A portion of the disclosure of this patent document includes material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyrights whatsoever.
Electronic databases provide storage and retrieval of digital data records. Data records in such databases may be electronically updated. Certain data records have access restrictions, such as restrictions regarding entities that can view or make use of the records, as well as restrictions on entities that can provide updates or changes to such records.
The systems, methods, and devices described herein each have several aspects, no single one of which is solely responsible for its desirable attributes. Without limiting the scope of this disclosure, several non-limiting features will now be described briefly.
In some embodiments, an account discovery system interfaces between an end-user (for example, a consumer) and one or more external accounts of the user to identify accounts of the user based on data items accessed at the external accounts. Multiple data items, which may be accessed or received from one or more third-party entities, such as via a direct application programming interface (API) communication channel, are analyzed to determine whether any of the data items, or combinations of data items, meet rules for addition of the data items to a secure third-party risk item database.
A system of one or more computers can be configured to perform particular operations or actions by virtue of having software, firmware, hardware, or a combination of them installed on the system that in operation causes or cause the system to perform the actions. One or more computer programs can be configured to perform particular operations or actions, such as those described below as computerized methods or simply methods, by virtue of including instructions that, when executed by data processing apparatus, cause the apparatus to perform the actions.
In one embodiment, a computerized method is performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system to perform the computerized method comprising receiving, via network communication with a user computing device, selection of a third-party entity from a plurality of third-party entities indicated in a user interface displayed on the user computing device, and credentials for directly accessing, by proxy on behalf of the user via an application programming interface (API), a plurality of data items associated with the user stored in one or more databases associated with the selected third-party entity. The method may further include transmitting at least an API token associated with the selected third-party and the credential to one or more databases associated with the selected third-party, accessing a plurality of data items associated with the user, via an API communication channel established with the one or more databases associated with the selected third-party entity. The method may further include selecting a first data item of the plurality of data items, determining a recipient identified in the first data item, identifying a subset of data items each indicating the determined recipient, wherein the subset of data items includes at least the first data item and one or more other data items. The method may further include determining, based at least on the identified subset of data items, account data associated with an account of the user associated with the recipient, the account data comprising at least one or more of: a number of data items each having time stamps within a predetermined time period, average number of days between time stamps of sequential data items, applying a first account identification rule, associated with a first account type, to the account data, determine, based on said application of the first account identification rule, a first confidence level indicating likelihood that the account is the first type of account. The method may further include, in response to determining that the first confidence level is about a first threshold, applying a first account scoring model to the account data, the first account scoring model configured to determine an expected change to a risk score associated with the user. The method may further include receiving, from the user computing device, confirmation that the account of the user is the first type of account, receiving, from the user computing device, a request to add the account with the recipient to risk data associated with the user at a secured third-party risk database. The method may further include generating, based on portions of the plurality of data items and the account data associated with the recipient, an account creation data package, the account creation data package formatted for ingestion at the secured third-party risk database to initiate addition of the account to risk data of the user, identifying a security key associated with the secured third-party risk database. The method may further include transmitting the security key and the account creation data package to the third-party risk database via a secure communication channel established with the third-party risk database, requesting execution of a risk scoring algorithm using risk data of the user at the secured third-party risk database, wherein the risk scoring algorithm is based at least partly on portions of the plurality of data items or the account data included in the risk data of the user. The method may further include providing risk score change information to the user computing device.
In one embodiment, the method further includes, prior to receiving credentials from the user computing device, transmit user interface data to the user computing device, the user interface data configured to depict a permissions interface element that is selectable to indicate authorization to access account information associated with the user, and receiving, from the user computing device, authorization to access account information associated with the user.
In one embodiment, the method further includes transmitting user interface data to the user computing device, the user interface data configured to depict a user interface including one or more interactive elements selectable to indicate authorized uses of the data items associated with the user by the computing system, receiving, from the user computing device, selection of authorized uses of the data items, and selectively sharing, based on the authorized uses of the data items, the data items with one or more third parties.
In one embodiment, determining a recipient identified in the first data items comprises: determining a recipient identifier in the first data item, accessing a recipient data structure storing indications of associations between recipient identifiers and corresponding recipients, wherein the recipient is associated with a plurality of recipient identifiers used by different third-party databases to identify the recipient, and determining that the recipient identifier is associated with the recipient in the recipient data structure. In one embodiment, associations between recipient identifiers and corresponding recipients are deterministic. In one embodiment, associations between recipient identifiers and corresponding recipients are probabilistic.
In one embodiment, the account creation data package includes at least: an identifier of the recipient, a data furnisher identifier associated with an entity that provides consumer data to the secured third-party risk database, and at least a portion of the account information formatted for ingestion by the secured third-party risk database to initiate addition of the account to risk data of the user. In one embodiment, the security key comprises an API token associated with the secured third-party risk database.
In one embodiment, the method further includes determining a first one or more items available to the user based on the current risk score, determining a second one or more items not available to the user based on the current risk score, determining an estimated risk score of the user based on potential addition of a new account of the user to risk data of the user, in response to determining that at least one of the second one or more items would be available to the user based on the estimated risk score, providing an option to the user in the interactive user interface to initiate updates to risk data of the user, in response to receiving an indication of selection of the option in the interactive user interface on the user device, initiating receiving via network communication with the user computing device, determining an updated risk score based at least on the risk score change information, determining at least one of the second one or more items eligible to the user based on the updated risk score, and updating the interactive user interface data to depict information regarding the at least one of the second one or more items in the user interface on the user device. In one embodiment, the first account scoring model is configured to determine an estimated risk score change if the first account of the first account type is added to the risk data of the user, wherein the first account scoring model is based at least on actual risk score changes of a plurality of other users in response to addition of accounts of the first account type to their respective risk data. In one embodiment, the method further includes, for each of a plurality of accounts included in the risk data of the user, determining an account type from a plurality of account types, identifying a second account type of the plurality of account types that impacts risk scores of users that is not included in the determined account types of the plurality accounts of the user, executing a score impact algorithm, based at least on the second account type and the risk data of the user, to determine a possible risk score change if an account of the second account type is added to the risk data of the user, and providing, to the user, an indication of the possible risk score change prior to receiving the request to add the account with the recipient to risk data of the user at the secured third-party risk database.
In one embodiment, a computing system comprising a hardware computer processor is configured to perform processor-executable instructions comprising receiving, via network communication with a user computing device, selection of a third-party entity from a plurality of third-party entities indicated in a user interface displayed on the user computing device, and credentials for directly accessing, by proxy on behalf of the user via an application programming interface (API), a plurality of data items associated with the user stored in one or more databases associated with the selected third-party entity, transmitting at least an API token associated with the selected third-party and the credential to one or more databases associated with the selected third-party, accessing a plurality of data items associated with the user, via an API communication channel established with the one or more databases associated with the selected third-party entity, selecting a first data item of the plurality of data items, determining a recipient identified in the first data item, identifying a subset of data items each indicating the determined recipient, wherein the subset of data items includes at least the first data item and one or more other data items, determining, based at least on the identified subset of data items, account data associated with an account of the user associated with the recipient, the account data comprising at least one or more of: a number of data items each having time stamps within a predetermined time period, and average number of days between time stamps of sequential data items. In one embodiment, the operations further comprise applying a first account identification rule, associated with a first account type, to the account data; determining, based on said application of the first account identification rule, a first confidence level indicating likelihood that the account is the first type of account, in response to determining that the first confidence level is about a first threshold, applying a first account scoring model to the account data, the first account scoring model configured to determine an expected change to a current risk score associated with the user, receiving, from the user computing device, confirmation that the account of the user is the first type of account, receiving, from the user computing device, a request to add the account with the recipient to risk data associated with the user at a secured third-party risk database, generating, based on portions of the plurality of data items and the account data associated with the recipient, an account creation data package, the account creation data package formatted for ingestion at the secured third-party risk database to initiate addition of the account to risk data of the user, identifying a security key associated with the secured third-party risk database, transmitting the security key and the account creation data package to the third-party risk database via a secure communication channel established with the third-party risk database, requesting execution of a risk scoring algorithm using risk data of the user at the secured third-party risk database, wherein the risk scoring algorithm is based at least partly on portions of the plurality of data items or the account data included in the risk data of the user, and providing risk score change information to the user computing device.
In one embodiment, the operations further comprise, prior to receiving credentials from the user computing device, transmit user interface data to the user computing device, the user interface data configured to depict a permissions interface element that is selectable to indicate authorization to access account information associated with the user, and receiving, from the user computing device, authorization to access account information associated with the user. In one embodiment, the operations further comprise transmitting user interface data to the user computing device, the user interface data configured to depict a user interface including one or more interactive elements selectable to indicate authorized uses of the data items associated with the user by the computing system, receiving, from the user computing device, selection of authorized uses of the data items, and selectively sharing, based on the authorized uses of the data items, the data items with one or more third parties.
In one embodiment, a non-transitory computer readable medium has processor-executable instructions stored thereon that are executable by a hardware computer processor to perform operations comprising receiving, via network communication with a user computing device, selection of a third-party entity from a plurality of third-party entities indicated in a user interface displayed on the user computing device, and credentials for directly accessing, by proxy on behalf of the user via an application programming interface (API), a plurality of data items associated with the user stored in one or more databases associated with the selected third-party entity, transmitting at least an API token associated with the selected third-party and the credential to one or more databases associated with the selected third-party, accessing a plurality of data items associated with the user, via an API communication channel established with the one or more databases associated with the selected third-party entity, selecting a first data item of the plurality of data items, determining a recipient identified in the first data item, identifying a subset of data items each indicating the determined recipient, wherein the subset of data items includes at least the first data item and one or more other data items, determining, based at least on the identified subset of data items, account data associated with an account of the user associated with the recipient, the account data comprising at least one or more of: a number of data items each having time stamps within a predetermined time period, and average number of days between time stamps of sequential data items. In one embodiment, the operations further comprise applying a first account identification rule, associated with a first account type, to the account data; determining, based on said application of the first account identification rule, a first confidence level indicating likelihood that the account is the first type of account, in response to determining that the first confidence level is about a first threshold, applying a first account scoring model to the account data, the first account scoring model configured to determine an expected change to a current risk score associated with the user, receiving, from the user computing device, confirmation that the account of the user is the first type of account, receiving, from the user computing device, a request to add the account with the recipient to risk data associated with the user at a secured third-party risk database, generating, based on portions of the plurality of data items and the account data associated with the recipient, an account creation data package, the account creation data package formatted for ingestion at the secured third-party risk database to initiate addition of the account to risk data of the user, identifying a security key associated with the secured third-party risk database, transmitting the security key and the account creation data package to the third-party risk database via a secure communication channel established with the third-party risk database, requesting execution of a risk scoring algorithm using risk data of the user at the secured third-party risk database, wherein the risk scoring algorithm is based at least partly on portions of the plurality of data items or the account data included in the risk data of the user, and providing risk score change information to the user computing device.
In one embodiment, a non-transitory computer readable medium has processor-executable instructions stored thereon that are executable by a hardware computer processor to perform operations comprising transmitting user interface data to a user computing device, the user interface data configured to depict a permissions interface element that is selectable to indicate authorization to access account information associated with the user, receiving, from the user computing device, authorization to access account information associated with the user, in response to receiving the authorization to access account information associated with the user, receiving, from the user computing device, selection of a third-party entity from a plurality of third-party entities indicated in a user interface on the user computing device, receiving credentials for accessing account information associated with the user at the selected third-party entity, identifying an API token associated with the selected third-party entity, transmitting to an online address associated with a system in electronic communication with the selected third-party entity, the API token and the credentials, receiving, via the system, indicators of one or more accounts of the user with the selected third-party entity, receiving, from the user computing device, selection of an account of the one or more financial accounts, accessing, via a secure communication session initiated with the API token, a plurality of data items of the selected account of the user at the third-party entity, transmitting user interface data to the user computing device, the user interface data configured to depict a user interface on a display of the user computing device, the user interface including one or more interactive elements selectable to indicate authorized uses of the data items by the computing system, receiving, from the user computing device, selection of authorized uses of the data items, and selectively sharing, based on the authorized uses of the data items, the data items with one or more third parties.
In one embodiment, a computerized method performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system comprises transmitting user interface data to a user computing device, the user interface data configured to depict a permissions interface element that is selectable to indicate authorization to access account information associated with the user, receiving, from the user computing device, authorization to access account information associated with the user. The method may further include, in response to receiving the authorization to access account information associated with the user, receiving, from the user computing device, selection of a third-party entity from a plurality of third-party entities indicated in a user interface on the user computing device, receiving credentials for accessing account information associated with the user at the selected third-party entity, identifying an API token associated with the selected third-party entity, transmitting to an online address associated with a system in electronic communication with the selected third-party entity, the API token and the credentials, receiving, via the system, indicators of one or more accounts of the user with the selected third-party entity, receiving, from the user computing device, selection of an account of the one or more financial accounts, accessing, via a secure communication session initiated with the API token, a plurality of data items of the selected account of the user at the third-party entity, transmitting user interface data to the user computing device, the user interface data configured to depict a user interface on a display of the user computing device, the user interface including one or more interactive elements selectable to indicate authorized uses of the data items by the computing system, receiving, from the user computing device, selection of authorized uses of the data items. The method may further include selectively sharing, based on the authorized uses of the data items, the data items with one or more third parties.
In one embodiment, transaction data items associated with a post date more than one year prior to a current date are disregarded. In one embodiment, transaction data items associated with a post date more than two years prior to a current date are disregarded. In one embodiment, the computing system comprises the system in electronic communication with the selected third-party. In one embodiment, the system in electronic communication with the selected third-party entity is operated by a third-party. In one embodiment, the user interface includes an iframe provided by the system in electronic communication with the selected third-party, wherein the credentials are provided directly to the system electronic communication with the selected third-party. In one embodiment, the credentials are not stored by the computing system. In one embodiment, the credentials comprises a username and password. In one embodiment, the credentials comprise biometric data of the user. In one embodiment, the system in electronic communication with the selected third-party entity communicates with the third-party entity via a secured API communication channel initiated via use of a second API token associated with the third-party entity. In one embodiment, the system in electronic communication with the selected third-party entity stores the credentials for use in a later request for information associated with the user from the selected third-party entity.
In one embodiment, a computerized method performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system comprises receiving, from a user computing device, a request to update risk data of the user with account information regarding an account identified in account data items associated with the user stored by a third-party entity, generating an account creation data package formatted for ingestion at a secured third-party risk database to initiate addition of the account to risk data of the user. The account creation data package may include an identifier of recipient indicated in each of the account data items, a data furnisher identifier associated with an entity that provides consumer data to the secured third-party risk database, and at least a portion of the account information formatted for ingestion by the secured third-party risk database to initiate addition of the account to risk data of the user, identifying an API token associated with the secured third-party risk database. The method may include transmitting the API token and the account creation data package to the secured third-party risk database via an secure communication channel established with the third-party risk database, wherein the account information is usable to update a risk score of the user.
In one embodiment, the account information includes a plurality of historical transaction data items indicating a corresponding plurality of historical transactions between the recipient and the user. In one embodiment, the method further includes requesting execution of a risk scoring algorithm using risk data of the user at the secured third-party risk database, including the plurality of historical transaction data items included in the risk data of the user. In one embodiment, the method further includes receiving, from the secured third-party risk database, a risk score of the user based on said execution of the risk scoring algorithm, and transmitting a notification to the user indicating the risk score. In one embodiment, the method further includes, in response to determining that the risk score is lower than a previous risk score of the user, initiating activation of a user interface on the user computing device that includes an option to remove the account information from the risk data of the user, in response to selection of the option to remove the account information from the risk data of the user, generating an account removal data package formatted for ingestion at the secured third-party risk database to initiate removal of the account from risk data of the user, the account removal data package including: the identifier of the recipient and the data furnisher identifier associated with the entity that provides consumer data to the secured third-party risk database, and transmitting the account removal data package to the secured third-party risk database via a secure communication channel.
In one embodiment, the method further includes receiving updated account information regarding the account associated with the user, the updated account information including a transaction data item not included in the plurality of historical transaction data items, generating an account update data package formatted for ingestion at the secured third-party risk database to initiate update of risk data of the user associated with the account, the account update data package including: an identifier of the recipient indicated in the transaction data item, the data furnisher identifier associated with the entity that provides consumer data to the secured third-party risk database, and at least a portion of the updated account information formatted for ingestion by the secured third-party risk database to initiate addition of the transaction data item to risk data of the user, and transmitting the API token associated with the secured third-party risk database and the account update data package to the secured third-party risk database. In one embodiment, the method further includes, requesting execution of a risk scoring algorithm using risk data of the user at the secured third-party risk database, wherein the risk scoring algorithm is based at least partly on portions of the plurality of historical transaction data items and the transaction data item. In one embodiment, the method further includes receiving, from the secured third-party risk database, a risk score of the user based on said execution of the risk scoring algorithm, and in response to determining that a risk score of the user is different than prior to transmitting the account update data package to the secured third-party risk database, transmitting a notification to the user. In one embodiment, the notification comprises a push notification to the user computing device, the push notification configured to automatically activate an application on the user computing device to cause display of information associated with the notification. In one embodiment, the notification is transmitted to the user in real-time from receiving the updated account information.
In one embodiment, the computerized method further comprises receiving, via network communication with the user computing device, selection of a third-party entity from a plurality of third-party entities indicated in a user interface displayed on the user computing device, credentials for directly accessing, by proxy on behalf of the user via an application programming interface (API), the account items associated with the user stored in one or more databases associated with the third-party entity, transmitting at least an API token associated with the selected third-party and the credential to one or more databases associated with the selected third-party entity, accessing the account data items associated with the user, via an API communication channel established with the one or more databases associated with the selected third-party entity, selecting a first data item of the plurality of account data items, determining a recipient identified in the first data item, identifying a subset of account data items each indicating the determined recipient, wherein the subset of account data items includes at least the first data item and one or more other account data items, determining, based at least on the identified subset of account data items, account data associated with an account of the user associated with the recipient, the account data comprising at least one or more of: a number of account data items each having time stamps within a predetermined time period, and average number of days between time stamps of sequential account data items, applying a first account identification rule, associated with a first account type, to the account data, determine, based on said application of the first account identification rule, a first confidence level indicating likelihood that the account is the first type of account. In some embodiments, the method further includes, in response to determining that the first confidence level is above a first threshold, applying a first account scoring model to the account data, the first account scoring model configured to determine an expected change to a current risk score associated with the user, requesting execution of a risk scoring algorithm using risk data of the user at the secured third-party risk database, wherein the risk scoring algorithm is based at least partly on portions of the plurality of account data items or the account data included in the risk data of the user, and providing risk score change information to the user computing device.
In one embodiment, a computing system comprising a hardware computer processor is configured to perform operations comprising receiving, from a user computing device, a request to update risk data of the user with account information regarding an account identified in account data items associated with the user stored by a third-party entity, generating an account creation data package formatted for ingestion at a secured third-party risk database to initiate addition of the account to risk data of the user, the account creation data package including: an identifier of recipient indicated in each of the account data items, a data furnisher identifier associated with an entity that provides consumer data to the secured third-party risk database, and at least a portion of the account information formatted for ingestion by the secured third-party risk database to initiate addition of the account to risk data of the user. In some embodiments, the operations further include identifying an API token associated with the secured third-party risk database and transmitting the API token and the account creation data package to the secured third-party risk database via a secure communication channel established with the third-party risk database, wherein the account information is usable to update a risk score of the user.
In one embodiment, the account information includes a plurality of historical transaction data items indicating a corresponding plurality of historical transactions between the recipient and the user. In one embodiment, the operations further comprise requesting execution of a risk scoring algorithm using risk data of the user at the secured third-party risk database, including the plurality of historical transaction data items included in the risk data of the user. In one embodiment, the operations further comprise receiving, from the secured third-party risk database, a risk score of the user based on said execution of the risk scoring algorithm and transmitting a notification to the user indicating the risk score.
In one embodiment, a non-transitory computer readable medium having processor-executable instructions stored thereon that are executable by a hardware computer processor to perform operations comprising receiving, from a user computing device, a request to update risk data of the user with account information regarding an account identified in account data items associated with the user stored by a third-party entity, generating an account creation data package formatted for ingestion at a secured third-party risk database to initiate addition of the account to risk data of the user, the account creation data package including: an identifier of recipient indicated in each of the account data items, a data furnisher identifier associated with an entity that provides consumer data to the secured third-party risk database, and at least a portion of the account information formatted for ingestion by the secured third-party risk database to initiate addition of the account to risk data of the user. In one embodiment, the operations further comprise identifying an API token associated with the secured third-party risk database, and transmitting the API token and the account creation data package to the secured third-party risk database via a secure communication channel established with the third-party risk database, wherein the account information is usable to update a risk score of the user.
In one embodiment, a computerized method performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system comprises receiving authentication information from a user computing device, the authentication information including at least a name and address of a user, transmitting, to a secured third-party risk system, a request for execution of a risk scoring algorithm to determine a current risk score of the user based at least on risk data of the user at the secured third-party risk system, receiving, from the secured third-party risk system, the current risk score of the user, accessing an item database including information associated with a plurality of items and, for each item, an associated criteria for matching the item with users, querying the item database with at least the current risk score of the user, receiving, in response to said querying the item database, information indicating: a first one or more items matched to the user based on the current risk score, and a second one or more items not matched to the user based on the current risk score. In one embodiment, the method further comprises generating interactive user interface data configured to display an interactive user interface on the user computing device, the user interface depicting information regarding at least one of the first one or more items, determining an estimated risk score of the user based on potential addition of a new account of the user to risk data of the user, in response to determining that at least one of the second one or more items would be matched to the user based on the estimated risk score, providing an option to the user in the interactive user interface to initiate updates to risk data of the user, in response to receiving an indication of selection of the option in the interactive user interface on the user computing device, initiating communication between the user computing device and an account discovery system, wherein the account discovery system is configured to identify a new account of the user through analysis of data items associated with the user stored by one or more third-party databases, transmitting, to the secured third-party risk system, a second request for execution of the risk scoring algorithm to determine an updated risk score of the user based at least on risk data of the user, including information regarding the new account of the user, at the secured third-party risk system, receiving, from the secured third-party risk system, the updated risk score of the user, querying the item database with at least the updated risk score of the user, receiving, in response to said querying the item database, information indicating that at least one of the second one or more data items matched to the user based on the updated risk score and updating the interactive user interface data to depict information regarding the at least one of the second one or more items in the user interface on the user computing device.
In one embodiment, the updated risk score equals the estimated risk score. In one embodiment, the user interface further depicts a first access link to a first enrollment entity associated with a first of the one or more items. In one embodiment, the first access link is configured to redirect communication of the user computing device to an enrollment website. In one embodiment, the access links comprise hyperlinks. In one embodiment, said determining the estimated risk score comprises determining a first account type of a plurality of account types that impacts risk scores of users that is not included in risk data of the user, determining a score impact associated with the determined first account type, and calculating the estimated risk score based at least on the current risk score and the score impact. In one embodiment, said determining the score impact associated with the determined first account type comprises identifying a plurality of other users associated with addition of accounts of the first account type to respective risk data, and, based on account data of the plurality of other users, generating a score impact algorithm configured to determine, for respective users, score impacts in response to addition of accounts of the first account type. In one embodiment, the plurality of other users are identified as users having accounts of the first account type with account attributes within a predetermined threshold of account attributes of the new account of the user.
In one embodiment, the method further comprises generating a first access link associated with a first item, the first access link including an online address of a first enrollment entity and personally identifiable information of the user, wherein the personally identifiable information is usable by the first enrollment entity to auto-populate an enrollment user interface with the personally identifiable information of the user. In one embodiment, the items are products or services. In one embodiment, first criteria for matching a first item with users is based on a risk score of the user being greater than a predetermined risk score threshold. In one embodiment, the user interface further includes a filter control configured for interaction with the user of the user computing device to receive a filter criteria, wherein application of the filter criteria generates a filtered set of the first one or more items.
In one embodiment, the account discovery system is configured to perform operations comprising receiving, via network communication with a user computing device, selection of a third-party entity from a plurality of third-party entities indicated in a user interface displayed on the user computing device, credentials for directly accessing, by proxy on behalf of the user via an application programming interface (API), a plurality of data items associated with the user stored in one or more databases associated with the selected third-party entity, transmitting at least an API token associated with the selected third-party and the credential to one or more databases associated with the selected third-party entity, accessing a plurality of data items associated with the user, via an API communication channel established with the one or more databases associated with the selected third-party entity, selecting a first data item of the plurality of data items, determining a recipient identified in the first data item, identifying a subset of data items each indicating the determined recipient, wherein the subset of data items includes at least the first data item and one or more other data items, determining, based at least on the identified subset of data items, account data associated with an account of the user associated with the recipient, the account data comprising at least one or more of: a number of data items each having time stamps within a predetermined time period, and an average number of days between time stamps of sequential data items, applying a first account identification rule, associated with a first account type, to the account data, determine, based on said application of the first account identification rule, a first confidence level indicating likelihood that the account is the first type of account. In one embodiment, the method further includes, in response to determining that the first confidence level is above a first threshold, applying a first account scoring model to the account data, the first account scoring model configured to determine an expected change to a current risk score associated with the user, receiving, from the user computing device, confirmation that the account of the user is the first type of account, receiving, from the user computing device, a request to add the account with the recipient to risk data associated with the user at a secured third-party risk database, generating, based on portions of the plurality of data items and the account data associated with the recipient, an account creation data package, the account creation data package formatted for ingestion at the secured third-party risk database to initiate addition of the account to risk data of the user, identifying a security key associated with the secured third-party risk database, and transmitting the security key and the account creation data package to the third-party risk database via a secure communication channel established with the third-party risk database.
In one embodiment, a computing system comprises a hardware computer processor configured to perform operations comprising receiving authentication information from a user computing device, the authentication information including at least a name and address of a user, transmitting, to a secured third-party risk system, a request for execution of a risk scoring algorithm to determine a current risk score of the user based at least on risk data of the user at the secured third-party risk system, receiving, from the secured third-party risk system, the current risk score of the user, accessing an item database including information associated with a plurality of items and, for each item, an associated criteria for matching the item with users, querying the item database with at least the current risk score of the user, receiving, in response to said querying the item database, information indicating: a first one or more items matched to the user based on the current risk score; and a second one or more items not matched to the user based on the current risk score, generating interactive user interface data configured to display an interactive user interface on the user computing device, the user interface depicting information regarding at least one of the first one or more items, determining an estimated risk score of the user based on potential addition of a new account of the user to risk data of the user, in response to determining that at least one of the second one or more items would be matched to the user based on the estimated risk score, providing an option to the user in the interactive user interface to initiate updates to risk data of the user, in response to receiving an indication of selection of the option in the interactive user interface on the user computing device, initiating communication between the user computing device and an account discovery system, wherein the account discovery system is configured to identify a new account of the user through analysis of data items associated with the user stored by one or more third-party databases, transmitting, to the secured third-party risk system, a second request for execution of the risk scoring algorithm to determine an updated risk score of the user based at least on risk data of the user, including information regarding the new account of the user, at the secured third-party risk system, receiving, from the secured third-party risk system, the updated risk score of the user, querying the item database with at least the updated risk score of the user, receiving, in response to said querying the item database, information indicating that at least one of the second one or more data items matched to the user based on the updated risk score, and updating the interactive user interface data to depict information regarding the at least one of the second one or more items in the user interface on the user computing device.
In one embodiment, the operations further include generating a first access link associated with a first item, the first access link including an online address of a first enrollment entity and personally identifiable information of the user, wherein the personally identifiable information is usable by the first enrollment entity to auto-populate an enrollment user interface with the personally identifiable information of the user.
In one embodiment, a computerized method performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system performs the computerized method comprising determining identification information of a user, obtaining a current risk score associated with the user, determining a first one or more items available to the user based on the current risk score, determining a second one or more items not available to the user based on the current risk score, generating interactive user interface data configured to display an interactive user interface on a user device, the user interface depicting information regarding at least one of the first one or more items, including an access link to an enrollment entity associated with the at least one of the first one or more items, determining an estimated risk score of the user based on potential addition of a new account of the user to risk data of the user, in response to determining that at least one of the second one or more items would be available to the user based on the estimated risk score, providing an option to the user in the interactive user interface to initiate updates to risk data of the user, in response to receiving an indication of selection of the option in the interactive user interface on the user device, initiating communication between the user device and an account discovery system, wherein the account discovery system is configured to identify a new account of the user through analysis of data items associated with the user stored by one or more third-party databases and to trigger generation of an updated risk score, receiving an indication of an updated risk score of the user, wherein the updated risk score is higher than the current risk score based on addition of the new account to risk data of the user by the account discovery system, determining at least one of the second one or more items eligible to the user based on the updated risk score, and updating the interactive user interface data to depict information regarding the at least one of the second one or more items in the user interface on the user device.
In one embodiment, a non-transitory computer readable medium having processor-executable instructions stored thereon are executable by a hardware computer processor to perform operations comprising receiving authentication information from a user computing device, the authentication information including at least a name and address of a user, transmitting, to a secured third-party risk system, a request for execution of a risk scoring algorithm to determine a current risk score of the user based at least on risk data of the user at the secured third-party risk system, receiving, from the secured third-party risk system, the current risk score of the user, accessing an item database including information associated with a plurality of items and, for each item, an associated criteria for matching the item with users, querying the item database with at least the current risk score of the user, receiving, in response to said querying the item database, information indicating: a first one or more items matched to the user based on the current risk score, and a second one or more items not matched to the user based on the current risk score, generating interactive user interface data configured to display an interactive user interface on the user computing device, the user interface depicting information regarding at least one of the first one or more items, determining an estimated risk score of the user based on potential addition of a new account of the user to risk data of the user, in response to determining that at least one of the second one or more items would be matched to the user based on the estimated risk score, providing an option to the user in the interactive user interface to initiate updates to risk data of the user, in response to receiving an indication of selection of the option in the interactive user interface on the user computing device, initiating communication between the user computing device and an account discovery system, wherein the account discovery system is configured to identify a new account of the user through analysis of data items associated with the user stored by one or more third-party databases, transmitting, to the secured third-party risk system, a second request for execution of the risk scoring algorithm to determine an updated risk score of the user based at least on risk data of the user, including information regarding the new account of the user, at the secured third-party risk system, receiving, from the secured third-party risk system, the updated risk score of the user, querying the item database with at least the updated risk score of the user, receiving, in response to said querying the item database, information indicating that at least one of the second one or more data items matched to the user based on the updated risk score, and updating the interactive user interface data to depict information regarding the at least one of the second one or more items in the user interface on the user computing device.
In one embodiment, a computerized method performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system comprises accessing a score impact rule indicating one or more account types that impacts risk scores of users, identifying an API token associated with a secured third-party risk database, transmitting the API token and a request for risk data of a user to the third-party risk database. The method may include accessing, via an secure communication channel established with the third-party risk database, risk data of the user, identifying a plurality of groupings of data items (which may also be referred to as subsets of data items) included in the risk data of the user, each of the groupings including a plurality of data items associated with an entity, determining an account type of a plurality of account types for each of the groupings of data items, identifying a first account type of the one or more account types that impacts credit scores of users that is not included in the determined account types of the plurality of groups of data items associated with the user, execute a score impact algorithm, based at least on the first account type and the risk data of the user, to determine a possible risk score change if an account of the first account type is added to the risk data of the user. The method may include providing, to the user, an indication of the possible risk score change.
In one embodiment, the possible risk score changes indicates an estimated risk score. In one embodiment, the possible risk score changes indicates an estimated risk score increase or decrease. In one embodiment, the method further comprises providing, to the user, an option to initiate addition of an account of the first account type to risk data of the user. In one embodiment, a first plurality of data items associated with a second entity indicate transactions of the user in a second account of the second account type. In one embodiment, the score impact algorithm is developed based at least on historical risk score changes of a plurality of other users in response to addition of respective accounts of the first account type to respective risk data of the users. In one embodiment, the method further comprises executing a second score impact algorithm configured to estimate a second possible risk score associated with addition of a second account of a second account type to the risk data of the user, and providing, to the user, a second indication of the second possible risk score change.
In one embodiment, the computerized method of further comprises receiving, via network communication with a user computing device, selection of a third-party entity from a plurality of third-party entities indicated in a user interface displayed on the user computing device, credentials for directly accessing, by proxy on behalf of the user via an application programming interface (API), a plurality of data items associated with the user stored in one or more databases associated with the selected third-party entity, transmitting at least an API token associated with the selected third-party and the credential to one or more databases associated with the selected third-party entity, accessing a plurality of data items associated with the user, via an API communication channel established with the one or more databases associated with the selected third-party entity, wherein said identifying a plurality of groupings of data items further comprises: selecting a first data item of the plurality of data items, determining a recipient identified in the first data item, identifying a subset grouping of data items each indicating the determined recipient, wherein the subset grouping of data items includes at least the first data item and one or more other data items, determining, based at least on the identified subset grouping of data items, account data associated with an account of the user associated with the recipient, the account data comprising at least one or more of: a number of data items each having time stamps within a predetermined time period, and an average number of days between time stamps of sequential data items. In one embodiment, the method further includes applying a first account identification rule, associated with the first account type, to the account data, determine, based on said application of the first account identification rule, a first confidence level indicating likelihood that the account is the first type of account, in response to determining that the first confidence level is above a first threshold, applying a first account scoring model to the account data, the first account scoring model configured to determine an expected change to a current risk score associated with the user, receiving, from the user computing device, confirmation that the account of the user is the first type of account type, receiving, from the user computing device, a request to add the account with the recipient to risk data associated with of the user at a the secured third-party risk database, generating, based on portions of the plurality of data items and the account data associated with the recipient, an account creation data package, the account creation data package formatted for ingestion at the secured third-party risk database to initiate addition of the account to risk data of the user, identifying a security key associated with the secured third-party risk database, transmitting the security key and the account creation data package to the third-party risk database via a secure communication channel established with the third-party risk database, requesting execution of a risk scoring algorithm using risk data of the user at the secured third-party risk database, wherein the risk scoring algorithm is based at least partly on portions of the plurality of data items or the account data included in the risk data of the user, and providing risk score change information to the user computing device.
In one embodiment, a computing system is configured to perform operations comprising accessing a score impact rule indicating one or more account types that impacts risk scores of users, identifying an API token associated with a secured third-party risk database, transmitting the API token and a request for risk data of a user to the third-party risk database, accessing, via a secure communication channel established with the third-party risk database, risk data of the user, identifying a plurality of groupings of data items included in the risk data of the user, each of the groupings including a plurality of data items associated with an entity, determining, for each of the groupings of data items, an account type of a plurality of account types, identifying a first account type of the plurality of account types that impacts risk scores when added to risk data of respective users and is not included in the determined account types associated with the user, executing a score impact algorithm, based at least on the first account type and the risk data of the user, to determine a possible risk score change if an account of the first account type is added to the risk data of the user, and providing, to the user, an indication of the possible risk score change.
In one embodiment, the possible risk score changes indicates an estimated risk score. In one embodiment, the possible risk score changes indicates an estimated risk score increase or decrease. In one embodiment, the operations further comprise providing, to the user, an option to initiate addition of an account of the first account type to risk data of the user. In one embodiment, a first plurality of data items associated with a second entity indicate transactions of the user in a second account of the second account type. In one embodiment, the score impact algorithm is developed based at least on historical risk score changes of a plurality of other users in response to addition of respective accounts of the first account type to respective risk data of the users. In one embodiment, the operations further comprise executing a second score impact algorithm configured to estimate a second possible risk score associated with addition of a second account of a second account type to the risk data of the user, and providing, to the user, a second indication of the second possible risk score change.
In one embodiment, a non-transitory computer readable medium having processor-executable instructions stored thereon that are executable by a hardware computer processor to perform operations comprising accessing a score impact rule indicating one or more account types that impacts risk scores of users, identifying an API token associated with a secured third-party risk database, transmitting the API token and a request for risk data of a user to the third-party risk database, accessing, via a secure communication channel established with the third-party risk database, risk data of the user, identifying a plurality of groupings of data items included in the risk data of the user, each of the groupings including a plurality of data items associated with an entity, determining, for each of the groupings of data items, an account type of a plurality of account types, identifying a first account type of the plurality of account types that impacts risk scores when added to risk data of respective users and is not included in the determined account types associated with the user, executing a score impact algorithm, based at least on the first account type and the risk data of the user, to determine a possible risk score change if an account of the first account type is added to the risk data of the user, and providing, to the user, an indication of the possible risk score change.
Although several embodiments, examples and illustrations are disclosed below, the systems and methods described herein extends beyond the specifically disclosed embodiments, examples and illustrations and includes other uses of the embodiments and modifications and equivalents thereof. Embodiments are described with reference to the accompanying figures, wherein like numerals refer to like elements throughout. The terminology used in the description presented herein is not intended to be interpreted in any limited or restrictive manner simply because it is being used in conjunction with a detailed description of certain specific embodiments. In addition, various embodiments can comprise several novel features and no single feature is solely responsible for its desirable attributes or is essential to practicing the embodiments herein described.
In this example, aggregation unit 20 accesses the multiple data items 10, and identifies groupings (also referred to as “subsets”) of data items each associated with a common entity. For example, multiple data items of a user stored in a third-party database may be included in a grouping. A categorization unit 30 may then apply rules to the groupings of data items to identify groupings that match one or more patterns indicative of groupings of data items that should be added to the item database 70.
Authentication unit 40 allows a user of a user device 50 to provide authentication credentials that uniquely identify the user as associated with a set of data items in a particular data item database, such as a database operated by a particular third-party entity. In some embodiments, the authentication unit 40 also receives authentication credentials via the aggregation unit 20, for example. Thus, authentication of the user may occur at various levels. In some embodiments, the user is the owner of data items associated with the user and can control, set, change, and/or issue electronic permissions for use of varying sets, silos, individual data items, or even particular pieces of data within a data item, via the authentication unit 40.
The authentication unit 40 may then provide a set of authenticated data items 60 to item database 70, such as multiple data items 10 that were aggregated to a particular grouping of data items associated with the user, and matching a rule for addition to the items database 70. The user may then authenticate the grouping of data items, via input from the user device 50, to authenticate the grouping of data items for addition to the item database 70.
The item database 70, after receipt of authenticated data items 60, may determine that information of the corresponding database record, such as a record associated with the user, is to be updated. For example, the authenticated data items 60 may include a grouping of data items each associated with a particular entity (different than the entity from which the data items were accessed) that the user authenticated as begin associated with an account that the user would like to add to the item database 70, such as in a new database record associated with the user. Communication of the authenticated data items 60 to the item database 70 may occur via a secure communication channel established via an application programming interface (API).
In some embodiments, the item database 70 includes records associated with unique identifiers (for example, a key value and/or index value) for users. The system may determine that the received authenticated grouping of data items are associated with a particular database record because the authenticated data items include information that associates them with the particular database record. For example, the authenticated data items may include the unique user identifier, and/or the authenticated data items may include another identifier that may be used to map to the unique user identifier by reference to additional information. The system may then determine that the authenticated data items include additional information regarding the user that is not already in the database record for the user, and may therefore update the database record with the new information.
In some instances, the system may determine that the corresponding database record is not to be updated. For example, the authenticated data items may include one or more groupings of data items that are already included in the database record of the user. Accordingly, no update may be necessary, or in some instances the database record or associated database items may be updated to indicate that a duplicate of the authenticated data items was received.
The system may generate a log of each database record update performed by the system. In some implementations, the log includes one or more (which may include all) data items included in the corresponding database record, including any newly added grouping of data items. Further, the log may include an indication of the change or update that was performed in the item database 70.
Database record updates/changes may be continuously logged as the item database 70 is updated. Logging updates to the item database 70 may speeds up later evaluation of triggers. For example, as described below, triggers may be evaluated against the log of record changes, and may not need to be evaluated against the records database 70 as a whole. This aspect may significantly reduce processing power needed to generate event notifications. Further, because much information related to the updated record may be included in the log, the system may not need to re-query the database to generate notifications, further making the process of generating notification more efficient and less processor intensive. In some implementations, logs of database record updates may be stored in a historical database.
The triggers database 80 maintains rules indicating when alerts should be transmitted to entities responsive to changes in the item database 70. For example, the triggers database may maintain rules or criteria for transmitting a notification 90 to a user (such as via the user device 50) in response to certain changes in the database record of the user in the item database 70. For example, the user may establish such criteria based on various levels of granularity, so that the user is alerted of only those changes to their database record at the item database 70 of particular interest to the user. For example, a user may indicate that an alert should be sent to the user device 50 in response to addition of a new account data (associated with a grouping of data items) to the user's record in the item database 70. Thus, the trigger database 80 may monitor continuously or periodically, changes to the item database 70, apply trigger rules for each of a plurality of users, and transmit notifications accordingly.
The notification 90 may be in various forms, which may be selected by the user, by the system, and/or set as a system default. For example, notification 90 may be a push notification to a mobile application on the user device 50, which may cause an immediate display of the notification information on the user device screen, text message, email, and/or update to an online portal that the user may access to review additional information regarding the users database record with the item database.
In the example of
Aggregation unit 20 may aggregate account data from financial institutions, such as the data items 10. As an example, aggregation unit 20 may download transaction data items 10 associated with users from financial institutions, such that the users can review the transaction data from one or more financial institutions in one place. Aggregation unit 20 may also provide transaction data to the categorization unit 30, which is similar to the account discovery systems discussed below, such as after receiving authorization from users to provide such transaction data to the categorization unit.
Financial institutions may include, as examples, institutions maintaining demand deposit accounts (for example, checking and savings accounts) or other accounts (for example, credit card accounts, revolving card accounts, prepaid cash card accounts, reloadable card accounts, and so forth) on behalf of users, including accepting deposits into users' accounts and processing payments (including check and electronic payments) out of users' accounts to third parties such as utility or rent providers. Financial institutions may provide transaction data to account discovery system showing users' payments to utility and rent providers (for example, at the direction or authorization of said users).
Vendors or service providers may include various service providers such as landlords (for example, rental service providers), telecoms (for example, providers of telephone, internet, wireless accounts, cable, media such as television, movies, games, music, and other related services), and utilities (for example, providers of electricity, gas, water, trash, and related services). In general, service providers may include any entity which is regularly paid by users, such that those payments can be used as an indicator of credit risk associated with the user, and as discussed herein, added as a trade line in a users' credit data. For example, service provider accounts may include accounts for payment of child care, school tuition, gym memberships, after school programs, daycare service, medical care, home owners association dues, country club dues, insurance (such as, for example, automobile insurance, life insurance, medical insurance, dental insurance, vision insurance, disability insurance, and so forth), sports team dues, as well as other service provider account payments. While much of the disclosure references rental and utility providers, accounts with other service providers may also be added to users' credit data and used in credit scoring algorithms.
To facilitate an understanding of the systems and methods discussed herein, a number of terms are described below. The terms described below, as well as other terms used herein, should be construed to include the provided descriptions, the ordinary and customary meaning of the terms, and/or any other implied meaning for the respective terms. Thus, the descriptions below do not limit the meaning of these terms, but only provide example descriptions.
The terms user, individual, consumer, and customer generally refer to single persons, as well as groups of users, such as, for example, married couples, households, or domestic partners, organizations, groups, and business entities. Additionally, the terms may be used interchangeably. In some embodiments, the terms refer to a computing device of a user rather than, or in addition to, an actual human operator of the computing device.
User Input (also referred to as Input) generally refers to any type of input provided by a user that is intended to be received and/or stored by one or more computing devices, to cause an update to data that is displayed, and/or to cause an update to the way that data is displayed. Non-limiting examples of such user input include keyboard inputs, mouse inputs, digital pen inputs, voice inputs, finger touch inputs (for example, via touch sensitive display), gesture inputs (for example, hand movements, finger movements, arm movements, movements of any other appendage, and/or body movements), and/or the like.
Credit data generally refers to user data that is collected and maintained by one or more credit bureaus (for example, Experian, TransUnion, and Equifax) and is subject to regulatory requirements that limit, for example, sharing of credit data to requesting entities based on the Fair Credit Reporting Act (FCRA) regulations in the United States and/or other similar federal regulations. Regulated data, as used herein, often refers to credit data as an example of such regulated data. However, regulated data may include other types of data, such as HIPPA regulated medical data. Credit data can describe each user data item associated with a user, for example, an account balance, or any combination of the user's data items. Credit file and credit report generally refer to a collection of credit data associated with a user, such as may be provided to the user, to a requesting entity that the user has authorized to access the user's credit data, or to a requesting entity that has a permissible purpose (for example, under the FCRA) to access the users credit data without the user's authorization.
Credit Event (also referred to as an event) generally refers to information associated with an event that is reported by a financial institution to one or more credit bureaus and/or the credit data system discussed herein. The credit events may include, for example, information associated with a payment, purchase, bill payment due date, bank transaction, credit inquiries, and/or any other event that may be reported to a credit bureau. Typically one credit event is associated with one single user. For example, a credit event may be a specific transaction, such as details regarding purchase of a particular product (for example, Target, $12.53, grocery, and so forth) or a credit event may be information associated with a credit line (for example, Citi credit card, $458 balance, $29 minimum payment, $1000 credit limit, and so forth, such as a periodic (for example, monthly) provision of summary information regarding the credit line of the consumer that is provided by the credit issuer.
Non-traditional Credit Data generally refers to data that is not generally included in FCRA regulated credit data of consumers, such as consumer data stored by one or more bureaus. Types of nontraditional credit data may change over time, such as if the FCRA revises regulations to allow or require credit bureaus to store additional types of consumer data as credit data. Depending on the jurisdiction, nontraditional credit data types may include rental, utility, and/or telecom data, for example.
Self-Reported Account generally refers to a consumer account with a vendor or service provider, such as a utility, telecom, or rental company, that is added to credit data of the consumer at the request of the user. The account discovery system discussed herein provides an example of a computing system that may interact with a user to identify and update credit data of the user to include accounts that are Self-Reported Accounts. In general, self-reported accounts are associated with non-traditional credit data, such as utility, rental, and/or telecom payment data.
DDA Account generally refers to a checking, savings, or money market account of a user, but could be any other type of account. DDA accounts typically allow the user to deposit to and withdraw from the account substantially immediately, such as on demand, for example, through use of a credit card, debit card, paper check, online check, electronic transfer, and so forth.
While DDA accounts are discussed herein as sources for transaction data from which transactions of a user may be accessed, in some implementations additional types of accounts, such as credit card, PayPal, Venmo, and/or other currently existing or later developed payment platforms, may be used in identifying new consumer trade lines. Thus, any reference herein to a DDA account, or any specific type of DDA account, should be interpreted to include other embodiments where other types of accounts, such as credit card accounts, are accessed in place of (or in addition to) the referenced DDA account.
Financial institution generally refers to a bank or lender with which a user may have a DDA account, such as a bank with which a user may have a checking or savings account.
Trade line generally refers to credit data associated with a financial account of a user. For example, a checking account at a particular financial institution may be a first trade line of a user, while a savings account at the same, or another, financial institution may be a second trade line of a user. Trade lines may be summarized in credit data of users, such as by providing information regarding the financial institution, account balance, last account payment amount, payment status over prior months, and so forth.
Transaction and transaction data item generally refer to a particular payment from one entity to another entity. For example, a transaction may include Bob purchasing coffee on Friday morning. A transaction data item associated with that transaction may include data about the transaction, such as that it occurred on Aug. 10, 2018 and $7.18 was paid to Coffee123 from Bob's checking account 123 at Bank XYZ. Transaction data items may indicate transactions using various user accounts, such as checking account, savings account, or credit card account. While discussions herein of transaction data items is primarily with reference to transaction identified in DDA account data of a user, transaction data items may also include transaction in a credit card account, or other credit-based account, of the user. Thus, the groupings and analysis of transaction data items that is discussed herein is not limited to only DDA account data, but also may include credit card transaction (and other payment account) data. As another example, cash, cashier check, money order, wire transfers, and other similar forms of payment may be included in transaction data items that are analyzed by the account discovery system. Such forms of payment may require additional validation procedures, such as a photograph of a receipt from the payee.
Application Programming Interface (API) generally refers to a defined communication channel, protocol, settings, and so forth that allows two devices to exchange information between one another in a more direct manner than might otherwise be possible. In some embodiments, an API registration module may be configured to register individual devices (for example, computing devices, Internet of things devices, sensors, and so forth) for communication with a particular computing device (for example, a central server that receives, processes, stores, provides, information to the individual devices) by issuing a security token (for example, such as an API token or an API key) to the individual devices that authorizes such direct communications. Thus, a computing system may establish secure and direct communication channels with multiple devices via APIs.
The credit score is an important indicator of a user's financial health. A user's credit score may impact availability and/or terms (for example, interest rate) of such things as loan applications, rental applications, and real estate mortgages, as well as impacting the user's ability to find employment. Therefore, users have a substantial interest in monitoring and improving their credit scores.
Making timely payments and having those payments reported to national credit bureaus may improve a user's credit score. However, the types of financial accounts for which data is reported to the credit reporting agencies (CRAs), otherwise referred to as credit bureaus, is limited. For example, certain types of consumer accounts that could be used as indicators of risk associated with a lender extending credit to the consumer have not been historically included in credit data that is reported to the credit bureaus. In particular, telecommunications, utilities, real estate rentals, and other types of accounts associated with recurring statements, are not included in most credit score algorithms used by the credit bureaus. Thus, consumers that have good payment history with a home rental are not able to use that payment history in improving its the consumer's credit score. Accordingly, it may be desirable for a user to add telecommunications, utility, rental, and/or other recurring accounts (for example, records of payments to utility and rental providers) to users' credit data in order to improve the users' credit scores and related risk scores. Various systems and methods discussed herein provide a networking device architecture, as well as software usable on the various computing devices, to address this need for additional types of payment information being reportable to the credit bureaus. Other examples of recurring accounts that may be identified and added as trade lines to credit data of users may include accounts for payment of child care, school tuition, gym memberships, after school programs, daycare service, medical care, home owners association dues, country club dues, insurance (such as, for example, automobile insurance, life insurance, medical insurance, dental insurance, vision insurance, disability insurance, and so forth), sports team dues, as well as any other service provider account payments.
Some users, particularly those with poor credit scores or limited credit data, may benefit from adding non-traditional credit data to their credit reports. As an example, a user with limited credit data may see a significant boost in their credit score by adding, to their credit data, a utility account, showing recurring on-time payments to a utility provider, and a rental account, showing recurring on-time rent payments to a landlord. The present disclosure describes systems and methods that provide a technology platform for identifying and adding non-traditional credit data, such as rent and utility trade lines, to users' credit reports. Such accounts may then be referred to as self-reported accounts of the consumer. Additionally, the present disclosure describes issues that arise when attempting to add rent and utility accounts, such as issues with obtaining transaction data and assessing the reliability of transaction and account data.
In the embodiment of
In one embodiment, the data permissioning component 112 provides a communication channel with the transaction providers 100, such as via application programming interfaces (API's) of the particular transaction providers. Thus, the data permissioning component 112 advantageously allows the account discovery system 110 to access transaction data items of the user. With access to the transaction data items of the user, the account discovery system 110 may analyze the transaction data items to potentially identify one or more recurring payment accounts that are not already included in the consumer's credit data. As an example, the data permissioning component 112 may store users' usernames and passwords or security tokens in order to download transaction data from the financial institutions. As another example, the data permissioning component 112 may store records, certificates, or other material enabling the user account discovery system to download transaction data directly from financial institutions or via account aggregation services.
In the embodiment of
In one embodiment, the account verification component 116 performs account verification, such as by interacting with the user and/or one or more third-party system 130 to verify that the appropriate account type has been associated with the set of transaction data items and/or that the account is truly associated with the particular user.
In one embodiment, the trade line update component 117 provides information to one or more credit bureaus requesting addition of an identified and verified user account (for example, a “self-reported account” of the user) to credit data of the user. For example, the trade line update component 117 may format and compile information regarding a new account to be added to credit data of the user in different formats for each of multiple different credit bureaus and generate a secure data packet storing such information to be transmitted to a remote system. Additionally, the trade line update component 117 may coordinate periodic updates to trade line data stored at the credit bureau 140, such as monthly updates to a rental account that was added to the credit data of the user previously by the trade line update component 117.
In one embodiment, the updated credit score usage component 118 provides updated credit information regarding the user (for example, an updated credit score of the user that considers a newly added rental account) to credit requesters. For example, a new account (or trade line in the credit data of the user) may be considered by various credit scoring algorithms in calculating risk scores of the user. Thus, if a new rental account of the consumer is added to the consumer's credit data, and the consumer has a history of on time rental payments, the consumer's credit score may increase immediately, or very soon, after addition of the new rental account information at the one or more credit bureaus. In some embodiments, the updated credit score usage component 118 provides alerts, such as in real time as credit data of a user is changed.
In some embodiments, the account discovery system 110 includes a user interface module (not shown) that interfaces with users. As an example, the user interface module may generate user-facing user interfaces, such as the user interfaces shown in the figures discussed below. Additionally, the user interface module may receive inputs and commands from the users, such as via interface with the user interfaces. As examples, the user interface module may receive a user's agreement with terms and conditions, may receive a user's identification of which financial institution to connect to, may receive credentials for connecting to an identified financial institution, may receive confirmations of and/or revisions to transaction data, may receive additional verification information such as copies of a lease agreement, and so forth.
In this way, the account access system 202 maintains a layer of security between the account discovery system and the consumers financial data held by the financial institution (or other transaction provider 100). In other embodiments, the various components 112, 114, 116, 117, and 118 may be combined or separated, various computing systems and/or entities. For example, in one embodiment each of the components 112, 114, 116, 117, and 118 are operated by different entities.
In one embodiment, the systems and methods discussed herein provide an authenticated access and aggregation database platform. For example, in one embodiment a data processing system is disclosed for data processing, including database and file management, as well accessing one or more databases or other data structures, authenticating users, and categorizing data items for addition to the database system. In some embodiments, the system may be configured to coordinate access to user account information via user-provided authentication credentials; apply account identification rules to the accessed account information to identify a plurality of accounts of the user; and initiate updates to a database record associated with the user indicative of any accounts identified.
In one embodiment, a computerized method of obtaining information regarding user accounts is performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system to perform operations comprising receiving, from a user computing device, a request to access financial account information associated with a user, selection of a financial institution indicator from a plurality of financial institution indicators indicated in a user interface on the user computing device. The method may further include receiving, from an account access system, account data associated with a financial account of the user with a payee, the account data indicating an account type and an associated payee, wherein the financial account is a rental account, a utility account, or a telecommunication account. The method may further include receiving, from the user computing device, confirmation that identified account type for the payee is accurate, a request to add the financial account with the payee to credit data of the user. The method may further include generating, based on portions of the plurality of transaction data items and the account data associated with the payee, a trade line creation data package, the trade line creation data package formatted for ingestion by a credit bureau to initiate addition of the trade line to credit data of the user, transmitting the trade line creation data package to the credit bureau, requesting a credit score of the user from the credit bureau, wherein a credit scoring algorithm executed by the credit bureau to generate the credit score is based at least partly on portions of the plurality of transaction data items or the account data included in the credit data of the user. The method may further include providing credit score change information to the user computing device.
In one embodiment, the method may further include receiving, from the user computing device credentials for accessing financial account information associated with the user at the selected financial institution, the credentials including a username and a password, selection of a financial account of the user at the financial institution via the user interface on the user computing device, the user interface displaying one or more of a checking account, a savings account, or a credit card account of the user at the financial institution. The method may further include accessing a plurality of transaction data items of the selected financial account of the user at the financial institution. The method may further include selecting a first transaction data item of the plurality of transaction data items, determining a payee identified in the first transaction data item, identifying a subset of transaction data items each indicating the determined payee, wherein the subset of transaction data items includes at least the first transaction data item and one or more other transactions data items. The method may further include, for individual payees, determining, based at least on the identified subset of transaction data items, account data associated with a financial account of the user with the payee, the account data comprising at least one or more of a number of payments, an annual payment amount, average payment amount, or average number of days between payments. The method may further include applying a first account identification rule, associated with a first account type, to the account data, the first account identification rule based on one or more of the number of payments, the annual payment amount, the average payment amount, or the average number of days between payments, determine, based on said application of the first account identification rule, a first confidence level indicating likelihood that the financial account is the first type of account. The method may further include applying a second account identification rule, associated with a second account type, to the account data, the second account identification rule based on one or more of the number of payments, the annual payment amount, the average payment amount, or the average number of days between payments, determine, based on said application of the second account identification rule, a second confidence level indicating likelihood that the financial account is the second type of account. The method may further include, if the first confidence level is higher than the second confidence level, identifying the financial account as of the first type of account, if the first confidence level is lower than the second confidence level, identifying the financial account as of the second type of account.
In one embodiment, the systems and methods discussed herein provide user permissions for access to secure data at third-party. For example, in one embodiment a user permission system manages and regulates access to secure data at one or more third-party data sites. The system may provide access to one or more databases or other data structures based on user authentication and access rules that have been established, such as by a user associated with the data being accessed at the third party data store. Access may be provided via an API to the third-party data site, along with access credentials of a user with data stored with the third-party data site, allowing the system to access data on behalf of the user.
In one embodiment, a computerized method of obtaining information regarding user accounts is performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system to perform operations comprising transmitting user interface data to a user computing device, the user interface data configured to depict a permissions interface element that is selectable to indicate authorization to access financial account information associated with the user, receiving, from the user computing device, authorization to access financial account information associated with the user. The method may further include, in response to receiving the authorization to access financial account information associated with the user, receiving, from the user computing device, selection of a financial institution from a plurality of financial institutions indicated in a user interface on the user computing device, receiving credentials for accessing financial account information associated with the user at the selected financial institution, identifying an API key associated with the selected financial institution, transmitting, to an online address of a system in electronic communication with the selected financial institution, the API token and the credentials, receiving, via the system, indicators of one or more financial accounts of the user with the selected financial institution, receiving, from the user computing device, selection of a financial account of the one or more financial accounts, accessing, via a secure communication session initiated with the API token, a plurality of transaction data items of the selected financial account of the user at the financial institution. The method may further include transmitting user interface data to the user computing device, the user interface data configured to depict a user interface on a display of the user computing device, the user interface including one or more interactive elements selectable to indicate authorized uses of the transaction data items by the computing system, receiving, from the user computing device, selection of authorized uses of the transaction data items, selectively sharing, based on the authorized uses of the transaction data items, the transaction data items with one or more third parties.
In some embodiments, the authorized uses of the transaction data items include one or more of use in: identifying recurring payments, updating credit data of the user, calculating derived attributes, or calculating a risk score. In some embodiments, transaction data items associated with a post date more than one year prior to a current date are disregarded. In some embodiments, transaction data items associated with a post date more than two years prior to a current date are disregarded. In some embodiments, the access component is operated by the computing system. In some embodiments, the access component is operated by a third-party.
In one embodiment, a computerized method performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system to perform the computerized method comprises accessing a plurality of data items associated with a user via an application programming interface (API) communication channel established with a third-party database, selecting a first data item of the plurality of data items, determining a recipient identifier in the first data item, accessing a recipient data structure storing indications of associations between recipient identifiers and corresponding recipients, wherein a first recipient is associated with a plurality of recipient identifiers used by different third-party databases to identify the first recipient, determining that the recipient identifier is associated with the first recipient in the recipient data structure, scanning the plurality of data items to identify a subset of the data items each associated with the recipient identifier, wherein the subset of data items includes at least the first data item and one or more other data items, determining, based at least on the identified subset of data items, account data associated with an account of the user with the first recipient, the account data comprising at least one or more of a number of data items each having time stamps within a predetermined time period; or an average number of days between time stamps of sequential data items, applying a first account identification rule, associated with a first account type, to the account data, determining, based on said application of the first account identification rule, a first confidence level indicating likelihood that the account is the first type of account. The method may further include, in response to determining that the first confidence level exceeds a threshold confidence level, initiating addition of the account to the secured third-party risk database.
In one embodiment, a computerized method of identifying accounts of a user each associated with a plurality of transaction data items is performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system to perform the computerized method comprising accessing a plurality of transaction data items indicative of transactions of a user with one or more financial institution, selecting a first transaction data item of the plurality of transaction data items, determining a payee identifier in the first transaction data item, accessing a payee data structure storing indications of associations between payee identifiers and corresponding payees, wherein a first payee is associated with a plurality of payee identifiers used by different financial institutions to identify the first payee, determining that the payee identifier is associated with the first payee in the payee data structure, scanning the plurality of transaction data items to identify a subset of the transaction data items each associated with the payee identifier, wherein the subset of transaction data items includes at least the first transaction data item and one or more other transactions data items, determining, based at least on the identified subset of transaction data items, account data associated with a financial account of the user with the payee, the account data comprising at least one or more of: a number of payments, an annual payment amount, an average payment amount, or an average number of days between payments, applying a first account identification rule, associated with a first account type, to one or more of the number of payments, the annual payment amount, the average payment amount, or the average number of days between payments of the account data, determining, based on said application of the first account identification rule, a first confidence level indicating likelihood that the financial account is the first type of account, in response to the first confidence level exceeding a threshold confidence level, determining an expected risk score impact of including the account data a risk data set associated with the user, in response to the expected risk score exceeding a threshold, initiating addition of the account data to the risk data set associated with the user.
The method may further include selecting, based on the account data, the first account type from a plurality of account types including at least a rental account type, a utility account type, and a telecommunication account type. The method may further include selecting, based on the account data, the first account type from a plurality of account types that each require recurring payments from account holders. The method may further include applying a second account identification rule, associated with a second account type, to the account data, the second account identification rule based on one or more of the number of payments, the annual payment amount, the average payment amount, or the average number of days between payments, and determining, based on said application of the second account identification rule, a second confidence level indicating likelihood that the financial account is the second type of account. In one embodiment, the plurality of transaction data items are indicative of transactions of the user with a first financial institution and a second financial institution, a second transaction data item from the second financial institution includes a second payee indicator that is different from the first payee indicator, and the first payee indicator and the second payee indicator are each associated the first payee in the payee data structure.
In one embodiment, the systems and methods discussed herein provide generation of data structures based on categories of matched data. For example, in one embodiment a data processing system communicates with a secure third-party database to provide updated user data that is then usable by a plurality of other entities. In some embodiments, the system may be configured to coordinate access to user account information via user-provided authentication credentials, apply account identification rules to the accessed account information to identify a plurality of accounts of the user, and initiate updates to a database record of the user at the secure third-party database associated indicative of any accounts identified.
In one embodiment, a computerized method of updating user risk data, the computerized method performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system to perform the computerized method comprises receiving, from a user computing device, a request to update credit data of the user with account information regarding an account identified in direct deposit account data of a financial payment account of the user, generating a trade line creation data package including an identifier of an issuer of the account identified in the direct deposit account data, a data furnisher identifier associated with an entity that provides consumer data to a credit bureau; and at least a portion of the account information formatted for ingestion by a credit bureau to initiate addition of the account to credit data of the user. The method may include identifying an API key associated with the credit bureau, and transmitting the API key and the trade line creation data package to the credit bureau, wherein the account information is usable by the credit bureau to update a risk score of the user.
The method may further include periodically receiving payment information associated with the account from the direct deposit account data of the financial payment account; and transmitting the periodically received payment information to the credit bureau.
The method may further include executing a credit scoring algorithm to generate the credit score of the user based at least on the account information stored by the credit bureau.
In one embodiment, the systems and methods discussed herein provide a database platform for realtime updating of user data from third party sources. For example, in one embodiment a data processing system communicates with a secure third-party database to obtain information about a user that is usable to determine one or more items associated with the user. The system then coordinates gathering and identification of additional data relevant to the user from other third-party data sources, to potentially update the user's information stored with the secure third-party database. The updated information may then be accessed at the secure third-party database to determine items associated with the user, which may include additional items in view of the additional data.
In one embodiment, a computerized method, performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system to perform the computerized method comprises determining identification information of a user, obtaining a current risk score associated with the user, determining a first one or more product offers available to the user based on the current risk score, determining a second one or more product offers not available to the user based on the current risk score, determining an estimated risk score of the user based on hypothetical addition a new trade line of the user to risk data of the user, in response to determining that at least one of the second one or more product offers would be available to the user based on the estimated risk score, providing an option to the user to initiate updates to risk data of user, in response to the user selecting the option to initiate updates to risk data, initiating communication of the user with an account discovery system, receiving, from the account discovery system, an indication of an updated risk score of the user, wherein the updated risk score is higher than the current risk score based on addition of the new trade line to risk data of the user by the account discovery system, determining at least one of the second one or more product offers that are now available to the user based on the updated risk score, and providing the at least one of the second one or more product offers to the user. The method may include providing credit score change information to the user computing device.
In one embodiment, the systems and methods discussed herein are usable in estimating changes to user risk indicators based on modeling of similarly categorized users. For example, in one embodiment a data processing system communicates with a secure third-party database to obtain information about a plurality of users and generates a model usable to identify other users with similar characteristics. A scoring algorithm may be selected for use on user data based on the associated users identified with the model. The scoring algorithm determines an estimated score change for the user, and may provide the user information regarding how the user can achieve the estimated score change.
In one embodiment, a computerized method, performed by a computing system having one or more hardware computer processors and one or more non-transitory computer readable storage device storing software instructions executable by the computing system to perform the computerized method comprises accessing a score impact rule indicating one or more account types that impacts credit scores of users, accessing credit data of a user, identifying a plurality of accounts included in the credit data, determining account types of the plurality of accounts in the credit data, identifying a first account type of the one or more account types that impacts credit scores of users that is not included in the determined account types of the plurality of accounts of the user, execute a score impact algorithm, based at least on the first account type and credit data of the user, to determine a possible credit score change if an account of the first account type is added to the credit data of the user. The method may include providing, to the user, an indication of the possible credit score change.
The method may include identifying a plurality of other users associated with addition of accounts of the first account type, analyzing account data of the plurality of other users, based on the aggregated account data, generating the score impact algorithm configured to determine, for respective users, possible credit score changes based on addition of accounts of the first account type.
In some embodiments, other users are identified as users having accounts of the first account type with account attributes within predetermined threshold of the account attributes of the account of the user.
In some embodiments, the predetermined threshold is of payment history, payment amount, or account subtype of the accounts.
Example System and Process
The illustration of
Beginning with block 402, the user engages an account discovery system, such as a system that may be controlled and/or operated by a credit bureau. Account discovery systems may include credit bureaus, such as Experian, TransUnion, and Equifax, as well as agents of credit bureaus, such as entities that provide credit data to users that is accessed from one or more credit bureaus, but is made available to the user via a third-party user interface (for example, via a website or mobile application). In some embodiments, the user provides login credentials, or establishes a credit monitoring account with a credit bureau, in order to access credit information via the account discovery system 110.
In some embodiments, the user accepts terms and conditions 404 agreeing to the account discovery system's rights and responsibilities, authorizing performance of the functional modules of
Data Permission
In the embodiment of
At block 410, the user may be provided with a user interface that lists, or allows the user to search for, a financial institution (or other transaction provider 100) with which the user has a DDA account. In other embodiments, the user may indicate a financial institution in other manners. Next, in block 412, the user provides credentials that allow the account discovery system 110 (
Moving to block 414, the user selects a particular DDA account held at the financial institution, such as from a list of DDA accounts that is retrieved directly from the financial institution by the data permissioning component 112 (whether performed by account discovery system 102 or another system/entity). For example, the user may be provided with an option to select one or both of a XYZ bank checking account or a XYZ savings account after providing credentials for XYZ bank in block 412. In some embodiments, the user may be allowed to connect a credit card account also, so that transaction data items include payments made through the credit card account. While
Depending on the embodiment, user authentication may be performed using various methods and based on various information. For example, authentication information may comprise a user-selected personal identifier, a username/password combination, biometric data (for example, faces, fingerprints or eye scans), and/or other information that can be used to authenticate a user. Similarly, various authentication protocols may be implemented to authenticate the user and/or any entities that are requesting information regarding the user's credit information, such as the service providers discussed herein. For example, a requesting user may send an electronic request to a token gateway environment (of the account discovery system 110 or account access system 202) with credentials, and then the token gateway environment may validate the credentials with a security and access management environment using a standard open protocol such as OAuth (for example, OAuth 2.0, which is generally an authorization framework that enables applications to obtain limited access to user accounts).
Account Identification
In the example of
As another example of an account identification process that may be performed by the account identification module, transaction data items in Bob's checking account with XYZ bank may indicate that Bob has paid a regular amount to Al's Landlord Service on the last day of each month over the last two years. Thus, the account identification module may identify these regular transactions as being part of a rental account that may qualify for inclusion as a trade line in Bob's credit data (at one or more credit bureaus). Other types of accounts that may be identified include utility accounts (electrical, gas, water, and so forth), mobile phone accounts, and other accounts that are associated with payments indicative of credit worthiness of the account holder.
In some embodiments, the transaction processing of block 420 may be performed by the account discovery system 110, while in other embodiments a third-party that accesses and/or aggregates financial account information, such as account access system 202 (for example, as illustrated in
In some embodiments, the account identification component 114 applies or executes one or more models that are configured to categorize transactions across multiple months or years of transactional data of the user. For example, in some embodiments, the account identification component 114 may search transaction data items of a user for transactions that occur with a certain periodicity, within a certain monetary range of one another, with certain keywords or characters in the payee's name (or other information, such as a memo or “for:” information field provided by the user), and/or any other attributes that may be associated with transaction data for the user. Data item groupings may then be created to indicate sets of data items that are believed to be associated with a particular account of the user. In some embodiments, each data item groupings is associated with a different payee.
In some embodiments the account identification component 114 may calculate a confidence level or score indicating likelihoods that the particular transaction data item should be included in a grouping of data items. Thus, for a particular transaction data item (for example, $4.58 purchase at Starbucks #417325 on Mar. 21, 2018 at 6:38 AM), multiple confidence levels may be calculated to indicate strength of correlation with multiple transaction groupings. In this implementation, the transaction data items may be associated with a transaction grouping for with a highest confidence level for the transaction data item was calculated. In some embodiments, a transaction data item confidence level may additionally need to exceed a threshold confidence level for the transaction data item to be associated with a grouping.
The account identification component 114 may associate an account type with each identified account (for example, each grouping of data items for particular payees) in the user's transactional data. For example, a first identified account (for example, associated with 24 separate monthly payments identified in Bob's checking account data) may be indicated as a rental type account. Account types may include a general account type (for example, telecom, utility) and/or a specific account type, or may have additional levels of categorization. For example, telecom account types may be further categorized as mobile phone, phone, internet, cable, or satellite accounts, while utilities account types may be further categorized as gas, electric, water, power, solar, or trash account.
In some embodiments, characteristics of transaction data items that are analyzed to help identify potential accounts of a given user may include payee identifier (or normalized payee identifier), description or memo associated with the transactions, transaction amount, transaction periodicity, and/or other related transaction characteristics. For example, in one embodiment information regarding the payee on each transaction (for example, in the transaction data item for the transaction) is normalized for matching with other transactions, such as from the same payee. For example, extraneous characters in the payee information, such as characters that are associated with a payment account or number of the transactions (for example, an electronic check number), may be removed or disregarded. Additionally, payee information may be standardized, such as by identifying a standardized identifier for a particular payee that may be associated with various adaptations of payee information for that particular payee. For example, a standardized identifier for a payee (for example, “Southern California Edison”) may be associated with multiple variations of payee information that could be used by different financial institutions in identifying transactions with that payee (for example, “SCE”, “So Calif Edison”, and so forth). Thus, through standardizing payee information of transaction data items, matching of transaction, even from multiple DDA accounts of the user, may be associated as payments to a particular account.
In some embodiments, additional data of a transaction data item may be normalized, standardized, or otherwise cleansed for use in matching the corresponding transaction with other related transactions (for example, other transactions to the same payee). For example, the description or memo associated with transactions may be analyzed and used in matching. For example, memo information that is handwritten on a paper check may be recognized using optical character recognition to determine the memo. A handwritten “rent” in the memo of rental payment checks each month may be used by the account identification component 114 to match the monthly rental payment checks as each being related to a rental payment of the user. Further, text input into a memo field may be parsed to be used in the matching. Additionally, in some embodiments the transaction amount of transactions is used in matching to other related transactions. For example, transactions of an identical amount (for example, to transactions for exactly $29.99) may have a higher likelihood of each being grouped together as associated with a common payee and user account than transactions of different amounts. In some embodiments, a range or percentage variation in payment amounts may be determined as within a tolerance zone such that transaction data items that vary within the tolerance zone (for example, payment amounts within 5% of the average payment amount for the grouping) are not disqualified from being in the grouping associated with a particular payee. For example, an electrical account may vary from month to month depending on usage by the user that month. Thus, a transaction amount rule may indicate that transaction amounts within a range of 20% of an average transaction amount for a group of transactions does not disqualify the transaction as being associated with the electrical account of the user. In some embodiments, third-party data may be access to determine and/or adjust tolerance zones for grouping transaction data items with one another. For example, for an electrical account, whether information may be accessed for the month corresponding to a particular transaction data item to determine an expected change in electrical power usage based on weather conditions that might cause additional (or less) power use.
In some embodiments, the account identification component 464 identifies a transaction periodicity for transactions that are preliminarily identified as being associated with a common payee. For example, the account identification component 464 may calculate an average time between payments to Electric Company as 31 days, with the shortest time between payments as 26 days and the longest time between payments as 34 days. Other statistical values associated with timing of the transaction data items, such as median, mean, standard deviation, and so forth, may also be calculated in certain embodiments. This transaction periodicity may then be used as a factor in determining whether the transactions should be grouped as being associated with a common payee and, thus, with a particular account of the user.
In some embodiments, the account identification component 114 determines one or more confidence levels or scores for each identified grouping of transaction data items. For example, a confidence score may indicate a likelihood that the identified grouping of transaction data items is associated with an account of the indicated type. For example, the confidence level may be based on factors such as periodicity of transactions, amount of transactions, payee information, and so forth that may indicate likelihood that each of the associated transactions are properly correlated with a particular payee and account of the indicated type. Thus, a lower confidence score may indicate that the identified transactions are only somewhat likely to be associated with a particular account type or trade line of the user, while higher confidence scores would indicate that the identified transactions are more likely associated with a particular trade line of the user.
Depending on the implementation, the account identification component 114 may determine an overall confidence level or score (for example, a single common score that indicates the overall likelihood that a grouping of transaction data items are associated with a particular type of account and/or with a particular payee) and/or may determine transaction-level confidence scores (for example, a score for each individual transaction, or for groups of transactions, each of which indicates the likelihood that that particular transaction, or group of transactions, is associated with a particular grouping of transaction data items and/or with a particular payee). In some embodiments, the confidence levels or scores may further consider a minimum frequency and/or recency requirement for addition of a self-report account as a tradeline in the user's credit data. For example, some or all types of self-reported accounts may be required to have at least three payments within six months to even be considered for addition as a trade line. Thus, for an account with three payments within seven months, even if there is a high confidence level in the account type being appropriate for addition as a trade line (for example, the transaction data items are associated with a wireless account), the account will not be transmitted to the credit bureau for addition as a tradeline. In some embodiments, the frequency and recency requirements for addition of trade lines may vary based on account type.
In some embodiments, the account identification component (and/or the account verification component) validate ownership of a DDA account by the user to ensure that the appropriate user is provided the potential credit score boost from payments included in the DDA account. For example, an account ownership validation component may receive information regarding an account, such as name, address, email address, phone number, etc, from the financial institution. This account ownership information may then be compared to user information associated with the user's account with the account identification system, such as a credit monitoring account. The account ownership information could be provided by the account access system, such as via an API communication to the account discovery system, so that the account discovery system may perform the account ownership validation matching and validation. Such account ownership validation may increase the likelihood that a user only gets credit for the accounts that they pay (and belong to them).
Account Verification
The account verification module generally processes the account information provided by the account identification component 464, attempts to verify the account information as being accurate, and/or determines if additional information may be needed to confirm accuracy of the account information. For example, an account of a user should not be added to the user's credit data unless the account accurately indicates payment activity of the user and, correspondingly, can be used as a factor in determining creditworthiness of the user. In the discussion below, an “account” is generally associated with a single payee (for example, a particular electric company, cellular provider, and so forth) as well as a grouping of transaction data items that have each been determined to be associated with the single payee by the account identification component 464. The accounts identified by the account identification component 464 may not include an account number provided by the payee since the account was identified based on transaction data items of the user that may not include the account number. As discussed below, in some embodiments additional information regarding an account, which may include an account number that is verifiable with the payee, for example, may be automatically collected and/or provided to the account discovery system.
At block 430, a list of accounts for possible inclusion in credit data of the user is provided to the account verification module (whether provided by the same or different entity as the account identification component 464). For example, the list of accounts may include, for each account, an account type, transactions associated with the account (for example, the transaction data items that were each categorized as associated with the account), a confidence score or scores, and/or other related information.
At block 432, the user confirms accuracy of each of the identified accounts, or indicates that one or more of the accounts is not accurately reflected (for example, transactions indicated as associated with a cell phone account may not actually be associated with a cell phone account). In some embodiments, a user interface indicating the identified accounts, or potentially just those identified accounts having confidence scores below a threshold or minimum confidence score for positive identification of the account type, may be provided to the user. The user may then select, or deselect, identified accounts to indicate those that are accurate. In some embodiments, transaction data associated with an indicated account may be displayed for review by the user. Additionally, the user may indicate that an identified account is legitimate, but that one or more of the particular associated transactions are not associated with the identified account. For example, an identified utility account may be associated with 14 transaction data items (for example, payments) over the prior 12 month period, and the user may indicate that two of the indicated transactions are not associated with that particular utility account. In such embodiments, the account verification module (and/or other modules discussed herein) may update the transaction data items associated with the identified account, which may in turn update the confidence level that the account is of the determine type (for example, a utility type).
In some embodiments, the user can indicate missing transaction data items to be added to an account. For example, if a cellular service provider account is missing three monthly payments over a 12 month period, the user may indicate that the payments were made during those three months with information regarding the payments. For example, the user may indicate that the payments were made from another DDA account with another financial institution and provide credentials allowing the account discovery system to access transaction data items of the user at that other financial institution. The transaction data items may then be identified in the other DDA account data and combined with the grouping for the cellular service provider.
Moving to block 434, for those accounts that the user has verified (for example, indicated are actual accounts of the user of the identified type at block 432), a determination is made as to whether additional information may be needed from the user and/or a third-party before providing the account to one or more credit bureaus for addition as a trade line to the user's credit. Thus, in some embodiments one or more criteria or rules may be applied to the identified account information to determine whether the account is sufficiently accurate and reliable for inclusion in the user's credit data. For example, a rule may indicate that for any identified rental accounts, additional account verification information is required before providing the new rental account to a credit bureau. As another example, a rule may indicate that a minimum number of transactions and/or minimum number of payments must be associated with an account for the account to qualify for addition to the user's credit data. In some embodiments, such a rule may vary based on the identified account type (and/or subtype), such that for a first account type (for example, rental) a minimum of eight payments are required, while for a second account type (for example, electricity), a minimum of 12 payments are required.
If additional information is needed (for example, the result of block 434 is a determination that additional information is needed), the process moves to block 436, where additional information is requested from the user and/or a third-party. For example, a user may be asked to provide additional information, such as a typical monthly payment amount and/or payment date for a particular identified account. This additional information may then be provided back to the account identification module (and block 420 repeated) to better categorize transactions that may be associated with the account. For example, with the typical payment amount and payment date provided by the user, the account identification module may identify additional payments that were not initially identified (and, similarly, may exclude certain payments that were initially identified). Thus, the additional information may increase likelihood of the identified accounts being eligible for addition to the user's credit data. In some embodiments, the user may provide information regarding an account that was not identified in the initial account identification block 420, so that the account identification module may potentially identify a new account only after the user provides additional information.
In some embodiments, a third-party is contacted for further information to verify a (potential) account of the user. For example, a mobile phone account may be verified with a request to the mobile carrier identified in the transaction data for the account. Such verification may be performed via an API call to the mobile carrier, which may return simply a binary (for example, yes or no) verification indication, or detailed transaction information regarding the account (such as payment history, payment timing, bill due dates, and so forth).
In some embodiments, the user and/or a third-party may provide documentation confirming authenticity of the identified account. For example, for an identified (potential) rental account of a user, the user may be asked to upload a scanned or photographed copy of a lease agreement that may be analyzed to confirm the rental account. In this example, the lease agreement may be automatically parsed (for example, after optical character recognition) and information, such as monthly payment amount, payment due date, landlord, and so forth, may be extracted and compared to account information included with that particular account (such as the grouping of transaction data items associated with the payee from the account identification module 464).
In some embodiments, other information and/or data sources may be accessed to verify accuracy of financial accounts. In some embodiments, one or more of the processes of scanning the user's DDA account (block 420), transmitting identified accounts (block 430), providing the user an opportunity to confirm accuracy (block 432), determining if additional information is needed (block 434) and requesting such additional information (block 436), may be repeated multiple times to enhance the accuracy of the identified account information and/or confidence level in categorization of transaction data. Additionally, in some embodiments the data permissioning process (beginning at block 410) may be performed as part of the account verification process to access additional transaction data items of the user from additional DDA accounts.
Trade Line Updating
In the embodiment of
If the user indicates a desire not to add the account to the user's credit data at block 440, the process may end, or may return to a prior block, such as block 410 where the user is asked to connect to one or more additional financial institutions, to block 430 where a list of accounts already identified is provided to the user, or to another block.
At block 442, the account discovery system updates profile information of the user to indicate the added trade line. In some embodiments, the account discovery system may generate or estimate the user's credit score based on account information (for example, trade line information) maintained by the account discovery system (or by a credit bureau or other entity that controls the account discovery system), such as without requesting credit data from a credit bureau. Additionally, the user profile information may be provided to the user in various formats and levels of detail, such as in user interfaces that are displayed to the user via a mobile application, web browser, text messages, and so forth, and which allow the user to interact with the provided information.
If the user requests the addition of the account to credit data of the user (at block 440), at block 444 the account discovery system generates a new trade line request for transmission to a credit bureau (or multiple credit bureaus in some embodiments). For example, the account information may be formatted in the same manner as account information provided by a typical credit data furnisher, such as a credit card lender that regularly provides account information to credit bureaus for addition (or updating) of trade lines associated with its credit card holders. In some embodiments, the format is the Metro 2 format. In other embodiments, other formatting may be used to prepare account information for transmission to the credit bureau. In some embodiments, the format of the trade line request is customized for the particular credit bureau. For example, a first format may be used for transmission to the first credit bureau while a second format is used for transmission to a second credit bureau. In some embodiments, communication with credit bureaus may be accomplished via API calls.
At block 446, the credit bureau receives the formatted trade line information (generated at block 444) and processes the information to add the trade line to the user's credit data. In some embodiments, the credit bureau applies the same requirements for adding new trade line information to a user's credit file as would be applied to other trade line information (for example, from other data furnishers). Thus, if the trade line information is not usable to uniquely identify a user in the credit bureau's data, the trade line information may not be added to the requesting user's credit data or, depending on the circumstances, may be added with reference to a newly added credit record for the user indicated in the trade line information.
In some instances where trade line information is transmitted to the credit bureau, a trade line for the payee may already exist in the user's credit data. Thus, the transmitted trade line information may be used to supplement the account information (for example, to include additional transactions that are not already reflected in the user's credit file).
Updated Credit Score Usage
In the embodiment of
At block 450, one or more scoring models may be applied to the user's credit data (including the newly added trade line) to generate updated credit scores for the user. For example, a scoring algorithm that includes utility account data as an input variable may be evaluated after addition of a utility trade line to the user's credit data to produce an updated (for example, higher) credit score for the user.
Various entities may apply scoring algorithms and/or otherwise access credit data of users. For example, in some embodiments the credit bureau may apply a credit scoring algorithm periodically to each users' credit data, such as nightly, so a credit score that is no more than 24 hours old is always quickly available to requesters. In some embodiments, the credit bureau may apply a credit scoring algorithm in response to requests for credit data of a particular user, such as in real-time in response to receiving an inquiry for credit data of a user. In some embodiments, the credit bureau may apply a scoring algorithm provided by another user risk assessment entity, such as by providing credit data of the user to a scoring server configured to analyze the credit data using a proprietary credit scoring algorithm and output to the credit bureau the resultant credit score for the user. Thus, in some embodiments, the account discovery system 110 may not know how particular credit data of users' impacts credit scores generated using the proprietary credit scoring algorithm. In other embodiments, other entities, such as financial institutions, marketing companies, and so forth, may generate risk scores based on credit data, and possibly other data, of the user.
At block 452, the updated credit score of the user may be used in identifying offers to provide to the user. For example, the account discovery system 110 may receive an indication of the user's new credit score (after addition of a new rental, utility, or telecom trade line, for example) and determine whether the user is prequalified for one or more financial products, such as credit cards, personal loans, refinance loans, car loans, and so forth Such financial products may not have been available to the user or may only have been available on less desirable terms (such as a higher interest rate) prior to addition of the new rental, utility, or telecom trade line to the user's credit data (for example, Alice's credit score may have increased from 600 to 625 after adding a rental trade line indicating she has regularly paid her rent over a two-year period, and Bank XYZ Bronze Credit Card may only be offered to users with a credit score above 620). Depending on the embodiment, the updated credit score (and/or additional user credit data) may be compared to offer criteria by the account discovery system 102 and/or another entity, such as directly by a financial institution.
At block 454, the user receives a notification of a change in credit data, such as an indication that the user's credit score has changed. The notification of block 454 may be one example of notification 90 sent to user device 50 of
In some embodiments, the account discovery system 102 requests an updated credit score of the user after providing the new trade line information to the credit bureau. Account discovery system 102 may request the updated credit score immediately after providing the new trade line information or after some amount of elapsed time (for example, one second, five seconds, and so forth after transmitting the trade line data to the credit bureau). Thus, in this embodiment the account discovery system 102 may receive the newly calculated credit score of the user within seconds of addition of the trade line to the user's credit file. After the new calculated credit score is received, the account discovery system 102 may optionally display to the user a change in the user's credit score (for example, a plus or minus amount) attributable to the newly added account.
In some embodiment, after the user has been shown an updated credit score, an option to remove a trade line from the user's credit file is provided via the user interface. For example, if the user adds a new utility account to the user's credit data, such as via the method discussed above, a newly calculated credit score may be displayed to the user via the account discovery system website, mobile application, text message, and so forth If the newly calculated score is lower than a previous score of the user, for example, the new utility account trade line actually decreased the user's credit score, the user interface may provide an option for the user to remove the new trade line credit data. For example, a button, check-box, link, or other user interface feature associated with removal of an account from credit data may be selected by the user to initiate a removal process. In response to a request for removal of a trade line, the account discovery system 102 may transmit a properly formatted request to one or more credit bureaus requesting removal of the trade line.
In various embodiments discussed herein, alerts and/or notifications (which may be used interchangeably) are automatically transmitted to a device operated by the user whose credit data has been updated and/or requested (for example, such as notification 90 sent to user device 50 of
Calculation of Expected Score Boost
In some embodiments, an estimate of impact on the user's credit score may be provided to the user, such as an expected credit score increase (or decrease) even before the user provides permission to the account discovery system to identify new trade line's (for example, at block 402). For example, an expected credit score impact may be calculated for users based on an expected impact of adding an account type (for example, an electrical account) that is currently missing from the user's credit data, and perhaps that is typically included in credit data, to the user's credit data. The account discovery system and/or an affiliated system may provide the expected credit score increase associated with the addition of an electrical account to the user as an incentive for the user to engage the account discovery system.
Depending on the embodiment, this expected (or “simulated”) credit score may be generated using the same scoring model or algorithm as is used to provide the user with their actual credit score (for example, that would appear in the user's credit report). In some embodiments, the expected credit score, or credit score change (for example, a plus or minus amount), may be determined based on a different model or algorithm, such as a scoring algorithm that is developed by the account discovery system 102 based on previous changes in credit scores of other users due to addition of particular types of accounts and/or accounts with particular ranges of attributes (for example, payment history, payment amount, account subtype, and so forth).
In one implementation, a score impact rule indicating one or more account types that impact risk scores of users are accessed. Next, an API key associated with the financial institution is identified and transmitted to the financial institution with a request for transaction data of the user. Via secure communication channel established with the financial institution, transaction data items of the user are obtained. Next, a plurality of groupings of the accessed data items are identified, such as groupings of data items associated with an entity. An account type for each of the groupings of data items may be determined, and then a first account type that impacts credit scores of users that is not included in the determined account types of the user may be identified. This account type represents a type of account that could be added to the credit data of the user to potentially impact credit score of the user. A score impact algorithm may be executed to determine a possible risk score change if an account of the first account type is added to the risk data of the user. The score impact algorithm may be based on the first account type and the existing credit data of the user.
Thus, in some embodiments a scoring model may be developed and improved over time, such as by a machine learning algorithm that analyzes credit information of users before and after addition of new trade lines for patterns in how credit scores are affected by such additions of trade lines. In some embodiments, such a scoring model may also consider user demographics and credit history in developing an algorithm for predicting credit score impact by the addition of new trade lines. For example, a user with a thin credit file (for example, less than two trade lines) may benefit greatly by addition of a cellular service account, while a user with a thick credit file (for example, three or more trade lines) may not see a credit score impact by addition of the same cellular service account. In some embodiments, an estimated credit score is not provided to the user prior to adding the account to the user's credit data (for example, a newly generated credit score may only be provided after the new account is added as a trade line at block 440).
Example Methods
Beginning at block 510, an account discovery system may be accessed by a user. For example, the user may visit a website of a credit monitoring service, such as may be provided by a credit bureau. The user may contact the account discovery system in response to an advertisement or other communication offering to help the user increase the user's credit score and/or qualify for a financial account. The user may then provide the account discovery system authorization to access DDA transaction data of the user at one or more identified financial institutions. As an example, the account discovery system may receive a user's authorization together with the user's username and password for a particular financial institution, such that the user account discovery system can prove to the financial institution it is authorized to retrieve the user's transaction data. In some embodiments, other forms of authentication of the user are requested for decreasing likelihood that a fraudster is attempting to access the user's financial account data. Further details of receiving the user's authorization to access DDA transaction data are discussed below.
Moving to block 520, the account discovery system accesses DDA transactions at the identified financial institution(s). Block 520 may involve downloading records of some or all of the DDA transactions made available to the user by the identified financial institution(s). In some embodiments, the access to DDA transactions is via an API communication channel that is established between the account discovery system and the financial institution. In other embodiments, the DDA transactions are accessed via a front end interface, such as the same or similar user interface that may be displayed to the user.
Continuing to block 530, the account discovery system categorizes the DDA transactions. For example, the user account discovery system identifies, from a plurality of transaction data items accessed at the indicated financial institution, a group of transactions associated with a particular payee. As an example, the system may identify monthly recurring transactions made to the same payee as being categorized together and associated with a single account (for example, an electric, water, or wireless account). Additionally, the system may identify a second set of transaction data items made to another payee and, based on account identification rules, determines that the second set of transaction data items are associated with a rental account of the user.
At block 540, the account discovery system receives a user's confirmation of the identified accounts. For example, the user account discovery system may identify, in block 530, a particular set of transaction data items as being associated with a particular utility account, may identify that the utility account is believed to be of a certain type (such as an electricity bill from a given utility), and may identify various attributes of the account such as the average payment, the maximum payment, the minimum payment, and so forth. Then, in block 540, the user account discovery system may provide at least some of this identified information to the user and receive the user's verification that the information is correct. The user may verify that individual transactions are properly categorized, that the identified account is correctly identified, and so forth.
At block 550, the user account discovery system may assess the reliability of the identified account and may, optionally, obtain additional information to verify that the account is of the type indicated. For example, the user may be asked to take a driver license photo, use an app to scan in a document (for example, associated with the account), provide electronic authorization to request automatic sending of electronic verification from a third-party (such as the account issuer), and so forth. Further details of account verification processes are discussed below.
At block 560, the account discovery system initiates addition of the account(s) as trade line(s) in the user's credit data. For example, the system may generate a data package formatted for ingestion by a particular credit bureau to allow the credit bureau to add the account as a new trade line of the user.
At block 570, the account discovery system recalculates the credit score of the user, based on the newly updated credit data (for example, including any newly added trade lines).
At block 580, the user account discovery system provides the updated credit score to the user and/or to third-parties. The updated credit score can be used by such third parties in determining whether to offer credit, and at what terms to offer said credit, to the user. By including additional trade lines such as rent and utility accounts, the updated credit score may more accurately reflect the credit worthiness of the user. In some embodiments, the updated credit score may be provided to, and usable, by the user and/or authorized third parties substantially immediately after the account is added as a new trade line to credit data of the user. For example, the credit score of the user may be recalculated in substantially real-time in response to addition of a new trade line to credit data of the user, and the recalculated credit score may similarly be provided to the user and/or authorized third parties substantially real-time in response to calculation of the updated credit score.
Example System, Method, and User Interfaces for Accessing DDA Data of Users
The data permissioning component 112 may further communicate with the user device 120 to obtain credentials that allow the data permissioning component 112 to access transaction data items of the user at a transaction provider. These user credentials may include a login ID and password for a particular transaction provider, or any other credentials that the user may have been issued that allow the user and/or the account access system 202 to access transaction data items in the user's secure account with the transaction provider. The data permissioning component 112, with a valid API token issued from a transaction provider and access credentials from the user device 124 that transaction provider, may initiate communication with the particular transaction provider and access transaction data items of the user with that transaction provider.
In the embodiment of
Beginning at block 710, a user provides authorization to the data permissioning component 112 to access DDA account information of the user at one or more transaction providers. For example, a consumer may authorize a credit bureau to initiate communication with a financial institution at which the consumer has a checking account for purposes of analyzing transactions in that checking account. For example, user interface 810 illustrates an example user interface that may be presented to a consumer on a mobile device, such as a cell phone or tablet. A similar user interface may be provided on a desktop computing device of a user or any other consumer electronic device. Any references herein to a mobile device or mobile user interface are provided for illustration purposes and should not be construed to limit implementations of the systems and methods herein to only those specifically mentioned mobile device or mobile user interfaces. Conversely, any mobile device or mobile user interface could also be implemented with a desktop, laptop, or other computing device and associated user interfaces.
Returning to
In one example implementation, the account discovery system may create a user record in an API from the account access system 202 (or more particularly, with the data permissioning component 112). The account discovery system 110 A may then generate a redirect URL and iFrame URL that are delivered to the user device (for example, user interface 910). The user within interacts with the iFrame URL, such as to provide login credentials and two factor authentication information, directly with the data permissioning component 112. After the user is authenticated with the financial institution, the account identification component 114 and/or other components of the account discovery system 110 A may access financial account information of the user has the financial institution via an API connection established by the data permissioning component 112. In one embodiment, after authorization to access a particular user's financial account information at a particular financial institution has been established, the data permissioning component 112 (and/or other related components) may request financial account information (for example, transaction data items) of the using a user-specific token, such as may be issued by the data permissioning component 112 and/or an API token generator/manager of the financial institution. Thus, the account identification component 114, for example, may immediately and/or periodically in the future, access transaction data items of the user at the financial institution using an API call that includes the user specific token. In some embodiments, an entity token may also be required, such as a token issued to the data permissioning component 112 that authorizes the account access system 202 to access user data at the financial institution (for example, with a user specific token).
Next, at block 730, with the user authenticated at the financial institution (via the data permissioning component 112), the account identification component 114 and/or other components of the account discovery system 110A, may access the users financial account information. In the example of
At block 745, a security token, such as an API token or key, is associated with the user account at the financial institution, so that the account identification component 114 and/or account access system 202 can use the security token to securely access transaction data items of the user at the financial institution. In one embodiment, a security token is an encrypted way of storing a username and password. It ensures that when the account discovery system is connecting to the financial institution of the user to get account information, it is safe and secure. For example, the security token may be provided to an API interface of the financial institution to authorize access to financial account data of the user at the financial institution. The security token may have a limited life (for example, two hours, two days, two weeks, and so forth) and may be associated with additional restrictions on use of the security token.
Moving to block 750, the account identification component 114 may use the established communication channel with the financial institution to access transaction data items of the user. For example, the account access system 202 may provide the user specific token (for example, as discussed above with reference to block 745) to the financial institution to obtain access to transaction data items in the one or more DDA accounts of the user associated with the user specific token (which the user previously authorized the account access system 202 to access).
At block 780, transaction data items of the user are accessed via a secure communication session with the financial institution. In some embodiments, transaction data items are copied to the account access system 202 for further analysis. In some embodiments, a subset of transaction data items, such as those within a predetermined time or meeting other filter criteria, are provided to the account access system 202.
At block 790, the transaction data items are accessible to the account identification component 114, for example, to analyze for indications of financial accounts (for example, utility, rental, telecom, and so forth) that may not already be in the credit data of the user, and which could be added to credit data of the user to potentially increase the credit score of the user.
Example System, Method, and User Interfaces for Categorizing Data Items
In some embodiments, the method of
Beginning at block 1110, a payee included in the transaction data items is selected. A user transaction data items, even with a single financial institution, may include dozens, hundreds, thousands or more transaction data items. Thus, categorization or grouping of the transaction data items may be initiated in various manners. For purposes of illustration, at block 1110, a particular transaction data items included in the set of access transaction data items is selected for analysis. In some embodiments, multiple transaction data items may be concurrently selected and analyzed, such as via a process similar to that illustrated in
For the selected transaction data items, at block 1120 a payee identified in the transaction data item is determined. For some transaction data items, the payee is included in a separate payee field as digital information, for example, a payee may be indicated as “ABC Rentals” in a “PAYEE” field of a transaction data item. For some transaction data items, the payee may not be as easily identifiable. For example, a paper check may include a handwritten payee. The account identification component 114 may analyze the handwritten payee information, such as by using a handwriting analysis algorithm and/or other optical character recognition algorithm, to identify digital characters included in the payee field. For the example payee ABC Rentals, character recognition of a handwritten version of ABC Rentals may result in something that is not precise such as “ABC Reatils”. Thus, correlation of transaction data items by payee may be technically challenging in such circumstances. In some embodiments, categorization of transaction data items associated with a recurring account of the user may be based on other parameters of the transaction data items, rather than or in addition to the payee identifier.
In some embodiments, the account identification component 114 performs a normalization and/or standardization process on data values of the transaction data items. For example, standardization may include removal of certain special characters (for example, symbols), correction of typographical errors (for example, which could catch the typo “Reatils” and correct to “Rentals”) and/or perform other standardization processes. A normalization process may involve accessing a payee data structure associating a normalized payee identifier with one or multiple possible payee identifiers that could be located in transaction data items. Example, the payee data structure could include a standard payee identifier of “ABC Rentals” that is associated with multiple variations of that payee identifier, such as “ABC Rental”, “ABC-Rentals”, “ABC Rentals Inc.”, and so forth. In this way, the account identification component 114 can more accurately associate transaction data items that are each involve a common payee.
In some embodiments, other data values of transaction data items are normalized, standardized, and used in generating groupings of similar transaction data items. For example, information provided in a memorandum or other informational field of a transaction data item may be analyzed.
After performance of block 1120 on a selected payee (block 1110), a grouping of transaction data items, each associated with the selected payee, are identified. Thus, if the transaction data items are associated with monthly payments to the selected payee, and two years of transaction data items are processed, the grouping of transaction data items identified at block 1120 may include 24 transaction data items.
Moving to blocks 1130-1150, information summarizing, characterizing, or aggregating information in the grouping of transaction data items located at block 1120, is performed. The information derived in blocks 1130-1150 is provided as examples of information that may be determined to help evaluate whether the grouping of transaction data items indicate an account of the user that potentially could be added to the credit data of the user. In other embodiments, other information may be derived from the grouping of transaction data items.
At block 1130, an annual payment amount for the transaction data items is calculated. For example, transaction amounts for each transaction data item dated within a prior 12 month period may be summed to determine the annual payment amount. A similar process may be performed for a prior yearly period, such as transaction data items dated from 24 months prior to 12 months prior. Similarly, total payment amounts for other time periods may be developed, such as quarterly or semiannually.
At block 1140, an average payment amount is determined. For example, an average payment amount over the prior one year period may be determined by averaging payments received over the last 12 month period.
At block 1150, periodicity of payments is determined. For example, an average number of days between payments over the prior one year period may be determined by averaging the number of days between each pair of sequential transaction data items.
At block 1160, the account identification component 114 determines whether there are additional payees in the transaction data items that have not yet been analyzed for categorization. In some embodiments, those transaction data items grouped with the transaction data item selected at block 1110 are not the selected for grouping. In other embodiments, each transaction data item, whether already associated with a grouping of transaction data items or not, is analyze with the method of blocks 1110-1150. If additional payees have not yet been analyzed for categorization, the method returns to block 1110 where another payee is selected. If no additional payees need categorization, the method continues to process for identifying the type of account each grouping of transaction data items is most associated with and identifying any accounts that may be added to credit data of the user.
Beginning at block 1210, a payee included in the transaction data items is selected. For example, a payee that is associated with a grouping of multiple transaction data items (for example, 24 transaction data items spanning a period of 24 months of transaction data items) is selected.
Next, at block 1220, rules for identifying a probable account type associated with the grouping of transaction data items are executed. Such rules may be stored in a datastore and/or in a rules engine. In some embodiments, the payee identifier (for example, the normalized payee identifier) may be a significant factor in determining account type associated with the transaction data items. For example, is the normalized payee identifier is associated with a well-known wireless provider, designation of those transaction data items grouped with the wireless provider ID may be categorized as a wireless account without further application of account determination rules. In some implementations, even where a payee of multiple groups transaction data items is well-known, additional rules may be applied to the transaction data items, as well as the overall information derived at blocks 1130-1150, for example, to validate that the grouping of transaction data items really is for the believed account type. For payee identifiers that are not well-known (for example, an account types is not readily known for a grouping of transaction data items associated with a particular payee), account identification rules may be applied.
Next, at block 1230, a confidence level that a grouping of transaction data items is of a particular account type is determined. For example, at block 1220 a rule set for a rental account may be applied to the grouping of transaction data items and at block 1230 the confidence level that the grouping of transaction data items really is a rental account is determined. In some embodiments, the rules applied at block 1220 automatically output the confidence level of block 1230, thus, these blocks may be combined in certain implementations.
At block 1240, the account identification component 114 determines whether the confidence level calculated at block 1230 is above a threshold that indicates sufficient confidence that the selected account type accurately reflects the grouping of transaction data items. For example, if a rental account rule set is applied to the grouping of transaction data items at block 1220, a confidence level that the grouping of transaction data items are associated with a rental account is determined at block 430, and at block 1240 a confidence level threshold is compared to the confidence level calculated at block 1230 to determine if the transaction data items are associated with a rental account. In some embodiments, the threshold levels vary based on the account type. For example, a confidence level may be higher for rental account then for a wireless account.
If the confidence level is above the threshold at block 1240, the method continues to block 1270 where the grouping of transaction data items are associated with the selected account type.
Depending on the embodiment, the confidence level associate with a grouping of transaction data items may be based on various information regarding the transaction data items, the financial account of the user, the financial institution from which the account information was obtained, the user (and/or related users, such as those in the same household), and/or other related characteristics. As an example, the account identification component 114 may determine if there are a sufficient number of transactions for the account to be reliable, may determine if the transactions were reported by a sufficiently reliable financial institution, and/or may determine if the transactions are consistent enough with patterns expected for such accounts (for example, rent transactions with amounts that vary each month may indicate a lower reliability that the transactions accurately reflect a rental account of the user, utility transactions with a payee name that doesn't match a known utility provider may indicate a lower reliability, and so forth). In some embodiments, the account identification component 114 may assign individual reliability scores to each of multiple factors, such as number of transactions, reliability of the associated financial institution, consistency with typical patterns for such accounts, and so forth, and may combine the individual reliability scores to determine an overall reliability score. In some embodiments, a threshold confidence level may include both individual reliability scores for each of one or more individual factors and a an overall reliability score for all of the factors that are determinative of reliability.
If the confidence level is not above the threshold at block 1240, the method continues to block 1250 where the account identification component 114 determines if additional information may be helpful in increasing the confidence level associated with the grouping of transaction data items. As an example, the account identification component 114 may determine that the account is a rental account and that obtaining a copy of the lease agreement would significantly improve the confidence of the system that the rental transactions are accurate, reliable, and properly associated with a rental agreement. As another example, the user account discovery system may determine that the account is a utility account and that confirming one or more details of the user's account directly with the utility provider would significantly improve the system's confidence in the utility account (for example, the account's reliability).
If additional information may be useful at block 1250, at block 1280 additional information is requested from the user and/or a third-party. In some embodiments, information regarding transactions that may be missing in a grouping of transaction data items may be requested from the user and/or third-party to supplement the transaction data items acquired directly from the transaction provider and increase the confidence level. In some embodiments, the types of additional information and/or sources of additional mission may vary based on the account type being analyzed. In some embodiments, additional information may only be requested if the confidence level is already near the threshold, such as within 10% of the required confidence level.
As other examples, the user may be asked to provide the date and amount of a monthly rent (or other utility, wireless, or other) payment; the user may be asked to provide a copy of a lease agreement, a utility bill, or other such confirming information, the financial institution may be asked to provide additional details of the transactions, utilities may be asked to confirm account and/or transaction details, rental providers may be asked to confirm rental agreement details, and so forth.
If additional information is not needed at block 1250, the account identification component 114 determines at block 1260 whether the grouping of transaction data items should be analyzed against other account types. For example, if the transaction data items are initially tested against rental account rules, at block 1260 the account identification component 114 may determine that utility account type rules should now be applied to determine whether those transaction data items are an utility account. If no additional account types are to be tested, the method continues to block 1290 where additional payees, or groupings of transaction data items associated with an additional payee, remain to be tested against the account type rules. If additional groupings of transaction data items do remain, the method continues to block 1210 where another grouping of transaction data items, associated with a particular payee, is selected and analyzed. At block 1295, associations of transaction data item groupings with account types, as well as potentially the confidence levels associated with the identified account types, are stored for later access.
If a determination is made that additional information is requested from a third-party, at block 1320 a request for the additional information is transmitted to the third-party and at block 1330 the third-party provides additional information. Such additional information may include, for example, demographic information of the user that may be compared to information associated with a payee on the groups transaction data items to confirm that the user lives within a service district of the payee. If a determination is made that additional information is to be requested from the user, at block 1340 the information is requested from the user, such as via the mobile application or website with which the user is already interacting with the account discovery system, and the user provides requested additional information at block 1350. Examples of additional information that may be provided by a user could include a payment type (for example, cash, handwritten check, cashier check, and so forth), payment amount, digital images of payments, digital images of account specific information (for example, monthly invoices or statements from the payee), and so forth. In one example embodiment, the user is requested to provide a digital copy of at least a portion of a rental agreement to validate terms and existence of a rental account. Information from the rental agreement may be extracted, such as through an optical character recognition processing, to identify key terms of the rental agreement and compare such terms to information included in (or derived from) the grouping of transaction data items.
Beginning at
In some embodiments, the system may interact with the user via a chat window (for example, a pop-up window) that may be operated by a chatbot to request the information needed from the user and/or provide the user with educational information regarding the process. In some embodiments, such chatbots may be entirely automated (for example, using artificial intelligence that learns how to best interact with users over time) or may be partially operated by a human operator (for example, when the chatbot is unsure of how to respond to a query from the user). Similarly, any other user interactions discussed herein may be partially or fully performed via a conversational format, with a chatbot (for example, fully or partially automated) interacting with the user via primarily textual communications.
User interface 1910 request information from the user regarding a few potential accounts that could be added to the credit data of the consumer. The user interface request that the user confirm that payments to the identified payees are actually made by the user and, accordingly, could properly be used in calculating credit worthiness of the user. In this embodiment, if the user does not recognize payees listed, those payees can be removed by clicking the acts the right of the payee data identifiers.
After the user selects payees with which the user has an account, the user may select a confirmation indicator element, such as an “I make these payments” link or button, and be presented with a user interface 1920 which indicates that the account identification process performed by account identification component 114 (referred to loosely as a “scan” in certain of the user interface features discussed herein) has completed. The user interface further indicates that two accounts, of the type that may be added to credit data of users, have been identified. In this particular example, an electrical account (associated with the payee “So Calif Edison”) and a wireless account (associated with the payee “T Mobile”) have been identified.
User interface 1930 illustrates an example of a request for additional information from the user, in this case related to a potential lease account for which transaction data items were identified in the user's transaction data. Advantageously, the user may launch a camera on their mobile application directly via the user interface 1930 and take one or more snapshots of the lease agreement. The lease agreement may then be processed by the account identification component 114 to validate a grouping of transaction data items associated with a lessee as indicative of a rental account of the user that may be added to credit data of the user.
User interface 2020 includes further details regarding the payments that were found in the transaction data items. In this example, two years of prior data is illustrated graphically such that the user can identify months where they transaction data item was not located. In this example, April 2018 payment was not identified in the transaction data items. In some embodiments, the user is given an opportunity to update the account information with payments may outside of the linked DDA account. For example, the user may be given the opportunity provide a copy of a cashiers check that was used to make the payment to So Calif Edison in April 2018 so that the historical payment activity for the account shows no missed payments over the last two years. Finally, after the user has reviewed information regarding the located account and related transaction data items, the user can select the “add to my credit file” button to initiate addition of the account to the user's credit file.
Since there are a few missing payments, the user may want to review the payment transaction items that were identified by the account identification component 114 to determine if some of those missing payments can be located (for example, in another DDA account of the user). Similarly, the user may want to provide the account identification component 114 with additional information regarding payments made to the payee, such as an alternate payee identifier that may have been used in certain transaction data items. As another example, the user may want to authorize access to another DDA account where payments to the payee may also be located. Through these processes, the user may improve the payment history associated with the account and, accordingly, may further increase a score impact by addition of the account to credit data of the user. In some implementations, a user interface such as
The user interfaces of
Also shown in the example of
Ongoing Access to Transaction Data Items
In some implementations, the account discovery system 110 periodically access transaction data items of the user, such as via the data permissioning component 112 that communicates with the financial institution of the user using the user security token. For example, the account discovery system 110 may periodically access recent transaction data items, for example, those transaction data items that are new since the financial account of the user was last accessed, to search for additional accounts of the user that could be added to the user's credit data. In some embodiments, the user is provided with a permissions dashboard that allows the user to selectively authorize uses of data associated with self-reported (and possible other) accounts of the user. For example, the user may opt into use of their credit data (including self-reported data) in calculation of other risk indicators and/or for other financial analysis or products. In one embodiment, the use can authorize use of credit data to calculate multiple risk indicators using various risk scoring algorithms. Some risk scoring algorithms may consider the self-reported accounts in the credit score calculation, while others may not directly consider the self-reported accounts in a credit score calculation, but may indirectly consider the accounts to the extent they impact the total debt, monthly payment obligations, equity, and so forth of the user.
Example user interface 2320 provides the user with example circumstances where further information may be available to identify accounts for addition to the user's credit data. In this example, the user is provided an opportunity to connect an additional account to the account discovery system 110, such that additional transaction data items may be included in the account discovery process. For example, if the user previously authorized access to a checking account, the user may additionally authorize access to a savings account or another checking account at different financial institution, to allow analysis of additional transaction data items that may be indicative of a utility, telecom, rental, and so forth account.
Example user interface 2330 is an example request the may be made to the user in an attempt to update payee information that may be indicated in transaction data items of the user (and/or other users). Such a request may be used to obtain data from the user that enhances the system's ability to identify transactions that the user can use to boost their credit score. In some embodiments, the user may be asked to provide examples of transactions that should qualify for the boost (for example, telecom and utility payments) and/or payee identifiers in transactions that are associated with a particular payee or type of payee. This user-provided information may then be used by the account identification component 114 to better identify transactions and accounts that could be added to credit data of the user.
In the example user interface 2330, the user is requested to provide information regarding the specific payee ID that is used in the transaction name by the user's financial institution, where the specific payee ID used by the financial institution may differ from other payee IDs for the same payee that are used by other financial institutions and/or that are included in the payee database. Thus, the payee ID information provided by the user may then be added to the payee database and used when analyzing other user transaction data items to better match transaction data items from that particular financial institution and payee with the appropriate standardized payee identifier.
In some embodiments, the account identification component 114 periodically accesses additional transaction data items of the user and searches those transaction data items for new payment information associated with accounts that have previously been added to the user's credit data. For example, if a wireless account is added after an initial processing of transaction data items from a checking and savings account of a user added financial institution, those same checking and savings accounts of the user may be accessed monthly (or other time period) to search for new payments to the wireless account. After identifying payments to the wireless account, information regarding the new payment may be provided to the credit bureau as an update to status of the trade line. In this way, self-reported accounts may be added to credit data and updated on an ongoing basis with payment information, in a similar manner as traditional credit accounts are initially reported to the credit bureaus and updated with monthly payment information.
In some embodiments, ongoing access to transaction data items and providing updated payment information on self-reported tradelines may continue indefinitely. For example, as long as the account remains connected and the credentials remain active, the account discovery system may periodically access new transaction data items which may allow identification of new payments that meet criteria for addition of an account as a trade line, and user may be notified they have new boost available for them to use to increase their credit score.
Such ongoing access to transaction data items may allow new accounts for a boost to be identified as more payments are made to the corresponding payee. For example, if the user on initial scan only had one or two months of payment history identified for a particular payee, new transaction data items may be received over the following months to obtain the required threshold payment months for adding credit data. In this example, the user may be notified via email (or other communication medium) of the qualifying account based on newly received transaction data items, and the account may be added to the user's credit data at the request of the user, or automatically upon identification (for example, if the user authorized later addition of the account when the initial scan was performed).
In some embodiments, the user provides permissions for later accesses to transaction information and/or may provide subsequent permissions to access the transaction information. In some embodiments, if a new payment for a tradeline has not been identified in transaction data items for more than a threshold time period (for example, three months, six months, and so forth), the self-reported tradeline may automatically be removed from credit data of the consumer. Additionally, as noted elsewhere, the user can remove permissions to periodically access transaction data at one or more financial institutions at any time.
In some embodiments, any disruption in monthly (or other periodic) updates to self-reported accounts, such as based on accessing transaction data items that one or more financial institutions in identifying payment information on those self-reported accounts, may trigger a notification to the user. For example, if a monthly scan of transaction data items from a DDA account (where a previous 12 months of payments on a self-reported account were identified) does not result in identification of a payment on the account, an alert may be transmitted to the user. For example, a text message, push notification, email, or other notification may be transmitted to the user device to alert the user of the missing payment. In some circumstances, the user may have inadvertently missed payment on the self-reported accounts and the notification provides the user with the ability to remedy the missed payment as quickly as possible. Alternatively, if the user purposefully missed payment, perhaps in conjunction with closing the account, the notification allows the user to indicate to the account discovery system that the self-reported accounts should be removed from credit data of the user. In some embodiments, alerts may be provided to the user based on other triggers, such as if credentials associated with a DDA account with financial institution have changed (for example, the transaction data items are no longer accessible by the account access system). Such an alert may request updated credentials (and/or new account information if the account has been canceled or transferred) from the user so that the system may be re-permissioned to access the transaction data items of the user account.
Example System, Method, and User Interfaces Associated with Trade Line Addition
As noted above, after the new trade line has been added to the user's credit data, that new trade line is immediately usable by credit scoring algorithms. User interface 2720 illustrates a scoring interface that may be displayed to the user shortly after addition of a new trade line to the user's profile. For example, after the user selects and identified account to be added as a trade line to credit data of the user, the new trade line creation data package may be prepared and sent to the credit bureau (and a user interface such as user interface 2710 may be provided to the user), and in response to confirmation that the new trade line has been added to the credit data of the user a scoring algorithm may be executed on the updated credit data of the user to generate an updated credit score. In the example of
Removal of Added Trade Lines
In some implementations, addition of new trade line to the user's credit data may not have the desired effect on credit score of the user. For example, in some situations, addition of a new trade line may actually cause the credit score of the user to decrease, or to not change at all. Accordingly, in some embodiments, the account discovery system 110 provides a mechanism allowing the user to remove any previously added self-reported trade line from their credit data.
In some implementations, an improvement to the credit situation of a user may be realized through addition of self-reported accounts, even if the credit score of the user decreases or stays the same. For example, a user's overall credit health could be seen as improving if addition of a self-reported account increases the total number of trade lines above a thin file threshold (for example, four or more trade lines) so that the user is seen as a thick file user. Thus, while a credit score increase is a straightforward indicator of credit health of a user, other factors associated with creditability of the user may also be considered by potential lenders, landlords, partners, and so forth. Accordingly, in some embodiments, the accounts discovery system provides educational material to the user, such as when their credit score has not increased responsive to a boost (or has actually decreased responsive to a boost), so that the user has an option to either remove the self-reported account or to maintain the self-reported account in the user's credit data because of an advantage in overall creditability of the user with the newly added self-reported account.
Example user interface 2920 provides additional information to the user regarding reasons that newly added accounts that have caused the credit score of the user to drop may still be beneficial to keep in credit data of the user. For example, user interface 2920 explains that the credit file of the user is being evaluated different now that it has additional trade line's, which may allow the user to qualify for additional offers even with a lower credit score. User interface 2930 further explains that lenders won't see newly added positive bill payments in the trade line that was added by the account discovery system, but that the user's credit score will go back up when the trade line is removed.
Should the user decide to remove one or more self-reported accounts that have been added by the account discovery system, such as by selecting user interface element 2912 or 2932, removal of the recently added account from the credit data of the user is initiated. Thus, users can remove accounts added through the account discovery system and their credit score will revert to the same score they had prior to addition of the new trade line. If the user continues to pay their utility and telecom bills on time to build positive payment history, they may later use the credit score update features again to recalculate their (hopefully increased) score,
Example System, Method, and User Interfaces Associated with Updating Offers to the User
Beginning at block 3000, the offer provider determines identification information of a user, such as information that is usable to obtain a credit score of the user. In block 3010, a current risk score of the user is obtained and/or calculated. For example, identification information obtained at block 3000 (for example, first name, last name, address, Social Security number, and so forth) may be provided to a consumer reporting agency with a request for a current credit score of the user. If the offer provider has the necessary permissible purpose for obtaining credit data of the user, the consumer reporting agency will calculate and return a current credit score of the user.
Moving to block 3020, the offer provider determines a first one or more product offers available to the user based on the current risk score. For example, each of multiple credit card offers (or automobile loans, home loans, or other offers) may be associated with a minimum credit score that qualifies users for the particular credit card offer. Thus, the credit score of the user may disqualify the user from eligibility for certain credit offers. Similarly, the credit score of the user may qualify the consumer for a first one or more credit offers (for example, those credit offers having eligibility criteria including a minimum credit score that is lower than the current credit score of the user). Accordingly, the offer provider may determine a first set of offers that the user is eligible to receive (and which the user may ultimately qualify for after full application) at block 3020 and a second set of offers that the user is not ineligible to receive (and for which the user would ultimately not qualify for after full application) at block 3030.
Next, at block 3040, the offer provider provides the user with an option to initiate updates to risk data of the user, such as by allowing the user to interface with the account discovery system to potentially identify self-reported accounts that could be added to credit data of the user to increase the user's credit score. In response to the user selecting the option to initiate updates to credit data, at block 3050 the offer provider initiates communication between the user and the account discovery system. The user may then interface with the account discovery system to provide the necessary permissions to access financial data, validation of account information, and confirmation that located accounts may be added to the user's credit data.
Next, at block 3060, the account discovery system may automatically provide an updated credit score of the user to the offer provider, such as by requesting execution of a credit scoring algorithm on credit data of the user after a new trade line creation data package has been transmitted to the credit bureau. In other embodiments, after the account discovery system has interfaced with the user, a notification may be transmitted to the offer provider indicating that a new credit score of the user may be requested again. In such case, the offer provider may obtain an updated risk score of the user with a similar process as described above with reference to block 3010.
At block 3070, with the newly calculated credit score of the user, the offer provider identifies one or more of the second set of product offers (which the user was not eligible for previously) for which the user is now qualified. For example, if the user's credit score increased from 650 to 680 based on one or more added trade line's by the account discovery system, the user would not have qualified for a credit card requiring a credit score of 660 prior to the score increase, but would qualify for the credit card after the score increase (assuming the user meets any other eligibility requirements for the credit card).
At block 3080, the new credit offers for which the user now qualifies are provided to the user, so that the user can potentially apply for any of the first set of credit offers and/or any of the newly identified credit offers from the set.
The example user interface 3220 is provided to a user after detecting that the user does not have a credit score yet, which could be the case for teenagers or young adults, retired persons, ex-patriots, and so forth. With the availability of self-reported accounts to credit data of users, establishment of a credit report having one or multiple trade lines, as well as a corresponding credit score, may be significantly simplified. For example, payment history for a rental property over the course of many months or years may very quickly be added to credit data of the user.
The example user interface 3230 is provided to a user in response to the user applying for credit, perhaps prior to the user finalizing and agreement for credit. In this example, the user may increase their credit score by adding self-reported accounts to their credit data and thereby become eligible for a better credit offer than the one they previously applied for. In other embodiments, other triggers for providing invitations to explore addition of nontraditional accounts to credit data of users may be used.
System, Method, and Example User Interface Associated with Calculating Expected Score Increase
Beginning at block 3310, a score impact rule indicating a plurality of account types impacting credit scores of users may be accessed. For example, the score impact rule may indicate that rental accounts, water accounts, and electrical accounts impact credit scores of users, while country club accounts do not impact credit scores of users.
At block 3320, credit data of a user is accessed, such as information regarding current trade lines and trade line types included in credit data of the user.
Next, at block 3350, the score impact rule is applied to the determined account types already in the user's credit data to identify any account types that are not already in the user's credit data. For example, if the user's credit data does not already include an electrical account, electrical account may be identified at block 3350 as a potential new account type that could be added to credit data of the user to increase credit score of the user. In one embodiment, an expected score impact may be calculated for each multiple account types, regardless of whether the user already has an account of any of the account types.
At block 3360, a score impact algorithm may be executed to determine a possible credit score change if an account of the identified account type is added to the credit data of the user. For example, with reference to the example above, the score impact algorithm may calculate a numerical credit score change that is possible if the user adds an electrical account to the user's credit data. For example, the score impact algorithm may be based on a model developed through analysis of a plurality of users each having added electrical accounts to credit data, such as via the account discovery system or similar system for identifying and adding self-reported accounts to consumer credit data. Thus, the score impact algorithm may estimate, based on realized credit score changes by those other users that also added an electrical account to their credit data, an expected credit score change for the particular user.
In some embodiments, the score impact algorithm considers other factors, such as demographic information of the user as compared to the base set of users from which the model was generated, in calculating the potential credit score change. For example, if users in general experienced a credit score increase of 12 points by addition of a rental account to their credit data, but users in northern California experienced a credit score increase of 24 points by addition of a rental account to their credit data, the calculated credit score change may be impacted based on the location of the rental unit associated with the rental account. Similarly, the score impact algorithm may vary based on number of trade line's already in the user's credit data, outstanding balances, public record information, and so forth, where, in general, the more similar a user is to a group of users that previously added an account of the same type to their credit data, the more similar the possible credit score change for the particular user will be to that group of users.
In the example user interface 3410, the user is notified that addition of a utility account to credit data of the user would potentially increase the user's credit score. In one embodiment, this message is provided to the user based on a determination that the user does not already have a utility account in credit data of the user. Additionally, in some embodiments the notification may only be provided if the user has the right quantity of other trade line, outstanding debt balances, and so forth, in their existing credit data, such that addition of the identified account type would actually increase the credit score of the user.
Example user interface 3420 indicates that an expected credit score increase of 22 points could be possible for the user with the addition of six months of consistent rental history. In one embodiment, the notification may be based on little information regarding the user, such as perhaps only a geographic location of the user, while in other embodiments the possible credit score change may be more precisely based on additional known information of the user, such as that the user has three trade lines on their credit report already, but no rental account in their credit data. As another example, a more precise estimate could be developed based on information associated with existing credit data of the user, such as payment history, how much each monthly payment affects their overall balance, if addition of a new tradeline would cause the credit file to move from a thin file to a thick file, and other attributes of the user's credit data.
Example user interface 3430 indicates that 87% of people with a credit file similar to the user saw an increase in their credit score with a boost (for example, with an addition of a new self-reported account to credit data of the user). In this example, the credit scoring algorithm may consider multiple attributes of the user in identifying a group of other users from which to calculate a likelihood of a credit score increase. For example, other users with a similar credit score (prior to boost), a similar quantity of trade lines, a similar amount of credit utilization, in a similar geographic region, and/or other factors, may be the basis for estimating how a new self-reported account might impact credit score of the user. In some embodiments, such estimations may be based on analytics of other users with similar credit files who have leverage the boost product (and/or other data indicative of changes to credit scores responsive to addition of self-reported accounts).
In one embodiment, the system provides an interactive score simulator interface that allows the user to be provided with real-time estimates of credit score changes in response to selection of hypothetical updates to credit data. For example, at block 3350 of
In some embodiments, multiple estimated credit scores are provided simultaneously to the user, such as an estimated risk score associated with addition of each of multiple account types. The user may then be able to select an account type, such as one that has the highest estimated risk score increase, to initiate addition of transaction data associated with an account of the selected account type, such as using the systems and methods discussed herein.
Disputing Self-Reported Account Information
System Block Diagram
In one embodiment, the account discovery system 3802 is configured to interface with multiple devices and/or data sources. The account discovery system 3802 may be configured to implement certain systems and methods described herein. The functionality provided for in the components and modules of the account discovery system 3802 may be combined into fewer components and modules or further separated into additional components and modules. The account discovery system 110, account discovery system 110A, and/or the account access system 202 may include the same or similar components as illustrated in
In general, the word component or module, as used herein, refers to logic embodied in hardware or firmware, or to a collection of software instructions, possibly having entry and exit points, written in a programming language such as, for example, C, C++, C#. A software module may be complied and linked into an executable program, installed in a dynamic link library, or may be written in an interpreted programming language such as, for example, BASIC, Java, Perl, or Python. It will be appreciated that software modules may be callable from other modules or from themselves or may be invoked in response to detected events and interrupts, or both. Software instructions may be embedded in firmware, such as an EPROM. It will be further appreciated that hardware modules may be comprised of connected logic units, such as programmable gate arrays or processors. The modules described herein are preferably implemented as software modules, but may be represented in hardware or firmware. Generally, the modules described herein refer to logical modules that may be combined with other modules or devices into sub-modules despite their physical organization or storage.
In one embodiment, the account discovery system 3802 includes, for example, one or more servers or personal computers that are IBM, Macintosh, or Linux/Unix compatible. In another embodiment, the account discovery system 3802 includes one or more laptop computers, smart phones, personal digital assistants, or other computing devices. The account discovery system 3802 may include a memory 3830, which may include a random access memory (RAM) for temporary storage of information, a read only memory (ROM) for permanent storage of information, and/or a mass storage device, such as a hard drive, diskette, optical media storage device, or USB flash drive. Typically, the modules of the monitoring system are in communication with each other via a standards based bus system. In different embodiments, the standards based bus system could be Peripheral Component Interconnect (PCI), Microchannel, SCSI, Industrial Standard Architecture (ISA), and Extended ISA (EISA) architectures, for example.
The account discovery system 3802 may be generally controlled and coordinated by operating system software, such as Windows 95, 98, NT, 4000, XP, Vista, 7, 8, SunOS, Solaris, Blackberry OS, or other compatible operating systems. In Macintosh systems, the operating system may be any available operating system, such as MAC OS X. In other embodiments, the account discovery system 3802 may be controlled by a proprietary operating system. Conventional operating systems control and schedule computer processes for execution, perform memory management, provide file systems, networking, and I/O services, and provide a user interface, such as a graphical user interface (GUI), among other functions. The example account discovery system 3802, as well as the account discovery system 110 shown in
The account discovery system, client computing devices, financial institutions, service providers (for example, rental service providers, telco service providers, utility service providers, and so forth) may communicate with each other over network 3860. Network 3860 may be formed from one or more networks including any combination of wired networks, wireless networks, wide-area networks such as the Internet, and local-area networks.
It is to be understood that not necessarily all objects or advantages may be achieved in accordance with any particular embodiment described herein. Thus, for example, those skilled in the art will recognize that certain embodiments may be configured to operate in a manner that achieves or optimizes one advantage or group of advantages as taught herein without necessarily achieving other objects or advantages as may be taught or suggested herein.
All of the processes described herein may be embodied in, and fully automated, via software code modules executed by a computing system that includes one or more computers or processors. In some embodiments, at least some of the processes may be implemented using virtualization techniques such as, for example, cloud computing, application containerization, or Lambda architecture, and so forth, alone or in combination. The code modules may be stored in any type of non-transitory computer-readable medium or other computer storage device. Some or all the methods may be embodied in specialized computer hardware.
Many other variations than those described herein will be apparent from this disclosure. For example, depending on the embodiment, certain acts, events, or functions of any of the algorithms described herein can be performed in a different sequence or can be added, merged, or left out altogether (for example, not all described acts or events are necessary for the practice of the algorithms). Moreover, in certain embodiments, acts or events can be performed concurrently, for example, through multi-threaded processing, interrupt processing, or multiple processors or processor cores or on other parallel architectures, rather than sequentially. In addition, different tasks or processes can be performed by different machines and/or computing systems that can function together.
Conditional language such as, among others, “can,” “could,” “might” or “may,” unless specifically stated otherwise, are understood within the context as used in general to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without user input or prompting, whether these features, elements and/or steps are included or are to be performed in any particular embodiment.
Disjunctive language such as the phrase “at least one of X, Y, or Z,” unless specifically stated otherwise, is understood with the context as used in general to present that an item, term, and so forth, may be either X, Y, or Z, or any combination thereof (for example, X, Y, and/or Z). Thus, such disjunctive language is not generally intended to, and should not, imply that certain embodiments require at least one of X, at least one of Y, or at least one of Z to each be present.
Any process descriptions, elements or blocks in the flow diagrams described herein and/or depicted in the attached figures should be understood as potentially representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or elements in the process. Alternate implementations are included within the scope of the embodiments described herein in which elements or functions may be deleted, executed out of order from that shown, or discussed, including substantially concurrently or in reverse order, depending on the functionality involved as would be understood by those skilled in the art.
Unless otherwise explicitly stated, articles such as “a” or “an” should generally be interpreted to include one or more described items. Accordingly, phrases such as “a device configured to” are intended to include one or more recited devices. Such one or more recited devices can also be collectively configured to carry out the stated recitations. For example, “a processor configured to carry out recitations A, B and C” can include a first processor configured to carry out recitation A working in conjunction with a second processor configured to carry out recitations B and C.
The term “remote” may include data, objects, devices, components, and/or modules not stored locally, that are not accessible via the local bus. Thus, remote devices may include a device which is physically stored in the same room and connected to the user's device via a network. In other situations, a remote device may be located in a separate geographic area, such as, for example, in a different location, country, and so forth.
Many variations and modifications may be made to the above-described embodiments, the elements of which are to be understood as being among other acceptable examples. All such modifications and variations are intended to be included herein within the scope of this disclosure.
Number | Name | Date | Kind |
---|---|---|---|
1372397 | Nies et al. | Mar 1921 | A |
3405457 | Bitzer | Oct 1968 | A |
3762316 | Spradlin | Oct 1973 | A |
4305059 | Benton | Dec 1981 | A |
4346442 | Musmanno | Aug 1982 | A |
4578530 | Zeidler | Mar 1986 | A |
4718009 | Cuervo | Jan 1988 | A |
4734858 | Schlafly | Mar 1988 | A |
4736294 | Gill | Apr 1988 | A |
4755940 | Brachtl et al. | Jul 1988 | A |
4774664 | Campbell et al. | Sep 1988 | A |
4827508 | Shear | May 1989 | A |
4869500 | Williams | Sep 1989 | A |
4876592 | Von Kohorn | Oct 1989 | A |
4891503 | Jewell | Jan 1990 | A |
4895518 | Arnold | Jan 1990 | A |
4900903 | Wright et al. | Feb 1990 | A |
4947028 | Gorog | Aug 1990 | A |
4977595 | Ohta et al. | Dec 1990 | A |
4989141 | Lyons et al. | Jan 1991 | A |
5013038 | Luxenberg et al. | May 1991 | A |
5025138 | Cuervo | Jun 1991 | A |
5025373 | Keyser, Jr. et al. | Jun 1991 | A |
5034807 | Von Kohorn | Jul 1991 | A |
5060153 | Nakagawa | Oct 1991 | A |
5077582 | Kravette et al. | Dec 1991 | A |
5126936 | Champion et al. | Jun 1992 | A |
5148365 | Dembo | Sep 1992 | A |
5173935 | Meschi | Dec 1992 | A |
5197094 | Tillery et al. | Mar 1993 | A |
5218632 | Cool | Jun 1993 | A |
5220501 | Lawlor et al. | Jun 1993 | A |
5239462 | Jones et al. | Aug 1993 | A |
5259766 | Sack | Nov 1993 | A |
5262941 | Saladin | Nov 1993 | A |
5274547 | Zoffel et al. | Dec 1993 | A |
5317636 | Vizcaino | May 1994 | A |
5317733 | Murdock | May 1994 | A |
5326959 | Perazza | Jul 1994 | A |
5336870 | Hughes et al. | Aug 1994 | A |
5351186 | Bullock et al. | Sep 1994 | A |
5361201 | Jost et al. | Nov 1994 | A |
5383113 | Kight et al. | Jan 1995 | A |
5404518 | Gilbertson et al. | Apr 1995 | A |
5420405 | Chasek | May 1995 | A |
5423033 | Yuen | Jun 1995 | A |
5457305 | Akel et al. | Oct 1995 | A |
5500513 | Langhans et al. | Mar 1996 | A |
5537464 | Lewis et al. | Jul 1996 | A |
5561706 | Fenner | Oct 1996 | A |
5563783 | Stolfo et al. | Oct 1996 | A |
5590038 | Pitroda | Dec 1996 | A |
5592560 | Deaton et al. | Jan 1997 | A |
5611052 | Dykstra et al. | Mar 1997 | A |
5615408 | Johnson | Mar 1997 | A |
5616902 | Cooley et al. | Apr 1997 | A |
5621201 | Langhans et al. | Apr 1997 | A |
5630127 | Moore et al. | May 1997 | A |
5640577 | Scharmer | Jun 1997 | A |
5649115 | Schrader et al. | Jul 1997 | A |
5655008 | Futch et al. | Aug 1997 | A |
5659725 | Levy et al. | Aug 1997 | A |
5659731 | Gustafson | Aug 1997 | A |
5684965 | Pickering | Nov 1997 | A |
5689651 | Lozman | Nov 1997 | A |
5696907 | Tom | Dec 1997 | A |
5699527 | Davidson | Dec 1997 | A |
5699528 | Hogan | Dec 1997 | A |
5704029 | Wright, Jr. | Dec 1997 | A |
5708422 | Blonder et al. | Jan 1998 | A |
5719941 | Swift et al. | Feb 1998 | A |
5729735 | Meyering | Mar 1998 | A |
5732400 | Mandler | Mar 1998 | A |
5739512 | Tognazzini | Apr 1998 | A |
5742769 | Lee et al. | Apr 1998 | A |
5745654 | Titan | Apr 1998 | A |
5745706 | Wolfberg et al. | Apr 1998 | A |
5748098 | Grace | May 1998 | A |
5754632 | Smith | May 1998 | A |
5774533 | Patel | Jun 1998 | A |
5774870 | Storey | Jun 1998 | A |
5774883 | Andersen | Jun 1998 | A |
5774885 | Delfer, III | Jun 1998 | A |
5793972 | Shane | Aug 1998 | A |
5794221 | Egendorf | Aug 1998 | A |
5802142 | Browne | Sep 1998 | A |
5802498 | Comesanas | Sep 1998 | A |
5809143 | Hughes | Sep 1998 | A |
5809322 | Akerib | Sep 1998 | A |
5813006 | Polnerow et al. | Sep 1998 | A |
5815665 | Teper et al. | Sep 1998 | A |
5819234 | Slavin et al. | Oct 1998 | A |
5832068 | Smith | Nov 1998 | A |
5832460 | Bednar et al. | Nov 1998 | A |
5838314 | Neel et al. | Nov 1998 | A |
5842211 | Horadan et al. | Nov 1998 | A |
5844218 | Kawan et al. | Dec 1998 | A |
5850446 | Berger et al. | Dec 1998 | A |
5857174 | Dugan | Jan 1999 | A |
5864620 | Pettitt | Jan 1999 | A |
5870721 | Norris | Feb 1999 | A |
5873072 | Kight et al. | Feb 1999 | A |
5875236 | Jankowitz | Feb 1999 | A |
5878403 | DeFrancesco | Mar 1999 | A |
5881131 | Farris et al. | Mar 1999 | A |
5884287 | Edesess | Mar 1999 | A |
5884288 | Chang et al. | Mar 1999 | A |
5884302 | Ho | Mar 1999 | A |
5893077 | Griffin | Apr 1999 | A |
5903830 | Joao et al. | May 1999 | A |
5903881 | Schrader et al. | May 1999 | A |
5914472 | Foladare et al. | Jun 1999 | A |
5918217 | Maggioncalda et al. | Jun 1999 | A |
5918227 | Polnerow et al. | Jun 1999 | A |
5920848 | Schutzer et al. | Jul 1999 | A |
5924082 | Silverman et al. | Jul 1999 | A |
5926754 | Cirelli et al. | Jul 1999 | A |
5930764 | Melchione et al. | Jul 1999 | A |
5930776 | Dykstra et al. | Jul 1999 | A |
5937392 | Alberts | Aug 1999 | A |
5940812 | Tengel et al. | Aug 1999 | A |
5950172 | Klingman | Sep 1999 | A |
5953710 | Fleming | Sep 1999 | A |
5956690 | Haggerson et al. | Sep 1999 | A |
5956693 | Geerlings | Sep 1999 | A |
5956698 | Lacheze et al. | Sep 1999 | A |
5963939 | McCann et al. | Oct 1999 | A |
5966695 | Melchione et al. | Oct 1999 | A |
5974521 | Akerib | Oct 1999 | A |
5978780 | Watson | Nov 1999 | A |
5991411 | Kaufman et al. | Nov 1999 | A |
5995947 | Fraser et al. | Nov 1999 | A |
5999596 | Walker et al. | Dec 1999 | A |
6006333 | Nielsen | Dec 1999 | A |
6009412 | Storey | Dec 1999 | A |
6009415 | Shurling et al. | Dec 1999 | A |
6012044 | Maggioncalda et al. | Jan 2000 | A |
6014645 | Cunningham | Jan 2000 | A |
6021397 | Jones et al. | Feb 2000 | A |
6021943 | Chastain | Feb 2000 | A |
6026440 | Shrader et al. | Feb 2000 | A |
6029149 | Dykstra et al. | Feb 2000 | A |
6029178 | Martin et al. | Feb 2000 | A |
6032132 | Nelson | Feb 2000 | A |
6035288 | Solomon | Mar 2000 | A |
6038551 | Barlow et al. | Mar 2000 | A |
6041319 | Bass et al. | Mar 2000 | A |
6044362 | Neely | Mar 2000 | A |
6049786 | Smorodinsky | Apr 2000 | A |
6052671 | Crooks et al. | Apr 2000 | A |
6055570 | Nielsen | Apr 2000 | A |
6061668 | Sharrow | May 2000 | A |
6064987 | Walker | May 2000 | A |
6064990 | Goldsmith | May 2000 | A |
6070141 | Houvener | May 2000 | A |
6070147 | Harms et al. | May 2000 | A |
6072894 | Payne | Jun 2000 | A |
6073140 | Morgan et al. | Jun 2000 | A |
6076070 | Stack | Jun 2000 | A |
6078907 | Lamm | Jun 2000 | A |
6078922 | Johnson et al. | Jun 2000 | A |
6085242 | Chandra | Jul 2000 | A |
6088686 | Walker et al. | Jul 2000 | A |
6094643 | Anderson et al. | Jul 2000 | A |
6098052 | Kosiba et al. | Aug 2000 | A |
6105007 | Norris | Aug 2000 | A |
6108691 | Lee et al. | Aug 2000 | A |
6112190 | Fletcher et al. | Aug 2000 | A |
6115690 | Wong | Sep 2000 | A |
6115694 | Cheetham et al. | Sep 2000 | A |
6119103 | Basch et al. | Sep 2000 | A |
6128599 | Walker | Oct 2000 | A |
6128602 | Northington et al. | Oct 2000 | A |
6128603 | Dent | Oct 2000 | A |
6144726 | Cross | Nov 2000 | A |
6145088 | Stevens | Nov 2000 | A |
6149441 | Pellegrino et al. | Nov 2000 | A |
6154729 | Cannon et al. | Nov 2000 | A |
6157707 | Baulier et al. | Dec 2000 | A |
6161139 | Win et al. | Dec 2000 | A |
6173272 | Thomas et al. | Jan 2001 | B1 |
6178420 | Sassano | Jan 2001 | B1 |
6182068 | Culliss | Jan 2001 | B1 |
6182229 | Nielsen | Jan 2001 | B1 |
6185543 | Galperin et al. | Feb 2001 | B1 |
6195660 | Polnerow et al. | Feb 2001 | B1 |
6195738 | Akerib | Feb 2001 | B1 |
6199077 | Inala et al. | Mar 2001 | B1 |
6202053 | Christiansen et al. | Mar 2001 | B1 |
6202067 | Blood et al. | Mar 2001 | B1 |
6208998 | Marcus | Mar 2001 | B1 |
6230188 | Marcus | May 2001 | B1 |
6233566 | Levine et al. | May 2001 | B1 |
6233588 | Marchoili et al. | May 2001 | B1 |
6247000 | Hawkins et al. | Jun 2001 | B1 |
6249770 | Erwin et al. | Jun 2001 | B1 |
6253203 | O'Flaherty et al. | Jun 2001 | B1 |
6254000 | Degen et al. | Jul 2001 | B1 |
6263447 | French et al. | Jul 2001 | B1 |
6269325 | Lee et al. | Jul 2001 | B1 |
6275824 | O'Flaherty et al. | Aug 2001 | B1 |
6278993 | Kumar et al. | Aug 2001 | B1 |
6282658 | French et al. | Aug 2001 | B2 |
6285987 | Roth et al. | Sep 2001 | B1 |
6289323 | Gordon et al. | Sep 2001 | B1 |
6289452 | Arnold et al. | Sep 2001 | B1 |
6292789 | Schutzer | Sep 2001 | B1 |
6295528 | Marcus et al. | Sep 2001 | B1 |
6295541 | Bodnar et al. | Sep 2001 | B1 |
6298348 | Eldering | Oct 2001 | B1 |
6304850 | Keller et al. | Oct 2001 | B1 |
6304860 | Martin et al. | Oct 2001 | B1 |
6311169 | Duhon | Oct 2001 | B2 |
6317783 | Freishtat et al. | Nov 2001 | B1 |
6321339 | French et al. | Nov 2001 | B1 |
6324516 | Shults et al. | Nov 2001 | B1 |
6324524 | Lent et al. | Nov 2001 | B1 |
6327578 | Linehan | Dec 2001 | B1 |
6330546 | Gopinathan et al. | Dec 2001 | B1 |
6330551 | Burchetta et al. | Dec 2001 | B1 |
6330575 | Moore et al. | Dec 2001 | B1 |
6334116 | Ganesan et al. | Dec 2001 | B1 |
6337901 | Rome et al. | Jan 2002 | B1 |
6339790 | Inoue | Jan 2002 | B1 |
6341272 | Randle | Jan 2002 | B1 |
6343279 | Bissonette et al. | Jan 2002 | B1 |
6343284 | Ishikawa et al. | Jan 2002 | B1 |
6347375 | Reinert et al. | Feb 2002 | B1 |
6353778 | Brown | Mar 2002 | B1 |
6353795 | Ranjan | Mar 2002 | B1 |
6356937 | Montville et al. | Mar 2002 | B1 |
6374262 | Kodama | Apr 2002 | B1 |
6374264 | Bohannon et al. | Apr 2002 | B1 |
6384844 | Stewart et al. | May 2002 | B1 |
6385594 | Lebda et al. | May 2002 | B1 |
6385595 | Kolling et al. | May 2002 | B1 |
6386444 | Sullivan | May 2002 | B1 |
6397197 | Gindlesperger | May 2002 | B1 |
6397212 | Biffar | May 2002 | B1 |
6397224 | Zubeldia et al. | May 2002 | B1 |
6401118 | Thomas | Jun 2002 | B1 |
6405173 | Honarvar | Jun 2002 | B1 |
6405181 | Lent et al. | Jun 2002 | B2 |
6405245 | Burson et al. | Jun 2002 | B1 |
6408282 | Buist | Jun 2002 | B1 |
6412073 | Rangan | Jun 2002 | B1 |
6421675 | Ryan et al. | Jul 2002 | B1 |
6421729 | Paltenghe et al. | Jul 2002 | B1 |
6421768 | Purpura | Jul 2002 | B1 |
6422462 | Cohen | Jul 2002 | B1 |
6424840 | Fitch et al. | Jul 2002 | B1 |
6430539 | Lazarus et al. | Aug 2002 | B1 |
6431439 | Suer et al. | Aug 2002 | B1 |
6438527 | Powar | Aug 2002 | B1 |
6438601 | Hardy | Aug 2002 | B1 |
6442590 | Inala et al. | Aug 2002 | B1 |
6453353 | Win et al. | Sep 2002 | B1 |
6457012 | Jatkowski | Sep 2002 | B1 |
6460127 | Akerib | Oct 2002 | B1 |
6473740 | Cockril et al. | Oct 2002 | B2 |
6477565 | Daswani et al. | Nov 2002 | B1 |
6496936 | French et al. | Dec 2002 | B1 |
5870721 | Norris | Jan 2003 | C1 |
6505168 | Rothman et al. | Jan 2003 | B1 |
6510451 | Wu et al. | Jan 2003 | B2 |
6516190 | Linkola | Feb 2003 | B1 |
6517587 | Satyavolu et al. | Feb 2003 | B2 |
6523021 | Monberg et al. | Feb 2003 | B1 |
6523041 | Morgan et al. | Feb 2003 | B1 |
6529880 | McKeen et al. | Mar 2003 | B1 |
6532450 | Brown et al. | Mar 2003 | B1 |
6539377 | Culliss | Mar 2003 | B1 |
6539392 | Rebane | Mar 2003 | B1 |
6542894 | Lee et al. | Apr 2003 | B1 |
6543683 | Hoffman | Apr 2003 | B2 |
6546413 | Northrup | Apr 2003 | B1 |
6549770 | Marran | Apr 2003 | B1 |
6549904 | Ortega et al. | Apr 2003 | B1 |
6552670 | Sundaravel et al. | Apr 2003 | B2 |
6564210 | Korda et al. | May 2003 | B1 |
6567791 | Lent et al. | May 2003 | B2 |
6567850 | Freishtat et al. | May 2003 | B1 |
6571236 | Ruppelt | May 2003 | B1 |
6574736 | Andrews | Jun 2003 | B1 |
6574798 | Bradley et al. | Jun 2003 | B1 |
6578012 | Storey | Jun 2003 | B1 |
6581025 | Lehman | Jun 2003 | B2 |
6581075 | Guturu et al. | Jun 2003 | B1 |
6587841 | DeFrancesco | Jul 2003 | B1 |
6594766 | Rangan et al. | Jul 2003 | B2 |
6611816 | Lebda et al. | Aug 2003 | B2 |
6615193 | Kingdon et al. | Sep 2003 | B1 |
6622131 | Brown et al. | Sep 2003 | B1 |
6622266 | Goddard et al. | Sep 2003 | B1 |
6629245 | Stone et al. | Sep 2003 | B1 |
6633910 | Rajan et al. | Oct 2003 | B1 |
6636803 | Hartz, Jr. et al. | Oct 2003 | B1 |
6647383 | August et al. | Nov 2003 | B1 |
6655583 | Walsh et al. | Dec 2003 | B2 |
6658393 | Basch et al. | Dec 2003 | B1 |
6665715 | Houri | Dec 2003 | B1 |
6678694 | Zimmermann et al. | Jan 2004 | B1 |
6684197 | Kolls | Jan 2004 | B1 |
6694353 | Sommerer | Feb 2004 | B2 |
6701348 | Sommerer | Mar 2004 | B2 |
6703930 | Skinner | Mar 2004 | B2 |
6704039 | Pena | Mar 2004 | B2 |
6711665 | Akerib et al. | Mar 2004 | B1 |
6714944 | Shapiro et al. | Mar 2004 | B1 |
6718313 | Lent et al. | Apr 2004 | B1 |
6721716 | Gross | Apr 2004 | B1 |
6725381 | Smith et al. | Apr 2004 | B1 |
6725425 | Rajan et al. | Apr 2004 | B1 |
6738804 | Lo | May 2004 | B1 |
6745196 | Colyer et al. | Jun 2004 | B1 |
6745938 | Sullivan | Jun 2004 | B2 |
6748367 | Lee et al. | Jun 2004 | B1 |
6748426 | Shaffer et al. | Jun 2004 | B1 |
6750985 | Rhoads | Jun 2004 | B2 |
6754564 | Newport | Jun 2004 | B2 |
6766304 | Kemp et al. | Jul 2004 | B2 |
6766327 | Morgan, Jr. et al. | Jul 2004 | B2 |
6772132 | Kemp et al. | Aug 2004 | B1 |
6775519 | Wiedman et al. | Aug 2004 | B1 |
6781608 | Crawford | Aug 2004 | B1 |
6782370 | Stack | Aug 2004 | B1 |
6782379 | Lee | Aug 2004 | B2 |
6782390 | Lee et al. | Aug 2004 | B2 |
6792088 | Takeuchi | Sep 2004 | B2 |
6792263 | Kite | Sep 2004 | B1 |
6795812 | Lent et al. | Sep 2004 | B1 |
6796497 | Benkert et al. | Sep 2004 | B2 |
6802042 | Rangan et al. | Oct 2004 | B2 |
6804346 | Mewhinney | Oct 2004 | B1 |
6804720 | Vilander et al. | Oct 2004 | B1 |
6805287 | Bishop et al. | Oct 2004 | B2 |
6807533 | Land et al. | Oct 2004 | B1 |
6810323 | Bullock et al. | Oct 2004 | B1 |
6816850 | Culliss | Nov 2004 | B2 |
6816871 | Lee | Nov 2004 | B2 |
6823319 | Lynch et al. | Nov 2004 | B1 |
6826707 | Stevens | Nov 2004 | B1 |
6829639 | Lawson et al. | Dec 2004 | B1 |
6832212 | Zenner et al. | Dec 2004 | B1 |
6832229 | Reed | Dec 2004 | B2 |
6839690 | Foth et al. | Jan 2005 | B1 |
6842740 | Jeran et al. | Jan 2005 | B1 |
6842782 | Malik et al. | Jan 2005 | B1 |
6845448 | Chaganti et al. | Jan 2005 | B1 |
6847966 | Sommer et al. | Jan 2005 | B1 |
6847974 | Wachtel | Jan 2005 | B2 |
6856974 | Ganesan et al. | Feb 2005 | B1 |
6857073 | French et al. | Feb 2005 | B2 |
6859212 | Kumar et al. | Feb 2005 | B2 |
6865680 | Wu et al. | Mar 2005 | B1 |
6871220 | Rajan et al. | Mar 2005 | B1 |
6871287 | Ellingson | Mar 2005 | B1 |
6871789 | Hilton et al. | Mar 2005 | B2 |
6873972 | Marcial et al. | Mar 2005 | B1 |
6880751 | Okamura et al. | Apr 2005 | B2 |
6882986 | Heinemann et al. | Apr 2005 | B1 |
6892307 | Wood et al. | May 2005 | B1 |
6898279 | Baker et al. | May 2005 | B1 |
6898574 | Regan | May 2005 | B1 |
6900731 | Kreiner et al. | May 2005 | B2 |
6901406 | Nabe et al. | May 2005 | B2 |
6910624 | Natsuno | Jun 2005 | B1 |
6912483 | Frederick | Jun 2005 | B2 |
6928487 | Eggebraaten et al. | Aug 2005 | B2 |
6932268 | McCoy et al. | Aug 2005 | B1 |
6934691 | Simpson | Aug 2005 | B1 |
6934714 | Meinig | Aug 2005 | B2 |
6938011 | Kemp et al. | Aug 2005 | B1 |
6938821 | Gangi | Sep 2005 | B2 |
6941323 | Galperin | Sep 2005 | B1 |
6947989 | Gullotta et al. | Sep 2005 | B2 |
6950807 | Brock | Sep 2005 | B2 |
6954630 | Offer | Oct 2005 | B2 |
6954757 | Zargham et al. | Oct 2005 | B2 |
6957336 | Wheeler et al. | Oct 2005 | B2 |
6962336 | Glass | Nov 2005 | B2 |
6963857 | Johnson | Nov 2005 | B1 |
6965881 | Brickell et al. | Nov 2005 | B1 |
6968319 | Remington et al. | Nov 2005 | B1 |
6970864 | Marcus et al. | Nov 2005 | B2 |
6973462 | Dattero et al. | Dec 2005 | B2 |
6983320 | Thomas et al. | Jan 2006 | B1 |
6985183 | Jan et al. | Jan 2006 | B2 |
6985887 | Sunstein et al. | Jan 2006 | B1 |
6988082 | Williams et al. | Jan 2006 | B1 |
6988085 | Hedy | Jan 2006 | B2 |
6990591 | Pearson | Jan 2006 | B1 |
6993504 | Friesen et al. | Jan 2006 | B1 |
6993572 | Ross, Jr. et al. | Jan 2006 | B2 |
6993596 | Hinton et al. | Jan 2006 | B2 |
6996542 | Landry | Feb 2006 | B1 |
6999941 | Agarwal | Feb 2006 | B1 |
7003476 | Samra et al. | Feb 2006 | B1 |
7013310 | Messing et al. | Mar 2006 | B2 |
7013315 | Boothby | Mar 2006 | B1 |
7013323 | Thomas et al. | Mar 2006 | B1 |
7016870 | Jones et al. | Mar 2006 | B1 |
7016907 | Boreham et al. | Mar 2006 | B2 |
7024174 | Nagy et al. | Apr 2006 | B2 |
7024548 | O'Toole, Jr. | Apr 2006 | B1 |
7024689 | O'Donnell et al. | Apr 2006 | B2 |
7028013 | Saeki | Apr 2006 | B2 |
7028052 | Chapman et al. | Apr 2006 | B2 |
7039607 | Watarai et al. | May 2006 | B2 |
7039656 | Tsai et al. | May 2006 | B1 |
7043476 | Robson | May 2006 | B2 |
7046139 | Kuhn et al. | May 2006 | B2 |
7050989 | Hurt et al. | May 2006 | B1 |
7058386 | McGregor et al. | Jun 2006 | B2 |
7058817 | Ellmore | Jun 2006 | B1 |
7062458 | Maggioncalda et al. | Jun 2006 | B2 |
7062475 | Szabo et al. | Jun 2006 | B1 |
7065526 | Wissner et al. | Jun 2006 | B2 |
7065566 | Menard et al. | Jun 2006 | B2 |
7069240 | Spero et al. | Jun 2006 | B2 |
7069249 | Stolfo et al. | Jun 2006 | B2 |
7072856 | Nachom | Jul 2006 | B1 |
7072909 | Polk | Jul 2006 | B2 |
7076462 | Nelson et al. | Jul 2006 | B1 |
7076475 | Honarvar et al. | Jul 2006 | B2 |
7083087 | Gangi | Aug 2006 | B1 |
7085727 | VanOrman | Aug 2006 | B2 |
7085997 | Wu et al. | Aug 2006 | B1 |
7089594 | Lal et al. | Aug 2006 | B2 |
7092905 | Behrenbrinker et al. | Aug 2006 | B2 |
7103473 | Ranjan | Sep 2006 | B2 |
7103602 | Black et al. | Sep 2006 | B2 |
7107241 | Pinto | Sep 2006 | B1 |
7107243 | McDonald et al. | Sep 2006 | B1 |
7107244 | Kight et al. | Sep 2006 | B2 |
7107285 | Von Kaenel et al. | Sep 2006 | B2 |
7110978 | Chin | Sep 2006 | B1 |
7117172 | Black | Oct 2006 | B1 |
7117529 | O'Donnell et al. | Oct 2006 | B1 |
7120599 | Keyes | Oct 2006 | B2 |
7124144 | Christianson et al. | Oct 2006 | B2 |
7127068 | Sundaravel et al. | Oct 2006 | B2 |
7127424 | Kemp et al. | Oct 2006 | B2 |
7131144 | Rabin et al. | Oct 2006 | B2 |
RE39376 | Biggs, Jr. et al. | Nov 2006 | E |
7133852 | Kurokawa et al. | Nov 2006 | B2 |
7139734 | Nathans et al. | Nov 2006 | B2 |
7143063 | Lent | Nov 2006 | B2 |
7149782 | Sommerer | Dec 2006 | B2 |
7155203 | Brewer et al. | Dec 2006 | B2 |
7155508 | Sankuratripati et al. | Dec 2006 | B2 |
7155725 | Kister et al. | Dec 2006 | B1 |
7155739 | Bari et al. | Dec 2006 | B2 |
7165037 | Lazarus et al. | Jan 2007 | B2 |
7174455 | Arnold et al. | Feb 2007 | B1 |
7177830 | Shields et al. | Feb 2007 | B2 |
7178096 | Rangan et al. | Feb 2007 | B2 |
7181418 | Zucker et al. | Feb 2007 | B1 |
7181427 | DeFrancesco | Feb 2007 | B1 |
7194416 | Provost et al. | Mar 2007 | B1 |
7200551 | Senez | Apr 2007 | B1 |
7200602 | Jonas | Apr 2007 | B2 |
7200804 | Khavari et al. | Apr 2007 | B1 |
7203315 | Livesay | Apr 2007 | B1 |
7206768 | deGroeve et al. | Apr 2007 | B1 |
7209895 | Kundtz et al. | Apr 2007 | B2 |
7209911 | Boothby et al. | Apr 2007 | B2 |
7212995 | Schulkins | May 2007 | B2 |
7212999 | Friesen et al. | May 2007 | B2 |
7213003 | Kight et al. | May 2007 | B1 |
7216104 | Mason | May 2007 | B2 |
7218912 | Erskine et al. | May 2007 | B2 |
7219107 | Beringer | May 2007 | B2 |
7222085 | Stack | May 2007 | B2 |
7222369 | Vering et al. | May 2007 | B2 |
7225464 | Satyavolu et al. | May 2007 | B2 |
7227935 | Creamer et al. | Jun 2007 | B2 |
7228289 | Brumfield et al. | Jun 2007 | B2 |
7228335 | Caughey | Jun 2007 | B2 |
7234156 | French et al. | Jun 2007 | B2 |
7236950 | Savage et al. | Jun 2007 | B2 |
7240031 | Kight et al. | Jul 2007 | B1 |
7243075 | Shaffer et al. | Jul 2007 | B1 |
7243369 | Bhat et al. | Jul 2007 | B2 |
7246361 | Scalora et al. | Jul 2007 | B1 |
7246740 | Swift et al. | Jul 2007 | B2 |
7249076 | Pendleton et al. | Jul 2007 | B1 |
7249080 | Hoffman et al. | Jul 2007 | B1 |
7249113 | Continelli et al. | Jul 2007 | B1 |
7254558 | Hinkle et al. | Aug 2007 | B2 |
7263497 | Wiser et al. | Aug 2007 | B1 |
7263548 | Daswani et al. | Aug 2007 | B2 |
7280980 | Hoadley et al. | Oct 2007 | B1 |
7280983 | Kuroda et al. | Oct 2007 | B2 |
7281652 | Foss | Oct 2007 | B2 |
7289971 | O'Neil et al. | Oct 2007 | B1 |
7292840 | Kissner et al. | Nov 2007 | B2 |
7296004 | Garrison et al. | Nov 2007 | B1 |
7296734 | Pliha | Nov 2007 | B2 |
7302272 | Ackley | Nov 2007 | B2 |
7302411 | Ganesan et al. | Nov 2007 | B2 |
7302420 | Aggarwal et al. | Nov 2007 | B2 |
7305233 | Paul et al. | Dec 2007 | B2 |
7308417 | Nathan | Dec 2007 | B1 |
7310611 | Shibuya et al. | Dec 2007 | B2 |
7310617 | Cunningham | Dec 2007 | B1 |
7310618 | Libman | Dec 2007 | B2 |
7313813 | Rangan et al. | Dec 2007 | B2 |
7314166 | Anderson et al. | Jan 2008 | B2 |
7314167 | Kiliccote | Jan 2008 | B1 |
7315837 | Sloan et al. | Jan 2008 | B2 |
7318224 | Honarvar et al. | Jan 2008 | B2 |
7328233 | Salim et al. | Feb 2008 | B2 |
7328435 | Trifon | Feb 2008 | B2 |
7330717 | Gidron et al. | Feb 2008 | B2 |
7330831 | Biondi et al. | Feb 2008 | B2 |
7330835 | Deggendorf | Feb 2008 | B2 |
7331518 | Rable | Feb 2008 | B2 |
7333635 | Tsantes et al. | Feb 2008 | B2 |
7333937 | Baldwin, Jr. et al. | Feb 2008 | B2 |
7334020 | Caughey | Feb 2008 | B2 |
7337133 | Bezos et al. | Feb 2008 | B1 |
7337468 | Metzger | Feb 2008 | B2 |
7340042 | Cluff et al. | Mar 2008 | B2 |
7340679 | Botscheck et al. | Mar 2008 | B2 |
7343149 | Benco | Mar 2008 | B2 |
7343295 | Pomerance | Mar 2008 | B2 |
7346576 | Lent et al. | Mar 2008 | B2 |
7349885 | Gangi | Mar 2008 | B2 |
7353203 | Kriplani et al. | Apr 2008 | B1 |
7356503 | Johnson et al. | Apr 2008 | B1 |
7356516 | Richey et al. | Apr 2008 | B2 |
7357305 | Ahn et al. | Apr 2008 | B2 |
7363257 | Kunz et al. | Apr 2008 | B2 |
7366694 | Lazerson | Apr 2008 | B2 |
7366696 | Ganesan et al. | Apr 2008 | B1 |
7366759 | Trevithick | Apr 2008 | B2 |
7370014 | Vasavada et al. | May 2008 | B1 |
7370044 | Mulhern et al. | May 2008 | B2 |
7370794 | Trane | May 2008 | B2 |
7373324 | Engin et al. | May 2008 | B1 |
7376603 | Mayr et al. | May 2008 | B1 |
7379978 | Anderson et al. | May 2008 | B2 |
7383215 | Navarro et al. | Jun 2008 | B1 |
7383225 | Hallihan | Jun 2008 | B2 |
7383226 | Kight et al. | Jun 2008 | B2 |
7383988 | Slonecker, Jr. | Jun 2008 | B2 |
7386466 | McLean et al. | Jun 2008 | B2 |
7386511 | Buchanan et al. | Jun 2008 | B2 |
7386597 | Takeuchi et al. | Jun 2008 | B2 |
7386786 | Davis et al. | Jun 2008 | B2 |
7389913 | Starrs | Jun 2008 | B2 |
7392223 | Ganesan et al. | Jun 2008 | B1 |
7395232 | Pilato | Jul 2008 | B1 |
7395241 | Cook et al. | Jul 2008 | B1 |
7395243 | Zielke et al. | Jul 2008 | B1 |
7395273 | Khan et al. | Jul 2008 | B2 |
7401050 | O'Neill | Jul 2008 | B2 |
7403602 | Khan | Jul 2008 | B2 |
7403919 | Chacko et al. | Jul 2008 | B2 |
7403923 | Elliott et al. | Jul 2008 | B2 |
7403942 | Bayliss | Jul 2008 | B1 |
7409369 | Homuth et al. | Aug 2008 | B1 |
7412228 | Barclay et al. | Aug 2008 | B2 |
7412487 | Caughey | Aug 2008 | B2 |
7418417 | Chacko et al. | Aug 2008 | B2 |
7424520 | Daswani et al. | Sep 2008 | B2 |
7430520 | Haugen et al. | Sep 2008 | B1 |
7433836 | August et al. | Oct 2008 | B1 |
7433864 | Malik | Oct 2008 | B2 |
7437324 | Goodwin, III et al. | Oct 2008 | B1 |
7437679 | Uemura et al. | Oct 2008 | B2 |
7444518 | Dharmarajan et al. | Oct 2008 | B1 |
7447663 | Barker et al. | Nov 2008 | B1 |
7451095 | Bradley et al. | Nov 2008 | B1 |
7451113 | Kasower | Nov 2008 | B1 |
7458508 | Shao et al. | Dec 2008 | B1 |
7467401 | Cicchitto | Dec 2008 | B2 |
7475032 | Patnode et al. | Jan 2009 | B1 |
7479949 | Jobs et al. | Jan 2009 | B2 |
7480631 | Merced et al. | Jan 2009 | B1 |
7483892 | Sommer et al. | Jan 2009 | B1 |
7486784 | Creamer et al. | Feb 2009 | B2 |
7490356 | Lieblich et al. | Feb 2009 | B2 |
RE40692 | Rose, Jr. | Mar 2009 | E |
7499875 | May et al. | Mar 2009 | B1 |
7503489 | Heffez | Mar 2009 | B2 |
7505931 | Silva | Mar 2009 | B2 |
7505939 | Lent et al. | Mar 2009 | B2 |
7509117 | Yum | Mar 2009 | B2 |
7509278 | Jones | Mar 2009 | B2 |
7512221 | Toms | Mar 2009 | B2 |
7516101 | Remington et al. | Apr 2009 | B2 |
7526448 | Zielke et al. | Apr 2009 | B2 |
7529698 | Joao | May 2009 | B2 |
7530097 | Casco-Arias et al. | May 2009 | B2 |
7536329 | Goldberg et al. | May 2009 | B2 |
7536348 | Shao et al. | May 2009 | B2 |
7537152 | Chakiris et al. | May 2009 | B2 |
7537153 | Hurwitz et al. | May 2009 | B2 |
7542468 | Begley et al. | Jun 2009 | B1 |
7542922 | Bennett et al. | Jun 2009 | B2 |
7542993 | Satterfield et al. | Jun 2009 | B2 |
7543739 | Brown et al. | Jun 2009 | B2 |
7546266 | Beirne et al. | Jun 2009 | B2 |
7546271 | Chmielewski et al. | Jun 2009 | B1 |
7548886 | Kirkland et al. | Jun 2009 | B2 |
7552080 | Willard et al. | Jun 2009 | B1 |
7552086 | Rajasekar et al. | Jun 2009 | B1 |
7552089 | Bruer et al. | Jun 2009 | B2 |
7552190 | Freishtat et al. | Jun 2009 | B1 |
7552467 | Lindsay | Jun 2009 | B2 |
7555459 | Dhar et al. | Jun 2009 | B2 |
7556192 | Wokaty, Jr. | Jul 2009 | B2 |
7558748 | Ehring et al. | Jul 2009 | B2 |
7558777 | Santos | Jul 2009 | B1 |
7558795 | Malik et al. | Jul 2009 | B2 |
7559217 | Bass | Jul 2009 | B2 |
7562184 | Henmi et al. | Jul 2009 | B2 |
7562382 | Hinton et al. | Jul 2009 | B2 |
7562814 | Shao et al. | Jul 2009 | B1 |
7571138 | Miri et al. | Aug 2009 | B2 |
7571143 | Circenis et al. | Aug 2009 | B2 |
7571322 | Karoubi | Aug 2009 | B2 |
7571473 | Boydstun et al. | Aug 2009 | B1 |
7575152 | Graves et al. | Aug 2009 | B2 |
7575157 | Barnhardt et al. | Aug 2009 | B2 |
7577665 | Ramer et al. | Aug 2009 | B2 |
7577934 | Anonsen et al. | Aug 2009 | B2 |
7580884 | Cook | Aug 2009 | B2 |
7581112 | Brown et al. | Aug 2009 | B2 |
7583682 | Hopkins | Sep 2009 | B2 |
7584126 | White | Sep 2009 | B1 |
7584127 | Byrne et al. | Sep 2009 | B2 |
7584146 | Duhon | Sep 2009 | B1 |
7587363 | Cataline et al. | Sep 2009 | B2 |
7587368 | Felsher | Sep 2009 | B2 |
7593891 | Kornegay et al. | Sep 2009 | B2 |
7593892 | Balk et al. | Sep 2009 | B2 |
7594019 | Clapper | Sep 2009 | B2 |
7596512 | Raines et al. | Sep 2009 | B1 |
7596716 | Frost et al. | Sep 2009 | B2 |
7603314 | Siksa | Oct 2009 | B2 |
7603317 | Adler et al. | Oct 2009 | B2 |
7606355 | Hutchison et al. | Oct 2009 | B2 |
7606752 | Hazlehurst et al. | Oct 2009 | B2 |
7610216 | May et al. | Oct 2009 | B1 |
7610229 | Kornegay | Oct 2009 | B1 |
7613600 | Krane | Nov 2009 | B2 |
7613656 | Stanley et al. | Nov 2009 | B2 |
7620383 | Taglienti et al. | Nov 2009 | B2 |
7620592 | O'Mara et al. | Nov 2009 | B2 |
7620596 | Knudson et al. | Nov 2009 | B2 |
7620602 | Jakstadt et al. | Nov 2009 | B2 |
7620653 | Swartz | Nov 2009 | B1 |
7623844 | Herrmann et al. | Nov 2009 | B2 |
7624068 | Heasley et al. | Nov 2009 | B1 |
7624433 | Clark et al. | Nov 2009 | B1 |
7627524 | Bennett et al. | Dec 2009 | B2 |
7627527 | Hildebrand | Dec 2009 | B1 |
7630903 | Vaidyanathan | Dec 2009 | B1 |
7630932 | Danaher et al. | Dec 2009 | B2 |
7630933 | Peterson et al. | Dec 2009 | B2 |
7634651 | Gerde et al. | Dec 2009 | B1 |
7634737 | Beringer et al. | Dec 2009 | B2 |
7636686 | Pierdinock et al. | Dec 2009 | B2 |
7636689 | Dent et al. | Dec 2009 | B2 |
7640200 | Gardner et al. | Dec 2009 | B2 |
7640209 | Brooks et al. | Dec 2009 | B1 |
7644023 | Kumar et al. | Jan 2010 | B2 |
7644035 | Biffle et al. | Jan 2010 | B1 |
7644036 | McCoy et al. | Jan 2010 | B2 |
7644285 | Murray et al. | Jan 2010 | B1 |
7647274 | Peterson et al. | Jan 2010 | B2 |
7647344 | Skurtovich, Jr. et al. | Jan 2010 | B2 |
7653187 | Clark et al. | Jan 2010 | B2 |
7653591 | Dabney | Jan 2010 | B1 |
7653592 | Flaxman et al. | Jan 2010 | B1 |
7653593 | Zarikian et al. | Jan 2010 | B2 |
7653600 | Gustin | Jan 2010 | B2 |
7653613 | DeGraaff et al. | Jan 2010 | B1 |
7653688 | Bittner | Jan 2010 | B2 |
7657484 | Ganesan et al. | Feb 2010 | B2 |
7660771 | Orcutt | Feb 2010 | B2 |
7664725 | Murray et al. | Feb 2010 | B2 |
7665657 | Huh | Feb 2010 | B2 |
7668738 | Wiggins | Feb 2010 | B2 |
7668766 | Goodwin, III et al. | Feb 2010 | B1 |
7672833 | Blume et al. | Mar 2010 | B2 |
7672865 | Kumar et al. | Mar 2010 | B2 |
7672879 | Kumar et al. | Mar 2010 | B1 |
7672944 | Holladay et al. | Mar 2010 | B1 |
7676410 | Petralia | Mar 2010 | B2 |
7676418 | Chung et al. | Mar 2010 | B1 |
7676463 | Thompson et al. | Mar 2010 | B2 |
7680772 | Kronberg | Mar 2010 | B2 |
7685209 | Norton et al. | Mar 2010 | B1 |
7685525 | Kumar et al. | Mar 2010 | B2 |
7686214 | Shao et al. | Mar 2010 | B1 |
7688813 | Shin et al. | Mar 2010 | B2 |
7689451 | Vives | Mar 2010 | B2 |
7689487 | Britto et al. | Mar 2010 | B1 |
7689505 | Kasower | Mar 2010 | B2 |
7689506 | Fei et al. | Mar 2010 | B2 |
7689563 | Jacobson | Mar 2010 | B1 |
7689716 | Short et al. | Mar 2010 | B2 |
7690032 | Peirce | Mar 2010 | B1 |
7693787 | Provinse | Apr 2010 | B2 |
7693790 | Lawlor et al. | Apr 2010 | B2 |
7697520 | Hopkins | Apr 2010 | B2 |
7698214 | Lindgren | Apr 2010 | B1 |
7698217 | Phillips et al. | Apr 2010 | B1 |
7702576 | Fahner et al. | Apr 2010 | B2 |
7702579 | Neely | Apr 2010 | B2 |
7707109 | Odijk et al. | Apr 2010 | B2 |
7707117 | Jimenez et al. | Apr 2010 | B1 |
7707122 | Hull et al. | Apr 2010 | B2 |
7707271 | Rudkin et al. | Apr 2010 | B2 |
7708190 | Brandt et al. | May 2010 | B2 |
7708191 | Vega | May 2010 | B2 |
7711626 | Nanjundamoorthy et al. | May 2010 | B2 |
7711635 | Steele et al. | May 2010 | B2 |
7711636 | Robida et al. | May 2010 | B2 |
7711645 | Morello | May 2010 | B2 |
7711690 | Garrison et al. | May 2010 | B1 |
7711707 | Kelley | May 2010 | B2 |
7715832 | Zhou | May 2010 | B2 |
7716132 | Spies et al. | May 2010 | B1 |
7720705 | Stein | May 2010 | B2 |
7720750 | Brody | May 2010 | B2 |
7720760 | Cook et al. | May 2010 | B1 |
7720846 | Bayliss | May 2010 | B1 |
7725330 | Rao et al. | May 2010 | B2 |
7725385 | Royer et al. | May 2010 | B2 |
7729283 | Ferguson et al. | Jun 2010 | B2 |
7729959 | Wells et al. | Jun 2010 | B1 |
7729969 | Smith, III et al. | Jun 2010 | B1 |
7729983 | Ellis | Jun 2010 | B1 |
7730078 | Schwabe et al. | Jun 2010 | B2 |
7734522 | Johnson et al. | Jun 2010 | B2 |
7734541 | Kumar et al. | Jun 2010 | B2 |
7734543 | Braco | Jun 2010 | B2 |
7734637 | Greifeneder et al. | Jun 2010 | B2 |
7739193 | Zimmer et al. | Jun 2010 | B2 |
7739707 | Sie et al. | Jun 2010 | B2 |
7746496 | Henry et al. | Jun 2010 | B2 |
7747520 | Livermore et al. | Jun 2010 | B2 |
7747521 | Serio | Jun 2010 | B2 |
7752095 | Laracey et al. | Jul 2010 | B1 |
7752130 | Byrd et al. | Jul 2010 | B2 |
7752132 | Stewart et al. | Jul 2010 | B2 |
7752179 | Brown | Jul 2010 | B1 |
7752286 | Anderson et al. | Jul 2010 | B2 |
7756787 | Hilton | Jul 2010 | B1 |
7756789 | Welker et al. | Jul 2010 | B2 |
7761373 | Metz | Jul 2010 | B2 |
7761384 | Madhogarhia | Jul 2010 | B2 |
7761569 | Hopkins | Jul 2010 | B2 |
7765148 | German et al. | Jul 2010 | B2 |
7765166 | Beringer et al. | Jul 2010 | B2 |
7765279 | Kaib et al. | Jul 2010 | B1 |
7765525 | Davidson et al. | Jul 2010 | B1 |
7769651 | Fine et al. | Aug 2010 | B2 |
7769657 | Chacko et al. | Aug 2010 | B2 |
7769697 | Fieschi et al. | Aug 2010 | B2 |
7769998 | Lynch et al. | Aug 2010 | B2 |
7770002 | Weber | Aug 2010 | B2 |
7774257 | Maggioncalda et al. | Aug 2010 | B2 |
7774270 | MacCloskey | Aug 2010 | B1 |
7778868 | Haugen et al. | Aug 2010 | B2 |
7778901 | Ganesan et al. | Aug 2010 | B2 |
7780075 | Cooper et al. | Aug 2010 | B2 |
7783515 | Kumar et al. | Aug 2010 | B1 |
7783749 | Hopkins | Aug 2010 | B2 |
7787869 | Rice et al. | Aug 2010 | B2 |
7788040 | Haskell et al. | Aug 2010 | B2 |
7788147 | Haggerty et al. | Aug 2010 | B2 |
7788152 | Haggerty et al. | Aug 2010 | B2 |
7788155 | Jones et al. | Aug 2010 | B2 |
7788172 | Kight et al. | Aug 2010 | B2 |
7792715 | Kasower | Sep 2010 | B1 |
7792716 | Gooding et al. | Sep 2010 | B2 |
7792725 | Booraem et al. | Sep 2010 | B2 |
7792732 | Haggerty et al. | Sep 2010 | B2 |
7792743 | Koningstein et al. | Sep 2010 | B2 |
7792747 | Chin | Sep 2010 | B2 |
7792749 | Ganesan | Sep 2010 | B2 |
7792903 | Fischer et al. | Sep 2010 | B2 |
7793835 | Coggeshall et al. | Sep 2010 | B1 |
7797224 | Barone et al. | Sep 2010 | B2 |
7797252 | Rosskamm et al. | Sep 2010 | B2 |
7797644 | Bhojan | Sep 2010 | B1 |
7797734 | Babi et al. | Sep 2010 | B2 |
7801807 | DeFrancesco et al. | Sep 2010 | B2 |
7801811 | Merrell et al. | Sep 2010 | B1 |
7801812 | Conlin et al. | Sep 2010 | B2 |
7801828 | Candella et al. | Sep 2010 | B2 |
7801896 | Szabo | Sep 2010 | B2 |
7801956 | Cumberbatch et al. | Sep 2010 | B1 |
7802104 | Dickinson | Sep 2010 | B2 |
7805348 | Nanjundamoorthy et al. | Sep 2010 | B2 |
7805362 | Merrell et al. | Sep 2010 | B1 |
7805439 | Elliott et al. | Sep 2010 | B2 |
7809398 | Pearson | Oct 2010 | B2 |
7809624 | Smith, III et al. | Oct 2010 | B1 |
7809797 | Cooley et al. | Oct 2010 | B2 |
7810036 | Bales et al. | Oct 2010 | B2 |
7813943 | Lefco et al. | Oct 2010 | B1 |
7814002 | DeFrancesco et al. | Oct 2010 | B2 |
7814004 | Haggerty et al. | Oct 2010 | B2 |
7814005 | Imrey | Oct 2010 | B2 |
7814431 | Quinn et al. | Oct 2010 | B1 |
7818228 | Coulter | Oct 2010 | B1 |
7818229 | Imrey et al. | Oct 2010 | B2 |
7818382 | Sommerer | Oct 2010 | B2 |
7822624 | Erdmann et al. | Oct 2010 | B2 |
7822667 | Smith, III et al. | Oct 2010 | B1 |
7827108 | Perlman et al. | Nov 2010 | B2 |
7827115 | Weller et al. | Nov 2010 | B2 |
7831521 | Ball et al. | Nov 2010 | B1 |
7831609 | Alexander | Nov 2010 | B1 |
7832006 | Chen et al. | Nov 2010 | B2 |
7835983 | Lefner et al. | Nov 2010 | B2 |
7835990 | Coleman | Nov 2010 | B2 |
7836111 | Shan | Nov 2010 | B1 |
7836197 | Isaac et al. | Nov 2010 | B2 |
7840484 | Haggerty et al. | Nov 2010 | B2 |
7840597 | Showalter et al. | Nov 2010 | B2 |
7840674 | Sterling | Nov 2010 | B1 |
7841004 | Balducci et al. | Nov 2010 | B1 |
7841008 | Cole et al. | Nov 2010 | B1 |
7844520 | Franklin | Nov 2010 | B1 |
7844522 | Fong | Nov 2010 | B2 |
7844604 | Baio et al. | Nov 2010 | B2 |
7848972 | Sharma | Dec 2010 | B1 |
7848974 | Sheehan | Dec 2010 | B1 |
7848978 | Imrey et al. | Dec 2010 | B2 |
7849004 | Choudhuri et al. | Dec 2010 | B2 |
7849014 | Erikson | Dec 2010 | B2 |
7849397 | Ahmed | Dec 2010 | B1 |
7853436 | McConnell et al. | Dec 2010 | B2 |
7853493 | DeBie et al. | Dec 2010 | B2 |
7853522 | Chin | Dec 2010 | B2 |
7853998 | Blaisdell et al. | Dec 2010 | B2 |
7856203 | Lipovski | Dec 2010 | B2 |
7856376 | Storey | Dec 2010 | B2 |
7856386 | Hazlehurst et al. | Dec 2010 | B2 |
7856453 | Malik et al. | Dec 2010 | B2 |
7860769 | Benson | Dec 2010 | B2 |
7860782 | Cash et al. | Dec 2010 | B2 |
7861287 | Pomerantz | Dec 2010 | B2 |
7865412 | Weiss et al. | Jan 2011 | B1 |
7866548 | Reed et al. | Jan 2011 | B2 |
7870025 | English | Jan 2011 | B2 |
7870066 | Lin et al. | Jan 2011 | B2 |
7870068 | Chin | Jan 2011 | B2 |
7870077 | Woo et al. | Jan 2011 | B2 |
7870078 | Clark et al. | Jan 2011 | B2 |
7870485 | Seliutin et al. | Jan 2011 | B2 |
7870491 | Henderson et al. | Jan 2011 | B1 |
7873441 | Synesiou et al. | Jan 2011 | B2 |
7873563 | Barone et al. | Jan 2011 | B2 |
7873573 | Realini | Jan 2011 | B2 |
7877304 | Coulter | Jan 2011 | B1 |
7877402 | Weiss et al. | Jan 2011 | B1 |
7877784 | Chow et al. | Jan 2011 | B2 |
RE42154 | Walker et al. | Feb 2011 | E |
7880728 | de los Reyes et al. | Feb 2011 | B2 |
7885637 | Immonen et al. | Feb 2011 | B2 |
7890358 | Dutta et al. | Feb 2011 | B2 |
7890371 | Chao | Feb 2011 | B2 |
7890403 | Smith | Feb 2011 | B1 |
7890420 | Haggerty et al. | Feb 2011 | B2 |
7895107 | Lapstun et al. | Feb 2011 | B2 |
7895227 | Henderson | Feb 2011 | B1 |
7899750 | Klieman et al. | Mar 2011 | B1 |
7899757 | Talan et al. | Mar 2011 | B1 |
7900052 | Joans | Mar 2011 | B2 |
7904306 | Johnson et al. | Mar 2011 | B2 |
7904354 | Pepe et al. | Mar 2011 | B2 |
7904367 | Chung et al. | Mar 2011 | B2 |
7904447 | Russell et al. | Mar 2011 | B1 |
7904899 | Robalewski et al. | Mar 2011 | B2 |
7908242 | Achanta | Mar 2011 | B1 |
7909246 | Hogg et al. | Mar 2011 | B2 |
7911673 | Yap | Mar 2011 | B1 |
7912770 | Haggerty et al. | Mar 2011 | B2 |
7912778 | Nanjundamoorthy | Mar 2011 | B2 |
7912842 | Bayliss et al. | Mar 2011 | B1 |
7912865 | Akerman et al. | Mar 2011 | B2 |
7913173 | Hebard et al. | Mar 2011 | B2 |
7917410 | Morimoto | Mar 2011 | B2 |
7917412 | Wang et al. | Mar 2011 | B1 |
7917435 | Hall et al. | Mar 2011 | B2 |
7917754 | Harrison et al. | Mar 2011 | B1 |
7925578 | Hong et al. | Apr 2011 | B1 |
7925582 | Kornegay et al. | Apr 2011 | B1 |
7925982 | Parker | Apr 2011 | B2 |
7930239 | Pierdinock et al. | Apr 2011 | B2 |
7930252 | Bender et al. | Apr 2011 | B2 |
7930285 | Abraham et al. | Apr 2011 | B2 |
7930302 | Bandaru et al. | Apr 2011 | B2 |
7930411 | Hayward | Apr 2011 | B1 |
7933834 | Kumar et al. | Apr 2011 | B2 |
7937323 | Wagner et al. | May 2011 | B2 |
7937325 | Kumar et al. | May 2011 | B2 |
7941365 | Bradley et al. | May 2011 | B1 |
7941560 | Friesen et al. | May 2011 | B1 |
7945240 | Klock et al. | May 2011 | B1 |
7945491 | Sharma | May 2011 | B2 |
7945510 | Bradley et al. | May 2011 | B1 |
7949609 | Colella | May 2011 | B2 |
7953660 | Ganesan et al. | May 2011 | B2 |
7954698 | Pliha | Jun 2011 | B1 |
7958046 | Doerner et al. | Jun 2011 | B2 |
7958049 | Jamison et al. | Jun 2011 | B2 |
7962361 | Ramchandani et al. | Jun 2011 | B2 |
7962410 | Tosswill | Jun 2011 | B2 |
7965275 | Lew | Jun 2011 | B1 |
7966192 | Pagliari et al. | Jun 2011 | B2 |
7966255 | Wong et al. | Jun 2011 | B2 |
7966325 | Singh | Jun 2011 | B2 |
7970669 | Santos | Jun 2011 | B1 |
7970676 | Feinstein | Jun 2011 | B2 |
7970679 | Kasower | Jun 2011 | B2 |
7970698 | Gupta et al. | Jun 2011 | B2 |
7970701 | Lewis et al. | Jun 2011 | B2 |
7970796 | Narayanan | Jun 2011 | B1 |
7971141 | Quinn et al. | Jun 2011 | B1 |
7974919 | Conlin et al. | Jul 2011 | B2 |
7975299 | Balducci et al. | Jul 2011 | B1 |
7979908 | Millwee | Jul 2011 | B2 |
7983932 | Kane | Jul 2011 | B2 |
7983975 | Jones et al. | Jul 2011 | B2 |
7983979 | Holland, IV | Jul 2011 | B2 |
7984436 | Murray | Jul 2011 | B1 |
7987124 | Holden et al. | Jul 2011 | B1 |
7987173 | Alexander | Jul 2011 | B2 |
7987501 | Miller et al. | Jul 2011 | B2 |
7990895 | Ferguson et al. | Aug 2011 | B2 |
7991673 | Kumar et al. | Aug 2011 | B2 |
7991688 | Phelan et al. | Aug 2011 | B2 |
7995991 | Johnson et al. | Aug 2011 | B2 |
7996310 | Edwards et al. | Aug 2011 | B1 |
8001034 | Chung et al. | Aug 2011 | B2 |
8001041 | Hoadley et al. | Aug 2011 | B2 |
8001045 | McClinton | Aug 2011 | B1 |
8001153 | Skurtovich, Jr. et al. | Aug 2011 | B2 |
8001235 | Russ et al. | Aug 2011 | B2 |
8001582 | Hulten et al. | Aug 2011 | B2 |
8005738 | Chacko et al. | Aug 2011 | B2 |
8005754 | McCoy et al. | Aug 2011 | B2 |
8005755 | Freishtat et al. | Aug 2011 | B2 |
8005759 | Hirtenstein et al. | Aug 2011 | B2 |
8005795 | Galipeau et al. | Aug 2011 | B2 |
8006261 | Haberman et al. | Aug 2011 | B1 |
8010674 | Fong | Aug 2011 | B2 |
8014756 | Henderson | Sep 2011 | B1 |
8015083 | Sterling et al. | Sep 2011 | B1 |
8015107 | Kornegay et al. | Sep 2011 | B2 |
8024263 | Zarikian et al. | Sep 2011 | B2 |
8024660 | Quinn et al. | Sep 2011 | B1 |
8024778 | Cash et al. | Sep 2011 | B2 |
8027975 | Gabriel et al. | Sep 2011 | B2 |
8032822 | Artamonov et al. | Oct 2011 | B1 |
8032930 | Hicks | Oct 2011 | B2 |
8032932 | Speyer et al. | Oct 2011 | B2 |
8036941 | Bennett et al. | Oct 2011 | B2 |
8036961 | Ducolon et al. | Oct 2011 | B2 |
8037097 | Guo et al. | Oct 2011 | B2 |
8037115 | Scalora et al. | Oct 2011 | B1 |
8037176 | Hopkins | Oct 2011 | B2 |
8037506 | Cooper et al. | Oct 2011 | B2 |
8041127 | Whitelaw | Oct 2011 | B2 |
8051074 | Eom et al. | Nov 2011 | B2 |
8055579 | Davies et al. | Nov 2011 | B2 |
8055904 | Cato et al. | Nov 2011 | B1 |
8060404 | Storey | Nov 2011 | B2 |
8060424 | Kasower | Nov 2011 | B2 |
8060438 | Dhar et al. | Nov 2011 | B2 |
8060441 | Stewart et al. | Nov 2011 | B2 |
8060508 | Gabriel et al. | Nov 2011 | B2 |
8060532 | White et al. | Nov 2011 | B2 |
8060916 | Bajaj et al. | Nov 2011 | B2 |
8065175 | Lewis | Nov 2011 | B1 |
8065233 | Lee et al. | Nov 2011 | B2 |
8065367 | Stanley | Nov 2011 | B1 |
8069066 | Stevens et al. | Nov 2011 | B2 |
8069213 | Bloch et al. | Nov 2011 | B2 |
8069407 | Armandpour et al. | Nov 2011 | B1 |
8073768 | Haggerty et al. | Dec 2011 | B2 |
8073773 | Kozee et al. | Dec 2011 | B2 |
8073774 | Pousti | Dec 2011 | B2 |
8073777 | Barry et al. | Dec 2011 | B2 |
8078453 | Shaw | Dec 2011 | B2 |
8078516 | Weiss et al. | Dec 2011 | B1 |
8078524 | Crawford et al. | Dec 2011 | B2 |
8078527 | Cerise et al. | Dec 2011 | B2 |
8078528 | Vicente et al. | Dec 2011 | B1 |
8078881 | Liu | Dec 2011 | B1 |
8078986 | Rhyne et al. | Dec 2011 | B1 |
8086219 | O'Neil et al. | Dec 2011 | B2 |
8086508 | Dheer et al. | Dec 2011 | B2 |
8086523 | Palmer | Dec 2011 | B1 |
8086524 | Craig et al. | Dec 2011 | B1 |
8086525 | Atwood et al. | Dec 2011 | B2 |
8090794 | Kilat et al. | Jan 2012 | B1 |
8095443 | DeBie | Jan 2012 | B2 |
8095458 | Peterson et al. | Jan 2012 | B2 |
8095534 | Alexander | Jan 2012 | B1 |
8095614 | Hopkins | Jan 2012 | B2 |
8098239 | Moore | Jan 2012 | B1 |
8099298 | Coleman et al. | Jan 2012 | B2 |
8099309 | Bober | Jan 2012 | B1 |
8099341 | Varghese | Jan 2012 | B2 |
8099356 | Feinstein et al. | Jan 2012 | B2 |
8099376 | Serrano-Morales et al. | Jan 2012 | B2 |
8103587 | Kumar et al. | Jan 2012 | B2 |
8104671 | Besecker et al. | Jan 2012 | B2 |
8104679 | Brown | Jan 2012 | B2 |
8108272 | Sorbe et al. | Jan 2012 | B2 |
8108301 | Gupta et al. | Jan 2012 | B2 |
8112354 | Lalwani et al. | Feb 2012 | B2 |
8117077 | Lin | Feb 2012 | B2 |
8117100 | Hopkins | Feb 2012 | B1 |
8117648 | Slaton et al. | Feb 2012 | B2 |
8121894 | Mason | Feb 2012 | B2 |
8121945 | Rackley, III et al. | Feb 2012 | B2 |
8121947 | Barth et al. | Feb 2012 | B1 |
8122133 | Hopkins | Feb 2012 | B2 |
8126456 | Lotter et al. | Feb 2012 | B2 |
8126820 | Talan et al. | Feb 2012 | B1 |
8127982 | Casey et al. | Mar 2012 | B1 |
8127986 | Taylor et al. | Mar 2012 | B1 |
8130075 | Hingole | Mar 2012 | B1 |
8131598 | Goolkasian et al. | Mar 2012 | B2 |
8131614 | Haggerty et al. | Mar 2012 | B2 |
8131685 | Gedalius et al. | Mar 2012 | B1 |
8131777 | McCullouch | Mar 2012 | B2 |
8131846 | Hernacki et al. | Mar 2012 | B1 |
8140432 | Johnson | Mar 2012 | B2 |
8140649 | Durand et al. | Mar 2012 | B2 |
8140847 | Wu | Mar 2012 | B1 |
8145188 | Park et al. | Mar 2012 | B2 |
8145189 | Power et al. | Mar 2012 | B2 |
8145554 | Kumar et al. | Mar 2012 | B2 |
8145568 | Rackley, III et al. | Mar 2012 | B2 |
8150161 | Laaser et al. | Apr 2012 | B2 |
8150754 | Leggatt et al. | Apr 2012 | B2 |
8151343 | Wang et al. | Apr 2012 | B1 |
8151344 | Channakeshava | Apr 2012 | B1 |
8152061 | Wolfe et al. | Apr 2012 | B2 |
8155950 | Bickerstaff | Apr 2012 | B1 |
8156175 | Hopkins | Apr 2012 | B2 |
8160624 | Kumar et al. | Apr 2012 | B2 |
8160959 | Rackley, III et al. | Apr 2012 | B2 |
8160960 | Fei et al. | Apr 2012 | B1 |
8165940 | Meimes et al. | Apr 2012 | B2 |
8170931 | Ross et al. | May 2012 | B2 |
8171471 | Daly | May 2012 | B1 |
8175889 | Girulat et al. | May 2012 | B1 |
8175969 | Yang et al. | May 2012 | B2 |
8180686 | Ryu et al. | May 2012 | B2 |
8180691 | Cao et al. | May 2012 | B2 |
8185472 | Boyd et al. | May 2012 | B1 |
8194956 | Chandler | Jun 2012 | B2 |
8195549 | Kasower | Jun 2012 | B2 |
8195566 | Tsui et al. | Jun 2012 | B2 |
8195567 | Cinelli et al. | Jun 2012 | B2 |
8196113 | Miller et al. | Jun 2012 | B2 |
8200966 | Grinberg et al. | Jun 2012 | B2 |
8201257 | Andres et al. | Jun 2012 | B1 |
8204774 | Chwast et al. | Jun 2012 | B2 |
8204788 | Ivankovich et al. | Jun 2012 | B1 |
8204812 | Stewart et al. | Jun 2012 | B2 |
8209659 | Mathew | Jun 2012 | B2 |
8219473 | Gardner et al. | Jul 2012 | B2 |
8219771 | Le Neel | Jul 2012 | B2 |
8224723 | Bosch et al. | Jul 2012 | B2 |
8224747 | Kumar et al. | Jul 2012 | B2 |
8224974 | Flora et al. | Jul 2012 | B1 |
8225270 | Frasher et al. | Jul 2012 | B2 |
8225288 | Miller et al. | Jul 2012 | B2 |
8225383 | Channakeshava et al. | Jul 2012 | B1 |
8225395 | Atwood et al. | Jul 2012 | B2 |
8229762 | Romans | Jul 2012 | B2 |
8229850 | Dilip et al. | Jul 2012 | B2 |
8229911 | Bennett | Jul 2012 | B2 |
8234498 | Britti et al. | Jul 2012 | B2 |
8244609 | Prakash et al. | Aug 2012 | B2 |
8244635 | Freishtat et al. | Aug 2012 | B2 |
8244646 | Johnston et al. | Aug 2012 | B2 |
8244848 | Narayanan et al. | Aug 2012 | B1 |
8249961 | Hopkins | Aug 2012 | B1 |
8249965 | Tumminaro | Aug 2012 | B2 |
8249968 | Oldham et al. | Aug 2012 | B1 |
8255298 | Nesladek | Aug 2012 | B1 |
8255327 | Kemper et al. | Aug 2012 | B2 |
8255868 | Robalewski | Aug 2012 | B1 |
8255971 | Webb et al. | Aug 2012 | B1 |
8255978 | Dick | Aug 2012 | B2 |
8256013 | Hernacki et al. | Aug 2012 | B1 |
8260649 | Ramanujan et al. | Sep 2012 | B2 |
8260682 | Rigole | Sep 2012 | B2 |
8260694 | Lauer et al. | Sep 2012 | B1 |
8260805 | Venu et al. | Sep 2012 | B1 |
8261204 | Huynh et al. | Sep 2012 | B1 |
8261334 | Hazlehurst et al. | Sep 2012 | B2 |
8261970 | Suginaka | Sep 2012 | B2 |
8261974 | Hull | Sep 2012 | B2 |
8265591 | Abidogun et al. | Sep 2012 | B1 |
8266065 | Dilip et al. | Sep 2012 | B2 |
8266515 | Satyavolu | Sep 2012 | B2 |
8271362 | Fasching | Sep 2012 | B2 |
8271393 | Twining et al. | Sep 2012 | B2 |
8271650 | Alexander | Sep 2012 | B2 |
8271894 | Mayers | Sep 2012 | B1 |
8271899 | Blackburn et al. | Sep 2012 | B1 |
8271906 | Fong | Sep 2012 | B1 |
8271961 | Chithambaram | Sep 2012 | B1 |
8275636 | Berg et al. | Sep 2012 | B2 |
8275683 | Wolfson et al. | Sep 2012 | B2 |
8275710 | Hildebrand | Sep 2012 | B1 |
8280723 | Laaser | Oct 2012 | B1 |
8280789 | Menzel | Oct 2012 | B2 |
8280792 | Rajan et al. | Oct 2012 | B2 |
8280810 | Grandcolas et al. | Oct 2012 | B2 |
8280879 | Alexander | Oct 2012 | B2 |
8281372 | Vidal | Oct 2012 | B1 |
8285613 | Coulter | Oct 2012 | B1 |
8285640 | Scipioni | Oct 2012 | B2 |
8285641 | Cataline et al. | Oct 2012 | B2 |
8285656 | Chang et al. | Oct 2012 | B1 |
8290835 | Homer et al. | Oct 2012 | B2 |
8290840 | Kasower | Oct 2012 | B2 |
8290845 | Leibon et al. | Oct 2012 | B2 |
8290856 | Kasower | Oct 2012 | B1 |
8290865 | Lawrence et al. | Oct 2012 | B2 |
8290941 | Alexander | Oct 2012 | B2 |
8296229 | Yellin et al. | Oct 2012 | B1 |
8306255 | Degnan | Nov 2012 | B1 |
8306861 | Dunsmore et al. | Nov 2012 | B2 |
8306889 | Leibon et al. | Nov 2012 | B2 |
8311792 | Podgorny et al. | Nov 2012 | B1 |
8311936 | Haggerty et al. | Nov 2012 | B2 |
8311942 | Mason | Nov 2012 | B1 |
8312033 | McMillan | Nov 2012 | B1 |
8315942 | Haggerty et al. | Nov 2012 | B2 |
8315945 | Gupta | Nov 2012 | B1 |
8320944 | Gibson et al. | Nov 2012 | B1 |
8321334 | Kornegay et al. | Nov 2012 | B1 |
8321339 | Imrey et al. | Nov 2012 | B2 |
8321413 | Gabriel et al. | Nov 2012 | B2 |
8326725 | Elwell et al. | Dec 2012 | B2 |
8326747 | Ang et al. | Dec 2012 | B2 |
8326770 | Weisman | Dec 2012 | B1 |
8327429 | Speyer et al. | Dec 2012 | B2 |
8332241 | Harrell et al. | Dec 2012 | B2 |
8335739 | Bol et al. | Dec 2012 | B1 |
8335741 | Kornegay et al. | Dec 2012 | B2 |
8341545 | Hebard | Dec 2012 | B2 |
8346226 | Gibson et al. | Jan 2013 | B2 |
8346615 | Connors et al. | Jan 2013 | B2 |
8352365 | Goldberg et al. | Jan 2013 | B1 |
8352564 | Campise et al. | Jan 2013 | B1 |
8353027 | Dennis et al. | Jan 2013 | B2 |
8353029 | Morgan et al. | Jan 2013 | B2 |
8353448 | Miller et al. | Jan 2013 | B1 |
8355935 | Hellman et al. | Jan 2013 | B2 |
8355966 | Vu et al. | Jan 2013 | B1 |
8355967 | Debie et al. | Jan 2013 | B2 |
8359003 | Gailloux et al. | Jan 2013 | B1 |
8359266 | Seale, III et al. | Jan 2013 | B2 |
8359278 | Domenikos et al. | Jan 2013 | B2 |
8364662 | Moyer et al. | Jan 2013 | B1 |
8364711 | Wilkins et al. | Jan 2013 | B2 |
8364969 | King | Jan 2013 | B2 |
8370229 | Moduga et al. | Feb 2013 | B2 |
8370256 | Murphy | Feb 2013 | B1 |
8370340 | Yu et al. | Feb 2013 | B1 |
8374885 | Stibel et al. | Feb 2013 | B2 |
8374962 | Abelman et al. | Feb 2013 | B2 |
8374973 | Herbrich et al. | Feb 2013 | B2 |
8375331 | Mayers | Feb 2013 | B1 |
8380803 | Stibel et al. | Feb 2013 | B1 |
8381120 | Stibel et al. | Feb 2013 | B2 |
8385521 | Rustagi et al. | Feb 2013 | B2 |
8386341 | Bennett et al. | Feb 2013 | B2 |
8386377 | Xiong et al. | Feb 2013 | B1 |
8386966 | Attinasi et al. | Feb 2013 | B1 |
8391846 | Mankovich | Mar 2013 | B1 |
8392230 | Stibel et al. | Mar 2013 | B2 |
8392272 | Lin | Mar 2013 | B2 |
8392300 | Battula et al. | Mar 2013 | B1 |
8392334 | Hirtenstein et al. | Mar 2013 | B2 |
8392969 | Park et al. | Mar 2013 | B1 |
8396743 | Alvin | Mar 2013 | B2 |
8396747 | Bachenheimer | Mar 2013 | B2 |
8400970 | Bajar et al. | Mar 2013 | B2 |
8401875 | Fish et al. | Mar 2013 | B2 |
8401941 | Havemose | Mar 2013 | B1 |
8401965 | Johnson et al. | Mar 2013 | B2 |
8401966 | Stewart et al. | Mar 2013 | B2 |
8402526 | Ahn | Mar 2013 | B2 |
8407141 | Mullen et al. | Mar 2013 | B2 |
8407194 | Chaput et al. | Mar 2013 | B1 |
8412593 | Song et al. | Apr 2013 | B1 |
8413239 | Sutton et al. | Apr 2013 | B2 |
8417627 | Cerise et al. | Apr 2013 | B2 |
8417635 | Kalra et al. | Apr 2013 | B2 |
8417644 | Ferguson et al. | Apr 2013 | B2 |
8423285 | Paterson et al. | Apr 2013 | B2 |
8423387 | Mirza | Apr 2013 | B1 |
8423452 | Ley et al. | Apr 2013 | B1 |
8423461 | Mukherjee | Apr 2013 | B2 |
8423463 | Matthews et al. | Apr 2013 | B1 |
8423563 | Chang et al. | Apr 2013 | B2 |
8423653 | Chang et al. | Apr 2013 | B2 |
8429073 | Ferguson et al. | Apr 2013 | B2 |
8432275 | Patel et al. | Apr 2013 | B2 |
8433654 | Subbarao et al. | Apr 2013 | B2 |
8438063 | Albisu | May 2013 | B2 |
8443202 | White et al. | May 2013 | B2 |
8447667 | Dinamani | May 2013 | B1 |
8452704 | Barbara et al. | May 2013 | B2 |
8452708 | Birenbaum et al. | May 2013 | B1 |
8453068 | Stibel et al. | May 2013 | B2 |
8453218 | Lan et al. | May 2013 | B2 |
8453940 | Diamond | Jun 2013 | B2 |
8456293 | Trundle et al. | Jun 2013 | B1 |
8458062 | Dutt et al. | Jun 2013 | B2 |
8463595 | Rehling et al. | Jun 2013 | B1 |
8463831 | Harris et al. | Jun 2013 | B2 |
8463939 | Galvin | Jun 2013 | B1 |
8464939 | Taylor et al. | Jun 2013 | B1 |
8468028 | Stibel et al. | Jun 2013 | B2 |
8473318 | Nielson et al. | Jun 2013 | B2 |
8473353 | Matsuda et al. | Jun 2013 | B2 |
8473394 | Marshall | Jun 2013 | B2 |
8467766 | Rackley, III et al. | Jul 2013 | B2 |
8478674 | Kapczynski et al. | Jul 2013 | B1 |
8478686 | Giles | Jul 2013 | B1 |
8483473 | Roach et al. | Jul 2013 | B2 |
8484104 | Hurlbutt et al. | Jul 2013 | B1 |
8484131 | Kelly et al. | Jul 2013 | B2 |
8484186 | Kapczynski et al. | Jul 2013 | B1 |
8489067 | Rackley, III et al. | Jul 2013 | B2 |
8489502 | Morris et al. | Jul 2013 | B2 |
8489504 | Gupta | Jul 2013 | B1 |
8489513 | Bishop et al. | Jul 2013 | B2 |
8489720 | Morford et al. | Jul 2013 | B1 |
8490126 | Walter et al. | Jul 2013 | B2 |
8490871 | Miller et al. | Jul 2013 | B1 |
8494958 | Schoenberg et al. | Jul 2013 | B2 |
8494973 | Dignan et al. | Jul 2013 | B1 |
8498613 | Aebi | Jul 2013 | B2 |
8498900 | Spirin et al. | Jul 2013 | B1 |
8498914 | Hazelhurst | Jul 2013 | B2 |
8498932 | Matthews | Jul 2013 | B2 |
8498944 | Solomon | Jul 2013 | B2 |
8499348 | Rubin | Jul 2013 | B1 |
8500006 | Carlson et al. | Aug 2013 | B2 |
8504394 | Nutkiewicz et al. | Aug 2013 | B2 |
8504470 | Chirehdast | Aug 2013 | B1 |
8504474 | Armes et al. | Aug 2013 | B2 |
8510220 | Rackley, III et al. | Aug 2013 | B2 |
8510223 | Blair et al. | Aug 2013 | B2 |
8515825 | Ross, Jr. et al. | Aug 2013 | B1 |
8515828 | Wolf et al. | Aug 2013 | B1 |
8515842 | Papadimitriou | Aug 2013 | B2 |
8515844 | Kasower | Aug 2013 | B2 |
8521657 | Kuebert et al. | Aug 2013 | B2 |
8527357 | Ganesan | Sep 2013 | B1 |
8527377 | D'Englere | Sep 2013 | B2 |
8527410 | Markki et al. | Sep 2013 | B2 |
8527413 | Heller | Sep 2013 | B2 |
8527596 | Long et al. | Sep 2013 | B2 |
8528813 | Blossom | Sep 2013 | B1 |
8533118 | Weller et al. | Sep 2013 | B2 |
8538871 | Portillo et al. | Sep 2013 | B2 |
8538874 | Thomas | Sep 2013 | B2 |
8538878 | Meier et al. | Sep 2013 | B2 |
8544091 | Stibel | Sep 2013 | B2 |
8458907 | Campbell | Oct 2013 | B1 |
8548832 | Ika et al. | Oct 2013 | B2 |
8548903 | Becker | Oct 2013 | B2 |
8548907 | Campbell | Oct 2013 | B1 |
8554584 | Hargroder | Oct 2013 | B2 |
8555357 | Gauvin | Oct 2013 | B1 |
8560161 | Kator et al. | Oct 2013 | B1 |
8560410 | Narkar | Oct 2013 | B2 |
8560436 | Ingram et al. | Oct 2013 | B2 |
8560438 | Hankey et al. | Oct 2013 | B2 |
8560444 | Rosenblatt et al. | Oct 2013 | B2 |
8560447 | Hinghole et al. | Oct 2013 | B1 |
8560450 | Kumar et al. | Oct 2013 | B2 |
8566187 | Keld et al. | Oct 2013 | B2 |
8571971 | Brown et al. | Oct 2013 | B1 |
8572083 | Snell et al. | Oct 2013 | B1 |
8578036 | Holfelder et al. | Nov 2013 | B1 |
8578496 | Krishnappa | Nov 2013 | B1 |
8589286 | Kornegay et al. | Nov 2013 | B1 |
8595101 | Daukas et al. | Nov 2013 | B1 |
8600768 | Stibel et al. | Dec 2013 | B2 |
8600886 | Ramavarjula et al. | Dec 2013 | B2 |
8601602 | Zheng | Dec 2013 | B1 |
8606694 | Campbell et al. | Dec 2013 | B2 |
8606869 | Stibel et al. | Dec 2013 | B2 |
8626137 | Devitt et al. | Jan 2014 | B1 |
8630893 | Stibel et al. | Jan 2014 | B2 |
8630938 | Cheng et al. | Jan 2014 | B2 |
8639930 | Stibel et al. | Jan 2014 | B2 |
8646051 | Paden et al. | Feb 2014 | B2 |
8650189 | Fertik et al. | Feb 2014 | B2 |
8660541 | Beresniewicz et al. | Feb 2014 | B1 |
8660919 | Kasower | Feb 2014 | B2 |
8671115 | Skurtovich, Jr. et al. | Mar 2014 | B2 |
8676684 | Newman et al. | Mar 2014 | B2 |
8688543 | Dominguez | Apr 2014 | B2 |
8689001 | Satish | Apr 2014 | B1 |
8694420 | Oliai | Apr 2014 | B1 |
8705718 | Baniak et al. | Apr 2014 | B2 |
8706599 | Koenig et al. | Apr 2014 | B1 |
8706616 | Flynn | Apr 2014 | B1 |
8725613 | Celka et al. | May 2014 | B1 |
8732004 | Ramos et al. | May 2014 | B1 |
8738516 | Dean et al. | May 2014 | B1 |
8744956 | DiChiara et al. | Jun 2014 | B1 |
8745698 | Ashfield et al. | Jun 2014 | B1 |
8751378 | Dornhelm et al. | Jun 2014 | B2 |
8760417 | Haug | Jun 2014 | B2 |
8762243 | Jenkins et al. | Jun 2014 | B2 |
8768914 | Scriffignano et al. | Jul 2014 | B2 |
8775299 | Achanta et al. | Jul 2014 | B2 |
8781951 | Lewis et al. | Jul 2014 | B2 |
8781953 | Kasower | Jul 2014 | B2 |
8782217 | Arone et al. | Jul 2014 | B1 |
8818888 | Kapczynski et al. | Aug 2014 | B1 |
8856894 | Dean et al. | Oct 2014 | B1 |
8856945 | Carter et al. | Oct 2014 | B2 |
8860763 | Privault et al. | Oct 2014 | B2 |
8868914 | Teppler | Oct 2014 | B2 |
8930251 | DeBie | Jan 2015 | B2 |
8930263 | Mahacek | Jan 2015 | B1 |
8938399 | Herman | Jan 2015 | B1 |
8949981 | Trollope et al. | Feb 2015 | B1 |
8954459 | McMillan et al. | Feb 2015 | B1 |
8972400 | Kapczynski et al. | Mar 2015 | B1 |
9002753 | Anschutz et al. | Apr 2015 | B2 |
9053589 | Kator et al. | Jun 2015 | B1 |
9053590 | Kator et al. | Jun 2015 | B1 |
9058627 | Wasser et al. | Jun 2015 | B1 |
9076276 | Kator et al. | Jul 2015 | B1 |
9106691 | Burger et al. | Aug 2015 | B1 |
9116918 | Kim | Aug 2015 | B1 |
9147042 | Haller et al. | Sep 2015 | B1 |
9218481 | Belisario | Oct 2015 | B2 |
9183377 | Sobel et al. | Nov 2015 | B1 |
9213461 | Eraker et al. | Dec 2015 | B2 |
9225704 | Johansson et al. | Dec 2015 | B1 |
9230283 | Taylor et al. | Jan 2016 | B1 |
9256624 | Skurtovich, Jr. et al. | Feb 2016 | B2 |
9256904 | Haller et al. | Feb 2016 | B1 |
9400589 | Wasser et al. | Jul 2016 | B1 |
9406085 | Hunt, III et al. | Aug 2016 | B1 |
9443268 | Kapczynski et al. | Sep 2016 | B1 |
9477737 | Charyk et al. | Oct 2016 | B1 |
9479471 | Schoenrock | Oct 2016 | B2 |
9483606 | Dean et al. | Nov 2016 | B1 |
9501583 | Nordstrom et al. | Nov 2016 | B2 |
9536263 | Dean et al. | Jan 2017 | B1 |
9542553 | Burger et al. | Jan 2017 | B1 |
9542682 | Taylor et al. | Jan 2017 | B1 |
9558519 | Burger | Jan 2017 | B1 |
9569797 | Rohn et al. | Feb 2017 | B1 |
9607336 | Dean et al. | Mar 2017 | B1 |
9619751 | Woon et al. | Apr 2017 | B2 |
9654541 | Kapczynski et al. | May 2017 | B1 |
9665854 | Burger et al. | May 2017 | B1 |
9690820 | Girulat, Jr. | Jun 2017 | B1 |
9697568 | Hunt, III | Jul 2017 | B1 |
9710523 | Skurtovich, Jr. et al. | Jul 2017 | B2 |
9710852 | Olson et al. | Jul 2017 | B1 |
9767513 | Taylor et al. | Sep 2017 | B1 |
9830646 | Wasser et al. | Nov 2017 | B1 |
9853959 | Kapczynski et al. | Dec 2017 | B1 |
9870589 | Arnold et al. | Jan 2018 | B1 |
9892457 | Kapczynski | Feb 2018 | B1 |
9916621 | Wasser et al. | Mar 2018 | B1 |
9972048 | Dean et al. | May 2018 | B1 |
9990674 | Taylor et al. | Jun 2018 | B1 |
10025842 | Charyk et al. | Jul 2018 | B1 |
10043214 | Hunt, III | Aug 2018 | B1 |
10061936 | Burger et al. | Aug 2018 | B1 |
10075446 | McMillan et al. | Sep 2018 | B2 |
10102570 | Kapczynski et al. | Oct 2018 | B1 |
10176233 | Dean et al. | Jan 2019 | B1 |
10187341 | Schoenrock | Jan 2019 | B2 |
10255598 | Dean et al. | Apr 2019 | B1 |
10262364 | Taylor et al. | Apr 2019 | B2 |
10269065 | Kapczynski et al. | Apr 2019 | B1 |
10277659 | Kapczynski et al. | Apr 2019 | B1 |
D847840 | Poschel et al. | May 2019 | S |
D851126 | Tauban | Jun 2019 | S |
D851127 | Tauban | Jun 2019 | S |
D851128 | Tauban | Jun 2019 | S |
10325314 | Kapczynski et al. | Jun 2019 | B1 |
10366450 | Mahacek et al. | Jul 2019 | B1 |
10380654 | Hirtenstein et al. | Aug 2019 | B2 |
10482532 | Kapczynski | Nov 2019 | B1 |
10528545 | Girulat, Jr. | Jan 2020 | B1 |
20010005840 | Verkama | Jun 2001 | A1 |
20010011247 | O'Flaherty et al. | Aug 2001 | A1 |
20010014878 | Mitra et al. | Aug 2001 | A1 |
20010027413 | Bhutta | Oct 2001 | A1 |
20010029470 | Schultz et al. | Oct 2001 | A1 |
20010029482 | Tealdi et al. | Oct 2001 | A1 |
20010032181 | Jakstadt et al. | Oct 2001 | A1 |
20010034618 | Kessler et al. | Oct 2001 | A1 |
20010034631 | Kiselik | Oct 2001 | A1 |
20010037204 | Horn et al. | Nov 2001 | A1 |
20010037289 | Mayr et al. | Nov 2001 | A1 |
20010037295 | Olsen | Nov 2001 | A1 |
20010037297 | McNair | Nov 2001 | A1 |
20010039523 | Iwamoto | Nov 2001 | A1 |
20010039532 | Coleman, Jr. et al. | Nov 2001 | A1 |
20010039563 | Tian | Nov 2001 | A1 |
20010042785 | Walker et al. | Nov 2001 | A1 |
20010044729 | Pomerance | Nov 2001 | A1 |
20010044756 | Watkins et al. | Nov 2001 | A1 |
20010044764 | Arnold | Nov 2001 | A1 |
20010047332 | Gonen-Friedman et al. | Nov 2001 | A1 |
20010049274 | Degraeve | Dec 2001 | A1 |
20010053989 | Keller et al. | Dec 2001 | A1 |
20010056390 | Varadarajan et al. | Dec 2001 | A1 |
20020010616 | Itzhaki | Jan 2002 | A1 |
20020010635 | Tokiwa | Jan 2002 | A1 |
20020013827 | Edstrom et al. | Jan 2002 | A1 |
20020013899 | Faul | Jan 2002 | A1 |
20020016767 | Johnston | Feb 2002 | A1 |
20020016771 | Carothers et al. | Feb 2002 | A1 |
20020023108 | Daswani et al. | Feb 2002 | A1 |
20020026423 | Maritzen et al. | Feb 2002 | A1 |
20020029192 | Nakagawa et al. | Mar 2002 | A1 |
20020032611 | Khan | Mar 2002 | A1 |
20020032635 | Harris et al. | Mar 2002 | A1 |
20020032645 | Nozaki et al. | Mar 2002 | A1 |
20020032647 | Delinsky et al. | Mar 2002 | A1 |
20020033846 | Balasubramanian et al. | Mar 2002 | A1 |
20020035480 | Gordon et al. | Mar 2002 | A1 |
20020035511 | Haji et al. | Mar 2002 | A1 |
20020035520 | Weiss | Mar 2002 | A1 |
20020040355 | Weiner | Apr 2002 | A1 |
20020042715 | Kelley | Apr 2002 | A1 |
20020045154 | Wood et al. | Apr 2002 | A1 |
20020046185 | Villart et al. | Apr 2002 | A1 |
20020049624 | Raveis, Jr. | Apr 2002 | A1 |
20020052836 | Galperin et al. | May 2002 | A1 |
20020052841 | Guthrie et al. | May 2002 | A1 |
20020055906 | Katz et al. | May 2002 | A1 |
20020059139 | Evans | May 2002 | A1 |
20020059201 | Work | May 2002 | A1 |
20020062249 | Iannacci | May 2002 | A1 |
20020065772 | Saliba et al. | May 2002 | A1 |
20020069122 | Yun et al. | Jun 2002 | A1 |
20020069165 | O'Neil | Jun 2002 | A1 |
20020069168 | Lee et al. | Jun 2002 | A1 |
20020069182 | Dwyer | Jun 2002 | A1 |
20020073017 | Robertson | Jun 2002 | A1 |
20020077964 | Brody et al. | Jun 2002 | A1 |
20020077978 | O'Leary et al. | Jun 2002 | A1 |
20020087460 | Hornung | Jul 2002 | A1 |
20020087488 | Fordahl et al. | Jul 2002 | A1 |
20020091635 | Dilip et al. | Jul 2002 | A1 |
20020091650 | Ellis | Jul 2002 | A1 |
20020099612 | Seaman et al. | Jul 2002 | A1 |
20020099635 | Guiragosian | Jul 2002 | A1 |
20020099641 | Mills et al. | Jul 2002 | A1 |
20020099824 | Bender et al. | Jul 2002 | A1 |
20020103933 | Garon et al. | Aug 2002 | A1 |
20020107765 | Walker | Aug 2002 | A1 |
20020111816 | Lortscher et al. | Aug 2002 | A1 |
20020111890 | Sloan et al. | Aug 2002 | A1 |
20020116331 | Cataline et al. | Aug 2002 | A1 |
20020120537 | Morea et al. | Aug 2002 | A1 |
20020120581 | Schiavone et al. | Aug 2002 | A1 |
20020120757 | Sutherland et al. | Aug 2002 | A1 |
20020120846 | Stewart et al. | Aug 2002 | A1 |
20020126449 | Casebolt | Sep 2002 | A1 |
20020128917 | Grounds | Sep 2002 | A1 |
20020128962 | Kasower | Sep 2002 | A1 |
20020133365 | Grey et al. | Sep 2002 | A1 |
20020133462 | Shteyn | Sep 2002 | A1 |
20020133504 | Vlahos et al. | Sep 2002 | A1 |
20020138409 | Bass | Sep 2002 | A1 |
20020138470 | Zhou | Sep 2002 | A1 |
20020143674 | Beckman | Oct 2002 | A1 |
20020143943 | Lee et al. | Oct 2002 | A1 |
20020147669 | Taylor et al. | Oct 2002 | A1 |
20020147695 | Khedkar et al. | Oct 2002 | A1 |
20020147801 | Gullotta et al. | Oct 2002 | A1 |
20020149794 | Yoshioka et al. | Oct 2002 | A1 |
20020152166 | Dutta et al. | Oct 2002 | A1 |
20020156676 | Ahrens et al. | Oct 2002 | A1 |
20020161664 | Shaya et al. | Oct 2002 | A1 |
20020165757 | Lisser | Nov 2002 | A1 |
20020165839 | Taylor et al. | Nov 2002 | A1 |
20020169747 | Chapman et al. | Nov 2002 | A1 |
20020173994 | Ferguson, III | Nov 2002 | A1 |
20020174048 | Dheer et al. | Nov 2002 | A1 |
20020174061 | Srinivasan et al. | Nov 2002 | A1 |
20020174124 | Haas et al. | Nov 2002 | A1 |
20020188511 | Johnson et al. | Dec 2002 | A1 |
20020194117 | Nabe et al. | Dec 2002 | A1 |
20020194120 | Russell et al. | Dec 2002 | A1 |
20020194140 | Makuck | Dec 2002 | A1 |
20020198736 | Harrison | Dec 2002 | A1 |
20020198798 | Ludwig et al. | Dec 2002 | A1 |
20020198800 | Shamrakov | Dec 2002 | A1 |
20020198806 | Blagg et al. | Dec 2002 | A1 |
20020198822 | Munoz et al. | Dec 2002 | A1 |
20020198824 | Cook | Dec 2002 | A1 |
20020198828 | Ludwig et al. | Dec 2002 | A1 |
20020198829 | Ludwig et al. | Dec 2002 | A1 |
20020198830 | Randell et al. | Dec 2002 | A1 |
20020198835 | Watson et al. | Dec 2002 | A1 |
20030002671 | Inchalik et al. | Jan 2003 | A1 |
20030004853 | Ram et al. | Jan 2003 | A1 |
20030004855 | Dutta et al. | Jan 2003 | A1 |
20030004922 | Schmidt et al. | Jan 2003 | A1 |
20030007283 | Ostwald et al. | Jan 2003 | A1 |
20030009301 | Anand et al. | Jan 2003 | A1 |
20030009411 | Ram et al. | Jan 2003 | A1 |
20030009415 | Lutnick et al. | Jan 2003 | A1 |
20030009418 | Green et al. | Jan 2003 | A1 |
20030009426 | Ruiz-Sanchez | Jan 2003 | A1 |
20030018549 | Fei et al. | Jan 2003 | A1 |
20030018578 | Schultz | Jan 2003 | A1 |
20030023531 | Fergusson | Jan 2003 | A1 |
20030023555 | Rees | Jan 2003 | A1 |
20030028466 | Jenson et al. | Feb 2003 | A1 |
20030028477 | Stevenson et al. | Feb 2003 | A1 |
20030028529 | Cheung | Feb 2003 | A1 |
20030036952 | Panttaja et al. | Feb 2003 | A1 |
20030036995 | Lazerson | Feb 2003 | A1 |
20030041019 | Vagim et al. | Feb 2003 | A1 |
20030041031 | Hedy | Feb 2003 | A1 |
20030046222 | Bard et al. | Mar 2003 | A1 |
20030046311 | Baidya et al. | Mar 2003 | A1 |
20030048294 | Arnold | Mar 2003 | A1 |
20030050929 | Bookman et al. | Mar 2003 | A1 |
20030061104 | Thomson et al. | Mar 2003 | A1 |
20030061155 | Chin | Mar 2003 | A1 |
20030061163 | Durfield | Mar 2003 | A1 |
20030064705 | Desierio | Apr 2003 | A1 |
20030065563 | Elliott et al. | Apr 2003 | A1 |
20030069839 | Whittington et al. | Apr 2003 | A1 |
20030069943 | Bahrs et al. | Apr 2003 | A1 |
20030078897 | Florance et al. | Apr 2003 | A1 |
20030090586 | Jan et al. | May 2003 | A1 |
20030093311 | Knowlson | May 2003 | A1 |
20030097342 | Whittingtom | May 2003 | A1 |
20030097380 | Mulhern et al. | May 2003 | A1 |
20030101111 | Dang et al. | May 2003 | A1 |
20030101344 | Wheeler et al. | May 2003 | A1 |
20030105646 | Siepser | Jun 2003 | A1 |
20030105710 | Barbara et al. | Jun 2003 | A1 |
20030105733 | Boreham | Jun 2003 | A1 |
20030105742 | Boreham et al. | Jun 2003 | A1 |
20030115122 | Slater et al. | Jun 2003 | A1 |
20030115133 | Bian | Jun 2003 | A1 |
20030130892 | Taono et al. | Jul 2003 | A1 |
20030154122 | Jackson, Jr. et al. | Aug 2003 | A1 |
20030154162 | Danaher et al. | Aug 2003 | A1 |
20030158960 | Engberg | Aug 2003 | A1 |
20030163418 | Marks | Aug 2003 | A1 |
20030163435 | Payone | Aug 2003 | A1 |
20030163513 | Schaeck et al. | Aug 2003 | A1 |
20030163733 | Barriga-Caceres et al. | Aug 2003 | A1 |
20030167229 | Ludwig et al. | Sep 2003 | A1 |
20030171942 | Gaito | Sep 2003 | A1 |
20030172039 | Guy | Sep 2003 | A1 |
20030177090 | Eden | Sep 2003 | A1 |
20030177091 | Paglin | Sep 2003 | A1 |
20030186200 | Selix | Oct 2003 | A1 |
20030187768 | Ryan et al. | Oct 2003 | A1 |
20030187780 | Arthus et al. | Oct 2003 | A1 |
20030187837 | Culliss | Oct 2003 | A1 |
20030191701 | Haseltine et al. | Oct 2003 | A1 |
20030191711 | Jamison et al. | Oct 2003 | A1 |
20030191731 | Stewart et al. | Oct 2003 | A1 |
20030195805 | Storey | Oct 2003 | A1 |
20030195830 | Merkoulovitch et al. | Oct 2003 | A1 |
20030195859 | Lawrence | Oct 2003 | A1 |
20030196109 | Raley et al. | Oct 2003 | A1 |
20030200142 | Hicks et al. | Oct 2003 | A1 |
20030204429 | Botscheck et al. | Oct 2003 | A1 |
20030204752 | Garrison | Oct 2003 | A1 |
20030208412 | Hillestad et al. | Nov 2003 | A1 |
20030212618 | Keyes et al. | Nov 2003 | A1 |
20030212745 | Caughey | Nov 2003 | A1 |
20030212909 | Chandrashekhar | Nov 2003 | A1 |
20030214775 | Fukuta et al. | Nov 2003 | A1 |
20030217000 | Wichman | Nov 2003 | A1 |
20030219709 | Olenick et al. | Nov 2003 | A1 |
20030220858 | Lam et al. | Nov 2003 | A1 |
20030220871 | Clarke et al. | Nov 2003 | A1 |
20030225742 | Tenner et al. | Dec 2003 | A1 |
20030229504 | Hollister | Dec 2003 | A1 |
20030229580 | Gass et al. | Dec 2003 | A1 |
20030229589 | Rosenblatt et al. | Dec 2003 | A1 |
20030229590 | Byrne et al. | Dec 2003 | A1 |
20030236701 | Rowney et al. | Dec 2003 | A1 |
20030236738 | Lange et al. | Dec 2003 | A1 |
20040001565 | Jones et al. | Jan 2004 | A1 |
20040002907 | Tosswill | Jan 2004 | A1 |
20040002916 | Timmerman et al. | Jan 2004 | A1 |
20040006536 | Kawashima et al. | Jan 2004 | A1 |
20040010458 | Friedman | Jan 2004 | A1 |
20040015714 | Abraham et al. | Jan 2004 | A1 |
20040015715 | Brown | Jan 2004 | A1 |
20040019549 | Gulbrandsen | Jan 2004 | A1 |
20040019799 | Vering et al. | Jan 2004 | A1 |
20040023637 | Johnson et al. | Feb 2004 | A1 |
20040024671 | Freund | Feb 2004 | A1 |
20040024702 | Angel et al. | Feb 2004 | A1 |
20040024709 | Yu et al. | Feb 2004 | A1 |
20040024717 | Angel et al. | Feb 2004 | A1 |
20040030574 | DiCostanzo et al. | Feb 2004 | A1 |
20040030621 | Cobb | Feb 2004 | A1 |
20040030629 | Freeman et al. | Feb 2004 | A1 |
20040030649 | Nelson et al. | Feb 2004 | A1 |
20040030667 | Xu et al. | Feb 2004 | A1 |
20040039586 | Garvey et al. | Feb 2004 | A1 |
20040039688 | Sulkowski et al. | Feb 2004 | A1 |
20040044563 | Stein | Mar 2004 | A1 |
20040044601 | Kim et al. | Mar 2004 | A1 |
20040044615 | Xue et al. | Mar 2004 | A1 |
20040044617 | Lu | Mar 2004 | A1 |
20040044628 | Mathew et al. | Mar 2004 | A1 |
20040044673 | Brady et al. | Mar 2004 | A1 |
20040046033 | Kolodziej et al. | Mar 2004 | A1 |
20040059786 | Caughey | Mar 2004 | A1 |
20040062213 | Koss | Apr 2004 | A1 |
20040078424 | Yairi et al. | Apr 2004 | A1 |
20040083159 | Crosby et al. | Apr 2004 | A1 |
20040083230 | Caughey | Apr 2004 | A1 |
20040088237 | Moenickheim et al. | May 2004 | A1 |
20040088255 | Zielke et al. | May 2004 | A1 |
20040093278 | Burchetta et al. | May 2004 | A1 |
20040098418 | Hein | May 2004 | A1 |
20040098546 | Bashant et al. | May 2004 | A1 |
20040102197 | Dietz | May 2004 | A1 |
20040107250 | Marciano | Jun 2004 | A1 |
20040110119 | Riconda et al. | Jun 2004 | A1 |
20040111292 | Hutchins | Jun 2004 | A1 |
20040111358 | Lange et al. | Jun 2004 | A1 |
20040111359 | Hudock | Jun 2004 | A1 |
20040111363 | Trench et al. | Jun 2004 | A1 |
20040117302 | Weichert et al. | Jun 2004 | A1 |
20040122681 | Ruvolo et al. | Jun 2004 | A1 |
20040122696 | Beringer | Jun 2004 | A1 |
20040122697 | Becerra et al. | Jun 2004 | A1 |
20040122766 | Brooks et al. | Jun 2004 | A1 |
20040128150 | Lundegren | Jul 2004 | A1 |
20040128156 | Beringer et al. | Jul 2004 | A1 |
20040128215 | Florance et al. | Jul 2004 | A1 |
20040133440 | Carolan et al. | Jul 2004 | A1 |
20040133493 | Ford et al. | Jul 2004 | A1 |
20040133509 | McCoy et al. | Jul 2004 | A1 |
20040133513 | McCoy et al. | Jul 2004 | A1 |
20040133514 | Zielke et al. | Jul 2004 | A1 |
20040133515 | McCoy et al. | Jul 2004 | A1 |
20040138992 | DeFrancesco et al. | Jul 2004 | A1 |
20040138994 | DeFrancesco et al. | Jul 2004 | A1 |
20040138995 | Hershkowitz et al. | Jul 2004 | A1 |
20040138997 | DeFrancesco et al. | Jul 2004 | A1 |
20040139005 | Ganesan | Jul 2004 | A1 |
20040141005 | Banatwala et al. | Jul 2004 | A1 |
20040143546 | Wood et al. | Jul 2004 | A1 |
20040143547 | Mersky | Jul 2004 | A1 |
20040143596 | Sirkin | Jul 2004 | A1 |
20040148200 | Hodges | Jul 2004 | A1 |
20040153437 | Buchan | Aug 2004 | A1 |
20040158521 | Newton | Aug 2004 | A1 |
20040158723 | Root | Aug 2004 | A1 |
20040159700 | Khan et al. | Aug 2004 | A1 |
20040167793 | Masuoka et al. | Aug 2004 | A1 |
20040167823 | Neely et al. | Aug 2004 | A1 |
20040172360 | Mabrey et al. | Sep 2004 | A1 |
20040177035 | Silva | Sep 2004 | A1 |
20040186807 | Nathans et al. | Sep 2004 | A1 |
20040190694 | Schelberg, Jr. et al. | Sep 2004 | A1 |
20040193535 | Barazesh | Sep 2004 | A1 |
20040193538 | Raines | Sep 2004 | A1 |
20040193891 | Ollila | Sep 2004 | A1 |
20040199456 | Flint et al. | Oct 2004 | A1 |
20040199789 | Shaw et al. | Oct 2004 | A1 |
20040210661 | Thompson | Oct 2004 | A1 |
20040215584 | Yao | Oct 2004 | A1 |
20040215673 | Furukawa et al. | Oct 2004 | A1 |
20040220865 | Lozowski et al. | Nov 2004 | A1 |
20040220918 | Scriffignano et al. | Nov 2004 | A1 |
20040225545 | Turner et al. | Nov 2004 | A1 |
20040225609 | Greene | Nov 2004 | A1 |
20040225643 | Alpha et al. | Nov 2004 | A1 |
20040230499 | Stack | Nov 2004 | A1 |
20040230524 | Meiners | Nov 2004 | A1 |
20040230527 | Hansen et al. | Nov 2004 | A1 |
20040236678 | Johns et al. | Nov 2004 | A1 |
20040236688 | Bozeman | Nov 2004 | A1 |
20040243450 | Bernard, Jr. et al. | Dec 2004 | A1 |
20040243506 | Das | Dec 2004 | A1 |
20040243508 | Samson et al. | Dec 2004 | A1 |
20040243588 | Tanner et al. | Dec 2004 | A1 |
20040249532 | Kelly et al. | Dec 2004 | A1 |
20040249811 | Shostack | Dec 2004 | A1 |
20040250107 | Guo | Dec 2004 | A1 |
20040253988 | Goldman | Dec 2004 | A1 |
20040254935 | Chagoly et al. | Dec 2004 | A1 |
20040255127 | Arnouse | Dec 2004 | A1 |
20040267646 | Chandhok et al. | Dec 2004 | A1 |
20040267714 | Frid et al. | Dec 2004 | A1 |
20050004855 | Jenson et al. | Jan 2005 | A1 |
20050010474 | Desai et al. | Jan 2005 | A1 |
20050010513 | Duckworth et al. | Jan 2005 | A1 |
20050010523 | Myklebust et al. | Jan 2005 | A1 |
20050015273 | Iyer | Jan 2005 | A1 |
20050015338 | Lee | Jan 2005 | A1 |
20050021353 | Aviles et al. | Jan 2005 | A1 |
20050021476 | Candella et al. | Jan 2005 | A1 |
20050021551 | Silva et al. | Jan 2005 | A1 |
20050027632 | Zeitoun et al. | Feb 2005 | A1 |
20050027633 | Fortuna et al. | Feb 2005 | A1 |
20050027666 | Beck | Feb 2005 | A1 |
20050027983 | Klawon | Feb 2005 | A1 |
20050033651 | Kogan et al. | Feb 2005 | A1 |
20050033660 | Solomon | Feb 2005 | A1 |
20050033690 | Antognini et al. | Feb 2005 | A1 |
20050042983 | Borgward | Feb 2005 | A1 |
20050050027 | Yeh et al. | Mar 2005 | A1 |
20050055231 | Lee | Mar 2005 | A1 |
20050055275 | Newman et al. | Mar 2005 | A1 |
20050055296 | Hattersley et al. | Mar 2005 | A1 |
20050058262 | Timmins et al. | Mar 2005 | A1 |
20050060244 | Goolkasian et al. | Mar 2005 | A1 |
20050060332 | Bernstein et al. | Mar 2005 | A1 |
20050065893 | Josephson | Mar 2005 | A1 |
20050071328 | Lawrence | Mar 2005 | A1 |
20050080697 | Foss et al. | Apr 2005 | A1 |
20050080723 | Burchetta et al. | Apr 2005 | A1 |
20050080796 | Midgley | Apr 2005 | A1 |
20050080821 | Breil et al. | Apr 2005 | A1 |
20050085931 | Willeby | Apr 2005 | A1 |
20050086126 | Patterson | Apr 2005 | A1 |
20050086176 | Dahlgren | Apr 2005 | A1 |
20050086261 | Mammone | Apr 2005 | A1 |
20050091159 | Ichikawa et al. | Apr 2005 | A1 |
20050091164 | Varble | Apr 2005 | A1 |
20050096950 | Caplan et al. | May 2005 | A1 |
20050097017 | Hanratty | May 2005 | A1 |
20050097039 | Kulcsar et al. | May 2005 | A1 |
20050097320 | Golan et al. | May 2005 | A1 |
20050102180 | Gailey et al. | May 2005 | A1 |
20050102209 | Sagrillo et al. | May 2005 | A1 |
20050102226 | Oppenheimer et al. | May 2005 | A1 |
20050105719 | Huda | May 2005 | A1 |
20050108396 | Bittner | May 2005 | A1 |
20050108631 | Amorin et al. | May 2005 | A1 |
20050114335 | Wesinger, Jr. et al. | May 2005 | A1 |
20050114344 | Wesinger, Jr. et al. | May 2005 | A1 |
20050114345 | Wesinger, Jr. et al. | May 2005 | A1 |
20050125291 | Demkiw Grayson et al. | Jun 2005 | A1 |
20050125347 | Akialis et al. | Jun 2005 | A1 |
20050125350 | Tidwell et al. | Jun 2005 | A1 |
20050125397 | Gross et al. | Jun 2005 | A1 |
20050125686 | Brandt | Jun 2005 | A1 |
20050130704 | McParland et al. | Jun 2005 | A1 |
20050137899 | Davies et al. | Jun 2005 | A1 |
20050137948 | Kissner et al. | Jun 2005 | A1 |
20050137963 | Ricketts et al. | Jun 2005 | A1 |
20050137978 | Ganesan et al. | Jun 2005 | A1 |
20050144143 | Freiberg | Jun 2005 | A1 |
20050149354 | Cyr et al. | Jul 2005 | A1 |
20050149355 | Cyr et al. | Jul 2005 | A1 |
20050149356 | Cyr et al. | Jul 2005 | A1 |
20050149378 | Cyr et al. | Jul 2005 | A1 |
20050149379 | Cyr et al. | Jul 2005 | A1 |
20050154617 | Ruggieri et al. | Jul 2005 | A1 |
20050154664 | Guy et al. | Jul 2005 | A1 |
20050154665 | Kerr | Jul 2005 | A1 |
20050154769 | Eckart et al. | Jul 2005 | A1 |
20050160051 | Johnson | Jul 2005 | A1 |
20050160280 | Caslin et al. | Jul 2005 | A1 |
20050165638 | Piller | Jul 2005 | A1 |
20050165681 | Heinemann et al. | Jul 2005 | A1 |
20050171850 | Yueh | Aug 2005 | A1 |
20050171884 | Arnott | Aug 2005 | A1 |
20050171900 | Onneken | Aug 2005 | A1 |
20050177480 | Huang | Aug 2005 | A1 |
20050177518 | Brown | Aug 2005 | A1 |
20050192839 | St. Jacques et al. | Sep 2005 | A1 |
20050198377 | Ferguson et al. | Sep 2005 | A1 |
20050203768 | Florance | Sep 2005 | A1 |
20050203844 | Ferguson et al. | Sep 2005 | A1 |
20050203864 | Schmidt et al. | Sep 2005 | A1 |
20050208461 | Krebs et al. | Sep 2005 | A1 |
20050216434 | Haveliwala et al. | Sep 2005 | A1 |
20050216524 | Gomes et al. | Sep 2005 | A1 |
20050216955 | Wilkins et al. | Sep 2005 | A1 |
20050226224 | Lee et al. | Oct 2005 | A1 |
20050240526 | Hill | Oct 2005 | A1 |
20050240578 | Biederman et al. | Oct 2005 | A1 |
20050251474 | Shinn et al. | Nov 2005 | A1 |
20050256766 | Garcia et al. | Nov 2005 | A1 |
20050267840 | Holm-Blagg et al. | Dec 2005 | A1 |
20050273431 | Abel et al. | Dec 2005 | A1 |
20050278250 | Zair | Dec 2005 | A1 |
20050283414 | Fernandes et al. | Dec 2005 | A1 |
20050283415 | Studnitzer et al. | Dec 2005 | A1 |
20050288998 | Verma et al. | Dec 2005 | A1 |
20060004623 | Jasti | Jan 2006 | A1 |
20060004626 | Holmen et al. | Jan 2006 | A1 |
20060010391 | Uemura et al. | Jan 2006 | A1 |
20060014129 | Coleman et al. | Jan 2006 | A1 |
20060031158 | Orman | Feb 2006 | A1 |
20060031177 | Rule | Feb 2006 | A1 |
20060032909 | Seegar | Feb 2006 | A1 |
20060036543 | Blagg et al. | Feb 2006 | A1 |
20060036748 | Nusbaum et al. | Feb 2006 | A1 |
20060041464 | Powers et al. | Feb 2006 | A1 |
20060041670 | Musseleck et al. | Feb 2006 | A1 |
20060044599 | Lipowitz et al. | Mar 2006 | A1 |
20060047605 | Ahmad | Mar 2006 | A1 |
20060059073 | Walzak | Mar 2006 | A1 |
20060059083 | Friesen et al. | Mar 2006 | A1 |
20060059110 | Madhok et al. | Mar 2006 | A1 |
20060059362 | Paden et al. | Mar 2006 | A1 |
20060064377 | Ganesan et al. | Mar 2006 | A1 |
20060074986 | Mallalieu et al. | Apr 2006 | A1 |
20060074991 | Lussier et al. | Apr 2006 | A1 |
20060079211 | Degraeve | Apr 2006 | A1 |
20060080230 | Freiberg | Apr 2006 | A1 |
20060080235 | Fukuda et al. | Apr 2006 | A1 |
20060080251 | Fried et al. | Apr 2006 | A1 |
20060080263 | Willis et al. | Apr 2006 | A1 |
20060085334 | Murphy | Apr 2006 | A1 |
20060085337 | Conforti et al. | Apr 2006 | A1 |
20060085361 | Hoerle et al. | Apr 2006 | A1 |
20060095289 | Bunning | May 2006 | A1 |
20060095363 | May | May 2006 | A1 |
20060100954 | Schoen | May 2006 | A1 |
20060101508 | Taylor | May 2006 | A1 |
20060106670 | Cai et al. | May 2006 | A1 |
20060106685 | Cheng et al. | May 2006 | A1 |
20060116931 | Storey | Jun 2006 | A1 |
20060116932 | Storey | Jun 2006 | A1 |
20060121880 | Cowsar et al. | Jun 2006 | A1 |
20060122932 | Birtwell et al. | Jun 2006 | A1 |
20060123461 | Lunt et al. | Jun 2006 | A1 |
20060129419 | Flaxer et al. | Jun 2006 | A1 |
20060129472 | Harrington | Jun 2006 | A1 |
20060129481 | Bhatt et al. | Jun 2006 | A1 |
20060129533 | Purvis | Jun 2006 | A1 |
20060131390 | Kim | Jun 2006 | A1 |
20060136180 | Hansen et al. | Jun 2006 | A1 |
20060136524 | Wohlers et al. | Jun 2006 | A1 |
20060136595 | Satyavolu | Jun 2006 | A1 |
20060149674 | Cook et al. | Jul 2006 | A1 |
20060155639 | Lynch et al. | Jul 2006 | A1 |
20060155780 | Sakairi et al. | Jul 2006 | A1 |
20060161435 | Atef et al. | Jul 2006 | A1 |
20060161478 | Turner et al. | Jul 2006 | A1 |
20060161554 | Lucovsky et al. | Jul 2006 | A1 |
20060163347 | Foss et al. | Jul 2006 | A1 |
20060169766 | Hoch | Aug 2006 | A1 |
20060173772 | Hayes et al. | Aug 2006 | A1 |
20060173775 | Cullen, III et al. | Aug 2006 | A1 |
20060173776 | Shalley et al. | Aug 2006 | A1 |
20060173778 | Lipsky et al. | Aug 2006 | A1 |
20060173792 | Glass | Aug 2006 | A1 |
20060178971 | Owen et al. | Aug 2006 | A1 |
20060178983 | Nice et al. | Aug 2006 | A1 |
20060179050 | Giang et al. | Aug 2006 | A1 |
20060184410 | Ramamurthy et al. | Aug 2006 | A1 |
20060184585 | Grear et al. | Aug 2006 | A1 |
20060190334 | Smith | Aug 2006 | A1 |
20060190394 | Fraser et al. | Aug 2006 | A1 |
20060195351 | Bayburtian | Aug 2006 | A1 |
20060195395 | Ganesan et al. | Aug 2006 | A1 |
20060195396 | Ganesan et al. | Aug 2006 | A1 |
20060195397 | Ganesan et al. | Aug 2006 | A1 |
20060195398 | Dheer et al. | Aug 2006 | A1 |
20060200583 | Le Lann et al. | Sep 2006 | A1 |
20060202012 | Grano et al. | Sep 2006 | A1 |
20060206425 | Sharma | Sep 2006 | A1 |
20060212386 | Willey et al. | Sep 2006 | A1 |
20060212407 | Lyon | Sep 2006 | A1 |
20060212486 | Kennis et al. | Sep 2006 | A1 |
20060213985 | Walker et al. | Sep 2006 | A1 |
20060218407 | Toms | Sep 2006 | A1 |
20060223043 | Dancy-Edwards et al. | Oct 2006 | A1 |
20060224469 | Kunz et al. | Oct 2006 | A1 |
20060224498 | Chin | Oct 2006 | A1 |
20060229799 | Nimmo et al. | Oct 2006 | A1 |
20060229943 | Mathias et al. | Oct 2006 | A1 |
20060229961 | Lyftogt et al. | Oct 2006 | A1 |
20060229996 | Keithley et al. | Oct 2006 | A1 |
20060230343 | Armandpour et al. | Oct 2006 | A1 |
20060233332 | Toms | Oct 2006 | A1 |
20060235775 | Pollin | Oct 2006 | A1 |
20060235935 | Ng | Oct 2006 | A1 |
20060239512 | Petrillo | Oct 2006 | A1 |
20060241923 | Xu et al. | Oct 2006 | A1 |
20060245731 | Lai | Nov 2006 | A1 |
20060248021 | Jain et al. | Nov 2006 | A1 |
20060248048 | Jain et al. | Nov 2006 | A1 |
20060248106 | Milne | Nov 2006 | A1 |
20060248525 | Hopkins | Nov 2006 | A1 |
20060253358 | Delgrosso et al. | Nov 2006 | A1 |
20060253463 | Wu et al. | Nov 2006 | A1 |
20060259364 | Strock et al. | Nov 2006 | A1 |
20060259427 | Randell et al. | Nov 2006 | A1 |
20060262929 | Vatanen et al. | Nov 2006 | A1 |
20060265323 | Winter et al. | Nov 2006 | A1 |
20060267999 | Cash et al. | Nov 2006 | A1 |
20060271456 | Romain et al. | Nov 2006 | A1 |
20060271457 | Romain et al. | Nov 2006 | A1 |
20060271633 | Adler | Nov 2006 | A1 |
20060277089 | Hubbard et al. | Dec 2006 | A1 |
20060277102 | Agliozzo | Dec 2006 | A1 |
20060282359 | Nobili et al. | Dec 2006 | A1 |
20060282373 | Stone | Dec 2006 | A1 |
20060282374 | Stone | Dec 2006 | A1 |
20060282429 | Hernandez-Sherrington et al. | Dec 2006 | A1 |
20060282819 | Graham et al. | Dec 2006 | A1 |
20060282886 | Gaug | Dec 2006 | A1 |
20060287764 | Kraft | Dec 2006 | A1 |
20060287765 | Kraft | Dec 2006 | A1 |
20060287766 | Kraft | Dec 2006 | A1 |
20060287767 | Kraft | Dec 2006 | A1 |
20060288090 | Kraft | Dec 2006 | A1 |
20060293979 | Cash et al. | Dec 2006 | A1 |
20060293987 | Shapiro | Dec 2006 | A1 |
20060294199 | Bertholf | Dec 2006 | A1 |
20070005508 | Chiang | Jan 2007 | A1 |
20070005984 | Florencio et al. | Jan 2007 | A1 |
20070011093 | Tree | Jan 2007 | A1 |
20070016500 | Chatterji et al. | Jan 2007 | A1 |
20070016501 | Chatterji et al. | Jan 2007 | A1 |
20070016518 | Atkinson et al. | Jan 2007 | A1 |
20070022141 | Singleton et al. | Jan 2007 | A1 |
20070027816 | Writer | Feb 2007 | A1 |
20070032240 | Finnegan et al. | Feb 2007 | A1 |
20070038563 | Ryzerski | Feb 2007 | A1 |
20070038568 | Greene et al. | Feb 2007 | A1 |
20070039049 | Kupferman et al. | Feb 2007 | A1 |
20070040015 | Carlson et al. | Feb 2007 | A1 |
20070043577 | Kasower | Feb 2007 | A1 |
20070047714 | Baniak et al. | Mar 2007 | A1 |
20070050777 | Hutchinson et al. | Mar 2007 | A1 |
20070055621 | Tischler et al. | Mar 2007 | A1 |
20070057947 | Yokoyama | Mar 2007 | A1 |
20070067239 | Dheer et al. | Mar 2007 | A1 |
20070067297 | Kublickis | Mar 2007 | A1 |
20070072190 | Aggarwal | Mar 2007 | A1 |
20070073577 | Krause | Mar 2007 | A1 |
20070073889 | Morris | Mar 2007 | A1 |
20070078741 | Haggerty et al. | Apr 2007 | A1 |
20070078908 | Rohatgi et al. | Apr 2007 | A1 |
20070078985 | Shao et al. | Apr 2007 | A1 |
20070078990 | Hopkins | Apr 2007 | A1 |
20070080826 | Chang | Apr 2007 | A1 |
20070083460 | Bachenheimer | Apr 2007 | A1 |
20070083463 | Kraft | Apr 2007 | A1 |
20070083465 | Ciurea et al. | Apr 2007 | A1 |
20070088821 | Sankuratripati et al. | Apr 2007 | A1 |
20070093234 | Willis et al. | Apr 2007 | A1 |
20070094230 | Subramaniam et al. | Apr 2007 | A1 |
20070094241 | Blackwell et al. | Apr 2007 | A1 |
20070100748 | Dheer et al. | May 2007 | A1 |
20070100749 | Bachu et al. | May 2007 | A1 |
20070100770 | Grinberg et al. | May 2007 | A1 |
20070112667 | Rucker | May 2007 | A1 |
20070112668 | Celano et al. | May 2007 | A1 |
20070112670 | DeFrancesco et al. | May 2007 | A1 |
20070121843 | Atazky et al. | May 2007 | A1 |
20070124235 | Chakraborty et al. | May 2007 | A1 |
20070124256 | Crooks et al. | May 2007 | A1 |
20070130347 | Rangan et al. | Jun 2007 | A1 |
20070131755 | Chang | Jun 2007 | A1 |
20070136109 | Yager et al. | Jun 2007 | A1 |
20070143123 | Goldberg et al. | Jun 2007 | A1 |
20070149184 | Viegers et al. | Jun 2007 | A1 |
20070150321 | Zhao et al. | Jun 2007 | A1 |
20070153085 | Chang | Jul 2007 | A1 |
20070153710 | Hopkins | Jul 2007 | A1 |
20070156554 | Nikoley et al. | Jul 2007 | A1 |
20070156581 | Imrey et al. | Jul 2007 | A1 |
20070156692 | Rosewarne | Jul 2007 | A1 |
20070156718 | Hossfeld et al. | Jul 2007 | A1 |
20070157107 | Bishop | Jul 2007 | A1 |
20070160458 | Yen | Jul 2007 | A1 |
20070162458 | Fasciano | Jul 2007 | A1 |
20070168267 | Zimmerman et al. | Jul 2007 | A1 |
20070168279 | D'Angelo | Jul 2007 | A1 |
20070174186 | Hokland | Jul 2007 | A1 |
20070174448 | Ahuja et al. | Jul 2007 | A1 |
20070174903 | Greff | Jul 2007 | A1 |
20070179798 | Inbarajan | Aug 2007 | A1 |
20070180380 | Khavari et al. | Aug 2007 | A1 |
20070192167 | Lei et al. | Aug 2007 | A1 |
20070198336 | Thompson | Aug 2007 | A1 |
20070198432 | Pitroda et al. | Aug 2007 | A1 |
20070204033 | Bookbinder et al. | Aug 2007 | A1 |
20070204212 | Chamberlain et al. | Aug 2007 | A1 |
20070204338 | Aiello et al. | Aug 2007 | A1 |
20070205266 | Carr et al. | Sep 2007 | A1 |
20070208640 | Banasiak et al. | Sep 2007 | A1 |
20070214000 | Shahrabi et al. | Sep 2007 | A1 |
20070214078 | Coppinger | Sep 2007 | A1 |
20070219881 | Peterson et al. | Sep 2007 | A1 |
20070219966 | Baylis et al. | Sep 2007 | A1 |
20070220003 | Chern et al. | Sep 2007 | A1 |
20070220092 | Heitzeberg et al. | Sep 2007 | A1 |
20070220275 | Heitzeberg et al. | Sep 2007 | A1 |
20070220581 | Chang | Sep 2007 | A1 |
20070226047 | Ward | Sep 2007 | A1 |
20070226093 | Chan et al. | Sep 2007 | A1 |
20070226114 | Haggerty et al. | Sep 2007 | A1 |
20070226122 | Burrell et al. | Sep 2007 | A1 |
20070228148 | Rable | Oct 2007 | A1 |
20070233591 | Newton | Oct 2007 | A1 |
20070236562 | Chang | Oct 2007 | A1 |
20070239493 | Sweetland et al. | Oct 2007 | A1 |
20070240206 | Wu et al. | Oct 2007 | A1 |
20070244732 | Chatterji et al. | Oct 2007 | A1 |
20070244807 | Andringa et al. | Oct 2007 | A1 |
20070245245 | Blue et al. | Oct 2007 | A1 |
20070250441 | Paulsen et al. | Oct 2007 | A1 |
20070250459 | Schwarz et al. | Oct 2007 | A1 |
20070260539 | Delinsky | Nov 2007 | A1 |
20070262140 | Long, Sr. | Nov 2007 | A1 |
20070265958 | Petralia | Nov 2007 | A1 |
20070266439 | Kraft | Nov 2007 | A1 |
20070273558 | Smith | Nov 2007 | A1 |
20070276750 | Stuart | Nov 2007 | A1 |
20070282736 | Conlin et al. | Dec 2007 | A1 |
20070282743 | Lovelett | Dec 2007 | A1 |
20070287415 | Yamada | Dec 2007 | A1 |
20070288338 | Hoadley | Dec 2007 | A1 |
20070288355 | Roland et al. | Dec 2007 | A1 |
20070288360 | Seeklus | Dec 2007 | A1 |
20070288490 | Longshaw | Dec 2007 | A1 |
20070294195 | Curry et al. | Dec 2007 | A1 |
20070295804 | Garvey et al. | Dec 2007 | A1 |
20070299770 | Delinsky | Dec 2007 | A1 |
20070299771 | Brody | Dec 2007 | A1 |
20080004957 | Hildreth et al. | Jan 2008 | A1 |
20080005760 | Kay et al. | Jan 2008 | A1 |
20080010191 | Rackley, III et al. | Jan 2008 | A1 |
20080010203 | Grant | Jan 2008 | A1 |
20080010204 | Rackley III et al. | Jan 2008 | A1 |
20080010206 | Coleman | Jan 2008 | A1 |
20080010687 | Gonen et al. | Jan 2008 | A1 |
20080015982 | Sokolic et al. | Jan 2008 | A1 |
20080015985 | Abhari et al. | Jan 2008 | A1 |
20080021761 | Rable | Jan 2008 | A1 |
20080021802 | Pendleton | Jan 2008 | A1 |
20080027841 | Eder | Jan 2008 | A1 |
20080027859 | Nathans | Jan 2008 | A1 |
20080028435 | Strickland et al. | Jan 2008 | A1 |
20080028446 | Burgoyne | Jan 2008 | A1 |
20080033956 | Saha et al. | Feb 2008 | A1 |
20080040176 | Ehling | Feb 2008 | A1 |
20080040475 | Bosworth et al. | Feb 2008 | A1 |
20080040610 | Fergusson | Feb 2008 | A1 |
20080046363 | Ali et al. | Feb 2008 | A1 |
20080047017 | Renaud | Feb 2008 | A1 |
20080052170 | Storey | Feb 2008 | A1 |
20080052182 | Marshall | Feb 2008 | A1 |
20080052208 | Neece et al. | Feb 2008 | A1 |
20080052224 | Parker | Feb 2008 | A1 |
20080052244 | Tsuei et al. | Feb 2008 | A1 |
20080059317 | Chandran et al. | Mar 2008 | A1 |
20080059352 | Chandran | Mar 2008 | A1 |
20080059364 | Tidwell et al. | Mar 2008 | A1 |
20080059447 | Winner et al. | Mar 2008 | A1 |
20080060054 | Srivastava | Mar 2008 | A1 |
20080065530 | Talbert et al. | Mar 2008 | A1 |
20080065774 | Keeler | Mar 2008 | A1 |
20080066188 | Kwak | Mar 2008 | A1 |
20080072316 | Chang et al. | Mar 2008 | A1 |
20080077526 | Arumugam | Mar 2008 | A1 |
20080079809 | Chang | Apr 2008 | A1 |
20080082536 | Schwabe et al. | Apr 2008 | A1 |
20080083021 | Doane et al. | Apr 2008 | A1 |
20080086400 | Ardelean et al. | Apr 2008 | A1 |
20080086431 | Robinson et al. | Apr 2008 | A1 |
20080091519 | Foss | Apr 2008 | A1 |
20080091530 | Egnatios et al. | Apr 2008 | A1 |
20080091818 | Bailey et al. | Apr 2008 | A1 |
20080097822 | Schigel et al. | Apr 2008 | A1 |
20080103798 | Domenikos et al. | May 2008 | A1 |
20080103799 | Domenikos et al. | May 2008 | A1 |
20080103800 | Domenikos et al. | May 2008 | A1 |
20080103836 | Park et al. | May 2008 | A1 |
20080103972 | Lanc | May 2008 | A1 |
20080109308 | Storey | May 2008 | A1 |
20080109355 | Dutta et al. | May 2008 | A1 |
20080109422 | Dedhia | May 2008 | A1 |
20080109740 | Prinsen et al. | May 2008 | A1 |
20080110973 | Nathans et al. | May 2008 | A1 |
20080114657 | Forzley | May 2008 | A1 |
20080114670 | Friesen | May 2008 | A1 |
20080114855 | Welingkar et al. | May 2008 | A1 |
20080115226 | Welingkar et al. | May 2008 | A1 |
20080120155 | Pliha | May 2008 | A1 |
20080120204 | Conner et al. | May 2008 | A1 |
20080120416 | Hopkins et al. | May 2008 | A1 |
20080120569 | Mann et al. | May 2008 | A1 |
20080120716 | Hall et al. | May 2008 | A1 |
20080122920 | Chang | May 2008 | A1 |
20080126136 | Nighan | May 2008 | A1 |
20080126233 | Hogan | May 2008 | A1 |
20080133273 | Marshall | Jun 2008 | A1 |
20080133278 | Stanfield | Jun 2008 | A1 |
20080133322 | Kalia et al. | Jun 2008 | A1 |
20080133657 | Pennington | Jun 2008 | A1 |
20080140476 | Anand et al. | Jun 2008 | A1 |
20080140507 | Hamlisch et al. | Jun 2008 | A1 |
20080140734 | Wagner | Jun 2008 | A1 |
20080140780 | Hopkins et al. | Jun 2008 | A1 |
20080141346 | Kay et al. | Jun 2008 | A1 |
20080147523 | Mulry et al. | Jun 2008 | A1 |
20080148368 | Zurko et al. | Jun 2008 | A1 |
20080148392 | Akens | Jun 2008 | A1 |
20080154758 | Schattmaier et al. | Jun 2008 | A1 |
20080162236 | Sommerer | Jul 2008 | A1 |
20080162317 | Banaugh et al. | Jul 2008 | A1 |
20080162350 | Allen-Rouman et al. | Jul 2008 | A1 |
20080162383 | Kraft | Jul 2008 | A1 |
20080172304 | Berkowitz | Jul 2008 | A1 |
20080172324 | Johnson | Jul 2008 | A1 |
20080175360 | Schwarz et al. | Jul 2008 | A1 |
20080177630 | Maghfourian et al. | Jul 2008 | A1 |
20080177655 | Zalik | Jul 2008 | A1 |
20080183480 | Carlson et al. | Jul 2008 | A1 |
20080183504 | Highley | Jul 2008 | A1 |
20080183585 | Vianello | Jul 2008 | A1 |
20080184351 | Gephart | Jul 2008 | A1 |
20080195548 | Chu et al. | Aug 2008 | A1 |
20080201257 | Lewis et al. | Aug 2008 | A1 |
20080201401 | Pugh et al. | Aug 2008 | A1 |
20080205774 | Brinker et al. | Aug 2008 | A1 |
20080208548 | Metzger et al. | Aug 2008 | A1 |
20080208726 | Tsantes et al. | Aug 2008 | A1 |
20080208735 | Balet et al. | Aug 2008 | A1 |
20080210752 | March | Sep 2008 | A1 |
20080212845 | Lund | Sep 2008 | A1 |
20080216156 | Kosaka | Sep 2008 | A1 |
20080221972 | Megdal et al. | Sep 2008 | A1 |
20080222015 | Megdal et al. | Sep 2008 | A1 |
20080222027 | Megdal et al. | Sep 2008 | A1 |
20080222706 | Renaud et al. | Sep 2008 | A1 |
20080228556 | Megdal et al. | Sep 2008 | A1 |
20080228775 | Abhyanker et al. | Sep 2008 | A1 |
20080229415 | Kapoor et al. | Sep 2008 | A1 |
20080235091 | Holliday | Sep 2008 | A1 |
20080243650 | Yoon | Oct 2008 | A1 |
20080249869 | Angell et al. | Oct 2008 | A1 |
20080249925 | Nazari et al. | Oct 2008 | A1 |
20080249936 | Miller et al. | Oct 2008 | A1 |
20080255992 | Lin | Oct 2008 | A1 |
20080263013 | Hopkins | Oct 2008 | A1 |
20080263638 | McMurtry et al. | Oct 2008 | A1 |
20080270038 | Partovi et al. | Oct 2008 | A1 |
20080270209 | Mauseth et al. | Oct 2008 | A1 |
20080270294 | Lent et al. | Oct 2008 | A1 |
20080270295 | Lent et al. | Oct 2008 | A1 |
20080270304 | Brown | Oct 2008 | A1 |
20080275812 | Stone | Nov 2008 | A1 |
20080275816 | Hazlehurst | Nov 2008 | A1 |
20080277465 | Pletz et al. | Nov 2008 | A1 |
20080281737 | Fajardo | Nov 2008 | A1 |
20080282324 | Hoal | Nov 2008 | A1 |
20080284586 | Chang | Nov 2008 | A1 |
20080288283 | Baldwin, Jr. et al. | Nov 2008 | A1 |
20080288299 | Schultz | Nov 2008 | A1 |
20080288400 | Panthaki et al. | Nov 2008 | A1 |
20080291932 | Mukherjee | Nov 2008 | A1 |
20080294501 | Rennich et al. | Nov 2008 | A1 |
20080294996 | Hunt et al. | Nov 2008 | A1 |
20080297602 | Chang | Dec 2008 | A1 |
20080301016 | Durvasula et al. | Dec 2008 | A1 |
20080306846 | Ferguson | Dec 2008 | A1 |
20080307063 | Caughey | Dec 2008 | A1 |
20080312969 | Raines et al. | Dec 2008 | A1 |
20080316010 | Chang | Dec 2008 | A1 |
20080319861 | Hopkins | Dec 2008 | A1 |
20080319889 | Hammad | Dec 2008 | A1 |
20080319896 | Carlson et al. | Dec 2008 | A1 |
20090006230 | Lyda et al. | Jan 2009 | A1 |
20090006582 | Daswani et al. | Jan 2009 | A1 |
20090007231 | Kaiser et al. | Jan 2009 | A1 |
20090012889 | Finch | Jan 2009 | A1 |
20090018986 | Alcorn et al. | Jan 2009 | A1 |
20090018996 | Hunt et al. | Jan 2009 | A1 |
20090024462 | Lin | Jan 2009 | A1 |
20090024484 | Walker et al. | Jan 2009 | A1 |
20090024485 | Haugen et al. | Jan 2009 | A1 |
20090030776 | Walker et al. | Jan 2009 | A1 |
20090037279 | Chockalingam et al. | Feb 2009 | A1 |
20090037332 | Cheung et al. | Feb 2009 | A1 |
20090043691 | Kasower | Feb 2009 | A1 |
20090043696 | Ornce et al. | Feb 2009 | A1 |
20090047992 | Ortiz et al. | Feb 2009 | A1 |
20090048957 | Celano | Feb 2009 | A1 |
20090048999 | Gupta et al. | Feb 2009 | A1 |
20090055287 | Chin | Feb 2009 | A1 |
20090055312 | Chin | Feb 2009 | A1 |
20090055322 | Bykov et al. | Feb 2009 | A1 |
20090055404 | Heiden et al. | Feb 2009 | A1 |
20090058676 | Orlosky | Mar 2009 | A1 |
20090063330 | Cerise | Mar 2009 | A1 |
20090064297 | Selgas et al. | Mar 2009 | A1 |
20090070148 | Skocic | Mar 2009 | A1 |
20090076950 | Chang et al. | Mar 2009 | A1 |
20090089190 | Girulat | Apr 2009 | A1 |
20090089193 | Palantin | Apr 2009 | A1 |
20090089205 | Bayne | Apr 2009 | A1 |
20090089869 | Varghese | Apr 2009 | A1 |
20090094156 | Wright et al. | Apr 2009 | A1 |
20090094237 | Churi et al. | Apr 2009 | A1 |
20090094675 | Powers | Apr 2009 | A1 |
20090098854 | Park et al. | Apr 2009 | A1 |
20090099941 | Berkowitz | Apr 2009 | A1 |
20090099960 | Robida et al. | Apr 2009 | A1 |
20090100047 | Jones et al. | Apr 2009 | A1 |
20090106141 | Becker | Apr 2009 | A1 |
20090106150 | Pelegero et al. | Apr 2009 | A1 |
20090106846 | Dupray et al. | Apr 2009 | A1 |
20090112746 | Fong | Apr 2009 | A1 |
20090119116 | Steen | May 2009 | A1 |
20090119199 | Salahi | May 2009 | A1 |
20090119299 | Rhodes | May 2009 | A1 |
20090125369 | Kloostra et al. | May 2009 | A1 |
20090125972 | Hinton et al. | May 2009 | A1 |
20090132312 | Reinheimer et al. | May 2009 | A1 |
20090132347 | Anderson et al. | May 2009 | A1 |
20090144160 | Haggerty et al. | Jun 2009 | A1 |
20090146879 | Chang | Jun 2009 | A1 |
20090147774 | Caughey | Jun 2009 | A1 |
20090157517 | Davis | Jun 2009 | A1 |
20090157564 | Cross | Jun 2009 | A1 |
20090157693 | Palahnuk | Jun 2009 | A1 |
20090158030 | Rasti | Jun 2009 | A1 |
20090164380 | Brown | Jun 2009 | A1 |
20090164582 | Dasgupta et al. | Jun 2009 | A1 |
20090164929 | Chen et al. | Jun 2009 | A1 |
20090171723 | Jenkins | Jul 2009 | A1 |
20090171817 | Cassis | Jul 2009 | A1 |
20090171838 | Liu et al. | Jul 2009 | A1 |
20090172788 | Veldula et al. | Jul 2009 | A1 |
20090172795 | Ritari et al. | Jul 2009 | A1 |
20090177529 | Hadi | Jul 2009 | A1 |
20090177562 | Peace et al. | Jul 2009 | A1 |
20090177670 | Grenier et al. | Jul 2009 | A1 |
20090183259 | Rinek et al. | Jul 2009 | A1 |
20090187607 | Yoo et al. | Jul 2009 | A1 |
20090195377 | Chang | Aug 2009 | A1 |
20090198557 | Wang et al. | Aug 2009 | A1 |
20090198572 | Jurgens | Aug 2009 | A1 |
20090198602 | Wang et al. | Aug 2009 | A1 |
20090199094 | Jurgens et al. | Aug 2009 | A1 |
20090199294 | Schneider | Aug 2009 | A1 |
20090204435 | Gale | Aug 2009 | A1 |
20090204514 | Bhogal et al. | Aug 2009 | A1 |
20090204519 | Randell et al. | Aug 2009 | A1 |
20090204522 | Meyer et al. | Aug 2009 | A1 |
20090204599 | Morris et al. | Aug 2009 | A1 |
20090210241 | Calloway | Aug 2009 | A1 |
20090210807 | Xiao et al. | Aug 2009 | A1 |
20090210886 | Bhojwani et al. | Aug 2009 | A1 |
20090216640 | Masi | Aug 2009 | A1 |
20090217342 | Nadler | Aug 2009 | A1 |
20090222375 | Choudhuri et al. | Sep 2009 | A1 |
20090222377 | Choudhuri et al. | Sep 2009 | A1 |
20090222379 | Choudhuri et al. | Sep 2009 | A1 |
20090222449 | Hom et al. | Sep 2009 | A1 |
20090222527 | Arconati et al. | Sep 2009 | A1 |
20090228295 | Lowy | Sep 2009 | A1 |
20090228392 | Pinson, III | Sep 2009 | A1 |
20090228918 | Rolff et al. | Sep 2009 | A1 |
20090228966 | Parfene et al. | Sep 2009 | A1 |
20090228990 | Chen et al. | Sep 2009 | A1 |
20090234665 | Conkel | Sep 2009 | A1 |
20090234775 | Whitney et al. | Sep 2009 | A1 |
20090234814 | Boerries et al. | Sep 2009 | A1 |
20090234876 | Schigel et al. | Sep 2009 | A1 |
20090240567 | Kinkead et al. | Sep 2009 | A1 |
20090240610 | Barsade | Sep 2009 | A1 |
20090240624 | James et al. | Sep 2009 | A1 |
20090244600 | Haycock et al. | Oct 2009 | A1 |
20090247122 | Fitzgerald et al. | Oct 2009 | A1 |
20090248573 | Haggerty et al. | Oct 2009 | A1 |
20090249451 | Su et al. | Oct 2009 | A1 |
20090254375 | Martinez et al. | Oct 2009 | A1 |
20090254476 | Sharma et al. | Oct 2009 | A1 |
20090254656 | Vignisson et al. | Oct 2009 | A1 |
20090254971 | Herz et al. | Oct 2009 | A1 |
20090258334 | Pyne | Oct 2009 | A1 |
20090260064 | Mcdowell et al. | Oct 2009 | A1 |
20090271248 | Sherman et al. | Oct 2009 | A1 |
20090271265 | Lay et al. | Oct 2009 | A1 |
20090276368 | Martin et al. | Nov 2009 | A1 |
20090280467 | Ahart | Nov 2009 | A1 |
20090281816 | Houga et al. | Nov 2009 | A1 |
20090282479 | Smith et al. | Nov 2009 | A1 |
20090288012 | Hertel et al. | Nov 2009 | A1 |
20090289110 | Regen et al. | Nov 2009 | A1 |
20090292603 | Wallach | Nov 2009 | A1 |
20090292642 | Han | Nov 2009 | A1 |
20090299911 | Abrahams et al. | Dec 2009 | A1 |
20090300066 | Guo et al. | Dec 2009 | A1 |
20090300604 | Barringer | Dec 2009 | A1 |
20090300641 | Friedman et al. | Dec 2009 | A1 |
20090300668 | Campagna et al. | Dec 2009 | A1 |
20090307778 | Mardikar | Dec 2009 | A1 |
20090313562 | Appleyard et al. | Dec 2009 | A1 |
20090319294 | Phillips et al. | Dec 2009 | A1 |
20090319648 | Dutta et al. | Dec 2009 | A1 |
20090327054 | Yao et al. | Dec 2009 | A1 |
20090327108 | Swierz, III et al. | Dec 2009 | A1 |
20090327120 | Eze et al. | Dec 2009 | A1 |
20090327270 | Teevan et al. | Dec 2009 | A1 |
20090327487 | Olson et al. | Dec 2009 | A1 |
20100005024 | Schmitz et al. | Jan 2010 | A1 |
20100009320 | Wilkelis | Jan 2010 | A1 |
20100009332 | Yaskin et al. | Jan 2010 | A1 |
20100010935 | Shelton | Jan 2010 | A1 |
20100010993 | Hussey, Jr. et al. | Jan 2010 | A1 |
20100011428 | Atwood et al. | Jan 2010 | A1 |
20100023434 | Bond | Jan 2010 | A1 |
20100023440 | Fraser et al. | Jan 2010 | A1 |
20100023448 | Eze | Jan 2010 | A1 |
20100023506 | Sahni et al. | Jan 2010 | A1 |
20100025820 | Suekawa | Feb 2010 | A1 |
20100030578 | Siddique et al. | Feb 2010 | A1 |
20100030649 | Ubelhor | Feb 2010 | A1 |
20100030675 | Hanan et al. | Feb 2010 | A1 |
20100030677 | Melik-Aslanian et al. | Feb 2010 | A1 |
20100036697 | Kelnar | Feb 2010 | A1 |
20100036769 | Winters et al. | Feb 2010 | A1 |
20100042537 | Smith et al. | Feb 2010 | A1 |
20100042539 | Dheer et al. | Feb 2010 | A1 |
20100042542 | Rose et al. | Feb 2010 | A1 |
20100042732 | Hopkins | Feb 2010 | A1 |
20100043055 | Baumgart | Feb 2010 | A1 |
20100049642 | Agisim et al. | Feb 2010 | A1 |
20100049643 | Mitchell et al. | Feb 2010 | A1 |
20100049803 | Ogilvie et al. | Feb 2010 | A1 |
20100063942 | Arnott et al. | Mar 2010 | A1 |
20100063993 | Higgins et al. | Mar 2010 | A1 |
20100076880 | Williams et al. | Mar 2010 | A1 |
20100076966 | Strutton et al. | Mar 2010 | A1 |
20100077483 | Stolfo et al. | Mar 2010 | A1 |
20100082445 | Hodge et al. | Apr 2010 | A1 |
20100082476 | Bowman | Apr 2010 | A1 |
20100083371 | Bennetts et al. | Apr 2010 | A1 |
20100094768 | Miltonberger | Apr 2010 | A1 |
20100094774 | Jackowitz et al. | Apr 2010 | A1 |
20100094910 | Bayliss | Apr 2010 | A1 |
20100100480 | Altman et al. | Apr 2010 | A1 |
20100100945 | Ozzie et al. | Apr 2010 | A1 |
20100114724 | Ghosh et al. | May 2010 | A1 |
20100114744 | Gonen | May 2010 | A1 |
20100114766 | Gustin et al. | May 2010 | A1 |
20100114768 | Duke et al. | May 2010 | A1 |
20100114776 | Weller et al. | May 2010 | A1 |
20100122316 | Lyon | May 2010 | A1 |
20100122324 | Welingkar et al. | May 2010 | A1 |
20100122333 | Noe et al. | May 2010 | A1 |
20100125521 | Hanan et al. | May 2010 | A1 |
20100130172 | Vendrow et al. | May 2010 | A1 |
20100131396 | Roach | May 2010 | A1 |
20100136956 | Drachev et al. | Jun 2010 | A1 |
20100138314 | Li et al. | Jun 2010 | A1 |
20100145836 | Baker et al. | Jun 2010 | A1 |
20100153227 | Medvinsky et al. | Jun 2010 | A1 |
20100153278 | Farsedakis | Jun 2010 | A1 |
20100153290 | Duggan | Jun 2010 | A1 |
20100161466 | Gilder | Jun 2010 | A1 |
20100161486 | Liu et al. | Jun 2010 | A1 |
20100161816 | Kraft et al. | Jun 2010 | A1 |
20100169159 | Rose et al. | Jul 2010 | A1 |
20100174638 | Debie et al. | Jul 2010 | A1 |
20100174813 | Hildreth et al. | Jul 2010 | A1 |
20100179906 | Hawkes | Jul 2010 | A1 |
20100185546 | Pollard | Jul 2010 | A1 |
20100188684 | Kumara | Jul 2010 | A1 |
20100205076 | Parson et al. | Aug 2010 | A1 |
20100205662 | Ibrahim et al. | Aug 2010 | A1 |
20100211445 | Bodington | Aug 2010 | A1 |
20100211636 | Starkenburg et al. | Aug 2010 | A1 |
20100214090 | Sartini et al. | Aug 2010 | A1 |
20100215270 | Manohar et al. | Aug 2010 | A1 |
20100217706 | Griffin et al. | Aug 2010 | A1 |
20100217837 | Ansari et al. | Aug 2010 | A1 |
20100223160 | Brown | Sep 2010 | A1 |
20100223168 | Haggerty et al. | Sep 2010 | A1 |
20100223184 | Perlman | Sep 2010 | A1 |
20100223192 | Levine et al. | Sep 2010 | A1 |
20100223211 | Johnson et al. | Sep 2010 | A1 |
20100228658 | Ketelsen | Sep 2010 | A1 |
20100229245 | Singhal | Sep 2010 | A1 |
20100241535 | Nightengale et al. | Sep 2010 | A1 |
20100248681 | Phills | Sep 2010 | A1 |
20100250338 | Banerjee et al. | Sep 2010 | A1 |
20100250376 | Nandiraju | Sep 2010 | A1 |
20100250394 | Lin | Sep 2010 | A1 |
20100250410 | Song et al. | Sep 2010 | A1 |
20100250411 | Ogrodski | Sep 2010 | A1 |
20100250416 | Hazlehurst | Sep 2010 | A1 |
20100250509 | Andersen | Sep 2010 | A1 |
20100253686 | Alsbury et al. | Oct 2010 | A1 |
20100257102 | Perlman | Oct 2010 | A1 |
20100257234 | Caughey | Oct 2010 | A1 |
20100257577 | Grandison et al. | Oct 2010 | A1 |
20100258623 | Beemer et al. | Oct 2010 | A1 |
20100258625 | Stanfield et al. | Oct 2010 | A1 |
20100259373 | Chang | Oct 2010 | A1 |
20100262339 | Chang | Oct 2010 | A1 |
20100262606 | Bedolla et al. | Oct 2010 | A1 |
20100262932 | Pan | Oct 2010 | A1 |
20100268557 | Faith et al. | Oct 2010 | A1 |
20100268660 | Ekdahl | Oct 2010 | A1 |
20100274815 | Vanasco | Oct 2010 | A1 |
20100280914 | Carlson | Nov 2010 | A1 |
20100280944 | Low et al. | Nov 2010 | A1 |
20100281020 | Drubner | Nov 2010 | A1 |
20100293090 | Domenikos et al. | Nov 2010 | A1 |
20100299186 | Cameo et al. | Nov 2010 | A1 |
20100299251 | Thomas | Nov 2010 | A1 |
20100299252 | Thomas | Nov 2010 | A1 |
20100299260 | Thomas | Nov 2010 | A1 |
20100306103 | Hankins et al. | Dec 2010 | A1 |
20100306834 | Grandison et al. | Dec 2010 | A1 |
20100312691 | Johnson, Jr. | Dec 2010 | A1 |
20100318460 | Stewart et al. | Dec 2010 | A1 |
20100323446 | Barnett et al. | Dec 2010 | A1 |
20100324986 | Thomas | Dec 2010 | A1 |
20100324999 | Conway et al. | Dec 2010 | A1 |
20100325036 | Thomas | Dec 2010 | A1 |
20100325045 | Johnson | Dec 2010 | A1 |
20100325048 | Carlson et al. | Dec 2010 | A1 |
20100332393 | Weller et al. | Dec 2010 | A1 |
20110004498 | Readshaw | Jan 2011 | A1 |
20110004514 | Thomas | Jan 2011 | A1 |
20110004546 | Thomas | Jan 2011 | A1 |
20110010283 | Williams | Jan 2011 | A1 |
20110022515 | Tallitsch et al. | Jan 2011 | A1 |
20110022516 | Gao et al. | Jan 2011 | A1 |
20110023115 | Wright | Jan 2011 | A1 |
20110029388 | Kendall et al. | Feb 2011 | A1 |
20110029427 | Haggerty et al. | Feb 2011 | A1 |
20110029566 | Grandison et al. | Feb 2011 | A1 |
20110029660 | Hopkins | Feb 2011 | A1 |
20110035305 | Imrey et al. | Feb 2011 | A1 |
20110035315 | Langley | Feb 2011 | A1 |
20110035452 | Gittleman | Feb 2011 | A1 |
20110040629 | Chiu et al. | Feb 2011 | A1 |
20110047606 | Blomquist | Feb 2011 | A1 |
20110060654 | Elliott et al. | Mar 2011 | A1 |
20110060673 | Delinsky et al. | Mar 2011 | A1 |
20110066495 | Ayloo et al. | Mar 2011 | A1 |
20110066618 | Sigurbjornsson et al. | Mar 2011 | A1 |
20110066695 | Hopkins | Mar 2011 | A1 |
20110071950 | Ivanovic | Mar 2011 | A1 |
20110078073 | Annappindi et al. | Mar 2011 | A1 |
20110082733 | Goldman et al. | Apr 2011 | A1 |
20110082736 | Goldman et al. | Apr 2011 | A1 |
20110082788 | Itwaru | Apr 2011 | A1 |
20110083181 | Nazarov | Apr 2011 | A1 |
20110093387 | Fuerstenberg et al. | Apr 2011 | A1 |
20110107400 | Shankaranarayanan et al. | May 2011 | A1 |
20110112851 | Poley | May 2011 | A1 |
20110112899 | Strutton et al. | May 2011 | A1 |
20110112919 | Gray | May 2011 | A1 |
20110113084 | Ramnani | May 2011 | A1 |
20110113086 | Long et al. | May 2011 | A1 |
20110119169 | Passero et al. | May 2011 | A1 |
20110119182 | Smolkin | May 2011 | A1 |
20110125632 | Neel | May 2011 | A1 |
20110125924 | McAleer | May 2011 | A1 |
20110126275 | Anderson et al. | May 2011 | A1 |
20110131123 | Griffin et al. | Jun 2011 | A1 |
20110136468 | McNamara et al. | Jun 2011 | A1 |
20110137760 | Rudie et al. | Jun 2011 | A1 |
20110137765 | Nonaka | Jun 2011 | A1 |
20110137924 | Hunt et al. | Jun 2011 | A1 |
20110142213 | Baniak et al. | Jun 2011 | A1 |
20110143711 | Hirson et al. | Jun 2011 | A1 |
20110145049 | Hertel et al. | Jun 2011 | A1 |
20110145064 | Anderson et al. | Jun 2011 | A1 |
20110145899 | Cao et al. | Jun 2011 | A1 |
20110148625 | Velusamy | Jun 2011 | A1 |
20110161218 | Swift | Jun 2011 | A1 |
20110166889 | Bain | Jul 2011 | A1 |
20110166988 | Coulter | Jul 2011 | A1 |
20110167011 | Paltenghe et al. | Jul 2011 | A1 |
20110173116 | Yan et al. | Jul 2011 | A1 |
20110178841 | Rane et al. | Jul 2011 | A1 |
20110178860 | Imrey et al. | Jul 2011 | A1 |
20110178899 | Huszar | Jul 2011 | A1 |
20110179139 | Starkenburg et al. | Jul 2011 | A1 |
20110184780 | Alderson et al. | Jul 2011 | A1 |
20110184863 | Coleman et al. | Jul 2011 | A1 |
20110191196 | Orr et al. | Aug 2011 | A1 |
20110191209 | Gould et al. | Aug 2011 | A1 |
20110191241 | Blain et al. | Aug 2011 | A1 |
20110193704 | Harper et al. | Aug 2011 | A1 |
20110196791 | Dominguez | Aug 2011 | A1 |
20110196795 | Pointer | Aug 2011 | A1 |
20110208601 | Ferguson et al. | Aug 2011 | A1 |
20110208659 | Easterly et al. | Aug 2011 | A1 |
20110211445 | Chen | Sep 2011 | A1 |
20110213670 | Strutton et al. | Sep 2011 | A1 |
20110214187 | Wittenstein et al. | Sep 2011 | A1 |
20110218863 | Roh et al. | Sep 2011 | A1 |
20110243406 | Chandler | Oct 2011 | A1 |
20110246244 | O'Rourke | Oct 2011 | A1 |
20110246361 | Geering | Oct 2011 | A1 |
20110251953 | Trende et al. | Oct 2011 | A1 |
20110252071 | Cidon | Oct 2011 | A1 |
20110258001 | Green et al. | Oct 2011 | A1 |
20110264531 | Bhatia et al. | Oct 2011 | A1 |
20110264566 | Brown | Oct 2011 | A1 |
20110264581 | Clyne | Oct 2011 | A1 |
20110264582 | Kim et al. | Oct 2011 | A1 |
20110270618 | Banerjee et al. | Nov 2011 | A1 |
20110270749 | Bennett et al. | Nov 2011 | A1 |
20110270754 | Kelly et al. | Nov 2011 | A1 |
20110271329 | Hulten et al. | Nov 2011 | A1 |
20110276382 | Ramchandani et al. | Nov 2011 | A1 |
20110276396 | Rathod | Nov 2011 | A1 |
20110276604 | Hom et al. | Nov 2011 | A1 |
20110282711 | Freishtat et al. | Nov 2011 | A1 |
20110282779 | Megdal et al. | Nov 2011 | A1 |
20110282783 | Ferguson et al. | Nov 2011 | A1 |
20110282943 | Anderson et al. | Nov 2011 | A1 |
20110288973 | Pazdziora et al. | Nov 2011 | A1 |
20110289151 | Hopkins | Nov 2011 | A1 |
20110289209 | Hopkins | Nov 2011 | A1 |
20110295662 | Harris | Dec 2011 | A1 |
20110295733 | Megdal et al. | Dec 2011 | A1 |
20110295750 | Rammal | Dec 2011 | A1 |
20110296003 | McCann et al. | Dec 2011 | A1 |
20110302055 | Drake | Dec 2011 | A1 |
20110302067 | Washington | Dec 2011 | A1 |
20110302122 | Klein et al. | Dec 2011 | A1 |
20110302653 | Frantz et al. | Dec 2011 | A1 |
20110307397 | Benmbarek | Dec 2011 | A1 |
20110307434 | Rostampour et al. | Dec 2011 | A1 |
20110307474 | Hom et al. | Dec 2011 | A1 |
20110307494 | Snow | Dec 2011 | A1 |
20110307938 | Reeves, Jr. et al. | Dec 2011 | A1 |
20110307957 | Barcelo et al. | Dec 2011 | A1 |
20110313915 | Tang | Dec 2011 | A1 |
20110313921 | Dheer et al. | Dec 2011 | A1 |
20110314100 | Hopkins | Dec 2011 | A1 |
20110314383 | Abdo et al. | Dec 2011 | A1 |
20110320582 | Lewis | Dec 2011 | A1 |
20110321137 | Lida et al. | Dec 2011 | A1 |
20120005070 | McFall et al. | Jan 2012 | A1 |
20120005221 | Lckman et al. | Jan 2012 | A1 |
20120005542 | Petersen et al. | Jan 2012 | A1 |
20120010927 | Attenberg et al. | Jan 2012 | A1 |
20120011027 | Okuyama | Jan 2012 | A1 |
20120011063 | Killian et al. | Jan 2012 | A1 |
20120011158 | Avner et al. | Jan 2012 | A1 |
20120011432 | Strutton | Jan 2012 | A1 |
20120015717 | Mosites et al. | Jan 2012 | A1 |
20120016800 | Stewart et al. | Jan 2012 | A1 |
20120016948 | Sinha | Jan 2012 | A1 |
20120022990 | Kasower | Jan 2012 | A1 |
20120030216 | Churi et al. | Feb 2012 | A1 |
20120030771 | Pierson et al. | Feb 2012 | A1 |
20120036065 | Orttung et al. | Feb 2012 | A1 |
20120036127 | Work et al. | Feb 2012 | A1 |
20120036565 | Gamez et al. | Feb 2012 | A1 |
20120041879 | Kim et al. | Feb 2012 | A1 |
20120042237 | Armandpour et al. | Feb 2012 | A1 |
20120046974 | Eshleman et al. | Feb 2012 | A1 |
20120047174 | Avner et al. | Feb 2012 | A1 |
20120047219 | Feng et al. | Feb 2012 | A1 |
20120054088 | Edrington et al. | Mar 2012 | A1 |
20120054224 | Eskin | Mar 2012 | A1 |
20120054592 | Jaffe et al. | Mar 2012 | A1 |
20120060105 | Brown et al. | Mar 2012 | A1 |
20120066044 | Honnef et al. | Mar 2012 | A1 |
20120066046 | Satyavolu et al. | Mar 2012 | A1 |
20120066050 | Satyavolu et al. | Mar 2012 | A1 |
20120066106 | Papadimitriou | Mar 2012 | A1 |
20120066119 | Carion | Mar 2012 | A1 |
20120072338 | Sorbe | Mar 2012 | A1 |
20120072382 | Pearson et al. | Mar 2012 | A1 |
20120078764 | Ross et al. | Mar 2012 | A1 |
20120078781 | Ross et al. | Mar 2012 | A1 |
20120084162 | Smith et al. | Apr 2012 | A1 |
20120084210 | Farahmand | Apr 2012 | A1 |
20120084866 | Stolfo | Apr 2012 | A1 |
20120089438 | Tavares et al. | Apr 2012 | A1 |
20120089521 | Abrevaya et al. | Apr 2012 | A1 |
20120101938 | Kasower | Apr 2012 | A1 |
20120101939 | Kasower | Apr 2012 | A1 |
20120109752 | Strutton et al. | May 2012 | A1 |
20120110467 | Blake et al. | May 2012 | A1 |
20120110677 | Abendroth et al. | May 2012 | A1 |
20120116913 | Goolkasian | May 2012 | A1 |
20120116951 | Chung et al. | May 2012 | A1 |
20120116963 | Klein et al. | May 2012 | A1 |
20120116969 | Kumar et al. | May 2012 | A1 |
20120123931 | Megdal et al. | May 2012 | A1 |
20120124033 | Gabriel et al. | May 2012 | A1 |
20120124498 | Santoro et al. | May 2012 | A1 |
20120130785 | Postrel | May 2012 | A1 |
20120131009 | Nath et al. | May 2012 | A1 |
20120131656 | Slaton et al. | May 2012 | A1 |
20120135705 | Thaker | May 2012 | A1 |
20120136699 | Martin et al. | May 2012 | A1 |
20120136763 | Megdal et al. | May 2012 | A1 |
20120136774 | Imrey et al. | May 2012 | A1 |
20120136780 | El-Awady et al. | May 2012 | A1 |
20120143767 | Abadir | Jun 2012 | A1 |
20120143772 | Abadir | Jun 2012 | A1 |
20120144461 | Rathbun | Jun 2012 | A1 |
20120150736 | Dickerson et al. | Jun 2012 | A1 |
20120151045 | Anakata et al. | Jun 2012 | A1 |
20120151046 | Weiss et al. | Jun 2012 | A1 |
20120158654 | Behren et al. | Jun 2012 | A1 |
20120166264 | Shum et al. | Jun 2012 | A1 |
20120173339 | Flynt et al. | Jul 2012 | A1 |
20120173396 | Melby et al. | Jul 2012 | A1 |
20120173417 | Lohman et al. | Jul 2012 | A1 |
20120179605 | Blain et al. | Jul 2012 | A1 |
20120185515 | Ferrel et al. | Jul 2012 | A1 |
20120191602 | Wright et al. | Jul 2012 | A1 |
20120191693 | Alexander | Jul 2012 | A1 |
20120195412 | Smith | Aug 2012 | A1 |
20120197788 | Sanghvi et al. | Aug 2012 | A1 |
20120198556 | Patel et al. | Aug 2012 | A1 |
20120203680 | Wehunt et al. | Aug 2012 | A1 |
20120203693 | Morgan et al. | Aug 2012 | A1 |
20120203696 | Morgan et al. | Aug 2012 | A1 |
20120203733 | Zhang | Aug 2012 | A1 |
20120208495 | Lawson et al. | Aug 2012 | A1 |
20120209766 | Kitchen et al. | Aug 2012 | A1 |
20120215682 | Lent et al. | Aug 2012 | A1 |
20120215690 | Grinberg et al. | Aug 2012 | A1 |
20120215719 | Verlander | Aug 2012 | A1 |
20120216125 | Pierce | Aug 2012 | A1 |
20120221467 | Hamzeh | Aug 2012 | A1 |
20120233066 | Vallabhaneni | Sep 2012 | A1 |
20120235897 | Hirota | Sep 2012 | A1 |
20120239417 | Pourfallah et al. | Sep 2012 | A1 |
20120239497 | Nuzzi | Sep 2012 | A1 |
20120239553 | Gonen et al. | Sep 2012 | A1 |
20120239560 | Pourfallah et al. | Sep 2012 | A1 |
20120240223 | Tu | Sep 2012 | A1 |
20120246048 | Cohen et al. | Sep 2012 | A1 |
20120246060 | Conyack, Jr. et al. | Sep 2012 | A1 |
20120253852 | Pourfallah et al. | Oct 2012 | A1 |
20120254018 | Davies et al. | Oct 2012 | A1 |
20120259763 | Pessin | Oct 2012 | A1 |
20120262472 | Garr et al. | Oct 2012 | A1 |
20120265661 | Megdal et al. | Oct 2012 | A1 |
20120271712 | Katzin et al. | Oct 2012 | A1 |
20120278217 | Sui et al. | Nov 2012 | A1 |
20120278226 | Kolo | Nov 2012 | A1 |
20120278767 | Stibel et al. | Nov 2012 | A1 |
20120290451 | Jones et al. | Nov 2012 | A1 |
20120290660 | Rao et al. | Nov 2012 | A1 |
20120290740 | Tewari et al. | Nov 2012 | A1 |
20120295583 | Kim et al. | Nov 2012 | A1 |
20120297484 | Srivastava | Nov 2012 | A1 |
20120310825 | Freishtat et al. | Dec 2012 | A1 |
20120311433 | Pasupulati et al. | Dec 2012 | A1 |
20120317005 | Hutson et al. | Dec 2012 | A1 |
20120317013 | Luk et al. | Dec 2012 | A1 |
20120317014 | Cerise et al. | Dec 2012 | A1 |
20120321202 | Fertik et al. | Dec 2012 | A1 |
20120323775 | Weinstein et al. | Dec 2012 | A1 |
20120324388 | Rao et al. | Dec 2012 | A1 |
20120330689 | McLaughlin et al. | Dec 2012 | A1 |
20130006782 | Schwarzkopf et al. | Jan 2013 | A1 |
20130006825 | Robida et al. | Jan 2013 | A1 |
20130006843 | Tralvex | Jan 2013 | A1 |
20130006844 | Kremen | Jan 2013 | A1 |
20130007012 | Selkowe Fertik et al. | Jan 2013 | A1 |
20130007014 | Fertik et al. | Jan 2013 | A1 |
20130013501 | Perlman | Jan 2013 | A1 |
20130013533 | Agarwal et al. | Jan 2013 | A1 |
20130018785 | Dolphin et al. | Jan 2013 | A1 |
20130018798 | Scipioni | Jan 2013 | A1 |
20130018811 | Britti et al. | Jan 2013 | A1 |
20130018838 | Parnaby et al. | Jan 2013 | A1 |
20130018877 | Gabriel et al. | Jan 2013 | A1 |
20130018892 | Castellanos et al. | Jan 2013 | A1 |
20130018957 | Parnaby et al. | Jan 2013 | A1 |
20130024520 | Siminoff | Jan 2013 | A1 |
20130024813 | Schnorr et al. | Jan 2013 | A1 |
20130030826 | Blom | Jan 2013 | A1 |
20130030994 | Calman et al. | Jan 2013 | A1 |
20130030996 | MacKouse | Jan 2013 | A1 |
20130031109 | Roulson et al. | Jan 2013 | A1 |
20130031624 | Britti et al. | Jan 2013 | A1 |
20130036000 | Giordano et al. | Feb 2013 | A1 |
20130036046 | Rom et al. | Feb 2013 | A1 |
20130036466 | Penta et al. | Feb 2013 | A1 |
20130040619 | Grube et al. | Feb 2013 | A1 |
20130041798 | Unger | Feb 2013 | A1 |
20130041810 | Murrell et al. | Feb 2013 | A1 |
20130041949 | Biesecker et al. | Feb 2013 | A1 |
20130043305 | Zhou et al. | Feb 2013 | A1 |
20130054345 | Ross et al. | Feb 2013 | A1 |
20130054357 | Mager et al. | Feb 2013 | A1 |
20130054393 | Francisco et al. | Feb 2013 | A1 |
20130054452 | Au et al. | Feb 2013 | A1 |
20130060694 | Oskolkov et al. | Mar 2013 | A1 |
20130066716 | Chen et al. | Mar 2013 | A1 |
20130066775 | Milam | Mar 2013 | A1 |
20130066884 | Kast et al. | Mar 2013 | A1 |
20130066922 | Jang et al. | Mar 2013 | A1 |
20130067582 | Donovan et al. | Mar 2013 | A1 |
20130073366 | Heath | Mar 2013 | A1 |
20130073445 | Meszaros | Mar 2013 | A1 |
20130073457 | Sander et al. | Mar 2013 | A1 |
20130080322 | Adolphe | Mar 2013 | A1 |
20130080467 | Carson et al. | Mar 2013 | A1 |
20130085804 | Leff et al. | Apr 2013 | A1 |
20130085894 | Chan et al. | Apr 2013 | A1 |
20130085936 | Law et al. | Apr 2013 | A1 |
20130085939 | Colak et al. | Apr 2013 | A1 |
20130086075 | Scott et al. | Apr 2013 | A1 |
20130090982 | Ross | Apr 2013 | A1 |
20130095810 | Moreton et al. | Apr 2013 | A1 |
20130103464 | Kuznetsov | Apr 2013 | A1 |
20130103571 | Chung et al. | Apr 2013 | A1 |
20130103580 | Ventura | Apr 2013 | A1 |
20130104216 | Dennis et al. | Apr 2013 | A1 |
20130110557 | Kasower | May 2013 | A1 |
20130110565 | Means et al. | May 2013 | A1 |
20130110668 | Hart et al. | May 2013 | A1 |
20130111436 | Phan et al. | May 2013 | A1 |
20130117072 | Nish | May 2013 | A1 |
20130117087 | Coppinger | May 2013 | A1 |
20130117177 | MacMillan et al. | May 2013 | A1 |
20130124406 | Poplawski et al. | May 2013 | A1 |
20130125010 | Strandell | May 2013 | A1 |
20130130778 | Anderson et al. | May 2013 | A1 |
20130132151 | Stibel et al. | May 2013 | A1 |
20130132181 | Fisher | May 2013 | A1 |
20130132219 | Liberty | May 2013 | A1 |
20130132235 | Gandhi | May 2013 | A1 |
20130132245 | Hsieh et al. | May 2013 | A1 |
20130138494 | Levine | May 2013 | A1 |
20130159411 | Bowen | Jun 2013 | A1 |
20130173447 | Rothschild | Jul 2013 | A1 |
20130173449 | Ng et al. | Jul 2013 | A1 |
20130173451 | Kornegay et al. | Jul 2013 | A1 |
20130173463 | Stewart et al. | Jul 2013 | A1 |
20130173465 | Talimaa et al. | Jul 2013 | A1 |
20130173468 | Ross | Jul 2013 | A1 |
20130173481 | Hirtenstein et al. | Jul 2013 | A1 |
20130179312 | Al-Hilali | Jul 2013 | A1 |
20130179332 | Allen et al. | Jul 2013 | A1 |
20130179337 | Ochynski | Jul 2013 | A1 |
20130179348 | Crofts et al. | Jul 2013 | A1 |
20130185205 | Boss et al. | Jul 2013 | A1 |
20130185210 | Dodson et al. | Jul 2013 | A1 |
20130185293 | Boback | Jul 2013 | A1 |
20130187923 | Yoshimoto et al. | Jul 2013 | A1 |
20130191231 | Gazdzinski | Jul 2013 | A1 |
20130191261 | Chandler et al. | Jul 2013 | A1 |
20130191270 | Carragher | Jul 2013 | A1 |
20130191272 | Cochran et al. | Jul 2013 | A1 |
20130191278 | O'Leary et al. | Jul 2013 | A1 |
20130198066 | Wall et al. | Aug 2013 | A1 |
20130198514 | Grinberg et al. | Aug 2013 | A1 |
20130204745 | Martin | Aug 2013 | A1 |
20130204753 | Wallace | Aug 2013 | A1 |
20130204762 | Harris et al. | Aug 2013 | A1 |
20130205135 | Lutz | Aug 2013 | A1 |
20130211986 | Debie et al. | Aug 2013 | A1 |
20130212016 | Davis et al. | Aug 2013 | A1 |
20130212187 | Mortazavi et al. | Aug 2013 | A1 |
20130226784 | He et al. | Aug 2013 | A1 |
20130246254 | Crooks | Sep 2013 | A1 |
20130254049 | Todd | Sep 2013 | A1 |
20130262226 | LaChapelle et al. | Oct 2013 | A1 |
20130262291 | Ricci | Oct 2013 | A1 |
20130267171 | Sarkar et al. | Oct 2013 | A1 |
20130268378 | Yovin | Oct 2013 | A1 |
20130268434 | Mohsenzadeh | Oct 2013 | A1 |
20130275294 | Liu et al. | Oct 2013 | A1 |
20130278515 | Kikuchi | Oct 2013 | A1 |
20130279676 | Baniak et al. | Oct 2013 | A1 |
20130282819 | Mehta et al. | Oct 2013 | A1 |
20130290164 | Salm | Oct 2013 | A1 |
20130293363 | Plymouth | Nov 2013 | A1 |
20130297485 | Whitney | Nov 2013 | A1 |
20130297499 | Mukherjee | Nov 2013 | A1 |
20130298238 | Shah et al. | Nov 2013 | A1 |
20130304596 | Munif | Nov 2013 | A1 |
20130317954 | Psota et al. | Nov 2013 | A1 |
20130332338 | Yan et al. | Dec 2013 | A1 |
20130332341 | Papadimitriou | Dec 2013 | A1 |
20130332342 | Kasower | Dec 2013 | A1 |
20130332352 | Imrey et al. | Dec 2013 | A1 |
20130339249 | Weller et al. | Dec 2013 | A1 |
20130347059 | Fong et al. | Dec 2013 | A1 |
20140012733 | Vidal | Jan 2014 | A1 |
20140012734 | Megdal et al. | Jan 2014 | A1 |
20140012737 | Evans | Jan 2014 | A1 |
20140019333 | Morris et al. | Jan 2014 | A1 |
20140019348 | Daley | Jan 2014 | A1 |
20140032300 | Zhang et al. | Jan 2014 | A1 |
20140032723 | Nema | Jan 2014 | A1 |
20140046872 | Arnott et al. | Feb 2014 | A1 |
20140052732 | Softky | Feb 2014 | A1 |
20140061302 | Hammad | Mar 2014 | A1 |
20140074689 | Lund et al. | Mar 2014 | A1 |
20140081835 | Choudhuri et al. | Mar 2014 | A1 |
20140089166 | Padawer | Mar 2014 | A1 |
20140089167 | Kasower | Mar 2014 | A1 |
20140089191 | Brown | Mar 2014 | A1 |
20140096249 | Dupont et al. | Apr 2014 | A1 |
20140098142 | Lee et al. | Apr 2014 | A1 |
20140098229 | Lu et al. | Apr 2014 | A1 |
20140110477 | Hammad | Apr 2014 | A1 |
20140129942 | Rathod | May 2014 | A1 |
20140156500 | Lassen et al. | Jun 2014 | A1 |
20140156501 | Howe | Jun 2014 | A1 |
20140156503 | Lassen et al. | Jun 2014 | A1 |
20140164112 | Kala | Jun 2014 | A1 |
20140164398 | Smith et al. | Jun 2014 | A1 |
20140164519 | Shah | Jun 2014 | A1 |
20140180919 | Brown | Jun 2014 | A1 |
20140181285 | Stevens et al. | Jun 2014 | A1 |
20140237377 | Meissner | Aug 2014 | A1 |
20140258083 | Achanta et al. | Sep 2014 | A1 |
20140258084 | Padawer et al. | Sep 2014 | A1 |
20140258089 | Pearson et al. | Sep 2014 | A1 |
20140279329 | Dancel | Sep 2014 | A1 |
20140279382 | Drakeley et al. | Sep 2014 | A1 |
20140279391 | Gallo et al. | Sep 2014 | A1 |
20140298485 | Gardner | Oct 2014 | A1 |
20140310151 | Shishkov et al. | Oct 2014 | A1 |
20140317023 | Kim | Oct 2014 | A1 |
20140372367 | McLean | Dec 2014 | A1 |
20140379554 | Grossman et al. | Dec 2014 | A1 |
20150026014 | Kasower | Jan 2015 | A1 |
20150026060 | Krietzman et al. | Jan 2015 | A1 |
20150073929 | Psota et al. | Mar 2015 | A1 |
20150112874 | Serio et al. | Apr 2015 | A1 |
20150127490 | Puertas | May 2015 | A1 |
20150134506 | King et al. | May 2015 | A1 |
20150178829 | Weiss | Jun 2015 | A1 |
20150200948 | Cairns | Jul 2015 | A1 |
20150228016 | Chandler | Aug 2015 | A1 |
20150302521 | Bartmann | Oct 2015 | A1 |
20150310543 | DeBie | Oct 2015 | A1 |
20150324920 | Wilson et al. | Nov 2015 | A1 |
20160125412 | Cannon | May 2016 | A1 |
20160224996 | Hunt et al. | Aug 2016 | A1 |
20170132700 | Kazerani et al. | May 2017 | A1 |
20170161486 | Jeon | Jun 2017 | A1 |
20170200223 | Kasower | Jul 2017 | A1 |
20170228820 | Rohn | Aug 2017 | A1 |
20170262758 | Boyapalle et al. | Sep 2017 | A1 |
20170262821 | Lmrey et al. | Sep 2017 | A1 |
20170323063 | Krause et al. | Nov 2017 | A1 |
20170323358 | Psota et al. | Nov 2017 | A1 |
20180040063 | Buechler | Feb 2018 | A1 |
20180082371 | Chandler | Mar 2018 | A1 |
20180218069 | Rege et al. | Aug 2018 | A1 |
20180225756 | Wasser et al. | Aug 2018 | A1 |
20180285886 | Yan et al. | Oct 2018 | A1 |
20180343265 | McMillan et al. | Nov 2018 | A1 |
20180349992 | Dean et al. | Dec 2018 | A1 |
20180365445 | Burger et al. | Dec 2018 | A1 |
20190102832 | Robida et al. | Apr 2019 | A1 |
20190156227 | Duke et al. | May 2019 | A1 |
20190197528 | Dean et al. | Jun 2019 | A1 |
20190197618 | Taylor et al. | Jun 2019 | A1 |
20190258818 | Yu et al. | Aug 2019 | A1 |
20190260843 | Dean et al. | Aug 2019 | A1 |
20190295165 | Kapczynski et al. | Sep 2019 | A1 |
Number | Date | Country |
---|---|---|
2 509 842 | Dec 2005 | CA |
2 611 595 | Dec 2006 | CA |
1290373 | Apr 2001 | CN |
0 350 907 | Jan 1990 | EP |
0 468 440 | Jan 1992 | EP |
0 542 298 | May 1993 | EP |
0 566 736 | Aug 1993 | EP |
0 869 652 | Oct 1998 | EP |
0 913 789 | May 1999 | EP |
0 919 942 | Jun 1999 | EP |
1 028 401 | Aug 2000 | EP |
1 239 378 | Sep 2002 | EP |
1 301 887 | Apr 2003 | EP |
1 591 931 | Nov 2005 | EP |
1 850 278 | Oct 2007 | EP |
1 897 051 | Mar 2008 | EP |
2 088 743 | Aug 2009 | EP |
2 151 793 | Feb 2010 | EP |
2 880 619 | Jun 2015 | EP |
2 102 606 | Feb 1983 | GB |
2001-282957 | Oct 2001 | JP |
2002-163449 | Jun 2002 | JP |
2003-016261 | Jan 2003 | JP |
2003-316950 | Nov 2003 | JP |
2005-208945 | Aug 2005 | JP |
10-2000-0063313 | Nov 2000 | KR |
10-2002-0039203 | May 2002 | KR |
10-0638324 | Oct 2006 | KR |
10-2007-0081504 | Aug 2007 | KR |
2007-015510 | Apr 2008 | MX |
256569 | Jun 2006 | TW |
WO 9116691 | Oct 1991 | WO |
WO 99046710 | Sep 1999 | WO |
WO 00011574 | Mar 2000 | WO |
WO 00051052 | Aug 2000 | WO |
WO 00055778 | Sep 2000 | WO |
WO 01009752 | Feb 2001 | WO |
WO 01016896 | Mar 2001 | WO |
WO 01039090 | May 2001 | WO |
WO 01039589 | Jun 2001 | WO |
WO 01041083 | Jun 2001 | WO |
WO 01057720 | Aug 2001 | WO |
WO 01080053 | Oct 2001 | WO |
WO 01084281 | Nov 2001 | WO |
WO 02029636 | Apr 2002 | WO |
WO 2004031986 | Apr 2004 | WO |
WO 2004114160 | Dec 2004 | WO |
WO 2005010683 | Feb 2005 | WO |
WO 2005022348 | Mar 2005 | WO |
WO 2005033979 | Apr 2005 | WO |
WO 2005124619 | Dec 2005 | WO |
WO 2006050278 | May 2006 | WO |
WO 2006069199 | Jun 2006 | WO |
WO 2006099492 | Sep 2006 | WO |
WO 2006135451 | Dec 2006 | WO |
WO 2007001394 | Jan 2007 | WO |
WO 2007004158 | Jan 2007 | WO |
WO 2007084555 | Jul 2007 | WO |
WO 2007106393 | Sep 2007 | WO |
WO 2007106786 | Sep 2007 | WO |
WO 2007106787 | Sep 2007 | WO |
WO 2008021104 | Feb 2008 | WO |
WO 2008022289 | Feb 2008 | WO |
WO 2008042614 | Apr 2008 | WO |
WO 2009061342 | May 2009 | WO |
WO 2009064694 | May 2009 | WO |
WO 2009064840 | May 2009 | WO |
WO 2009099448 | Aug 2009 | WO |
WO 2009102391 | Aug 2009 | WO |
WO 2010001406 | Jan 2010 | WO |
WO 2010062537 | Jun 2010 | WO |
WO 2010077989 | Jul 2010 | WO |
WO 2010129257 | Nov 2010 | WO |
WO 2010150251 | Dec 2010 | WO |
WO 2011005876 | Jan 2011 | WO |
WO 2014022813 | Feb 2014 | WO |
WO 2018144612 | Aug 2018 | WO |
WO 2019103979 | May 2019 | WO |
Entry |
---|
International Committee on Credit Reporting (ICCR), Use of Alternative Data to Enhance Credit Reporting to Enable Access to Digital Financial Services by Individuals and SMEs operating in the Informal Economy, Jun. 28, 2018, 35 Pages (Year: 2018). |
U.S. Appl. No. 12/705,489, filed Feb. 12, 2010, Bargoli et al. |
U.S. Appl. No. 12/705,511, filed Feb. 12, 2010, Bargoli et al. |
Abrahams, Steven W., “The New View in Mortgage Prepayments: Insight from Analysis at the Loan-By-Loan Level,” The Journal of Fixed Income, Jun. 1997, vol. 7, No. 1, pp. 8-21. |
Actuate, “Delivering Enterprise Information for Corporate Portals”, White Paper, 2004, pp. 1-7. |
“Aggregate and Analyze Social Media Content: Gain Faster and Broader Insight to Market Sentiment,” SAP Partner, Mantis Technology Group, Apr. 2011, pp. 4. |
Aktas et al., “Personalizing PageRank Based on Domain Profiles”, WEBKDD workshop: Webmining and Web Usage Analysis, Aug. 22, 2004, pp. 83-90. |
Aktas et al., “Using Hyperlink Features to Personalize Web Search”, WEBKDD workshop: Webmining and Web Usage Analysis, Aug. 2004. |
Apte, et al., “A Probabilistic Estimation Framework for Predictive Modeling Analytics,” IBM Systems Journal, 2002, vol. 41, No. 3, pp. 438-448. |
“Arizona Company Has Found Key in Stopping ID Theft,” PR Newswire, New York, Aug. 10, 2005 http://proquest.umi.com/pqdweb?did=880104711&sid=1&Fmt=3&clientId=19649&RQT=309&Vname=PQD. |
ABC News Now:Money Matters, as broadcasted Nov. 15, 2005 with guest Todd Davis (CEO of Lifelock), pp. 6. |
AISG's National Underwriting Database, A-PLUS, is Now the Largest in the Industry, Business Wire, Aug. 7, 1997. |
Announcing TrueProfiler, http://web.archive.org/web/20021201123646/http://www.truecredit.com/index.asp, dated Dec. 1, 2002, 2 pages. |
Anonymous, “Credit-Report Disputes Await Electronic Resolution,” Credit Card News, Chicago, Jan. 15, 1993, vol. 5, No. 19, p. 5. |
Anonymous, “MBNA Offers Resolution of Credit Card Disputes,” Hempstead, Feb. 2002, vol. 68, No. 2, p. 47. |
Anonymous, “Feedback”, Credit Management, ABI/INFORM Global, Sep. 2006, pp. 6. |
“AT&T Expected to Turn Up Heat in Card Wars”, American Banker, May 27, 1993, vol. 158, No. 101, pp. 3. |
Avery et al., “Consumer Credit Scoring: Do Situational Circumstances Matter?”, Journal of Banking & Finance, vol. 28, 2004, pp. 835-856. |
Awoonor-Williams, Princess Josephine, Ph.D. “Gender and Credit: An Analysis of Women's Experience in the Credit Market”, ProQuest Dissertations and Theses, 2004, pp. 148. |
“Balance Transfers Offer Opportunities”, Risk Credit Risk Management Report, Jan. 29, 1996, vol. 6, No. 2, pp. 2. |
Bancroft, John, “Tools Help Managers with Risk Management,” Real Estate Finance Today, May 26, 1997, pp. 11-12. |
“Bank of America Direct Web-Based Network Adds Core Functionality to Meet Day-To-Day Treasury Needs”, Business Wire, Oct. 25, 1999. pp. 2. |
Barone, Robert P., “The Integrated Approach to Branch Service Delivery,” American Banker, Aug. 6, 1991, http://www.highbeam.com/doc/1G1-11128400.html. |
“Beware of ‘Who Viewed My Profile’ Apps on Facebook” Tech for Luddites, Mar. 15, 2010 printed Sep. 27, 2013 http://www.techforluddites.com/2010/03/beware-of-who-viewed-my-profile-apps-on-facebook.html. |
Bielski, Lauren, “Will you Spend to Thwart ID Theft?” ABA Banking Journal, Apr. 2005, pp. 54, 56-57, 60. |
Bilotta, Caryn, “Understanding Credit Scores,” Pittsburgh Post—Gazette, May 9, 2010. |
BlueCava, “What We Do”, http://www.bluecava.com/what-we-do/, printed Nov. 5, 2012 in 3 pages. |
Brown et al., “ALCOD IDSS:Assisting the Australian Stock Market Surveillance Team's Review Process,” Applied Artificial Intelligence Journal, Dec. 1, 1996, pp. 625-641. |
Buxfer, http://www.buxfer.com/ printed Feb. 5, 2014 in 1 page. |
Cantor, R. and Packer, F., “The Credit Rating Industry,” FRBNY Quarterly Review, Summer-Fall, 1994, pp. 1-24. |
“Chase Gets Positive,” Bank Technology News, May 6, 2000, vol. 14, No. 5, p. 33. |
Chatterjee et al., “Expenditure Patterns and Aggregate Consumer Behavior, Some Experiments with Australian and New Zealand Data”, The Economic Record, vol. 70, No. 210, Sep. 1994, pp. 278-291. |
Check, http://check.me/ printed Feb. 5, 2014 in 3 pages. |
Chores & Allowances, “Do Kids Have Credit Reports?” Oct. 15, 2007, http://choresandallowances.blogspot.com/2007/10/do-kids-have-credit-reports.html, pp. 5. |
CISCO: What-If Simulator, http://www.ciscocredit.com/whatifsim.html printed Oct. 12, 2012 in 2 pages. |
CISCO: Your Mortgage Credit Reporting Specialists, http://www.ciscocredit.com/cc_Services.html printed Oct. 12, 2012 in 4 pages. |
“Cole Taylor Bank Chooses Integrated E-Banking/E-Payments/Reconciliation Solution From Fundtech”, Business Wire, Oct. 21, 1999, pp. 2. |
Comlounge.net, “plonesocial.auth.rpx” http://web.archive.org/web/20101026041841/http://comlounge.net/rpx as captured Oct. 26, 2010 in 9 pages. |
“Consumer Reports Finds American-Made Vehicles Close Reliability Gap with European-Made Vehicle—As Japanese Continue to Set New Benchmarks for the Industry”, Consumer Reports: Consumers Union, Yonkers, NY, Apr. 2003, pp. 2. |
CreditAnalyst, Digital Matrix Systems, as printed out Mar. 4, 2008, pp. 2. |
CreditKarma, http://www.creditkarma.com printed Feb. 8, 2013 in 2 pages. |
CreditSesame, http://www.creditsesame.com/how-it-works/our-technology/ printed Feb. 5, 2013 in 2 pages. |
CreditToolkit, Digital Matrix Systems, as printed out Mar. 4, 2008, pp. 2. |
CreditXpert, http://www.creditxpert.com/Products/individuals.asp printed Oct. 12, 2012 in 1 page. |
“Credit Information Bureaus and ‘CIBIL’”, http://www.icicibank.com/cibil.html printed Aug. 22, 2012 in 3 pages. |
CreditKarma: How Credit Karma Works, http://www.creditkarma.com/help/howitworks printed Oct. 12, 2012 in 2 pages. |
Credit Source Online: The Secrets of Raising Your Credit Score, http://www.creditsourceonline.com/secrets-of-raising-your-credit-score.html printed Oct. 12, 2012 in 4 pages. |
Collins, Michael J., “Exploring the Design of Financial Counseling for Mortgage Borrowers in Default,” Journal of Family and Economic Issues, Springer Science+Business Media, Mar. 13, 2007, pp. 207-226. |
ComScore Networks Launches Business Unit to Help Credit Card Marketers Master Online and Multi-Channel Strategies—Solutions Provide Unprecedented Insight Into Customer Acquisition and Usage Opportunities, Reston, VA, Oct. 11, 2001, 2 pages. |
“Consumers Gain Immediate and Full Access to Credit Score Used by Majority of U.S. Lenders”, PR Newswire, ProQuest Copy, Mar. 19, 2001, p. 1. |
Credit Card Management, “Neural Nets Shoot for Jackpot,” Dec. 1995, pp. 1-6. |
“CreditCheck Monitoring Services,” Dec. 11, 2000, pp. 1, lines 21-23. |
“Credit Improvement”, CreditRepair.com, Mar. 10, 2010, http://web.archive.org/web/20100310134914/http://www.creditrepair.com/credit/, as archived Mar. 10, 2010 in 2 pages. |
Credit Plus, Inc., “Score Wizard”, http://web.archive.org/web/20030806080310/www.creditplus.com/scorewizard.asp, as archived Aug. 6, 2003 in 1 page. |
Credit Risk Management Report, Potomac, Mar. 9, 1998, vol. 8, No. 4. |
CreditXpert Inc., CreditXpert 3-Bureau Comparison™, 2002, pp. 5, http://web.archive.org/web/20030608171018/http://creditxpert.com/CreditXpert%203-Bureau%20Comparison(TM)%20sample.pdf. |
CreditXpert Inc., CreditXpert Credit Score & Analysis™, Jan. 11, 2000, pp. 6, http://web.archive.org/web/20030611070058/http://www.creditxpert.com/CreditXpert%20Score%20&%20Analysis%20and%20Credit%20Wizard%20sample.pdf. |
CreditXpert Inc., CreditXpert Essentials™, Advisor View-Experian on Jul. 7, 2003, http://www.creditxpert.com/cx_ess_app.pdf. |
CreditXpert Inc., CreditXpert Essentials™, Advisor View—TransUnion on Oct. 10, 1999, pp. 6, http://web.archive.org/web/20041211052543/http://creditxpert.com/cx_ess_app.pdf. |
CreditXpert Inc., CreditXpert Essentials™, Applicant View—TransUnion on Oct. 10, 1999, pp. 6, http://www.creditxpert.com/cx_ess_app.pdf. |
CreditXpert Inc., CreditXpert What-If Simulator™, 2002, pp. 8, http://web.archive.org/web/20030630132914/http://creditxpert.com/CreditXpert%20What-If%20Simulator(TM)%20sample.pdf. |
Cullen, Terri; “The Wall Street Journal Complete Identity Theft Guidebook:How to Protect Yourself from the Most Pervasive Crime in America”; Chapter 3, pp. 59-79; Jul. 10, 2007. |
“D&B Corporate Family Linkage”, D&B Internet Access for U.S. Contract Customers, https://www.dnb.com/ecomp/help/linkage.htm as printed Dec. 17, 2009, pp. 1. |
Dash, Julekha, “Java on the Street,” Software Magazine, Oct. 1, 1997, vol. 17, No. 11, p. 2. |
Dataman Group, “Summarized Credit Statistics,” Aug. 22, 2001, http://web.archive.org/web/20010822113446/http://www.datamangroup.com/summarized_credit.asp. |
“Data Loss Prevention (DLP) Software”, http://www.symantec.com/data-loss-prevention/ printed Apr. 8, 2013 in 8 pages. |
“Data Protection”, http://compliantprocessing.com/data-protection/ printed Apr. 8, 2013 in 4 pages. |
David, Alexander, “Controlling Information Premia by Repackaging Asset-Backed Securities,” The Journal of Risk and Insurance, Dec. 1997, 26 pages. |
Davis, Lisa, “Safety in Numbers,” Business North Carolina, Sep. 1, 1995, vol. 15, No. 9, p. 24. |
Day, Jo and Kevin; “ID-ology: A Planner's Guide to Identity Theft”; Journal of Financial Planning:Tech Talk; pp. 36-38; Sep. 2004. |
“Debt Settlement: Watch Video on how to Pay Your Debt Faster”, http://www.debtconsolidationcare.com/debt-settlement.html printed Jan. 9, 2013 in 6 pages. |
Demby, Elayne, “Special Report: Letting Consumers Know the Score—and More”, Collections and Credit Risk, New York, Feb. 2003, vol. 8, Issue 2, p. 53, pp. 3. |
Department of Real Estate, http://web.archive.org/web/20040619190012/http://www.dre.ca.gov/pubs_sub.htm, Jun. 19, 2004, in 5 pages. |
Department of Real Estate, “Reference Book,” http://web.archive.org/web/20041011063158/http://www.dre.ca.gov/pdf_docs/ref17.pdf, Jun. 18, 2004, Chapter 17, pp. 311-382. |
Dillon et al., “Good Science”, Marketing Research: A Magazine of Management & Applications TM, Winter 1997, vol. 9, No. 4; pp. 11. |
“Disputes in Cyberspace 2001: Update of online dispute resolution for consumers in cross-border disputes”, Consumers International, Nov. 2001, pp. 45, http://web.archive.org/web/20160414183303/http://www.consumersinternational.org/media/304196/disputes%20in%20cyberspace%202001.%20update%20of%20online%20dispute%20resolution%20for%20consumers%20in%20cross-border%20disputes..pdf. |
Downing, Jr.; Richard, “Changes to the Credit Reporting Act,” Mortgage Banking, Apr. 1, 1998, vol. 58, No. 7, pp. 82-85. |
Ecredable: Discover your AMP Credit Rating™, http://www.ecredable.com/how-it-works/amp-credit-rating printed Oct. 12, 2012 in 2 pages. |
eFunds Introduces QualiFileSM, Deluxe Corporation, eFunds Press Release and Product Launch, Sep. 23, 1999, Milwaukee, WI. |
Elangovan, A.R., “Managerial Third-Party Dispute Intervention: A Prescriptive Model of Strategy Selection”, Academy of Management, Oct. 1, 1995, vol. 20, No. 4, pp. 800-830. |
Elliehausen et al., The Impact of Credit Counseling on Subsequent Borrower Behavior, The Journal of Consumer Affairs, Summer 2007, vol. 41, No. 1, pp. 1-28. |
Equifax, “Business Status Alerts: User Guide”, Jul. 2009, pp. 1-21. |
Equifax: Consumer Bureau, http://www.equifax.co.in/financial-services/consumer_bureau/en_in#RiskScore printed Oct. 12, 2012 in 3 pages. |
Equifax Consumer Credit Report http://www.equifax.com/home/, as retrieved on Sep. 17, 2008. |
Equifax; “Equifax Credit Watch”; https://www.econsumer.equifax.co.uk/consumer/uk/sitepage.ehtml, dated Jun. 27, 2007 on www.archive.org. |
“Equifax: Debt Wise™ Credit Monitoring Service,” Product Review, http://www.mdmproofing.com/iym/reviews/equifax/debt-wise/, Jan. 2010, pp. 11. |
Equifax; “Places”, http://web.archive.org/web/20111111113930/http://www.equifax.com/places as archived Nov. 11, 2011 in 1 page. |
Equifax; “Places”, http://www.equifax.com/places/ as printed Nov. 16, 2015 in 1 page. |
Equifax; “Welcome to Equifax Mobile”, http://www.equifax.com/mobile/ as printed Mar. 18, 2011 in 2 pages. |
Ettorre, “Paul Kahn on Exceptional Marketing,” Management Review, vol. 83, No. 11, Nov. 1994, pp. 48-51. |
“Equifax and FICO Serve Consumers”, Mortgage Servicing News, Mar. 2001, vol. 5, No. 3, p. 19. |
Experian, http://www.experian.com/ printed Oct. 12, 2012 in 1 page. |
Experian Announces PLUS Score; Experian Press Release dated Oct. 16, 2003; Experian Global Press Office. |
Experian Consumer Credit Report http://www.experian.com/, as retrieved on Sep. 17, 2008. |
“Experian Launches Portfolio Monitor—Owner NoticesSM”, News Release, Feb. 2003, Costa Mesa, CA. |
Experian-Scorex Announces New Credit Simulation Tool, PR Newswire, Costa Mesa, CA, Jun. 13, 2005. |
Experian, Custom Strategist and Qualifile from Funds, 2000, in 2 pages. |
Experian Information Solutions, Inc., Credit Trends: Access Credit Trending Information Instantly, http://kewaneecreditbureau.com/Credit.Trends.pdf, Aug. 2000, pp. 4. |
Facebook, “Facebook helps you connect and share with the people in your life,” www.facebook.com printed Nov. 16, 2010 in 1 page. |
Fair Isaac Announces Integrated, End-to-End Collection and Recovery Solution, Business Wire, New York, Sep. 2, 2004, p. 1. |
Fair Isaac Corporation, myFICO: Calculators: Credit Assessment, as printed Jun. 8, 2005 in 2 pages, http://www.myfico.com/CreditEducation/Calculators/CreditAssessment.aspx. |
Fair Isaac Corporation, myFICO: Help: FICO Score Simulator, as printed Jun. 8, 2005 in 2 pages, http://www.myfico.com/Help/Simulator.aspx?fire=5. |
Fair Isaac Corporation, myFICO: Products: Suze Orman's FICO Kit Platinum, as printed Jun. 8, 2005 in 4 pages, http://www.myfico.com/Products/FICOKit/Description.aspx. |
Fair Isaac Corporation, myFICO: Products: Suze Orman's FICO® Kit Platinum: FICO Score Check, as printed Jun. 7, 2005 in 1 page, http://www.myfico.com/Products/FICOKit/Sample03.html. |
Fair Isaac Corporation, myFICO: Products: Suze Orman's FICO®. Kit Platinum: Look for Errors, as printed Jun. 7, 2005 in 3 pages http://www.myfico.com/Products/FICOKit/Sample02.html. |
Fair Isaac Corporation, myFICO: Products:Suze Orman's FICO® Kit Platinum: Your FICO Score, as printed Jun. 7, 2005 in 1 page, http://www.mvfico.com/Products/FICOKit/Sample01.html. |
Fair Isaac Corporation, myFICO: Sample: FICO Score Simulator, as printed Jun. 8, 2005 in 5 pages, http://www.rnyfico.com/Content/Samples/Sample_ScoreSimulator.asp. |
Fair Isaac Corporation, myFICO: Sample: FICO Score Simulator: Max Out All Your Credit Cards, as printed Jun. 8, 2005 in 2 pages, http://www.myfico.com/Content/Samples/Sample_ScoreSimulatorResults.asp?Simulation=4&ReportID=1&productID=&Execute.x=105&Execute.y=23. |
Fair Isaac Corporation, myFICO: Sample: FICO Score Simulator: Miss Payments on All Accounts With a Payment Due, as printed Jun. 8, 2005 in 2 pages, http://www.myfico.com/Content/Samples/Sample_ScoreSimulatorResults.asp?miss_payment=radiobutton&Simulation=2&ReportID=1&ProductID=&Execute.x81&Execute.y=28>. |
Fair Isaac Corporation, myFICO: Sample: FICO Score Simulator: Pay Down Delinquent Balances First, as printed Jun. 8, 2005 in 2 pages, http://www.myfico.com/Content/Samples/Sample_ScoreSimulatorResults.asp?textfieldCC=750&Simulation=7&ReportID=1&ProductID=&PayDelinquent.x=78&PayDelinquent.y=30. |
Fair Isaac Corporation, myFICO: Sample: FICO Score Simulator: Pay Down the Balances on All Your Credit Cards, as printed Jun. 8, 2005 in 2 pages, http://www.myfico.com/Content/Samples/Sample_ScoreSimulatorResults.asp?textfieldCC1=750&SelectMonths=1&PayOption=radiobutton&textfieldCC=750&Simulation=3&ReportID=1&ProductID=&Execute.x=57&Execute.y=22. |
Fair Isaac Corporation, myFICO: Sample: FICO Score Simulator: Pay Your Bills on Time, as printed Jun. 8, 2005 in 2 pages, http://www.myfico.com/Content/Samples/Sample_ScoreSimulatorResults.asp?select1=1&Simulation=1&ReportID=1&ProductID=&PayBillsOnTime.x=93&PayBillsOnTime.y=23. |
Fair Isaac Corporation, myFICO: Sample: FICO Score Simulator: Seek New Credit, as printed Jun. 8, 2005 in 2 pages, http://www.myfico.com/Content/Samples/Sample_ScoreSimulatorResults.asp?new_credit=radiobutton&textfield5A=3000&tectfield5B=&textfield5C=&Simulation=5&ReportID=1&ProductID=&NewCredit.x=62&NewCredit.y=20. |
Fair Isaac Corporation, myFICO: Sample: FICO Score Simulator: Suggested Best Action, as printed Jun. 8, 2005 in 2 pages, http://www.myfico.com/Content/Samples/Sample_ScoreSimulatorResults.asp?Simulation=111&ReportID=1&ProductID=&TopAction.x=66&TopAction.y=16. |
Fair Isaac Corporation, myFICO: Sample: FICO Score Simulator: Transfer Credit Card Balances, as printed Jun. 8, 2005 in 2 pages, http://www.myfico.com/Content/Samples/Sample_ScoreSimulatorResults.asp?textfield222=5000&Simulation=6&ReportID=1&ProductID=&TransferBalance.x=86&TransferBalance.y=24. |
FamilySecure.com, “Frequently Asked Questions”, http://www.familysecure.com/FAQ.aspx as archived Jul. 15, 2007 in 3 pages. |
FamilySecure.com; “Identity Theft Protection for the Whole Family | FamilySecure.com” http://www.familysecure.com/, as retrieved on Nov. 5, 2009. |
Fenner, Peter, “Mobile Address Management and Billing for Personal Communications”, 1st International Conference on Universal Personal Communications, 1992, ICUPC '92 Proceedings, pp. 253-257. |
Fickenscher, Lisa, “Merchant American Express Seeks to Mine its Data on Cardholder Spending Patterns,” American Banker, vol. 162, Issue 56, Mar. 24, 1997, pp. 1-2. |
“Fictitious Business Name Records”, Westlaw Database Directory, http://directory.westlaw.com/scope/default.asp?db=FBN-ALL&RS-W...&VR=2.0 as printed Dec. 17, 2009, pp. 5. |
Financial Engines, http://corp.financialengines.com/ printed Oct. 12, 2012 in 1 page. |
Fisher, Joseph, “Access to Fair Credit Reports: Current Practices and Proposed Legislation,” American Business Law Journal, Fall 1981, vol. 19, No. 3, p. 319. |
Fitzpatrick, Alex, “Facebook Monitors Your Chats for Criminal Activity [Report],” Mashable, Jul. 12, 2012 printed Sep. 27, 2013 http://mashable.com/2012/07/12/facebook-scanning-chats/. |
Forrest, David, “Achieving Perfect Credit—Lesson 3: Assessing Your Situation,” http://www.fool.com/seminars/ev/index.htm?sid=0029&lid=300, 2002, copyright 1995-2002, in 7 pages. |
Frank, John, “Scoring Takes on a New Meaning,” Credit Card Management, Sep. 1996, vol. 9, No. 6, pp. 155-159. |
“Fraud Alert | Learn How”. Fight Identity Theft. http://www.fightidentitytheft.com/flag.html, accessed on Nov. 5, 2009. |
“FTC Testifies: Identity Theft on the Rise”, FTC News Release, Mar. 7, 2000, pp. 3. |
“Fund Manager,” Portfolio Management Software website, indexed into Google on Jan. 7, 2005, Retrieved Oct. 24, 2014 http://www.fundmanagersoftware.com/, http://www.fundmanagersoftware.com/help/gph_tp_pieasset.html, http://www.fundmanagersoftware.com/demo2.html. |
GAO-03-661, Best Practices: Improved Knowledge of DOD Service Contracts Could Reveal Significant Savings, GAO, Jun. 2003. |
Gibbs, Adrienne; “Protecting Your Children from Identity Theft,” Nov. 25, 2008, http://www.creditcards.com/credit-card-news/identity-ID-theft-and-kids-children-1282.php, pp. 4. |
Gilje, Shelby, “Keeping Tabs on Businesses That Keep Tabs on Us”, NewsRoom, The Seattle Times, Section: Scene, Apr. 19, 1995, pp. 4. |
Giudici, Paolo, “Bayesian Data Mining, with Application to Benchmarking and Credit Scoring,” Applied Stochastic Models in Business and Industry, 2001, vol. 17, pp. 69-81. |
“GLBA Compliance and FFFIEC Compliance” http://www.trustwave.com/financial-services.php printed Apr. 8, 2013 in 1 page. |
Gopalan, R., “Panning for Sales-Force Gold”, Intelligent Enterprise, Dec. 21, 1999, vol. 2, No. 18, pp. 38-43. |
Gordon et al., “Identity Fraud: A Critical National and Global Threat,” LexisNexis, Oct. 28, 2003, pp. 1-48. |
“Green Tree Investors May Go to Court,” Mar. 4, 1998, http://web.archive.org/web/20001101080021/http://www.channel4000.com/news/stories/news-980304-120038.html. |
“Groups Demand Government Action on Online Marketing to Children,” American Marketplace, Apr. 4, 1996, vol. 17, No. 7, p. 53. |
Gualtieri et al., “The Forrester Wave™: Big Data Streaming Analytics, Q1 2016”, Forrester®, Mar. 30, 2016, pp. 14, https://www.sas.com/content/dam/SAS/en_us/doc/analystreport/forrester-big-data-streaming-analytics-108218.pdf. |
“Guide to Benefits, MasterCard® Cardholder Smart Shopper Benefits”, May 2005, pp. 10. |
Healy, Thomas J., “The New Science of Borrower Behavior,” Mortgage Banking, vol. 58, No. 5, pp. 26-35, Feb. 1, 1998. |
Herzberg, Amir, “Payments and Banking with Mobile Personal Devices,” Communications of the ACM, May 2003, vol. 46, No. 5, pp. 53-58. |
Hill, Kerry, “Identity Theft Your Social Security Number Provides Avenue for Thieves”, NewsRoom, Wisconsin State Journal, Sep. 13, 1998, pp. 4. |
Hoofnagle, Chris Jay, “Identity Theft: Making the Known Unknowns Known,” Harvard Journal of Law & Technology, Fall 2007, vol. 21, No. 1, pp. 98-122. |
Hunt, Robert M.; Whither Consumer Credit Counseling? Business Review, Dec. 31, 2005, pp. 9-20. |
ID Analytics, “ID Analytics® Consumer Notification Service” printed Apr. 16, 2013 in 2 pages. |
ID Theft Assist, “Do You Know Where Your Child's Credit Is?”, Nov. 26, 2007, http://www.idtheftassist.com/pages/story14, pp. 3. |
“ID Thieves These Days Want Your Number, Not Your Name”, The Columbus Dispatch, Columbus, Ohio, http://www.dispatch.com/content/stories/business/2014/08/03/id-thieves-these-days-want-your-number-not-your-name.html, Aug 3, 2014 in 2 pages. |
Identity Theft Resource Center; Fact Sheet 120 A—To Order a Credit Report for a Child; Fact Sheets, Victim Resources; Apr. 30, 2007. |
“Identity Thieves Beware: Lifelock Introduces Nation's First Guaranteed Proactive Solution to Identity Theft Protection,” PR Newswire, New York, Jun. 13, 2005 http://proquest.umi.com/pqdweb?did=852869731&sid=1&Fmt=3&clientId=19649&RQT=309&Vname=PQD. |
IDEON, Credit-Card Registry that Bellyflopped this Year, Is Drawing some Bottom-Fishers, The Wall Street Journal, Aug. 21, 1995, pp. C2. |
“Impac Funding Introduces Enhanced Website for Static Pool Tracking of MBS Transactions,” Waltham, MA; Webpage printed out from http://www.lewtan.com/press/1208044_Impac-Lewtan.htm on Mar. 20, 2008. |
Information Brokers of America, “Information Brokers of America Child Identity Theft Protection” http://web.archive.org/web/20080706135451/http://iboainfo.com/child-order.html as archived Jul. 6, 2008 in 1 page. |
Information Brokers of America, “Safeguard Your Child's Credit”, http://web.archive.org/web/20071215210406/http://www.iboainfo.com/child-id-protect.html as archived Dec. 15, 2007 in 1 page. |
Instant Access to Credit Reports Now Available Online with DMS' CreditBrowser-based system also Simplifies Credit Decisioning and Offers a Central Point of Control, Business Wire, Dallas, May 23, 2000, p. 0264. |
Intelius, “People Search—Updated Daily, Accurate and Fast!” http://www.intelius.com/people-search.html?=&gclid=CJqZIZP7paUCFYK5KgodbCUJJQ printed Nov. 16, 2010 in 1 page. |
Internal Revenue Service Data Book 2000, Issued Aug. 2001, Revised May 2003. |
Iovation, Device Identification & Device Fingerprinting, http://www.iovation.com/risk-management/device-identification printed Nov. 5, 2012 in 6 pages. |
Irby, LaToya, “How Will a Late Payment Hurt My Credit Score?”http://web.archive.org/web/20101024113603/http://credit.about.com/od/creditscorefaq/f/how-late-payment-affects-credit-score.htm, Oct. 24, 2010, pp. 1. |
Jones, Yvonne, “Consumers Understood the Basics but Could Benefit from Targeted Educational Efforts,” GAO U.S. Government Accountability Office, Mar. 16, 2005, pp. 128, http://www.gao.gov/products/GAO-05-223. |
“JPMorgan Worldwide Securities Services to Acquire Paloma's Middle and Back Office Operations,” Webpage printed from http://www.jpmorgan.com on Apr. 1, 2009. |
“Judging Credit: Consumers Need Better Finance Tools”, News Journal, Daytona Beach, FL, Dec. 28, 2002. |
Kaushik, Nishant, “The Epic Hacking of Mat Honan and Our Identity Challenge,” Aug. 7, 2012, http://blog.talkingidentity.com/2012/08/the-epic-hacking-of-mat-honan-and-our-identity-challenge.html. |
Khan, Mickey Alam, “Equifax Recognizes Changing Customer Behavior with Four-Pronged Mobile Stategy”, Mobile Marketer, http://web.archive.org/web/20151117005818/http://www.mobilemarketer.com/cms/news/strategy/9733.html, Apr. 19, 2011 in 10 pages. |
Kulkosky, Edward, “Credit Scoring Appeal Transcends Underwriting,” American Banker, vol. 161, No. 93, p. 8, May 15, 1996. |
Kuykendall, Lavonne, “Divergent Paths in Early Pacts with Credit Bureaus”, American Banker, May 30, 2002, vol. 167, No. 3, pp. 2. |
Lan, Joe, “The Top Portfolio Management Software,” http://www.aaii.com/computerizedinvesting/article/the-top-portfolio-management-sofware, Includes Discussion thread, Fourth Quarter 2011, pp. 17. |
Lanubile, et al., “Evaluating Empirical Models for the Detection of High-Risk Components: Some Lessons Learned”, 20th Annual Software Engineering Workshop, Nov. 29-30, 1995, Greenbelt, Maryland, pp. 1-6. |
Lauwers et al., “Five Hundred Years of Bookkeeping: A Portrait of Luca Pacioli”, Tijdschrift voor Economie en Management, 1994, vol. 39. No. 3, pp. 289-304. |
Lee, W.A., “Experian Eyes Payments, Mulls Deals” American Banker: The Financial Services Daily, 2pgs., New York, NY, May 30, 2003. |
Lee, W.A.; “Experian, on Deal Hunt, Nets Identity Theft Insurer”, American Banker: The Financial Services Daily, Jun. 4, 2003, New York, NY, 1 page. |
Lee, W.A.; “Fair Isaac Taps Institutions for Credit Score Distribution”, American Banker: The Financial Services Daily, New York, NY, Apr. 9, 2002, vol. 167, Issue 67, 1 Page. |
Lee, W.A., “Money, Quicken, and the Value of Alliances”, American Banker: The Financial Services Daily, 2pgs., New York, NY, Jul. 28, 2003. |
LendingTree.com, “Lender Ratings & Reviews,” http://web.archive.org/web/20091015043716/http://www.lendingtree.com/lender-reviews/, Oct. 15, 2009, in 21 pages. |
Leskovec, Jure, “Social Media Analytics: Tracking, Modeling and Predicting the Flow of Information through Networks”, WWW 2011—Tutorial, Mar. 28-Apr. 1, 2011, Hyderabad, India, pp. 277-278. |
Letter to Donald A. Robert from Carolyn B. Maloney, dated Oct. 31, 2007, pp. 2. |
Letter to Donald A. Robert from Senator Charles E. Schumer, dated Oct. 11, 2007, pp. 2. |
Letter to Harry C. Gambill from Carolyn B. Maloney, dated Oct. 31, 2007, pp. 2. |
Letter to Harry C. Gambill from Senator Charles E. Schumer, dated Oct. 11, 2007, pp. 2. |
Letter to Richard F. Smith from Carolyn B. Maloney, dated Oct. 31, 2007, pp. 2. |
Letter to Richard F. Smith from Senator Charles E. Schumer, dated Oct. 11, 2007, pp. 2. |
Li et al., “Automatic Verbal Information Verification for User Authentication”, IEEE Transactions on Speech and Audio Processing, vol. 8, No. 5, Sep. 2000, pp. 585-596. |
LifeLock, http://web.archive.org/web/20110724011010/http://www.lifelock.com/? as archived Jul. 24, 2011 in 1 page. |
LifeLock, “How LifeLock Works,” http://www.lifelock.com/lifelock-for-people printed Mar. 14, 2008 in 1 page. |
LifeLock, “Identity Theft F.A.Q.” http://web.archive.org/web/20080215093614/http://www.identitytheftkiller.com/promo/faq.php, Feb. 15, 2008, pp. 8. |
LifeLock, “LifeLock Launches First ID Theft Prevention Program for the Protection of Children,” Press Release, Oct. 14, 2005, http://www.lifelock.com/about-us/press-room/2005-press-releases/lifelock-protection-for-children. |
LifeLock; “How Can LifeLock Protect My Kids and Family?” http://www.lifelock.com/lifelock-for-people/how-we-do-it/how-can-lifelock-protect-my-kids-and-family printed Mar. 14, 2008 in 1 page. |
LifeLock, “Personal Identity Theft Protection & Identity Theft Products,” http://www.lifelock.com/lifelock-for-people, accessed Nov. 5, 2007. |
LifeLock, Various Pages, www.lifelock.com/, 2007. |
Littwin, Angela, “Beyond Usury: A Study of Credit-Card Use and Preference Among Low-Income Consumers”, Texas Law Review, vol. 86, No. 3, pp. 451-506; Feb. 2008. |
Lobo, Jude, “MySAP.com Enterprise Portal Cookbook,” SAP Technical Delivery, Feb. 2002, vol. 1, pp. 1-13. |
Longo, Tracey, “Managing Money: Your Family Finances”, Kiplinger's Personal Finance Magazine, Jun. 1, 1995, vol. 49, No. 6, pp. 4. |
Lund, Graham, “Credit Bureau Data: Maximizing the Benefits,” Credit Management, May 2004, ProQuest Central, pp. 44-45. |
Magid, Lawrence, J., Business Tools: When Selecting an ASP Ensure Data Mobility, Los Angeles Times, Los Angeles, CA, Feb. 26, 2001, vol. C, Issue 4, pp. 3. |
“Managing Debt?” Federal Trade Commission: Consumer Information, http://www.consumer.ftc.gov/articles/0158-managing-debt, printed Mar. 22, 2013 in 4 pages. |
Manilla, http://www.manilla.com/how-it-works/ printed Feb. 5, 2014 in 1 page. |
Mannan et al., “Mercury: Recovering Forgotten Passwords Using Personal Devices*”, Dec. 17, 2011, Pre-Proceedings of Financial Cryptography and Data Security 2011, pp. 1-16. |
Merriam Webster's Collegiate Dictionary, 10th Edition, 1999, p. 79. |
Meyers et al., “Using Your Social Networking Accounts to Log Into NPR.org,” NPR.org, Jun. 24, 2010, http://web.archive.org/web/20100627034054/http://www.npr.org/blogs/inside/2010/06/24/128079309/using-your-social-networking-accounts-to-log-into-npr-org in 3 pages. |
Micarelli et al., “Personalized Search on the World Wide Web,” The Adaptive Web, LNCS 4321, 2007, pp. 195-230. |
Microsoft, “Expand the Reach of Your Business,” Microsoft Business Solutions, 2004, in 16 pages. |
Miller, Margaret, “Credit Reporting Systems Around the Globe: The State of the Art in Public and Private Credit Registries”, Jun. 2000, pp. 32, http://siteresources.worldbank.org/INTRES/Resources/469232-1107449512766/Credit_Reporting_Systems_Around_The_Globe.pdf. |
Mint.com, http://www.mint.com/ printed Sep. 18, 2008 in 2 pages. |
Mint.com, http://www.mint.com/how-it-works/ printed Feb. 5, 2013 in 2 pages. |
Montgomery County Housing Report, Residential Market Report, Jan. 2004 in 6 pages. |
MS Money Software by Microsoft http://www.microsoft.com/Money/default.mspx as retrieved on Sep. 17, 2008. |
Mvelopes, http://www.mvelopes.com/ printed Feb. 5, 2014 in 2 pages. |
My Call Credit http://www.mycallcredit.com/products.asp?product=ALR dated Dec. 10, 2005 on www.archive.org. |
My Call Credit http://www.mycallcredit.com/rewrite.asp?display=faq dated Dec. 10, 2005 on www.archive.org. |
MyFico, http://www.myfico.com/products/ficoone/sample/sample_scoresimulator.aspx.printed Oct. 12, 2012 in 3 pages. |
My ID Alerts, “Why ID Alerts” http://www.myidalerts.com/why-id-alerts.jsps printed Apr. 3, 2012 in 2 pages. |
My ID Alerts, “How it Works” http://www.myidalerts.com/how-it-works.jsps printed Apr. 3, 2012 in 3 pages. |
MyRatePlan.com, “Cell Phone Buying Guide”, http://web.archive.org/web/20061116103256/http://myrateplan.com/cell_phone_buying_guide/family_plans/, as archived Nov. 16, 2006 in 2 pages. |
MyReceipts, http://www.myreceipts.com/, printed Oct. 16, 2012 in 1 page. |
MyReceipts—How it Works, http://www.myreceipts.com/howItWorks.do, printed Oct. 16, 2012 in 1 page. |
“Name Availability Records”, Westlaw Database Directory, http://directory.westlaw.com/scope/default.asp?db=NA-ALL&RS=W...&VR=2.0 as printed Dec. 17, 2009, pp. 5. |
National Alert Registry Launches RegisteredOffendersList.org to Provide Information on Registered Sex Offenders, May 16, 2005, pp. 2, http://www.prweb.com/printer/240437.htm accessed on Oct. 18, 2011. |
National Alert Registry Offers Free Child Safety “Safe From Harm” DVD and Child Identification Kit, Oct. 24, 2006. pp. 2, http://www.prleap.com/pr/53170 accessed on Oct. 18, 2011. |
National Alert Registry website titled, “Does a sexual offender live in your neighborhood”, Oct. 22, 2006, pp. 2, http://web.archive.org/wb/20061022204835/http://www.nationallertregistry.com/ accessed on Oct. 13, 2011. |
“New Privista Product Provides Early Warning System to Combat Identity Theft”, PR Newswire, Oct. 24, 2000, PR Newswire Association, Inc., New York. |
“NewsHound: NewsHound User Guide Internet E-Mail”, of record as early as May 2, 1997, pp. 11. |
“New for Investors: Asset Allocation, Seasoned Returns and More,” Prosper, http://blog.prosper.com/2011/10/27/new-for-investors-asset-allocation-seasoned-returns-and-more/, pp. 4. |
Next Card: About Us, http://web.cba.neu.edu/˜awatson/NextCardCase/NextCardAboutUs.htm printed Oct. 23, 2009 in 10 pages. |
“Normalize,” http://www.merriam-webster.com/dictionary/normalize printed Jun. 14, 2010. |
Novack, Janet, “The Coming Fight over FICO,” Forbes, Dec. 18, 1995, vol. 156, No. 14, p. 96. |
Occasional CF Newsletter; http://www.halhelms.com/index.cfm?fuseaction=newsletters.oct1999; Oct. 1999. |
Office of Integrated Analysis and Forecasting, DOE/EIA-M065(2004), Model Documentation Report: Macroeconomic Activity Module (MAM) of the National Energy Modeling System, EIA, Washington DC, Feb. 2004. |
Ogg, Erica, “Apple Cracks Down on UDID Use”, http://gigaom.com/apple/apple-cracks-down-on-udid-use/ printed Nov. 5, 2012 in 5 Pages. |
Organizing Maniac's Blog—Online Receipts Provided by MyQuickReceipts.com, http://organizingmaniacs.wordpress.com/2011/01/12/online-receipts-provided-by-myquickreceipts.com/ dated Jan. 12, 2011 printed Oct. 16, 2012 in 3 pages. |
Pagano, et al., “Information Sharing in Credit Markets,” Dec. 1993, The Journal of Finance, vol. 48, No. 5, pp. 1693-1718. |
Partnoy, Frank, Rethinking Regulation of Credit Rating Agencies: An Institutional Investor Perspective, Council of Institutional Investors, Apr. 2009, pp. 21. |
Paustian, Chuck, “Every Cardholder a King Customers get the Full Treatment at Issuers' Web Sites,” Card Marketing, New York, Mar. 2001, vol. 5, No. 3, pp. 4. |
Peltier, Jon, “Conditional Formatting of Excel Charts”, Peltier Tech Blog, as posted Feb. 13, 2012, http://peltiertech.com/conditional-formatting-of-excel-charts/, pp. 1-5. |
People Finders, http://www.peoplefinders.com/?CMP=Google&utm_source=google&utm_medium=cpc printed Nov. 16, 2010 in 1 page. |
People Lookup, “Your Source for Locating Anyone!” www.peoplelookup.com/people-search.html printed Nov. 16, 2010 in 1 page. |
People Search, “The Leading Premium People Search Site on the Web,” http://www.peoplesearch.com printed Nov. 16, 2010 in 2 pages. |
PersonalCapital.com, http://www.personalcapital.com/how-it-works printed Feb. 5, 2014 in 5 pages. |
Pinola, Melanie, “How Can I Protect Against Social Engineering Hacks?” Aug. 9, 2012, http://lifehacker.com/5933296/how-can-i-protect-against-hackers-who-use-sneaky-social-engineering-techniques-to-get-into-my-accounts. |
Planet Receipt—Home, http://www.planetreceipt.com/home printed Oct. 16, 2012 in 1 page. |
Planet Receipt—Solutions & Features, http://www.planetreceipt.com/solutions-features printed Oct. 16, 2012 in 2 pages. |
Planwise, http://planwise.com printed Feb. 8, 2013 in 5 pages. |
Powerforms: Declarative Client-Side for Field Validation, ISSN 1386-145x, Dec. 2000. |
Press Release—“Helping Families Protect Against Identity Theft—Experian Announces FamilySecure.com; Parents and guardians are alerted for signs of potential identity theft for them and their children; product features an industry-leading $2 million guarantee”; PR Newswire; Irvine, CA; Oct. 1, 2007. |
PrivacyGuard, http://web.archive.org/web/20110728114049/http://www.privacyguard.com/ as archived Jul. 28, 2011 in 1 page. |
Privacy Rights Clearinghouse, “Identity Theft: What to do if it Happens to You,” http://web.archive.org/web/19990218180542/http://privacyrights.org/fs/fs17a.htm printed Feb. 18, 1999. |
“ProClarity and Microsoft to Host Free Seminar Series on Retail Analytics with Independent Analyst Firm-ProClarity to Share Best Forrester Analysts to Discuss Trends and the Future of the Retail”; Business Wire; pp. 2; Aug. 13, 2003. |
“Qualifying for Debt Settlement”, http://www.certifieddebt.com/debt/settlement-qualifications.shtml printed Jan. 9, 2013 in 2 pages. |
Quantix Software, “Investment Account Manager,” available at https://www.youtube.com/watch?v=1UwNTEER1Kk, as published Mar. 21, 2012. |
Quicken Online by Intuit http://www.quicken.intuit.com/, as retrieved on Sep. 17, 2008. |
“Quicken Support”, http://web.archive.org/web/20071231040130/http://web.intuit.com/support/quicken/docs/d_qif.html as archived Dec. 31, 2007 in 6 pages. |
Ramaswamy, Vinita M., Identity-Theft Toolkit, The CPA Journal, Oct. 1, 2006, vol. 76, Issue 10, pp. 66-70. |
Ratner, Juliana, “GMAC to Sell Risk-Management Advice; Target is 150 Biggest Home Loan Servicers,” American Banker, vol. 161, No. 53, p. 16, Mar. 19, 1996. |
Rawe, Julie; “Identity Thieves”, Time Bonus Section, Inside Business, Feb. 2002, pp. 2. |
“Recognition and use by Appraisers of Energy-Performance Benchmarking Tools for Commercial Buildings,” prepared by the Institute for Market Transformation, NYSERDA, Feb. 2003, pp. 6. |
Repici et al., “The Comma Separated Value (CSV) File Format”, http://creativyst.com/Doc/Articles/CSV/CSV01.htm, Creativyst, Inc., 2002, pp. 10. |
Reppler.com, “Learn More: Basic Information about how TrustedID Reppler Works for You,” www.reppler.com/learn/ printed Oct. 24, 2012 in 2 pages. |
“Resolve Debt for Less: With Help from Freedom Financial” http://www.debtsettlementusa.com/ printed Jan. 9, 2013 in 6 pages. |
“RF/Spectrum to Offer Score,” National Mortgage News, Special Report; Credit Reporting & Scaring, Jun. 9, 1997, p. 40. |
Risk Monitors, “New GMAC Unit Focuses on Portfolio Risk,” PR Newswire, Mar. 13, 1996, pp. 2. http://www.thefreelibrary.com/New+GMAC+UNIT+FOCUSES+ON+PORTFOLIO+RISK-a018092212. |
Romig, Shane, “The Truth About Credit Repair”, Credit.com, May 5, 2010, http://web.archive.org/web/20100505055526/http://www.credit.com/credit_information/credit_help/The-Truth-About-Credit-Repair.jsp printed Mar. 22, 2013 in 4 pages. |
Roth, Andrew, “CheckFree to Introduce E-Mail Billing Serving,” American Banker, New York, Mar. 13, 2001, vol. 166, No. 49, pp. 3. |
SAS, “SAS® Information Delivery Portal”, Fact Sheet, 2008, in 4 pages. |
Saunders, A., “Data Goldmine,” Management Today, London: Mar. 1, 2004, 6 pages. |
Schmidt, David, “Environmental Impact: The Changing Credit Reporting Landscape,” Business Credit, Apr. 2003, vol. 105, No. 4, pp. 14. |
Schmidt et al., “A Set of Multi-Touch Graph Interaction Techniques”, ITS '10, Nov. 7-10, 2010, Saarbrucken, Germany, pp. 1-4. |
Scholastic Inc.:Parent's Request for Information http://web.archive.org/web/20070210091055/http://www.scholastic.com/inforequest/index.htm as archived Feb. 10, 2007 in 1 page. |
Scholastic Inc.:Privacy Policy http://web.archive.org/web/20070127214753/http://www.scholastic.com/privacy.htm as archived Jan. 27, 2007 in 3 pages. |
Screenshot for Investment Account Manager v.2.8.3, published at http://www.aaii.com/objects/get/1642.gif by at least Aug. 30, 2011 in 1 page. |
Sealey, Geraldine, “Child ID Theft Can Go Unnoticed for Years”, http://abcnews.go.com/US/story?id=90257, Sep. 12, 2003 in 9 pages. |
“Settling Your Debts—Part 1 in Our Debt Settlement Series”, http://www.creditinfocenter.com/debt/settle_debts.shtml printed Jan. 9, 2013 in 6 pages. |
“Shareholders Sue Green Tree Financial,” Dated Dec. 4, 1997, http://web.archive.org/web/20000419070107/http://www.wcco.com/news/stories/news-971204-092238.html. |
Shin, Laura, “See an Error on Your Credit Report? Credit Karma Now Makes It Easy to Dispute”, Nov. 12, 2015, http://www.forbes.com/sites/laurashin/2015/11/12/see-an-error-on-your-credit-report-credit-karma-now-makes-it-easy-to-dispute/, pp. 4. |
ShoeBoxed, https://www.shoeboxed.com/sbx-home/ printed Oct. 16, 2012 in 4 pages. |
Simpson, Glyn, “Microsoft (MS) Money (MSMoney FAQ, Help and Information Pages”, pp. 2, Copyright © Glyn Simpson 1998-2007, http://web.archive.org/web/20071018075531/http://money.mvps.org/faq/article/196.aspx. |
Singletary, Michelle “Ratings for the Credit Raters”, The Washington Post, The Color of Money column, Mar. 24, 2002 in 1 page. |
Singletary, Michelle, “Score One for Open Credit Ratings”, The Washington Post, Washington DC, Jun. 18, 2000, 3 pages. |
Singletary, Michelle, “The Littlest Victims of ID Theft”, The Washington Post, The Color of Money, Oct. 4, 2007. |
Stanton, T.H., “Credit Scoring and Loan Scoring as Tools for Improved Management of Federal Credit Programs”, Financier, Philadelphia, Summer 1999, vol. 6, 36 pages. |
Stauffer et al., “Using HTML 3.2,” Second Edition, 1996, Que Publishing, pp. 192-193. |
Steele, Georgia, “Fair, Isaac Seeks Mortgage Tech Opportunities,” National Mortgage News, Special Report; B& C Lending, Mar. 23, 1998, p. 34. |
Stein, Benchmarking Default Prediction Models: Pitfalls and Remedies in Model Validation, Moody's KMV, Revised Jun. 13, 2002, Technical Report #020305; New York. |
Sullivan, Deidre, “Scoring Borrower Risk,” Mortgage Banking, Nov. 1994, vol. 55, No. 2, pp. 94-98. |
Tajik, S., “Conditional Plotting, Changing Color of Line Based on Value”, MathWorks®, MATLAB Answers™, Question Posted Feb. 10, 2011 to https://www.mathworks.com/matlabcentral/answers/1156-conditional-plotting-changing-color-of-line-based-on-value?requestedDomain=www.mathworks.com, pp. 8. |
Taylor, Marshall, “Loan-Level Pricing Draws Interest From Investors,” Real Estate Finance Today, Jul. 7, 1997, vol. 14, No. 14. p. 10. |
“The Best of the Best,” Mortgage Technology, Nov. 1, 2003, vol. 10, No. 8, pp. 34-53. |
TheMorningCall.Com, “Cheap Ways to Foil Identity Theft,” www.mcall.com/business/columnists/all-karp.5920748jul01,0 . . . , published Jul. 1, 2007. |
Thompson, Herbert H., “How I Stole Someone's Identity”, https://www.scientificamerican.com/article/anatomy-of-a-social-hack/#, Aug. 18, 2008, pp. 5. |
Todorova, Aleksandra, “Protecting Your Child's Identity”, Smart Money, Published Aug. 2, 2007, pp. 1-5. |
“TransUnion—Child Identity Theft Inquiry”, TransUnion, http://www.transunion.com/corporate/personal/fraudIdentityTheft/fraudPrevention/childIDInquiry.page as printed Nov. 5, 2009 in 4 pages. |
TransUnion Consumer Credit Report http://www.transunion.com/, as retrieved on Sep. 17, 2008. |
TransUnion: VantageScore®—Consistency in Credit Scoring, http://www.transunion.com/personal-credit/credit-reports/vantage-score.page printed Oct. 12, 2012 in 2 pages. |
Trulia, “Trulia Estimates,” http://www.trulia.com/trulia_estimates/, printed Feb. 18, 2014 in 2 pages. |
Truston, “Checking if your Child is an ID Theft Victim can be Stressful,” as posted by Michelle Pastor on Jan. 22, 2007 at http://www.mytruston.com/blog/credit/checking_if_your_child_is_an_id_theft_vi.html. |
Tuman, Diane, “What is a Zestimate?” Mar. 2013, pp. 5, http://www.zillow.com/wikipages/What-is-a-Zestimate/. |
US Legal, Description, http://www.uslegalforms.com/us/US-00708-LTR.htm printed Sep. 4, 2007 in 2 pages. |
Vamosi, Robert, “How to Handle ID Fraud's Youngest Victims,” Nov. 21, 2008, http://news.cnet.com/8301-10789_3-10105303-57.html. |
Van Collie, Shimon, “The Road to Better Credit-Card Marketing,” Bank Technology News, Sep. 1995, pp. 4. |
Verstraeten, Geert, Ph.D.; Issues in predictive modeling of individual customer behavior: Applications in targeted marketing and consumer credit scoring; Universiteit Gent (Belgium) 2005. |
Waggoner, Darren J., “Having a Global Identity Crisis,” Collections & Credit Risk, Aug. 2001, vol. vol. 6, No. 8, pp. 6. |
Wahl, Martin, “The Stampede to Subprime,” Mortgage Banking, Oct. 1, 1997, vol. 58, No. 1, p. 26(7). |
Watts, Craig, “Consumers Now Can Know What Loan Rate Offers to Expect Based on Their FICO Credit Score at MyFICO.com,” San Rafael, CA, Mar. 6, 2002, pp. 2, http://www.myfico.com/PressRoom/PressReleases/2002_03_06.aspx. |
Watts, Craig, “Fair, Isaac and Equifax Give Consumers New Score Power Tools Offering Greater Insights for Managing Their Credit Health,” May 21, 2002, pp. 3, http://www.myfico.com/PressRoom/PressReleases/2002_05_21.aspx. |
Webpage printed from http://www.magnum.net/pdfs/RapUpBrochure.pdf as printed Mar. 3, 2008. |
“We Eliminate Bad Debt”, as printed from http://www.webcreditbureau.com/start/, dated Aug. 22, 2012, 1 Page. |
Wesabe.com http://www.wesabe.com/, as retrieved on Sep. 17, 2008. |
West, David, “Neural Network Credit Scoring Models”, Computers & Operations Research, vol. 27, 2000, pp. 1131-1152. |
Wood, Greg, “Top Streaming Technologies for Data Lakes and Real-Time Data”, http://blog.zaloni.com/top-streaming-technologies-for-data-lakes-and-real-time-data, Sep. 20, 2016 in 3 pages. |
Yang, et al., “An Analysis of the Ex Ante Probabilities of Mortgage Prepayment and Default”, Real Estate Economics, Dec. 1998, vol. 26, No. 4, pp. 651-676. |
Yahoo! Search, “People Search,” http://people.yahoo/com printed Nov. 16, 2010 in 1 page. |
YODLEE | Money Center, https://yodleemoneycenter.com/ printed Feb. 5, 2014 in 2 pages. |
You Need a Budget, http://www.youneedabudget.com/features printed Feb. 5, 2014 in 3 pages. |
Yücesan et al., “Distributed Web-Based Simulation Experiments for Optimization”, Simulation Practice and Theory 9, 2001, pp. 73-90. |
Zimmerman et al., “A Web-Based Platform for Experimental Investigation of Electric Power Auctions,” Decision Support Systems, 1999, vol. 24, pp. 193-205. |
Zoot—Instant Rules GUI, www.zootweb.com/instant_rules_GUI.html as printed Mar. 3, 2008. |
Zoot—Rules Management GUI, www.zootweb.com/business_rules_GUI.html as printed Mar. 3, 2008. |
Application as filed in U.S. Appl. No. 10/452,155, dated May 30, 2003. |
Preliminary Amendment in U.S. Appl. No. 10/452,155, dated Sep. 15, 2003. |
Office Action in U.S. Appl. No. 10/452,155, dated Jan. 25, 2008. |
Examiner Interview Summary in U.S. Appl. No. 10/452,155, dated Jul. 23, 2008. |
Office Action in U.S. Appl. No. 10/452,155, dated Oct. 2, 2008. |
Examiner Interview Summary in U.S. Appl. No. 10/452,155, dated Jan. 14, 2009. |
Examiner Interview Summary in U.S. Appl. No. 10/452,155, dated Jul. 21, 2009. |
Notice of Allowance in U.S. Appl. No. 10/452,155, dated Aug. 19, 2009. |
International Search Report for Application No. PCT/US2005/041814, dated Aug. 29, 2007. |
International Preliminary Report on Patentability and Written Opinion for Application No. PCT/US2005/041814, dated Dec. 27, 2007. |
International Search Report and Written Opinion for Application No. PCT/US2018/016258, dated May 16, 2018. |
International Search Report and Written Opinion for Application No. PCT/US2018/061877, dated Mar. 8, 2019. |
Provisional Application as filed in U.S. Appl. No. 60/168,272, dated Dec. 1, 1999 in 14 pages. |
Provisional Application as filed in U.S. Appl. No. 60/168,276, dated Dec. 1, 1999 in 82 pages. |
Provisional Application as filed in U.S. Appl. No. 60/213,367, dated Jun. 23, 2000 in 20 pages. |
Application as filed in U.S. Appl. No. 09/411,683, dated Oct. 4, 1999. |
Application as filed in U.S. Appl. No. 09/653,595, dated Aug. 31, 2000. |
Application as filed in U.S. Appl. No. 09/790,453, dated Feb. 22, 2001. |
Office Action in U.S. Appl. No. 09/790,453, dated Jan. 20, 2006. |
Office Action in U.S. Appl. No. 09/790,453, dated Jul. 11, 2006. |
Office Action in U.S. Appl. No. 09/790,453, dated Dec. 1, 2006. |
Office Action in U.S. Appl. No. 09/790,453, dated May 10, 2007. |
Office Action in U.S. Appl. No. 09/790,453, dated Mar. 21, 2008. |
Application as filed in U.S. Appl. No. 10/183,135, filed Jun. 25, 2002. |
Office Action in U.S. Appl. No. 10/183,135, dated Oct. 22, 2007. |
Final Office Action in U.S. Appl. No. 10/183,135, dated Apr. 14, 2008. |
Office Action in U.S. Appl. No. 10/183,135, dated Aug. 21, 2008. |
Office Action in U.S. Appl. No. 10/183,135, dated Feb. 26, 2009. |
Office Action in U.S. Appl. No. 10/183,135, dated Aug. 18, 2009. |
Office Action in U.S. Appl. No. 10/183,135, dated Feb. 19, 2010. |
Final Office Action in U.S. Appl. No. 10/183,135, dated Sep. 22, 2010. |
Office Action in U.S. Appl. No. 10/183,135, dated Mar. 25, 2011. |
Notice of Allowance in U.S. Appl. No. 10/183,135, dated Aug. 15, 2011. |
Office Action in U.S. Appl. No. 11/169,769, dated Mar. 24, 2010. |
Application as Filed in U.S. Appl. No. 11/363,984, dated Feb. 27, 2006. |
Office Action in in U.S. Appl. No. 11/363,984, dated Dec. 26, 2008. |
International Preliminary Report on Patentability in Application No. PCT/US2018/016258, dated Aug. 15, 2019. |
Langer et al., “Creditor List Screening Practices: Certain Implications Under the Fair Credit Reporting Act and the Equal Credit Opportunity Act,” The Business Lawyer, May 1988, vol. 43, pp. 1123-1141. |
Menge, Falko, “Enterprise Service Bus”, Free and Open Source Software Conference, 2007, pp. 6. |
International Search Report and Written Opinion for Application No. PCT/US2019/049377, dated Dec. 20, 2019. |
Number | Date | Country | |
---|---|---|---|
20200074099 A1 | Mar 2020 | US |
Number | Date | Country | |
---|---|---|---|
62727479 | Sep 2018 | US | |
62826319 | Mar 2019 | US |