A1
20200090265 Quinn et al. Mar 2020 A1
20200106764 Hockey et al. Apr 2020 A1
20200106765 Hockey et al. Apr 2020 A1
20200120004 Kohout et al. Apr 2020 A1
20200126126 Briancon et al. Apr 2020 A1
20200137110 Tyler et al. Apr 2020 A1
20200143384 Koontz et al. May 2020 A1
20200160372 Andrick May 2020 A1
20200174010 Pfeiffer et al. Jun 2020 A1
20200193413 Jangama et al. Jun 2020 A1
20200193423 Jangama et al. Jun 2020 A1
20200201878 Putnam et al. Jun 2020 A1
20200202425 Taylor-Shoff et al. Jun 2020 A1
20200210466 Yin et al. Jul 2020 A1
20200211099 Smith et al. Jul 2020 A1
20200213206 Bracken et al. Jul 2020 A1
20200233850 Girulat, Jr. Jul 2020 A1
20200311168 Rokos Oct 2020 A1
20200327610 Rohn et al. Oct 2020 A1
20200342039 Bakir et al. Oct 2020 A1
20200342527 Kasower Oct 2020 A1
20200349639 Mousseau Nov 2020 A1
20200364785 Olson et al. Nov 2020 A1
20200372173 Burger et al. Nov 2020 A1
20200372506 Billman et al. Nov 2020 A1
20200380599 Wasser et al. Dec 2020 A1
20200402159 Arnold et al. Dec 2020 A1
20210004703 Zoldi et al. Jan 2021 A1
20210027357 Bonfigli et al. Jan 2021 A1
20210152567 Huston, III et al. May 2021 A1
20210234869 Bondugula et al. Jul 2021 A1
20220051315 Robida et al. Feb 2022 A1
20220217146 Felice-Steele et al. Jul 2022 A1
20220335032 Girulat, Jr. Oct 2022 A1
20220374744 Zoldi et al. Nov 2022 A1
20230007007 Manna Jan 2023 A1
20230054085 Bondugula et al. Feb 2023 A1
Foreign Referenced Citations (98)
Number Date Country
112013017973-2 Oct 2020 BR
2 509 842 Dec 2005 CA
2 611 595 Dec 2006 CA
1290373 Apr 2001 CN
0 350 907 Jan 1990 EP
0 468 440 Jan 1992 EP
0 542 298 May 1993 EP
0 566 736 Aug 1993 EP
0 869 652 Oct 1998 EP
0 913 789 May 1999 EP
0 919 942 Jun 1999 EP
1 028 401 Aug 2000 EP
1 239 378 Sep 2002 EP
1 301 887 Apr 2003 EP
1 550 960 Jul 2005 EP
1 591 931 Nov 2005 EP
1 850 278 Oct 2007 EP
2 088 743 Aug 2009 EP
2 151 793 Feb 2010 EP
2 410 484 Jan 2012 EP
2 472 423 Jul 2012 EP
2 102 606 Feb 1983 GB
2001-282957 Oct 2001 JP
2002-163449 Jun 2002 JP
2003-016261 Jan 2003 JP
2003-316950 Nov 2003 JP
2005-208945 Aug 2005 JP
10-2000-0063313 Nov 2000 KR
10-2002-0039203 May 2002 KR
10-0638324 Oct 2006 KR
10-2007-0081504 Aug 2007 KR
2007-015510 Apr 2008 MX
I256569 Jun 2006 TW
WO 9116691 Oct 1991 WO
WO 97022073 Jun 1997 WO
WO 99046710 Sep 1999 WO
WO 00011574 Mar 2000 WO
WO 00051052 Aug 2000 WO
WO 00052616 Sep 2000 WO
WO 00055778 Sep 2000 WO
WO 01009752 Feb 2001 WO
WO 01009792 Feb 2001 WO
WO 01016896 Mar 2001 WO
WO 01039090 May 2001 WO
WO 01039589 Jun 2001 WO
WO 01041083 Jun 2001 WO
WO 01045012 Jun 2001 WO
WO 01046889 Jun 2001 WO
WO 01057720 Aug 2001 WO
WO 01080053 Oct 2001 WO
WO 01084281 Nov 2001 WO
WO 02029636 Apr 2002 WO
WO 02091127 Nov 2002 WO
WO 2004031986 Apr 2004 WO
WO 2004114160 Dec 2004 WO
WO 2005010683 Feb 2005 WO
WO 2005022348 Mar 2005 WO
WO 2005029369 Mar 2005 WO
WO 2005033979 Apr 2005 WO
WO 2005038631 Apr 2005 WO
WO 2005098630 Oct 2005 WO
WO 2005107405 Nov 2005 WO
WO 2005124619 Dec 2005 WO
WO 2006031626 Mar 2006 WO
WO 2006050278 May 2006 WO
WO 2006069199 Jun 2006 WO
WO 2006099492 Sep 2006 WO
WO 2006135451 Dec 2006 WO
WO 2007004158 Jan 2007 WO
WO 2007084555 Jul 2007 WO
WO 2007103203 Sep 2007 WO
WO 2007106393 Sep 2007 WO
WO 2007106786 Sep 2007 WO
WO 2007106787 Sep 2007 WO
WO 2008021104 Feb 2008 WO
WO 2008022289 Feb 2008 WO
WO 2008042614 Apr 2008 WO
WO 2009061342 May 2009 WO
WO 2009064694 May 2009 WO
WO 2009064840 May 2009 WO
WO 2009099448 Aug 2009 WO
WO 2009102391 Aug 2009 WO
WO 2010001406 Jan 2010 WO
WO 2010062537 Jun 2010 WO
WO 2010077989 Jul 2010 WO
WO 2010129257 Nov 2010 WO
WO 2010150251 Dec 2010 WO
WO 2011005876 Jan 2011 WO
WO 2011109576 Sep 2011 WO
WO 2012054401 Apr 2012 WO
WO 2012097171 Jul 2012 WO
WO 2013015746 Jan 2013 WO
WO 2016070096 May 2016 WO
WO 2018144612 Aug 2018 WO
WO 2019089439 May 2019 WO
WO 2019103979 May 2019 WO
WO 2020051154 Mar 2020 WO
WO 2020072239 Apr 2020 WO
Non-Patent Literature Citations (72)
Entry
International Preliminary Report on Patentability in Application No. PCT/US2018/061877, dated Jun. 4, 2020.
U.S. Appl. No. 12/705,489, filed Feb. 12, 2010, Bargoli et al.
U.S. Appl. No. 12/705,511, filed Feb. 12, 2010, Bargoli et al.
Application as filed in U.S. Appl. No. 10/452,155, dated May 30, 2003.
Preliminary Amendment in U.S. Appl. No. 10/452,155, dated Sep. 15, 2003.
Office Action in U.S. Appl. No. 10/452,155, dated Jan. 25, 2008.
Examiner Interview Summary in U.S. Appl. No. 10/452,155, dated Jul. 23, 2008.
Office Action in U.S. Appl. No. 10/452,155, dated Oct. 2, 2008.
Examiner Interview Summary in U.S. Appl. No. 10/452,155, dated Jan. 14, 2009.
Examiner Interview Summary in U.S. Appl. No. 10/452,155, dated Jul. 21, 2009.
Notice of Allowance in U.S. Appl. No. 10/452,155, dated Aug. 19, 2009.
International Search Report for Application No. PCT/US2005/041814, dated Aug. 29, 2007.
International Preliminary Report on Patentability and Written Opinion for Application No. PCT/US2005/041814, dated Dec. 27, 2007.
International Search Report and Written Opinion for Application No. PCT/US2018/016258, dated May 16, 2018.
International Preliminary Report on Patentability in Application No. PCT/US2018/016258, dated Aug. 15, 2019.
International Search Report and Written Opinion for Application No. PCT/US2018/061877, dated Mar. 8, 2019.
International Search Report and Written Opinion for Application No. PCT/US2019/049377, dated Dec. 20, 2019.
Provisional Application as filed in U.S. Appl. No. 60/168,272, dated Dec. 1, 1999 in 14 pages.
Provisional Application as filed in U.S. Appl. No. 60/168,276, dated Dec. 1, 1999 in 82 pages.
Provisional Application as filed in U.S. Appl. No. 60/213,367, dated Jun. 23, 2000 in 20 pages.
Application as filed in U.S. Appl. No. 09/411,683, dated Oct. 4, 1999.
Application as filed in U.S. Appl. No. 09/653,595, dated Aug. 31, 2000.
Application as filed in U.S. Appl. No. 09/790,453, dated Feb. 22, 2001.
Office Action in U.S. Appl. No. 09/790,453, dated Jan. 20, 2006.
Office Action in U.S. Appl. No. 09/790,453, dated Jul. 11, 2006.
Office Action in U.S. Appl. No. 09/790,453, dated Dec. 1, 2006.
Office Action in U.S. Appl. No. 09/790,453, dated May 10, 2007.
Office Action in U.S. Appl. No. 09/790,453, dated Mar. 21, 2008.
Application as filed in U.S. Appl. No. 10/183,135, filed Jun. 25, 2002.
Office Action in U.S. Appl. No. 10/183,135, dated Oct. 22, 2007.
Final Office Action in U.S. Appl. No. 10/183,135, dated Apr. 14, 2008.
Office Action in U.S. Appl. No. 10/183,135, dated Aug. 21, 2008.
Office Action in U.S. Appl. No. 10/183,135, dated Feb. 26, 2009.
Office Action in U.S. Appl. No. 10/183,135, dated Aug. 18, 2009.
Office Action in U.S. Appl. No. 10/183,135, dated Feb. 19, 2010.
Final Office Action in U.S. Appl. No. 10/183,135, dated Sep. 22, 2010.
Office Action in U.S. Appl. No. 10/183,135, dated Mar. 25, 2011.
Notice of Allowance in U.S. Appl. No. 10/183,135, dated Aug. 15, 2011.
Office Action in U.S. Appl. No. 11/169,769, dated Mar. 24, 2010.
Application as Filed in U.S. Appl. No. 11/363,984, dated Feb. 27, 2006.
Office Action in in U.S. Appl. No. 11/363,984, dated Dec. 26, 2008.
Consumer Financial Protection Bureau (CFPB): Analysis of Difference between Consumer- and Creditor-Purchased Credit Scores, Sep. 2012, pp. 1-42.
Fisher, Greg, “Credit Score Distribution and Practical Range Statistics”, Feb. 23, 2010, The Credit Scoring Site, pp. 2.
Lang et al., “A Collaborative Web-Based Help-System”, Proceedings of the 2nd international conference on web intelligence, mining and semantics, Jun. 13-15, 2012, pp. 5.
Lang et al., “An Avatar-Based Help System for Web-Portals”, International Conference on Human-Computer Interaction, Springer, Berlin, Heidelberg, 2011, pp. 10.
Oracle: Recommendations for Leveraging the Critical Patch Update and Maintaining a Proper Security Posture, Nov. 2010, An Oracle White Paper, pp. 1-30.
Phinisee, Tamarind, “Banks, FTC Step up Efforts to Address Identity Theft”, San Antonio Business Journal; San Antonio, Jul. 5, 2002, vol. 16, No. 24, pp. 5.
Srinivasa et al., “Augmented Reality Adaptive Web Content”, 2016 13th IEEE Annual w Consumer Communications & Networking Conference (CCNC), pp. 4.
“12 Mag: How Debt Settlement is Helpful in Improving the Credit Score”, Weblog post. Newstex Trade & Industry Blogs, Newstex, Oct. 8, 2017, pp. 2.
Agarwal et al., “Determinants of Credit Card Delinquency and Bankruptcy: Macroeconomic Factors”, Journal of Economics and Finance, 2003, vol. 27, pp. 75-84 (12 pages).
Cai et al., “A Genetic Algorithm Model for Personal Credit Scoring”, Dec. 2009, IEEE, pp. 4.
Caldeiira et al., “Characterizing and Preventing Chargebacks in Next Generation Web Payments Services”, 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN), 2012 IEEE, pp. 333-338.
Christianson, David, “Monitoring Your Credit's Health”, Winnipeg Free Press [Online], Jan. 7, 2011, pp. 2.
Credit Scoring Systems Used to Measure Bankruptcy Risk. (1991). Credit Risk Management Report, 1(2), N/A. Retrieved from https://dialog.proquest.com/professional/docview/1078503725?accountid= 131444, pp. 7.
Delamaire et al., “Credit Card Fraud and Detection Techniques: A Review”, Banks and Bank Systems, vol. 4, No. 2, 2009, pp. 57-68.
“Discover Card Brings Out Credit ScoreTracker”, Wireless News, Nov. 24, 2007, pp. 2.
European Network and Information Security Agency (enisa): Privacy and Security Risks when Authenticating on the Internet with European eID Cards, Nov. 2009, pp. 1-41.
Federal Bureau of Investigation (FBI): The Cyber Threat to the Financial Sector: Testimony, Sep. 14, 2011, pp. 1-6.
Gramazio, Connor C., “Colorgorical: Creating Discriminable and Preferable Color Palettes for Information Visualization”, IEEE Transactions on Visualization and Computer Graphics, Jan. 2017, vol. 23, No. 1, pp. 521-530.
Gustafsson et al., “Always Best Connected”, 3G Mobile Network Technologies and Experiences, IEEE Wireless Communications, Feb. 28, 2003, vol. 10, No. 1, pp. 49-55.
Hu et al. “Forecasting Identity Theft Victims: Analyzing Characteristics and Preventive Actions through Machine Learning Approaches”, Victims & Offenders, 2021, vol. 16, No. 4, pp. 465-494.
Koka et al., “Online Review Analysis by Visual Feature Selection”, 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), 2017, pp. 1084-1091.
Musto et al., “A Portfolio View of Consumer Credit”, Journal of Monetary Economics, vol. 53, 2006, pp. 59-84.
Nikravesh et al., “Fuzzy Queries, Search, and Decision Support System”, Soft Computing, Aug. 2002, vol. 6, No. 5, pp. 373-399.
Peng et al., “Factors Affecting Online Purchase Behavior: Implications to Improve the Existing Credit Rating System”, 2009 International Conference on Management and Service Science, 2009 IEEE, pp. 1-4.
Poon, Martha Ann, “What Lenders See—A History of the Fair Isaac Scorecard”, UCSD, ProQuest Dissertations Publishing, 2012, pp. 5. [Abstract Only].
Ralston et al., “Lending Procedures and the Viability-Social Objectives Conflict in Credit Unions”, The International Journal of Bank Marketing, 2003, vol. 21, No. 6/7, pp. 304-311 (14 pages).
Shibata et al., “3D Retrieval System Based on Cognitive Level-Human Interface for 3D Building Database”, Proceedings of the 2004 International Conference on Cyberworlds (CW'04), 2004, pp. 6.
Skanderson, David M., “Managing Discrimination Risk of Machine Learning and AI Models”, ABA Journal of Labor & Employment Law, 2021, pp. 339-360.
Solapurkar, Prajakta, “Building Secure Healthcare Services Using OAuth 2.0 and JSON Web Token in IOT Cloud Scenario”, IEEE, 2nd International Conference on Contemporary Computing and Informatics (ic3i), 2016, pp. 99-104.
Vantage Score, “Assume the Role of Managing Your Credit Prudently and Watch Your Credit Score Improve”, VantageScore.com, Jul. 2012, pp. 12.
Yao, Ping, “Feature Selection Based on SVM for Credit Scoring”, 2009 International Conference on Computational Intelligence and Natural Computing, 2009, pp. 44-47.
Related Publications (1)
Number Date Country
20200389461 A1 Dec 2020 US
Provisional Applications (2)
Number Date Country
62826319 Mar 2019 US
62727479 Sep 2018 US
Continuations (1)
Number Date Country
Parent 16445647 Jun 2019 US
Child 16855912 US