Businesses generally collect information relating to their operations, such as by using enterprise resource planning (ERP) applications and accounting applications which may interact with an online software platform (OSP) that provides various services. ERP applications manage information relating to a business's activities, such as sales, resource management, production, inventory management, delivery, billing, and so on. Accounting applications manage a business's accounting information, such as purchase orders, sales invoices, payroll, accounts payable, accounts receivable, and so on.
All subject matter discussed in this Background section of this document is not necessarily prior art, and may not be presumed to be prior art simply because it is presented in this Background section. Plus, any reference to any prior art in this description is not, and should not be taken as, an acknowledgement or any form of suggestion that such prior art forms parts of the common general knowledge in any art in any country. Along these lines, any recognition of problems in the prior art discussed in this Background section or associated with such subject matter should not be treated as prior art, unless expressly stated to be prior art. Rather, the discussion of any subject matter in this Background section should be treated as part of the approach taken towards the particular problem by the inventors. This approach in and of itself may also be inventive.
The present description gives instances of computer systems, storage media that may store programs, and methods.
In embodiments, a novel architecture of connections and Graphical User Interfaces (GUIs) is used to facilitate extracting a client business's data that is stored in some locations, and copying it to other locations for further processing according to digital rules. As such, embodiments improve the client's on-boarding operation onto the software platform.
Providing, in a timely and efficient manner, accurate and reliable data extraction presents a technical problem for current ERP applications. Another such problem is providing such data extraction without compromising security. One more such problem is providing such data extraction in a way that integrates well into existing technical environments.
The present disclosure provides systems, computer-readable media, and methods that solve these technical problems by increasing the speed, efficiency and accuracy of such specialized software platforms and computer networks, thus improving the technology of ERP software applications and accounting applications. Therefore, the systems and methods described herein for data extraction improve the functioning of computer or other hardware, such as by reducing the processing, storage, and/or data transmission resources needed to perform various tasks, thereby enabling the tasks to be performed by less capable, capacious, and/or expensive hardware devices, enabling the tasks to be performed with less latency and/or preserving more of the conserved resources for use in performing other tasks or additional instances of the same task.
These and other features and advantages of the claimed invention will become more readily apparent in view of the embodiments described and illustrated in this specification, namely in this written specification and the associated drawings.
In the drawings, which are not necessarily drawn to scale, like numerals may describe similar components in different views. Like numerals having different suffixes may represent different instances of similar components. Some embodiments are illustrated by way of example, and not limitation, in the figures of the accompanying drawings in which:
As has been mentioned, the present description is about computer systems, storage media that may store programs, and methods. Embodiments are now described in more detail.
Each client device 102 may communicate and exchange data with other client devices 102, as well as with server system 108 via the network 106. The server system 108 is a computer system. Such data may include functions (e.g., commands to invoke functions) as well as payload data (e.g., text, audio, video or other multimedia data). In this context, the network 106 may be, or include, one or more portions of a network such as an ad hoc network, an intranet, an extranet, a virtual private network (VPN), a local area network (LAN), a wireless LAN (WLAN), a wide area network (WAN), a wireless WAN (WWAN), a metropolitan area network (MAN), the Internet, a portion of the Internet, a portion of the Public Switched Telephone Network (PSTN), a plain old telephone service (POTS) network, a cellular telephone network, a wireless network, a Wi-Fi® network, another type of network, or a combination of two or more such networks. For example, a network or a portion of a network may include a wireless or cellular network and the coupling may be a Code Division Multiple Access (CDMA) connection, a Global System for Mobile communications (GSM) connection, or other type of cellular or wireless coupling. In this example, the coupling may implement any of a variety of types of data transfer technology, such as Single Carrier Radio Transmission Technology (1×RTT), Evolution-Data Optimized (EVDO) technology, General Packet Radio Service (GPRS) technology, Enhanced Data rates for GSM Evolution (EDGE) technology, third Generation Partnership Project (3GPP) including 3G, fourth generation wireless (4G) networks, Universal Mobile Telecommunications System (UMTS), High Speed Packet Access (HSPA), Worldwide Interoperability for Microwave Access (WiMAX), Long Term Evolution (LTE) standard, others defined by various standard setting organizations, other long range protocols, or other data transfer technology.
The server system 108 provides server-side functionality via the network 106 to one or more client devices (102). While certain functions of the system 100 are described herein as being performed by either a client device 102 or by the server system 108, it will be appreciated that some functionality may be interchangeably performed by either the client device 102 or by the server system 108. For example, it may be technically preferable to initially deploy certain technology and functionality within the server system 108, but later migrate this technology and functionality to a client device 102 having sufficient processing/memory capacity. Additionally, some functionality of embodiments of the present disclosure may be distributed across a plurality of different processors and/or computing devices, including one or more client devices 102 and server systems 108.
The server system 108 supports various services and operations that are provided to the client devices 102. Such operations include transmitting data to, receiving data from, and processing data generated by the client device 102. This data may include, for example, message content, client device information, geolocation information, database information, transaction data, social network information, and other information. Data exchanges within the system 100 are invoked and controlled through functions available via user interfaces (UIs) of the client devices 102.
In the example depicted in
In the example shown in
The application server 104 hosts a number of applications and subsystems. For example, the application server 104 may implement a variety of message processing technologies and functions, including various data-processing operations, with respect to data received within the payload of a message received from one or more client devices 102, or retrieved from one or more databases 107 by database server 105.
Online Software Platform Data Extraction for Improved Data on-Boarding
As described in more detail below, embodiments of the present disclosure help provide a software-based software platform and graphical user interface (GUI) architecture that facilitates online software platform data extraction for improved data on-boarding. For example, some embodiments may receive inputs that permit extraction of a customer's/client's data from where it presently is (e.g., another memory, such as an ERP) onto an OSP's platform, for the customer's/client's data to on-board the OSP. Data may be collected (e.g., by extraction and per user input) and rules may be applied to the collected data to make a determination (e.g., a determination that the data exceeds threshold). One or more notifications may be generated responsive to the determination, and the notification may be transmitted to the client/customer.
A user 112 is a client entity 110, or an agent or the client entity 110. The user 112 has a computer system 114 that has a screen 116. The client entity 110 has an account with the ERP provider, and thus may receive services from ERP platform 120. For receiving these services, according to operation C1, the client entity 110 stores its own client data 128 onto the ERP platform 120.
In this example, the client entity 110 also desires the services of OSP 140. And, in embodiments, the very client data 128 that is useful to the ERP platform 120 is also useful to the OSP 140. As such, extracting the client data 128 from the ERP platform 120 by the OSP 140 may facilitate the on-boarding of the client entity 110 to the OSP 140.
Accordingly, the client entity 110 establishes an account with the OSP 140. This account may be established in a number of ways, including via a connector or web-only access. If via a connector, such a connector may be different from the connector 128 that is described later.
In particular, according to another operation C2, the client entity 110 establishes a client account module 142 with the OSP 140. The client account module 142 includes a client UI portal 144, which may contain instructions and data for how to present information as a Graphical User Interface (GUI) onto screen 116.
Returning to
According to one more operation C7, the OSP 140 provides an indication for a connector that will be used for extracting. According to another operation C8, the client entity 110 may install the indicated connector 122 onto the ERP platform 120.
At one more operation C9, the connector 122 is actuated, either by the client entity 110 or by the OSP 140. This actuation results in causing the connector 122 to use the provided authentication information to access the ERP platform 120, to identify the stored client data 128, and to provide the client data 128 to the OSP 140. This providing of the data is also known as ingesting and importing the data.
The OSP 140 also includes a data ingestion engine 152, a recommendation engine 154, a recommendation output API and an OSP computation engine 146. The client data 128 may be provided to the data ingestion engine 152, which may be in the form of an application program interface (API). Of course, the client data 128 may be provided using an OSP identifier for the client entity 110.
At one more operation C10, the ingested data is normalized. The OSP computation engine 146 may process the data, filter it, compute statistics of it, apply rules to the data or statistics, and so on. In so doing, the OSP computation engine 146 may also input entity data about the client entity 110 from the client account module 142, and the applicable rules may depend on the entity data. In addition, the recommendation engine 154 may generate recommendations depending on the results of applying the rules to the imported data or its statistics.
At one more operation C11, the recommendation/output API 156 may fetch and make available, to client account module 142 and to the client UI portal 144 this data, and/or its statistics, and/or the results of applying the rules, and/or any recommendations generated from applying the rules.
In some use cases the client data 128 is transaction data from relationship instances, such as buy-sell transactions. In addition, the OSP 140 may compute tax obligations arising from the relationship instances, such as sales tax due. Applying the rules to the data may determine that economic nexus thresholds have been reached in various jurisdictions, where registration, filing returns, and remitting taxes is now required from client entity 110.
According to operation 410, an OSP computer system receives via a network, from a client computer system of a client entity, such as client entity 110, one or more electronic communications. The electronic communications include an onboarding request for data of the client entity that is stored by an ERP computer system, such as that of ERP platform 120, distinct from the OSP computer system. The onboarding request includes ERP identification information about the ERP computer system and authentication information to access the data. In some embodiments, the onboarding request further includes a permission indication, and the operations may further include the OSP computer system causing to be presented, on a screen of the client computer system, a GUI that includes a field to receive the permission indication.
According to another, optional operation 420, the OSP computer system contacts, using the ERP identification information, the ERP computer system. In some embodiments, the OSP computer system may also cause to be presented, on a screen of the client computer system, a GUI that includes a field to receive the ERP identification information and/or a field to receive the authentication information.
According to another, optional operation 430, the OSP computer system accesses, using the authentication information, the data of the client entity.
According to another, optional operation 440, the OSP computer system copies the accessed data onto one or more local non-transitory computer-readable storage media, such as that of database(s) 107 if
According to another, optional operation 450, the OSP computer system applies one or more digital rules to the copied data to generate a determination. In some embodiments, the copied data is in originally a first format and the operations further include the OSP computer system converting the copied data from the first format to a second format different from the first format. The one or more digital rules are then applied to the data in the second format. For example, the copied data may include a dataset. The dataset is in the first format and includes a first dataset identifier and data in a first order. The dataset may be converted into a second format. The dataset in the second format may include a second dataset identifier and data in a second order different from the first order.
In some embodiments, the copied data include datasets that include respective attributes and the operations further include the OSP computer system filtering the datasets according to at least one of the attributes. The one or more digital rules are then applied to the filtered datasets. In some instances, the datasets are filtered according to two of the attributes, such as according to time stamps and location codes indicating locations.
According to another, optional operation 460, the OSP computer system transmits one or more electronic communications to the client computer system that make available an indication of the determination. The OSP may also cause to be presented, on a screen of the client computer system, a graphical user interface GUI that includes the indication of the determination.
In some embodiments, the copied data include datasets and the datasets include respective numerical resource values. The application of the one or more digital rules may then include adding at least two of the numerical resource values to generate a sum, and comparing the sum to a sum threshold. In this case, the indication indicates a result of the comparison to the sum threshold.
In some embodiments, the attributes include respective numerical resource values. The application the one or more digital rules may further include adding the numerical resource values of the filtered datasets to generate a sum, and comparing the sum to a sum threshold. The indication would then further indicate a result of the comparison to the sum threshold.
A user 512 is a client entity 510, or an agent or the client entity 510. The user 512 has a computer system 514 that has a screen 516. The client entity 510 has an account with the ERP provider, and thus may receive services from ERP platform 520. For receiving these services, according to operation D1, the client entity 510 stores its own client data 528 onto the ERP platform 520.
In this example, the client entity 510 also desires the services of OSP 540. And, in embodiments, the very client data 528 that is useful to the ERP platform 520 is also useful to the OSP 540. As such, extracting the client data 528 from the ERP platform 520 by the OSP 540 may facilitate the on-boarding of the client entity 510 to the OSP 540.
At operation D2, the user 512 may have discovered the OSP 540 via interaction with the ERP platform 520. For example, the ERP platform 520 may provide an online catalogue or resource directory, such as an application center, that includes or provides links to various software applications and/or services that may work with or otherwise integrate with the ERP platform 520. Such applications may be available for download via the ERP platform 520. One such application may be or include a connector 522. In particular, according to operation D2, the ERP platform 520 provides an indication for the connector 522 that will be used for extracting client data 528. According to operation D2, the client entity 510 may install the indicated connector 522 onto the ERP platform 520.
Accordingly, the client entity 510 establishes an account with the OSP 540 at operation D3. This account may be established in a number of ways, including via a connector or web-only access. If via a connector, such a connector may be different from the connector 522. In particular, according to operation D3, the client entity 510 establishes a client account module 542 with the OSP 540. The client account module 542 includes a client UI portal 544, which may contain instructions and data for how to present information as a Graphical User Interface (GUI) onto screen 516. The OSP 540 generates identification information associated with the client account for the client entity 510, such as a user name, password, credentials, keys, tokens and/or other authentication information for accessing the client account. Such authentication information may be provided to the client entity 510 via the client UI portal 544.
Returning to
At one more operation D7, the connector 522 is actuated, either by the client entity 510 or by the ERP platform 522. This actuation results in causing the connector 522 to identify the stored client data 528, to use the provided network address and authentication information to access the OSP 540, and to input or otherwise provide the client data 528 to the OSP 540. This providing of the data is also known as exporting the client data 528 to the OSP 540, which the OSP 540 then ingests.
The OSP 540 also includes a data ingestion engine 552, a recommendation engine 554, a recommendation output API and an OSP computation engine 546. The client data 528 may be provided to the data ingestion engine 552, which may be in the form of an application program interface (API). Of course, the client data 528 may be provided using an OSP identifier for the client entity 510.
At one more operation D8, the OSP 540 receives the client data 528, and the ingested data is normalized. The OSP computation engine 546 may process the data, filter it, compute statistics of it, apply rules to the data or statistics, and so on. In so doing, the OSP computation engine 546 may also input entity data about the client entity 510 from the client account module 542, and the applicable rules may depend on the entity data. In addition, the recommendation engine 554 may generate recommendations depending on the results of applying the rules to the imported data or its statistics.
At one more operation D9, the recommendation/output API 556 may fetch and make available, to client account module 542 and to the client UI portal 544, this data, and/or its statistics, and/or the results of applying the rules, and/or any recommendations generated from applying the rules.
In some use cases the client data 528 is transaction data from relationship instances, such as buy-sell transactions. In addition, the OSP 540 may compute tax obligations arising from the relationship instances, such as sales tax due. Applying the rules to the data may determine that economic nexus thresholds have been reached in various jurisdictions, where registration, filing returns, and remitting taxes is now required from client entity 510.
According to operation 805, an ERP computer system, such as a computer system of ERP platform 510, receives via a network, such as network 106 of
According to another, optional operation 810, the ERP computer system stores the data onto the one or more non-transitory computer-readable storage media, such as that of database(s) 107 if
According to another, optional operation 815, the ERP computer system receives, via a network, from a client computer system of the client entity, one or more electronic communications that include a copying request for the data to be copied to an OSP computer system, such as that of OSP 540, with which the client entity has an account. The OSP computer system may be distinct from the ERP computer system and the copying request includes OSP direction information about the account. For example, the OSP direction information may include one or more of: a network address of the OSP, credentials for the OSP, a token, a key, an account number, and other authentication information associated with the account.
In some embodiments, the ERP computer system causes to be presented, on a screen of the client computer system, such as screen 516, a graphical user interface (GUI) that includes a field to receive the OSP direction information, such as fields 710, 722, 724 of the GUI 700 of
In some embodiments, after or in response to, or on conjunction with receiving or responding to, the copying request, the ERP computer system transmits, to the client computer system of the client entity, a request for permission to transmit data stored in the location range to and for receipt by the OSP computer system. The ERP computer system then receives, via a network, from a client computer system of the client entity, permission to transmit data stored in the location range to and for receipt by the OSP computer system. For example, the request may be presented in a GUI such as GUI 700 of
According to another, optional operation 820, the ERP computer system contacts the OSP computer system using the OSP direction information.
According to another, optional operation 825, the ERP computer system identifies a location range where at least a portion of the data is stored on the one or more non-transitory computer-readable storage media.
According to another, optional operation 830, the ERP computer system causes at least a portion of the data stored in the location range to be transmitted to and for receipt by the OSP computer system using the OSP direction information. The OSP computer system may then store the data it receives, apply one or more digital rules to the stored data to generate a determination, and transmits one or more electronic communications to the client computer system that make available an indication of the determination.
In some embodiments, the ERP computer system stores, onto the one or more non-transitory computer-readable storage media, a connector, such as connector 522 of
In some embodiments, the connector may be received as a download at the ERP computer system. The ERP computer system may then receive, via a network, from a client computer system of the client entity, a request to install the connector. The ERP computer system then installs the connector onto the ERP computer system in response to the request to install the connector. In some embodiments, the account with the OSP computer system is created after the installation of the connector. For example, the ERP computer system may contact, via the connector, the OSP computer system to initiate creation of the account before receiving the electronic communications that include the copying request.
Each dataset of the client data may have a first parameter value that serves as an identification number and one or more ancillary parameter values that are, or represent, one or more attributes of the dataset. In the present example, dataset 901 has a first parameter value that serves as an identification number, which is represented by ID1. Dataset 901 has other parameters that include ancillary parameter values. In the present embodiment, such ancillary parameter values include, for example, a calendar year associated with the relationship instance, represented by CY; a domain associated with the relationship instance, represented by ST; and a resource amount associated with the relationship instance, represented by BX. Other ancillary values may also be included in dataset 901 that are, or represent, one or more attributes of dataset 901.
In an example use case, the client entity 110 of
In some embodiments, the copied client data is in originally a first format and the OSP computer system, such as that the OSP 140 of
The datasets 1009 are shown filtered in such a manner within a matrix in which the horizontal axis 1108 of the matrix represents time in terms of the calendar year of the transaction represented by the dataset and the vertical axis 1107 of the matrix represents the domain associated with the transaction represented by the dataset. In some embodiments, there may be multiple domains associated with a particular dataset and thus there may be multiple matrices used. Thus, each cell of the matrix contains the datasets for transactions that occurred in a particular year and that are associated with a particular domain. For example, in
In some embodiments, the matrix shown in
In the present example, the stored digital rules facilitate determining whether an economic nexus is established for purposes of remitting transaction tax in the certain domain (e.g. tax jurisdiction). However, different states have different thresholds for determining whether there is an economic nexus, which provides a problem for retailers in determining whether they are compliant with the tax rules in various jurisdictions, especially when the retailers have ever changing total revenue and numbers of transactions in various different domains (e.g., tax jurisdictions). Determining tax compliance under such circumstances for multiple retailers in various different jurisdictions according to the various different rules for the different tax jurisdictions and communicating such information to the retailers or other entities efficiently as rules are changing presents a technical problem in order to do so in a timely and efficient manner over computer networks and in a way that integrates well into existing technical environments in which tax assistance is provided. The present disclosure provides systems and methods that solve this technical problem by improving the speed, efficiency and accuracy of such specialized software platforms and computer networks and onboarding users for such systems.
For example, the digital rules applied by the OSP may be based on regulations regarding a monetary amount of sales that are associated with each of various tax jurisdictions (e.g., states) and/or a volume of sales transactions that are associated with each of various tax jurisdictions. In an embodiment, the regulation may indicate the client entity is obligated to collect and remit sales tax in a particular tax jurisdiction if a particular economic nexus is met. For example, this particular economic nexus may be that within a particular calendar year, the total number of transactions exceed a particular threshold and the sum of the transaction amounts of all those transactions in that calendar year exceed another threshold. Thus, the digital rule based on the regulation will test the datasets representing those transactions to determine whether the thresholds are met for those datasets.
In the present embodiment, the computer system of the OSP (e.g., the computation engine 146 of the OSP 140 of
The GUI 1300 may appear on screen 1391 (e.g., screen 116 of
Such notifications about results of applying rules may be provided by the computer system of the OSP in various other manners in various different embodiments, such as including, but not limited to: email, updates to user accounts, text messages, automated phone calls, chat messages, web-based messages, desktop computer alerts, pop-up messages or alerts, mobile device messages, mobile device applications, etc. In some embodiments, a message may be electronically initiated by the computer system of the OSP to be sent by mail or courier to an address selected by the client entity. In some embodiments, the notifications do not indicate there is a potential lack of tax compliance, but just that there is a notification available for the client entity and may include instructions or a link for receiving or otherwise accessing further information, including information regarding potential lack of tax compliance. In some embodiments, the notification regarding potential lack of tax compliance may include or provide access to a notification regarding a potential lack of tax compliance regarding reporting, collecting, and/or remitting transaction taxes for individual jurisdictions based on the application of the digital rules.
Such client entity information may include, but is not limited to: proof of consent and agreement of the client entity to terms of the OSP; tax identifiers or identifications numbers of the client entity, addresses of all companies and warehouses of the client entity, and system versions and capabilities of systems of the client entity and ERP platform. In an example use case, such client entity and associated transaction information may include, but is not limited to: transaction history including full copies of all accounts receivable (AR) and accounts payable (AP) invoices; item catalog(s) including all product descriptions for products of the client entity; tax authorities for various tax jurisdictions associated with the client entity and transactions; and store locations of the client entity.
The OSP may upload the data in a raw format, native to that connector of the ERP platform associated with the client entity and then implements a cloud process to normalize and convert the data, such as, for example, described with respect to
The above operations may be implemented in an example embodiment illustrated with respect to
At operation Q5, the client entity requests recommendations from the recommendation API engine 1412 via a client UI portal (CUP) 1410. For example, the CUP 1410 may be an example of the CUP 144 of
In the example shown in
If user credentials are to be used to validate the request, then at operation 1508 the data ingestion API service checks in local cache to see if the user credentials can be found there. If the user credentials cannot be found in local cache, then the data ingestion API service validates the request via REST API authentication. If the REST API authentication fails, then the data ingestion API service determines the user is invalid and an error message is returned at operation 1518. If the user credentials can be found in local cache or the REST API authentication succeeds, then the data ingestion API service reads the body of the request at operation 1520.
If a security token is to be used to validate the request, then at operation 1510 the data ingestion API service checks in local cache to see if the security token can be found there. If the security token cannot be found in local cache, then the data ingestion API service validates the request via authentication through an artificial intelligence (AI) engine (e.g., using an AI model based on user access patterns). If the validation through AI fails, then the data ingestion API service determines the user is invalid and an error message is returned at operation 1518. If the user credentials can be found in local cache or authentication through AI succeeds, then the data ingestion API service reads the body of the request at operation 1520. In various embodiments, the user credentials and/or token provided with the request may be authenticated through the REST API and/or AI methodologies.
At operation 1522 the data ingestion API service determines the type of request (e.g., based on the body of the request). If the type of request is determined to be that in which client data is to be ingested (e.g., datasets including data of transactions of the client entity), then at operation 1526 the data ingestion API service reads the JavaScript Object Notation (JSON) object and form data for the client data type and at operation 1530 pushes that data to the dedicated portion of storage S3 for that type of data. JSON is an open standard file format, and data interchange format, that uses human-readable text to store and transmit data objects consisting of attribute-value pairs and array data types. However, other file types and data formats may be used in various embodiments. At operation 1532, the data ingestion API service then returns value indicating the ingestion of the data was successful.
If the type of request is determined to be that in which log data is to be ingested (client entity application logs), then at operation 1524 the data ingestion API service reads the JSON object and form data for the log data type and at operation 1528 pushes that data to the dedicated portion of storage S3 for that type of data. In various other embodiments, file types and data formats other than JSON may be used. At operation 1532, the data ingestion API service then returns value indicating the ingestion of the data was successful.
At operation 1602, data being stored to storage S31406 of
At operation 1610, the REST nexus API of the nexus recommendation engine 1606 is called to get the digital rules pertaining to thresholds for establishment of local nexuses in various applicable domains that are associated with the document retrieved.
At operation 1612 nexus recommendations are prepared based on application of the digital rules to the data of the retrieved document to determine whether the applicable thresholds have been met to establish one or more nexuses in various applicable domains that are associated with the retrieved document. At operation Q4, the nexus recommendation engine 1606 stores the recommendations in a portion of storage S31406 that is for storage of recommendations.
The client application, such as that of the ERP platform 120 and/or connector 122 of
If user credentials are to be used to validate the request, then at operation 1710 the recommendation API service validates the request via REST API authentication. If the REST API authentication fails, then the recommendation API service determines the user is invalid and an error message is returned at operation 1714. If the REST API authentication succeeds, then the recommendation API service reads the request parameters at operation 1716.
If a security token is to be used to validate the request, then at operation 1712 the recommendation API service validates the request via authentication through an artificial intelligence (AI) engine (e.g., using an AI model based on user access patterns). If the validation through AI fails, then the recommendation API service determines the user is invalid and an error message is returned at operation 1716. If the authentication through AI succeeds, then the recommendation API service reads the request parameters at operation 1716. In various embodiments, the user credentials and/or token provided with the request may be authenticated through the REST API and/or AI methodologies.
At operation 1522 the recommendation API service determines the type of request (e.g., based on the request parameters). At 1720, the recommendation API service pulls the data (e.g., from data to storage S31406 of
Software and System Architectures
The software architecture 1806 may execute on hardware such as machine 1900 of
The representative hardware layer 1852 includes a processing unit 1854 having associated executable instructions 1804. Executable instructions 1804 represent the executable instructions of the software architecture 1806, including implementation of the methods, components and so forth described herein. The hardware layer 1852 also includes memory and/or storage modules memory/storage 1856, which also have executable instructions 1804. The hardware layer 1852 may also comprise other hardware 1858.
As used herein, a “component” may refer to a device, physical entity or logic having boundaries defined by function or subroutine calls, branch points, application program interfaces (APIs), or other technologies that provide for the partitioning or modularization of particular processing or control functions. Components may be combined via their interfaces with other components to carry out a machine process. A component may be a packaged functional hardware unit designed for use with other components and a part of a program that usually performs a particular function of related functions. Components may constitute either software components (e.g., code embodied on a machine-readable medium) or hardware components. A “hardware component” is a tangible unit capable of performing certain operations and may be configured or arranged in a certain physical manner. In various exemplary embodiments, one or more computer systems (e.g., a standalone computer system, a client computer system, or a server computer system) or one or more hardware components of a computer system (e.g., a processor or a group of processors) may be configured by software (e.g., an application or application portion) as a hardware component that operates to perform certain operations as described herein.
A hardware component may also be implemented mechanically, electronically, or any suitable combination thereof. For example, a hardware component may include dedicated circuitry or logic that is permanently configured to perform certain operations. A hardware component may be a special-purpose processor, such as a Field-Programmable Gate Array (FPGA) or an Application Specific Integrated Circuit (ASIC). A hardware component may also include programmable logic or circuitry that is temporarily configured by software to perform certain operations. For example, a hardware component may include software executed by a general-purpose processor or other programmable processor. Once configured by such software, hardware components become specific machines (or specific components of a machine) uniquely tailored to perform the configured functions and are no longer general-purpose processors. It will be appreciated that the decision to implement a hardware component mechanically, in dedicated and permanently configured circuitry, or in temporarily configured circuitry (e.g., configured by software) may be driven by cost and time considerations. Accordingly, the phrase “hardware component” (or “hardware-implemented component”) should be understood to encompass a tangible entity, be that an entity that is physically constructed, permanently configured (e.g., hardwired), or temporarily configured (e.g., programmed) to operate in a certain manner or to perform certain operations described herein. Considering embodiments in which hardware components are temporarily configured (e.g., programmed), each of the hardware components need not be configured or instantiated at any one instance in time. For example, where a hardware component comprises a general-purpose processor configured by software to become a special-purpose processor, the general-purpose processor may be configured as respectively different special-purpose processors (e.g., comprising different hardware components) at different times. Software accordingly configures a particular processor or processors, for example, to constitute a particular hardware component at one instance of time and to constitute a different hardware component at a different instance of time. Hardware components can provide information to, and receive information from, other hardware components. Accordingly, the described hardware components may be regarded as being communicatively coupled.
Where multiple hardware components exist contemporaneously, communications may be achieved through signal transmission (e.g., over appropriate circuits and buses) between or among two or more of the hardware components. In embodiments in which multiple hardware components are configured or instantiated at different times, communications between such hardware components may be achieved, for example, through the storage and retrieval of information in memory structures to which the multiple hardware components have access. For example, one hardware component may perform an operation and store the output of that operation in a memory device to which it is communicatively coupled. A further hardware component may then, at a later time, access the memory device to retrieve and process the stored output. Hardware components may also initiate communications with input or output devices, and can operate on a resource (e.g., a collection of information). The various operations of exemplary methods described herein may be performed, at least partially, by one or more processors that are temporarily configured (e.g., by software) or permanently configured to perform the relevant operations. Whether temporarily or permanently configured, such processors may constitute processor-implemented components that operate to perform one or more operations or functions described herein. As used herein, “processor-implemented component” refers to a hardware component implemented using one or more processors. Similarly, the methods described herein may be at least partially processor-implemented, with a particular processor or processors being an example of hardware. For example, at least some of the operations of a method may be performed by one or more processors or processor-implemented components. Moreover, the one or more processors may also operate to support performance of the relevant operations in a “cloud computing” environment or as a “software as a service” (SaaS). For example, at least some of the operations may be performed by a group of computers (as examples of machines including processors), with these operations being accessible via a network (e.g., the Internet) and via one or more appropriate interfaces (e.g., an Application Program Interface (API)). The performance of certain of the operations may be distributed among the processors, not only residing within a single machine, but deployed across a number of machines. In some exemplary embodiments, the processors or processor-implemented components may be located in a single geographic location (e.g., within a home environment, an office environment, or a server farm). In other exemplary embodiments, the processors or processor-implemented components may be distributed across a number of geographic locations.
In the exemplary architecture of
The operating system 1802 may manage hardware resources and provide common services. The operating system 1802 may include, for example, a kernel 1822, services 1824 and drivers 1826. The kernel 1822 may act as an abstraction layer between the hardware and the other software layers. For example, the kernel 1822 may be responsible for memory management, processor management (e.g., scheduling), component management, networking, security settings, and so on. The services 1824 may provide other common services for the other software layers. The drivers 1826 are responsible for controlling or interfacing with the underlying hardware. For instance, the drivers 1826 include display drivers, camera drivers, Bluetooth® drivers, flash memory drivers, serial communication drivers (e.g., Universal Serial Bus (USB) drivers), Wi-Fi® drivers, audio drivers, power management drivers, and so forth depending on the hardware configuration.
The libraries 1820 provide a common infrastructure that is used by the applications 1816 and/or other components and/or layers. The libraries 1820 provide functionality that allows other software components to perform tasks in an easier fashion than to interface directly with the underlying operating system 1802 functionality (e.g., kernel 1822, services 1824 and/or drivers 1826). The libraries 1820 may include system libraries 1844 (e.g., C standard library) that may provide functions such as memory allocation functions, string manipulation functions, mathematical functions, and the like. In addition, the libraries 1820 may include API libraries 1846 such as media libraries (e.g., libraries to support presentation and manipulation of various media format such as MPEG4, H.264, MP3, AAC, AMR, JPG, PNG), graphics libraries (e.g., an OpenGL framework that may be used to render 2D and 3D in a graphic content on a display), database libraries (e.g., SQLite that may provide various relational database functions), web libraries (e.g., WebKit that may provide web browsing functionality), and the like. The libraries 1820 may also include a wide variety of other libraries 1848 to provide many other APIs to the applications 1816 and other software components/modules.
The frameworks/middleware 1818 (also sometimes referred to as middleware) provide a higher-level common infrastructure that may be used by the applications 1816 and/or other software components/modules. For example, the frameworks/middleware 1818 may provide various graphic user interface (GUI) functions, high-level resource management, high-level location services, and so forth. The frameworks/middleware 1818 may provide a broad spectrum of other APIs that may be utilized by the applications 1816 and/or other software components/modules, some of which may be specific to a particular operating system 1802 or platform.
The applications 1816 include built-in applications 1838 and/or third-party applications 1840. Examples of representative built-in applications 1838 may include, but are not limited to, a contacts application, a browser application, a book reader application, a location application, a media application, a messaging application, and/or a game application. Third-party applications 1840 may include an application developed using the ANDROID™ or (OS™ software development kit (SDK) by an entity other than the vendor of the particular platform, and may be mobile software running on a mobile operating system such as IOS™, ANDROID™, WINDOWS® Phone, or other mobile operating systems. The third-party applications 1840 may invoke the API calls 1808 provided by the mobile operating system (such as operating system 1802) to facilitate functionality described herein.
The applications 1816 may use built in operating system functions (e.g., kernel 1822, services 1824 and/or drivers 1826), libraries 1820, and frameworks/middleware 1818 to create user interfaces to interact with users of the system. Alternatively, or additionally, in some systems interactions with a user may occur through a presentation layer, such as presentation layer 1814. In these systems, the application/component “logic” can be separated from the aspects of the application/component that interact with a user.
In some embodiments, the machine 1900 operates as a standalone device or may be coupled (e.g., networked) to other machines. In a networked deployment, the machine 1900 may operate in the capacity of a server machine or a client machine in a server-client network environment, or as a peer machine in a peer-to-peer (or distributed) network environment. The machine 1900 may be or include, but is not limited to, a server computer, a client computer, a personal computer (PC), a tablet computer, a laptop computer, a netbook, a set-top box (STB), a personal digital assistant (PDA), an entertainment media system, a cellular telephone, a smart phone, a mobile device, a wearable device (e.g., a smart watch), a smart home device (e.g., a smart appliance), other smart devices, a web appliance, a network router, a network switch, a network bridge, or any machine capable of executing the instructions 1910, sequentially or otherwise, that specify actions to be taken by machine 1900. Further, while only a single machine 1900 is illustrated, the term “machine” or “computer system” shall also be taken to include a collection of machines or computer systems that individually or jointly execute the instructions 1910 to perform any of the methodologies discussed herein.
The machine 1900 may include processors 1904 (e.g., processors 1908 and 1912), memory memory/storage 1906, and I/O components 1918, which may be configured to communicate with each other, such as via bus 1902. The memory/storage 1906 may include a memory 1914, such as a main memory, or other memory storage, and a storage unit 1916, both accessible to the processors 1904 such as via the bus 1902. In this context, a “processor” may refer to any circuit or virtual circuit (a physical circuit emulated by logic executing on an actual processor) that manipulates data values according to control signals (e.g., “commands”, “op codes”, “machine code”, etc.) and which produces corresponding output signals that are applied to operate a machine. A processor may, for example, be a Central Processing Unit (CPU), a Reduced Instruction Set Computing (RISC) processor, a Complex Instruction Set Computing (CISC) processor, a Graphics Processing Unit (GPU), a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Radio-Frequency Integrated Circuit (RFIC) or any combination thereof. A processor may further be a multi-core processor having two or more independent processors (sometimes referred to as “cores”) that may execute instructions contemporaneously.
The storage unit 1916 and memory 1914 store the instructions 1910 embodying any one or more of the methodologies or functions described herein. The instructions 1910 may also reside, completely or partially, within the memory 1914, within the storage unit 1916, within at least one of the processors 1904 (e.g., within the processor's cache memory), or any suitable combination thereof, during execution thereof by the machine 1900. Accordingly, the memory 1914, the storage unit 1916, and the memory of processors 1904 are examples of machine-readable media.
In this context, “machine-readable medium” refers to a component, device or other tangible media able to store instructions and data temporarily or permanently and may include, but is not be limited to, random-access memory (RAM), read-only memory (ROM), buffer memory, flash memory, optical media, magnetic media, cache memory, other types of storage (e.g., Erasable Programmable Read-Only Memory (EEPROM)) and/or any suitable combination thereof. The term “machine-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, or associated caches and servers) able to store instructions. The term “machine-readable medium” shall also be taken to include any medium, or combination of multiple media, that is capable of storing instructions (e.g., code) for execution by a machine, such that the instructions, when executed by one or more processors of the machine, cause the machine to perform any one or more of the methodologies described herein. Accordingly, a “machine-readable medium” refers to a single storage apparatus or device, as well as “cloud-based” storage systems or storage networks that include multiple storage apparatus or devices. The term “machine-readable medium” excludes signals per se.
The I/O components 1918 may include a wide variety of components to receive input, provide output, produce output, transmit information, exchange information, capture measurements, and so on. The specific I/O components 1918 that are included in a particular machine 1900 will depend on the type of machine. For example, portable machines such as mobile phones will likely include a touch input device or other such input mechanisms, while a headless server machine will likely not include such a touch input device. It will be appreciated that the I/O components 1918 may include many other components that are not shown in
In further exemplary embodiments, the I/O components 1918 may include biometric components 1930, motion components 1934, environmental environment components 1936, or position components 1938 among a wide array of other components. For example, the biometric components 1930 may include components to detect expressions (e.g., hand expressions, facial expressions, vocal expressions, body gestures, or eye tracking), measure biosignals (e.g., blood pressure, heart rate, body temperature, perspiration, or brain waves), identify a person (e.g., voice identification, retinal identification, facial identification, fingerprint identification, or electroencephalogram based identification), and the like. The motion components 1934 may include acceleration sensor components (e.g., accelerometer), gravitation sensor components, rotation sensor components (e.g., gyroscope), and so forth. The environment components 1936 may include, for example, illumination sensor components (e.g., photometer), temperature sensor components (e.g., one or more thermometer that detect ambient temperature), humidity sensor components, pressure sensor components (e.g., barometer), acoustic sensor components (e.g., one or more microphones that detect background noise), proximity sensor components (e.g., infrared sensors that detect nearby objects), gas sensors (e.g., gas detection sensors to detection concentrations of hazardous gases for safety or to measure pollutants in the atmosphere), or other components that may provide indications, measurements, or signals corresponding to a surrounding physical environment. The position components 1938 may include location sensor components (e.g., a Global Position system (GPS) receiver component), altitude sensor components (e.g., altimeters or barometers that detect air pressure from which altitude may be derived), orientation sensor components (e.g., magnetometers), and the like.
Communication may be implemented using a wide variety of technologies. The I/O components 1918 may include communication components 1940 operable to couple the machine 1900 to a network 1932 or devices 1920 via coupling 1922 and coupling 1924 respectively. For example, the communication components 1940 may include a network interface component or other suitable device to interface with the network 1932. In further examples, communication components 1940 may include wired communication components, wireless communication components, cellular communication components, Near Field Communication (NFC) components, Bluetooth® components (e.g., Bluetooth® Low Energy), Wi-Fi® components, and other communication components to provide communication via other modalities. The devices 1920 may be another machine or any of a wide variety of peripheral devices (e.g., a peripheral device coupled via a Universal Serial Bus (USB)).
Moreover, the communication components 1940 may detect identifiers or include components operable to detect identifiers. For example, the communication components 1940 may include Radio Frequency Identification (RFID) tag reader components, NFC smart tag detection components, optical reader components (e.g., an optical sensor to detect one-dimensional bar codes such as Universal Product Code (UPC) bar code, multi-dimensional bar codes such as Quick Response (QR) code, Aztec code, Data Matrix, Dataglyph, MaxiCode, PDF417, Ultra Code, UCC RSS-2D bar code, and other optical codes), or acoustic detection components (e.g., microphones to identify tagged audio signals). In addition, a variety of information may be derived via the communication components 1940, such as, location via Internet Protocol (IP) geolocation, location via Wi-Fi® signal triangulation, location via detecting a NFC beacon signal that may indicate a particular location, and so forth.
In the methods described above, each operation can be performed as an affirmative act or operation of doing, or causing to happen, what is written that can take place. Such doing or causing to happen can be by the whole system or device, or just one or more components of it. It will be recognized that the methods and the operations may be implemented in a number of ways, including using systems, devices and implementations described above. In addition, the order of operations is not constrained to what is shown, and different orders may be possible according to different embodiments. Examples of such alternate orderings may include overlapping, interleaved, interrupted, reordered, incremental, preparatory, supplemental, simultaneous, reverse, or other variant orderings, unless context dictates otherwise. Moreover, in certain embodiments, new operations may be added, or individual operations may be modified or deleted. The added operations can be, for example, from what is mentioned while primarily describing a different system, apparatus, device or method.
A person skilled in the art will be able to practice the present invention in view of this description, which is to be taken as a whole. Details have been included to provide a thorough understanding. In other instances, well-known aspects have not been described, in order to not obscure unnecessarily this description.
Some technologies or techniques described in this document may be known. Even then, however, it does not necessarily follow that it is known to apply such technologies or techniques as described in this document, or for the purposes described in this document.
This description includes one or more examples, but this fact does not limit how the invention may be practiced. Indeed, examples, instances, versions or embodiments of the invention may be practiced according to what is described, or yet differently, and also in conjunction with other present or future technologies. Other such embodiments include combinations and sub-combinations of features described herein, including for example, embodiments that are equivalent to the following: providing or applying a feature in a different order than in a described embodiment; extracting an individual feature from one embodiment and inserting such feature into another embodiment; removing one or more features from an embodiment; or both removing a feature from an embodiment and adding a feature extracted from another embodiment, while providing the features incorporated in such combinations and sub-combinations.
A number of embodiments are possible, each including various combinations of elements. When one or more of the appended drawings—which are part of this specification—are taken together, they may present some embodiments with their elements in a manner so compact that these embodiments can be surveyed quickly. This is true even if these elements are described individually extensively in this text, and these elements are only optional in other embodiments.
In general, the present disclosure reflects preferred embodiments of the invention. The attentive reader will note, however, that some aspects of the disclosed embodiments extend beyond the scope of the claims. To the respect that the disclosed embodiments indeed extend beyond the scope of the claims, the disclosed embodiments are to be considered supplementary background information and do not constitute definitions of the claimed invention.
In this document, the phrases “constructed to”, “adapted to” and/or “configured to” denote one or more actual states of construction, adaptation and/or configuration that is fundamentally tied to physical characteristics of the element or feature preceding these phrases and, as such, reach well beyond merely describing an intended use. Any such elements or features can be implemented in a number of ways, as will be apparent to a person skilled in the art after reviewing the present disclosure, beyond any examples shown in this document.
Parent patent applications: Any and all parent, grandparent, great-grandparent, etc. patent applications, whether mentioned in this document or in an Application Data Sheet (“ADS”) of this patent application, are hereby incorporated by reference herein as originally disclosed, including any priority claims made in those applications and any material incorporated by reference, to the extent such subject matter is not inconsistent herewith.
Reference numerals: In this description a single reference numeral may be used consistently to denote a single item, aspect, component, or process. Moreover, a further effort may have been made in the preparation of this description to use similar though not identical reference numerals to denote other versions or embodiments of an item, aspect, component or process that are identical or at least similar or related. Where made, such a further effort was not required, but was nevertheless made gratuitously so as to accelerate comprehension by the reader. Even where made in this document, such a further effort might not have been made completely consistently for all of the versions or embodiments that are made possible by this description. Accordingly, the description controls in defining an item, aspect, component or process, rather than its reference numeral. Any similarity in reference numerals may be used to infer a similarity in the text, but not to confuse aspects where the text or other context indicates otherwise.
The claims of this document define certain combinations and sub-combinations of elements, features and acts or operations, which are regarded as novel and non-obvious. The claims also include elements, features and acts or operations that are equivalent to what is explicitly mentioned. Additional claims for other such combinations and sub-combinations may be presented in this or a related document. These claims are intended to encompass within their scope all changes and modifications that are within the true spirit and scope of the subject matter described herein. The terms used herein, including in the claims, are generally intended as “open” terms. For example, the term “including” should be interpreted as “including but not limited to,” the term “having” should be interpreted as “having at least,” etc. If a specific number is ascribed to a claim recitation, this number is a minimum but not a maximum unless stated otherwise. For example, where a claim recites “a” component or “an” item, it means that the claim can have one or more of this component or this item.
In construing the claims of this document, 35 U.S.C. § 112(f) is invoked by the inventor(s) only when the words “means for” or “steps for” are expressly used in the claims. Accordingly, if these words are not used in a claim, then that claim is not intended to be construed by the inventor(s) in accordance with 35 U.S.C. § 112(f).