Systems and methods for data verification

Information

  • Patent Grant
  • 10437895
  • Patent Number
    10,437,895
  • Date Filed
    Monday, May 16, 2016
    9 years ago
  • Date Issued
    Tuesday, October 8, 2019
    6 years ago
Abstract
Embodiments are directed to data verification of business or consumer data. Certain embodiments include a data verification system that receives or selects data to be verified, selects one or more verification methods to verify, update, and/or append/enhance the data. The data verification system may verify the data with one or more data verification methods, either alone or in combination. The methods may include a web-crawling verification method, an agent web verification method, a call verification method, a direct mail method, an email method, an in-person verification method, or other methods. The system has the ability to, automatically or manually, (1) blend automatic and manual segmentation of records or elements by criteria such as industry type, best times of day/month/year to verify, update, or append, cost, and level of importance (2) select the best verification processing method(s), and (3) manage the results and properly verify, update, append/enhance records.
Description
BACKGROUND

Field


The present disclosure relates to the field of data verification, more particularly to improved methods and systems for verifying and/or updating data.


Description of the Related Art


Companies increasingly rely on internal and external data relating to their existing or potential customers in order to make critical business strategy decisions. Therefore, a business need exists for systems and methods for verifying the integrity and quality of such data.


SUMMARY OF THE DISCLOSURE

Embodiments are directed to data verification of business or consumer data. One embodiment is a data verification system that receives or selects data to be verified, selects one or more verification methods to be applied to the data, and verifies, updates, and/or appends/enhances the data.


In certain embodiments, the data verification system and/or method is configured to verify one or more types of data. The data may include, for example, business data, non-profit data, government data, credit data, financial data, securities data, consumer data, individual data, pet data, web-posting data, shopping data, email data and the like. In certain embodiments, the data verification system is configured to verify the data in one or more languages or formats or codes or the like.


In certain embodiments, the data verification system is configured to verify data with one or more data verification methods, either alone or in combination. The methods may include a web-crawling verification method, an agent web verification method, a call verification method, a direct-mail method, an email method, an in-person method, and/or other methods. The system may utilize a lower cost method to first verify a larger amount of data records and a higher cost method to verify a smaller amount of data records. The system may segment data into multiple segments/elements and apply a different data verification method to each segment/element.


Certain embodiments of the system comprise an artificial intelligence module that checks the accuracy and costs of the data verification methods as well as other business logic (for example, best time of day/month/year to verify) and dynamically adjusts the usage of the verification methods to meet certain pre-defined business objectives (for example, to achieve the highest accuracy at the lowest cost).


One embodiment is an automated system for verifying data comprising a data selection module configured to select at least a portion of data to be verified, and an artificial intelligence module configured to select one or more data verification methods, based on prior results of the use of the one or more data verification methods, from web-crawling, tele-verification, agent web verification, direct-mail verification, email verification, and in-person verification to apply to the selected portion of the data, wherein the data is verified, updated, or appended as a result the application of the one or more selected data verification methods to the selected portion of the data. In another embodiment, the system may further comprise cost data stored on the system indicating the cost of the data verification methods, and the artificial intelligence module is further configured to select two data verification methods using the cost data for the two data verification methods, wherein the selected data verification method with the lower cost is applied to the selected portion of the data, and the selected data verification method with the higher cost is applied to a subset of the selected portion of the data.


Another embodiment is an automated system for verifying data comprising a data segmentation module configured to segment data to be verified into a plurality of data portions, wherein each data portion comprises a characteristic and an artificial intelligence module configured to select a data verification method to apply to each of the plurality of data portions based on the characteristic of the data portion, wherein data is verified, updated, or appended as a result of the application of the selected data verification method.


Yet another embodiment is an automated method of data verification, comprising: selecting a portion of data to be verified; and selecting one or more data verification methods from web-crawling, tele-verification, agent web verification, direct-mail verification, email verification, and in-person verification to apply to the selected portion of the data, based on prior results of the use of the data verification methods, wherein the data is verified, updated, or appended as a result the application of the one or more data verification methods to the selected portion of the data. In another embodiment, the method may further comprise: storing cost data indicating the cost of data verification methods; and the selecting one or more data verification methods comprises selecting two data verification methods using the cost data for the two data verification methods, wherein the selected data verification method with the lower cost is applied to the selected portion of the data, and the selected data verification method with the higher cost is applied to a subset of the selected portion of the data.


Another embodiment is an automated method for verifying data comprising: segmenting data to be verified into a plurality of data portions, wherein each data portion comprises a characteristic; and selecting a data verification method to apply to each of the plurality of data portions based on the characteristic of the data portion, wherein data is verified, updated, or appended as a result of the application of the selected data verification method.


Another embodiment is a computer program product comprising a computer usable medium having control logic stored therein for causing a computer to verify data, the control logic comprising: a first computer readable program code means for causing the computer to select a portion of data to be verified; and a second computer readable program code means for causing the computer to select one or more data verification methods, based on prior results of the use of the one or more data verification methods, from web-crawling, tele-verification, agent web verification, direct-mail verification, email verification, and in-person verification to apply to the selected portion of the data, wherein the data is verified, updated or appended as a result the application of the one or more selected data verification methods to the selected portion of the data.


Finally, one embodiment is a computer program product comprising a computer usable medium having control logic stored therein for causing a computer to verify data, the control logic comprising: a first computer readable program code means for causing the computer to segment data to be verified into a plurality of data portions, wherein each data portion comprises a characteristic; and a second computer readable program code means for causing the computer to select a data verification method to apply to each of the plurality of data portion based on the characteristic of the data portion, wherein data is verified, updated or appended as a result of the application of the selected data verification method.





BRIEF DESCRIPTION OF THE DRAWINGS

Specific embodiments of the invention will now be described with reference to the following drawings, which are intended to illustrate embodiments of the invention, but not limit the invention:



FIG. 1 illustrates a method of data verification according to one embodiment;



FIG. 2 is a Venn diagram that shows how data verification methods are used in accordance to one embodiment;



FIG. 3 illustrates an example configuration of a data verification system and its components according to one embodiment;



FIG. 4 is a flow diagram of an example web-crawling data verification method according to one embodiment;



FIG. 5 is a flow diagram of an example tele-verification method according to one embodiment;



FIG. 6 is a flow diagram showing how data verification methods are selectively applied by segments/elements according to one embodiment;



FIG. 7 is a flow diagram showing how data verification methods are selectively applied according to one embodiment; and



FIG. 8 is a flow diagram showing an example method of ranking data verification methods according to one embodiment.





DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

To make critical business strategy decisions, companies often rely on internal and external data relating to their existing or potential customers. For example, some companies may conduct target marketing campaigns directed at prospective customers exhibiting characteristics of a certain market demographic, such as households with children located in the Midwest. Accordingly, these companies may obtain a listing of such households from a third party data provider. To ensure that these companies are effectively targeting the desired market segment, it is best for the consumer data to be accurate and updated. Therefore, systems and methods are needed to check and update such consumer data or business data.


The same is true for any sort of business data whether generated internally by a company or obtained from a third party data provider. For example, a company may want to market loan products to small businesses in the restaurant supply industry. However, in many instances companies simply have too much data or not enough resources to check and update the consumer or business data. Furthermore, companies often need some or all of the data on a real-time basis, thereby preferring that such data be verified and updated continuously or periodically. For purposes of summarizing the embodiments of the invention certain aspects, advantages and novel features of the systems and methods for verifying the integrity and quality of data will be described herein. Of course, it is to be understood that not necessarily all such aspects, advantages or features will be embodied in any particular embodiment of the invention.


Data Verification Overview



FIG. 1 shows a method of data verification in accordance to one embodiment. At block 110, the data verification system receives or selects data to be verified. The system may receive data from an external source, or may select data from a database connected to the system. At block 120, the system selects one or more verification methods to be applied to the data. At block 130, the system applies the selected one or more verification methods to verify the data. At block 140, as a result of the data verification process, data may be verified, updated, and/or appended/enhanced.


In certain embodiments, a data record comprises a plurality of data elements. For example, a data record for a company may comprise data elements such as company name, company size, executive listings, address, and so forth. When a data record is verified, the original content of the record is saved. The record may also be saved along with a time identifier to indicate the time of the verification. When a data record is updated, part of the data record (for example, one or more elements) is altered. For example, the phone number of a company data record may be updated while the address remains unchanged. Finally, when a data record is appended or enhanced, additional information is newly added to the data record. For example, during the verification process it may be discovered that a company has 50 employees. The number of employees will thus be added as a new data element to the record for the company. Another example of appending or enhancing may involve discovering a relationship between two or more data records (for example, company A is a subsidiary of company B or individual A is married to individual B) and adding a relationship link between/among the records.


In certain embodiments, the data verification system and/or method is configured to verify one or more types of data. The data may include, for example, business data, non-profit data, government data, credit data, financial data, securities data, consumer data, individual data, pet data, web-posting data, shopping data, email data and the like. In certain embodiments, the data verification system is configured to verify the data in one or more languages or formats or codes or the like. In certain embodiments, the data verification system is configured to translate or standardize the data into one language, for example English, or into a standard format or code or the like before comparing the data to existing data or before storing the data in a database. Data may be segmented by industries, by types, by data having common elements suitable to be verified by a similar method, and/or by other criteria.



FIG. 2 is a Venn diagram that shows how data verification methods are used in accordance to one embodiment. A plurality of new data records 240 may be received into the data verification system. The system selects a portion of data records 250 and applies a specific data verification method to the selected portion. In certain embodiments, the system chooses from a web-crawling verification method 210, an agent web verification method 220, and a call verification/tele-verification method 230. In other embodiments, other verification methods such as direct postal mail, email, or in-person verification may be used as well. As shown in the Venn diagram, some data records (represented by dots) may be verified by multiple methods while some data records may be verified by one method. In other embodiments, some methods will be applied to certain data elements/segments. For example, web-crawling may be applied to verify/update/append the phone number and address elements while call/tele-verification may be applied to verify/update/append other elements such as company names and owner's names.



FIG. 3 shows a data verification system in accordance to one embodiment. A data verification module 300 is a computer executable program executed on a computer server 316. The computer server 316 is in communication with one or more databases 318 that house data.


In certain embodiments, the data verification module 300 includes a data selection module 302, a verification method selection/artificial intelligence module 304, and one or more data verification method modules. The data verification module 300 may additionally include a quality control module 312 and/or a data segmentation module 314. The quality control module 312 performs quality control and/or rank the accuracy of data verification methods in some embodiments. In certain embodiments, the data segmentation module 314 segments data by data elements or segments according to certain characteristics by which data verification method may be selected. The data verification module 300 may include a cost data module 342 to monitor and/or store cost data associated with various data verification methods. Other embodiments combine or separate into fewer or more modules.


The data selection module 302 selects a plurality of data records from the one or more database(s) 318 for the verification. In certain embodiments, the verification method selection/artificial intelligence module 304 selects one or more data verification modules to execute (within the dotted box in FIG. 3). The selection may be based in part on a set of business rules, some of which may maximize cost, efficiency, and accuracy of the various verification methods, or may be based in part on the artificial intelligence module 304 monitoring and learning the performance of various verification methods and adjusting the selection accordingly.


In the sample embodiment shown in FIG. 3, the data verification method modules include a tele-verification module 306, a web-crawling module 308, an agent web verification module 310, and an other verification methods module 344, which may include methods such as direct mail, in-person verification, and so forth. In certain embodiments, the tele-verification module 306 contacts entities associated with the selected data records through communication channels 324. The entities may be individuals 332, households 334, or businesses 336. The term “entity” as used herein can comprise without limitation individuals, households, businesses, non-profit organizations, governments, or the like. Communications channels 324 may include telephone, cellphone, text messaging, email, or the like. The web-crawling module 308 may communicate through a network 320 (for example, Internet, local area network (LAN), wide area network (WAN), wireless network) to access information located on data sources 338, which may be maintained by entities associated with the data records to be verified. The web-crawling module 308 may also access data located on other third-party data sources 340 such as commercial data sources or governmental data sources. Finally, the agent web verification module 310 may similarly access information maintained on data sources 338, data sources 340 and/or other available sources. These verification method modules verify, update, and/or amend/enhance the selected data records. Each of these data verification methods is further described below.


Web-Crawling


In certain embodiments, the data verification system and/or method selects at least a portion of the data to be verified, and causes the selected data to be verified by the web-crawling-type methodology or web-crawling module 308. In certain embodiments, the terms “web-crawler” or “web-crawling” as used herein include without limitation, for example, web spider, web robot, watching, scraping, harvesting, content monitoring, extraction or other like technologies. In certain embodiments, the web-crawling module 308 comprises a computer program system that selects certain data and compares the data with similar data obtained from searching sources, such as via the internet.


By way of example and with reference to FIG. 3, web-crawling module 308 may access data sources 338 and/or 340. For example, the web-crawling module 308 may extract information from a personal page maintained by an individual 332 on a social network site 340. Alternatively, the web-crawling module 308 may extract information from a web site on the company server 338 maintained by a business 336. In addition, the web crawling module 308 may search several internet data sources 340, including but not limited to company websites, directories, search engines, chamber of commerce websites, yellow page directories, white page directories, government data, directory data, chamber of commerce data, franchise data, business financial data, business owner data, securities reports or filing data, news article data, press release data, online databases, and the like. The web crawling module 308 may utilize data findings for corroboration of other data sources as well. For example, certain data elements or data records for certain industry segments may require three sources of corroboration before a verify, an update, and/or an append is executed. The web-crawling results for may thus be one source of that corroboration. In one embodiment, the administrator of the data verification system may set a system-wide or segment-specific policy to decide how many additional sources of corroboration are required before the web-crawling results are used to verify, update, and/or append.


In certain embodiments, web-crawling is performed worldwide on data sources located anywhere in the world. In certain embodiments, the data verification system compares and updates the data based on the data found from the web-crawling. In certain embodiments, the various internet data sources have a pre-determined trustworthiness ranking. In certain embodiments, the web-crawling method or program uses such trustworthiness ranking to determine whether to update consumer data based on the data from a particular internet data source.


In certain embodiments, the data verification system completes the web-crawler comparing and updating automatically. In certain embodiments, automatic updating is completed where there is no discrepancy between the data and the data obtained from one or more of the several internet data sources. In certain embodiments, automatic updating is completed when the internet data source has a high trustworthiness ranking. In certain embodiments, the data verification system presents to an operator the original data, and the data found from the web-crawling. In certain embodiments, an operator of the data verification system compares the original data with the data found from web-crawling and based on such a comparison, the operator directs the data verification system to update the data with or ignore the data found from the web-crawling. In certain embodiments, the operator manually updates the data.


In certain embodiments, web-crawling comprises the use of watching technology that monitors, for example, a certain website for updates to the website such that the data is only updated when website updates are detected. In certain embodiments, the data verification system updates the data when the system receives a notification from the watching technology. In certain embodiments, updates to the website includes without limitation, for example, changes in text, images or other information provided on the website; or increases/decreases in: traffic to the website, number of unique visitors to the website, purchases transacted on the website, average user duration on the website or any other website metrics or analytics; or changes in related business or industry trends, financial market valuations or any other business intelligence indicator. In certain embodiments, the website metrics or analytics is provided by third party providers including without limitation, for example, Google Inc, onestat.com, or the like.


In certain embodiments, the web-crawler automatically determines whether to update the data based on a date and time comparison, wherein, for example, the web-crawler updates the existing data with the new data found on the internet if the internet data comprises a more recent creation date and/or time. In certain embodiments, the web-crawler determines the creation date and time of the newly found internet data by analyzing the date stamp information stored on the webpage or in the code of the webpage. In certain embodiments, the web-crawler or other system is configured to update the existing data with newly found data, and store in a database the corresponding stamp date and/or time information related to the newly found data. In certain embodiments, the stored stamp date and/or time data is compared with newly discovered internet data to determine whether such internet data was more recently created. In addition, to websites, the web-crawler may monitor a variety of systems, data sets, and applications, including a network of computers, application data, database data, and so forth. In certain embodiment embodiments, some or all of the web-crawling may be performed by a third party, such as, for example 365 Media, Velocityscape, and the like. Other embodiments of the foregoing will be apparent to those of ordinary skill in the art from the disclosure herein.


Agent Web Verification


In certain embodiments, the data verification system and/or method selects at least a portion of the data to be verified, and causes the selected data to be verified by the agent web verification module 310. FIG. 4 shows one embodiment of the agent web verification method. At block 410, at least one agent, preferably multiple agents, review the selected data. At block 420, the agent(s) locate the data or similar data available on the internet. At block 430, the agent(s) compare the selected data to the data found on the internet in order to verify the quality of the selected data (for example, completeness, accuracy, and so forth). At block 440, the agent(s) determine whether to verify, update, and/or append the selected data based on the data found on the internet. If so, at block 450, the agent(s) update the selected data. Otherwise, at block 460, the agents ignore the located data.


In certain embodiments, agents are located at a central location wherein they have access to the data verification system via one or more network connections, such as, for example, a local area network (LAN) connection or the like. In certain embodiments, agents are located at distributed or multiple locations wherein the agents have access to the data verification system via one or more network connections, such as, for example, a wide area network (WAN) connection or the like.


Call/Tele-verification


In certain embodiments, the data verification system and/or method selects at least a portion of the data to be verified, and causes the selected data to be verified by a call verification methodology. FIG. 5 shows one embodiment of the call verification method, which may be performed by the tele-verification module 306. At block 510, at least one caller, preferably multiple callers, review the selected data. The caller may be a human or may be an automated calling program executed on a computer or an electronic device. At block 520, the caller(s) contact the business(es), the individual(s), the household(s) or other entities associated with the data in order to verify, update, append/enhance the data. At block 530, the caller(s) may verify, update, append/enhance the data based on the results obtained at block 520.


In certain embodiments, the callers use predefined scripts and/or customized scripts in making their calls. Customized scripts may be used for special industry segments. The scripts are configured to increase the number of data points that can be verified and/or to maintain a favorable call experience for the recipient of the call. In certain embodiments, the callers may be monitored by monitoring agents who can provide feedback to the callers to improve future call experiences.


By way of example and with reference to FIG. 3, the tele-verification module 306 or callers may contact individuals 332, households 334, and businesses 336 by various communication channels 324, including telephoning, emailing, mailing, internet calling, text-messaging, instant messaging, video messaging, voice-mailing, faxing or the like.


In certain embodiments, the callers determine whether to update the data with the information received from the contacting or ignore the information received from the contacting. The callers may be located at a central location wherein they have access to the data verification system via a network or the like, or they may be located at multiple locations, for example, a satellite office or the caller's home, wherein the caller has access to the data verification system via a network or the like. In certain embodiments, callers may be located at one or more countries across the globe.


In certain embodiments, the data verification system allows the callers to perform the contacting through the network and over the internet through voice over internet protocol (VOIP) technology. In certain embodiments, the callers are situated or designed to work with a team wherein the team makes calls to verify one or more selected types of data and/or to verify data from one or more selected data types. The teams are segmented to better utilize the callers, and may, for example, be segmented based on strengths and/or weaknesses of the data and/or the callers. For example, certain agents are trained to verify, update, and/or append certain data elements or data records for certain industry segments.


In certain embodiments, some or all of the call verification maybe performed by a third party provider such as, for example, ePerformax, eTelecare, Direct Mail, and the like. Other embodiments of any of the foregoing will be apparent to those of ordinary skill in the art from the disclosure herein.


Hybrid Method


In certain embodiments, the data verification system and/or method uses a combination of at least two of the verification methods described above (web-crawling, agent web verification, call/tele-verification, direct mail, email, in-person or other methods) to verify the data. The verification system includes a verification method selection/artificial intelligence module 304 that selects the appropriate data verification method(s). In certain embodiments, the data verification system and/or method selects at least a portion of the data to be verified by one of the foregoing verification methods, while selecting another portion of the data to be verified by another one of the foregoing verification methods.



FIG. 6 shows a sample method of applying data verification methods. At block 610, data to be verified is received. At block 620, a low cost verification method is used to verify the data received at block 610. Then at block 630, a higher cost verification method is used to verify the data. The higher cost verification method may be applied to all the data that is verified by the low cost method at block 620, or may be applied to a portion of the data that is verified by the low cost method. The data is verified, updated, or appended/enhanced depending on the results of the verification performed at block 620 and/or block 630. In certain embodiments, at block 650, the results of the higher cost verification method applied at block 630 are sent back as feedback to improve the results of the low cost verification method. Examples of this feedback may include the types of data records that can be verified solely with a low cost method, or the types of data records that should be verified with a higher cost method. For example, in certain embodiments, the data verification system executes a web-crawling verification method at block 620 and then monitors or tracks the agent's determinations to rank the trustworthiness of the internet data sources at block 630. In certain embodiments, such trustworthiness ranking data is used as feedback at block 650 to improve the accuracy of the web-crawling module executed at block 620. It is recognized that the blocks in FIG. 6 can be rearranged to accommodate various configurations, for example, a higher cost method may be used first.


Data Segmentation


Returning to FIG. 3, in certain embodiments the data verification system includes a data segmentation module 314 that segments data. In certain embodiments, the data verification system and/or method is configured to segment the data to determine which data elements relate to high value customers or clients. For example, the determination of whether a customer or client is high value or otherwise is based on several factors, including but not limited to income, home location, net worth, credit score, and so forth. Based on the segmentation, the data verification system may verify the segmented data relating to high value customers or clients before segmented data relating to lower value customers or clients. Data designated as high value or high priority may be verified by call/tele-verification or by the verification method that is most accurate. In certain embodiments, the data verification system is configured to have high value or high priority data verified by a combination of the foregoing verification methods in order to double check the accuracy of the data (for example, the combination shown in FIG. 6).


In certain embodiments, the data verification system and/or method uses the data verification methodology with the highest or higher accuracy, or highest or higher ranking, as set forth above, to verify the segmented data relating to high value customers or clients. In certain embodiments, the data verification system and/or method uses the data verification methodology with the lowest or lower accuracy or lowest or lower ranking, as set forth above, to verify the segmented data relating to low value customers or clients.


In certain embodiments, the data verification system and/or method uses the data verification methodology with a medium accuracy or medium ranking to verify the segmented data relating to medium value customers or clients. In certain embodiments, the data verification system and/or method is configured to segment the data as soon as the data is received, or on a periodic basis, for example, daily, monthly, yearly or the like. Other embodiments of any of the foregoing will be apparent to those of ordinary skill in the art from the disclosure herein.


In certain embodiments, the data verification system performs a segmentation of the data based on related industry and/or timing, and determines which verification methodology is most or more accurate or least or less expensive for collecting data related to the industry and/or timing. For example, for financial reporting data, the data verification system, in certain embodiments, is configured to use the web-crawling methodology to retrieve financial data from a specific financial data reporting website during earnings reporting season. For example, the web-crawling method may be configured to access 10-K reports of companies two weeks after they are required to file the reports with the Securities and Exchange Commission. In certain embodiments, the data verification system is configured to automatically route the data to be verified to the appropriate verification methodology, for example, call verification wherein the caller is part of a virtual call center that allows the caller to work from home.


In certain embodiments, data is segmented so that new data is verified by higher cost methods, and older data is verified by lower cost methods or vice versa. In other embodiments, data is segmented to ensure proper compliance with local, state, federal, national, and/or international laws/regulations. For example, consumer data may be segmented to take into account that consumer data regulation is stricter than business data regulation. Data may also thus be segmented by geographic locations to ensure proper compliance with local laws and regulations.


Artificial Intelligence


In certain embodiments, the data verification system/method includes an automated, artificial intelligence module 304 that evolves by tracking and learning patterns of successful updates, usability, best practices within segments of data, timing of year/month/day to attain best verification/updates/appends, and so forth. The artificial intelligence module 304 may take into account results generated by both the quality control module 312 and the segmentation module 314. In certain embodiments, the system/method including the artificial intelligence module 304 has the ability to, automatically or manually, (1) blend automatic and manual segmentation of records or elements by criteria such as industry type, best times of day/month/year to verify, update, and/or append, cost, and level of importance (2) select the best verification processing method(s), and (3) manage the results and properly verify, update, append/enhance records.


In certain embodiments, the artificial intelligence module 304 is configured to store and track the time period or season when a particular verification method produces the most or more accurate results and/or least or less expensive results and/or the most or more efficient results. In certain embodiments, the artificial intelligence module 304 is configured to store industry information related to the data such that the system is configured to determine which verification method to use given a particular industry and/or season/time period.


In certain embodiments, under the hybrid method and/or the tele-verification method, the processing of data (full records or specific elements of the records) may run through multi-tiered levels of verification/updates/appends depending on type/segment of data in order to gain the best data with the least related expense. With respect to FIG. 7, the sample multi-tiered method receives data to be verified at block 710. Then data is segmented into a plurality of segments and an appropriate data verification method is determined for each segment. In addition, the order in which the data verification methods are applied may also be determined. In certain embodiments, the data verification methods and their order of execution may be determined by the verification method selection/artificial intelligence module 304.


At block 730, a first data verification method is applied to a first segment of the data. Then, at block 740, a second data verification method is applied to a second segment of the data. Finally, at block 750, a third data verification method is applied to a third segment of the data. As shown by block 760, the number of data verification methods and the number of segments can be any number and are not limited to the example shown in FIG. 7. In addition, the data verification method for each segment does not have to be different, that is, the same data verification method may be applied to multiple segments. At each block where a segment is being verified, the results may be sent as feedback to improve the learning of the verification method selection/artificial intelligence module 304. In addition, at each block where a segment is being verified, data may be verified, updated, or amended/enhanced according to the results of the data verification (block 770). In other embodiments, the data is segmented by different elements and methods of verification are selected based on the characteristics of the elements.


The method shown in FIG. 7 may be further illustrated by the following example. For data records within the Business Services industry segment, the artificial intelligence module 304 could recognize or learn from feedback obtained from past operations that the best way to verify/update/append this type of data records is by (1) routing the main demographic elements (name, address, phone) to a automated dialing process to test connectivity of phone, (2) using the web-crawling process to extract on-line information or check automated postal deliverability system for address element updates, and (3) sending the data records to the tele-verification method for population of other in-depth data elements. The dialing process may be a one-dial process that puts phones on an automatic dialer during off-hours or on weekends. In one embodiment, the artificial intelligence module selects a lower cost data verification method (for example, web-crawling) for a data segment/element that has a characteristic indicating reliable data is readily available on-line and a higher cost data verification method (for example, agent web verification or tele-verification) for another data segment/element with a characteristic indicating reliable data is not readily available on-line.


In certain embodiments, the data verification system is configured to include one or more methods depending on the cost. Balancing against the cost of each verification method is the fact certain data elements or certain industry segments are more valuable than others. For example, a business name element is more valuable than other details of the business, and a data record in the business segment is more valuable than a data record in the government segment. Therefore, some valuable data elements/segments may be verified by multiple methods, including an expensive method such as call/tele-verification, while other data elements/segments may have a cost threshold that allow only certain data verification methods to be used. The artificial intelligence module may take the cost of verification and the value of the data elements and/or segments into account when it selects the verification method. As another example, the web-crawling may include one or more data sources that charge fees for their use such that using the web-crawling on those data course may exceed a threshold cost. In other embodiments, other costs may be considered.


In certain embodiments, the data verification system is configured to process the data on a real-time basis. In certain embodiments, the data verification system is configured to process the data on a batch processing or periodic basis.


Quality Control/Method Ranking


In certain embodiments, the data verification system is configured to compare the accuracy of the foregoing data verification methods and rank the methods. In certain embodiments, the results of quality control and ranking performed by the quality control module 312 are sent to the artificial intelligence module 304 to assist the learning process and enhance future selection of data verification methods.


With reference to FIG. 8, the quality control module 312 may check the accuracy of data verification methods at block 810. In certain embodiments, the quality control involves taking a sample of data records previous verified by a data verification method and compare them to the results of another data verification method. At block 820, the quality control module 312 is configured to dynamically rank, continuously or periodically, the foregoing data verification methods relative to their accuracy.


At block 830, the quality control module 312 is configured to dynamically compare and/or rank, continuously or periodically, the relative expense of using the foregoing verification methods. Optionally, at block 840, the quality control module 312 is configured to dynamically compare and/or rank, continuously or periodically, the foregoing verification methods based on other business rules.


At block 850, in certain embodiments, the quality control module 312 is configured to switch dynamically between the foregoing data verification methods. At block 860, in certain embodiments, the quality control module 312 is configured to increase the use of highly ranked data verification methods over lower ranked data verification methods based on accuracy, expense, or other ranking criteria (for example, regulatory compliance, timing, and so forth). In certain embodiments, at block 870, the data verification system provides reports, written or graphical or otherwise, for comparing the verification methods. The data verification system may provide reports that include without limitation, for example, dashboards, scorecards, or the like.


In certain embodiments, the data verification system is configured to signal to an operator or system administrator or project manager or the like when a certain data verification methodology falls below a certain accuracy level. In certain embodiments, the data verification system is configured to cause or start an investigation when the data verification system detects that a certain data verification methodology has fallen below a certain accuracy threshold.


Various Embodiments of System and Method Implementations


In certain embodiments, the systems and methods for verifying and updating data may be embodied in part or in whole in software that is running on a computing device. The functionality provided for in the components and modules of the computing device may comprise one or more components and/or modules. For example, the computing device may comprise multiple central processing units (CPUs) and a mass storage device, such as may be implemented in an array of servers.


In general, the word “module,” “application”, or “engine,” as used herein, refers to logic embodied in hardware and/or firmware, and/or to a collection of software instructions, possibly having entry and exit points, written in a programming language, such as, for example, Java, C, and/or C++. These may be compiled and linked into an executable program, installed in a dynamic link library, or may be written in an interpreted programming language such as, for example, BASIC, Perl, or Python. It will be appreciated that modules, applications, and engines may be callable from others and/or from themselves, and/or may be invoked in response to detected events or interrupts. Instructions may be embedded in firmware, such as an EPROM.


It will be further appreciated that hardware may be comprised of connected logic units, such as gates and flip-flops, and/or may be comprised of programmable units, such as programmable gate arrays or processors. The modules, applications, and engines described herein are in certain applications preferably implemented as software modules, but may be represented in hardware or firmware in other implementations. Generally, the modules, applications, and engines described herein refer to logical modules that may be combined with other modules and/or divided into sub-modules despite their physical organization or storage.


In some embodiments, the computing device(s) communicates with one or more databases that store information on individuals, households, and businesses, including credit data and/or non-credit data. This database or databases may be implemented using a relational database, such as SQLite, Sybase, Oracle, CodeBase, mySQL, and Microsoft® SQL Server as well as other types of databases such as, for example, a flat file database, an entity-relationship database, and object-oriented database, and/or a record-based database.


In certain embodiments, the computing device is IBM, Macintosh, and/or Linux/Unix compatible. In another embodiment, the computing device comprises a server, a laptop computer, a cell phone, a Blackberry, a personal digital assistant, a kiosk, or an audio player, for example. In certain embodiments, the computing device includes one or more CPUs, which may each include microprocessors. The computing device may further include one or more memory devices, such as random access memory (RAM) for temporary storage of information and read only memory (ROM) for permanent storage of information, and one or more mass storage devices, such as hard drives, diskettes, or optical media storage devices. In certain embodiments, the modules of the computing are in communication via a standards based bus system, such as bus systems using Peripheral Component Interconnect (PCI), Microchannel, SCSI, Industrial Standard Architecture (ISA) and Extended ISA (EISA) architectures, for example. In certain embodiments, components of the computing device communicate via a network, such as a local area network that may be secured.


The computing is generally controlled and coordinated by operating system software, such as the Windows 95, Windows 98, Windows NT, Windows 2000, Windows XP, Windows Vista, Linux, SunOS, Solaris, PalmOS, Blackberry OS, or other compatible operating systems. In Macintosh systems, the operating system may be any available operating system, such as MAC OS X. In other embodiments, the computing device may be controlled by a proprietary operating system. Conventional operating systems control and schedule computer processes for execution, perform memory management, provide file system, networking, and I/O services, and provide a user interface, such as a graphical user interface (GUI), among other things.


The computing device may include one or more commonly available input/output (I/O) devices and interfaces, such as a keyboard, mouse, touchpad, microphone, and printer. Thus, in certain embodiments the computing device may be controlled using the keyboard and mouse input devices, while in another embodiment the user may provide voice commands to the computing device via a microphone. In certain embodiments, the I/O devices and interfaces include one or more display device, such as a monitor, that allows the visual presentation of data to a user. More particularly, a display device provides for the presentation of GUIs, application software data, and multimedia presentations, for example. The computing device may also include one or more multimedia devices, such as speakers, video cards, graphics accelerators, and microphones, for example.


In certain embodiments, the I/O devices and interfaces provide a communication interface to various external devices. For example, the computing device may be configured to communicate with one or more networks, such as any combination of one or more LANs, WANs, or the Internet, for example, via a wired, wireless, or combination of wired and wireless, communication links. The network communicates with various computing devices and/or other electronic devices via wired or wireless communication links.


Although the foregoing disclosure has been described in terms of certain embodiments, other embodiments will be apparent to those of ordinary skill in the art from the disclosure herein. Moreover, the described embodiments have been presented by way of example only, and are not intended to limit the scope of the disclosure. Indeed, the novel methods and systems described herein may be embodied in a variety of other forms without departing from the spirit thereof. Accordingly, other combinations, omissions, substitutions and modifications will be apparent to the skilled artisan in view of the disclosure herein. For purposes of discussing the invention, certain aspects, advantages and novel features of the invention have been described herein. Of course, it is to be understood that not necessarily all such aspects, advantages or features will be embodied in any particular embodiment of the disclosure.

Claims
  • 1. A system comprising: an electronic data store that stores data associated with each of a plurality of individual persons; anda computing device, comprising a physical processor, that is in communication with the electronic data store and that is configured to: retrieve, from the electronic data store, a plurality of data elements associated with a person;electronically locate information regarding the person on a webpage, wherein the information is located by searching content of a plurality of internet data sources using at least one of web crawling or web scraping;extract the located information regarding the person from the webpage;determine a creation date associated with the located information based on code of the webpage;perform a first comparison of one or more portions of the located information regarding the person with at least one of the plurality of data elements associated with the person retrieved from the electronic data store, wherein a portion of the located information is not represented in the plurality of data elements retrieved from the electronic data store;verify accuracy of the located information based at least in part on the first comparison and data regarding the person obtained from at least one internet data source other than the webpage;perform a second comparison of the creation date associated with the located information and a date stored in the electronic data store in association with the at least one of the plurality of data elements, wherein the creation date associated with the located information is different than the date stored in the electronic data store;based on the second comparison, determine that the creation date associated with the located information regarding the person from the webpage is more recent than the date stored in the electronic data store in association with the at least one of the plurality of data elements; andstore one or more updated or appended data elements associated with the person in the electronic data store, wherein the one or more data elements are updated or appended to include at least a portion of the located information in response to determining that the located information is accurate and that the located information has a more recent creation date than the at least one of the plurality of data elements associated with the person in the electronic data store.
  • 2. The system of claim 1, wherein the information regarding the person is located by at least one of an automated web spider or web robot.
  • 3. The system of claim 1, wherein the computing device is further configured to assess trustworthiness of the webpage prior to storing the one or more updated or appended data elements.
  • 4. The system of claim 1, wherein the webpage comprises a page maintained by the person in association with a social networking service.
  • 5. The system of claim 2, wherein the webpage is associated with one of a company website or a government website.
  • 6. The system of claim 1, wherein storing the one or more updated or appended data elements associated with the person in the electronic data store is further based at least in part on a trustworthiness ranking associated with the webpage and a trustworthiness ranking of at least one other source of information regarding the person.
  • 7. The system of claim 1, wherein the computing device is further configured to, prior to storing the one or more updated or appended data elements, verify the located information at least in part by identifying the located information from a source other than an internet data source.
  • 8. The system of claim 7, wherein verifying the located information from a source other than the internet data source comprises applying a verification method that includes an automated telephone calling program executed by a computing system.
  • 9. The system of claim 8, wherein the verification method is selected based at least in part on a determination of value associated with the located information.
  • 10. The system of claim 9, wherein the verification method is further selected based at least in part on both (a) a cost associated with the verification method and (b) a reliability associated with the verification method.
  • 11. A computer-implemented method comprising: as implemented by one or more computing devices configured with specific executable instructions, retrieving, from an electronic data store that stores information regarding a plurality of individual persons, a plurality of data elements associated with a person;electronically locating information regarding the person on a webpage, wherein the information is located by searching content of a plurality of internet data sources using at least one of web crawling or web scraping;extracting the located information regarding the person from the webpage;determining a creation date associated with the located information based on at least one (a) information on the webpage or (b) code of the webpage;performing a first comparison of one or more portions of the located information regarding the person with at least one of the plurality of data elements associated with the person retrieved from the electronic data store;performing a second comparison of the creation date associated with the located information and a date stored in the electronic data store in association with the at least one of the plurality of data elements;based on the second comparison, determining that the creation date associated with the located information regarding the person from the webpage is more recent than the date stored in the electronic data store in association with the at least one of the plurality of data elements; andstoring one or more updated or appended data elements associated with the person in the electronic data store, wherein the one or more data elements are updated or appended to include at least a portion of the located information based at least in part on the determining that the located information has a more recent creation date than the at least one of the plurality of data elements associated with the person in the electronic data store.
  • 12. The computer-implemented method of claim 11, wherein the information regarding the person is located by at least one of an automated web spider or web robot.
  • 13. The computer-implemented method of claim 11, wherein the webpage comprises a page maintained by the person in association with a social networking service.
  • 14. The computer-implemented method of claim 11, wherein the webpage is associated with one of a company website or a government website.
  • 15. The computer-implemented method of claim 11, wherein storing the one or more updated or appended data elements associated with the person in the electronic data store is further based at least in part on a trustworthiness ranking associated with the webpage.
  • 16. The computer-implemented method of claim 11, further comprising, prior to storing the one or more updated or appended data elements, verifying the located information based on identifying the located information from a source other than the webpage.
  • 17. A computer-readable, non-transitory storage medium storing computer executable instructions that, when executed by one or more computer systems, configure the one or more computer systems to perform operations comprising: retrieving, from an electronic data store, a plurality of data elements associated with a person;electronically locating information regarding the person on a webpage, wherein the information is located by searching content of a plurality of internet data sources using at least one of web crawling or web scraping;extracting the located information regarding the person from the webpage;performing a comparison of one or more portions of the located information regarding the person with at least one of the plurality of data elements associated with the person retrieved from the electronic data store;determining that a creation date of the located information on the webpage is more recent than a date stored in association the at least one of the plurality of data elements associated with the person in the electronic data store; andbased at least in part on the comparison and determining that the creation of the located information is more recent than the date stored in the electronic data store, storing one or more updated or appended data elements associated with the person in the electronic data store, wherein the one or more data elements are updated or appended to include at least a portion of the located information.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 13/620,103 filed on Sep. 14, 2012, entitled “Systems and Methods for Data Verification,” which is a continuation of U.S. patent application Ser. No. 12/058,632 filed on Mar. 28, 2008, entitled “Systems and Methods for Data Verification,” which claims the benefit of priority from U.S. Provisional Patent Application No. 60/921,188 filed on Mar. 30, 2007, entitled “Systems and Methods for Data Verification,” the entire contents of which are each hereby incorporated herein by reference in their entirety. All publications and patent applications mentioned in this specification are herein incorporated by reference in their entirety to the same extent as if each individual publication or patent application was specifically and individually indicated to be incorporated by reference.

US Referenced Citations (872)
Number Name Date Kind
4163290 Sutherlin et al. Jul 1979 A
4346442 Musmanno Aug 1982 A
4827508 Shear May 1989 A
4868570 Davis Sep 1989 A
4935870 Burk, Jr. et al. Jun 1990 A
4989141 Lyons et al. Jan 1991 A
5216612 Cornett et al. Jun 1993 A
5247575 Sprague et al. Sep 1993 A
5325509 Lautzenheiser Jun 1994 A
5341429 Stringer et al. Aug 1994 A
5528701 Aref Jun 1996 A
5555409 Leenstra, Sr. et al. Sep 1996 A
5590038 Pitroda Dec 1996 A
5621201 Langhans et al. Apr 1997 A
5628004 Gormley et al. May 1997 A
5629982 Micali May 1997 A
5630070 Dietrich et al. May 1997 A
5640551 Chu et al. Jun 1997 A
5640577 Scharmer Jun 1997 A
5655129 Ito Aug 1997 A
5659731 Gustafson Aug 1997 A
5666528 Thai Sep 1997 A
5692107 Simoudis et al. Nov 1997 A
5737732 Gibson et al. Apr 1998 A
5739512 Tognazzini Apr 1998 A
5748098 Grace May 1998 A
5754632 Smith May 1998 A
5754939 Herz et al. May 1998 A
5765143 Sheldon et al. Jun 1998 A
5768423 Aref et al. Jun 1998 A
5774692 Boyer et al. Jun 1998 A
5778405 Ogawa Jul 1998 A
5797136 Boyer et al. Aug 1998 A
5812840 Shwartz Sep 1998 A
5819291 Haimowitz et al. Oct 1998 A
5822750 Jou et al. Oct 1998 A
5822751 Gray et al. Oct 1998 A
5825884 Zdepski et al. Oct 1998 A
5828837 Eikland Oct 1998 A
5832068 Smith Nov 1998 A
5835915 Carr et al. Nov 1998 A
5844218 Kawan et al. Dec 1998 A
5881131 Farris et al. Mar 1999 A
5893090 Friedman et al. Apr 1999 A
5905985 Malloy et al. May 1999 A
5930764 Melchione et al. Jul 1999 A
5956693 Geerlings Sep 1999 A
5960430 Haimowitz et al. Sep 1999 A
5961593 Gabber et al. Oct 1999 A
5963932 Jakobsson et al. Oct 1999 A
5966695 Melchione et al. Oct 1999 A
5990038 Suga et al. Nov 1999 A
6014688 Venkatraman et al. Jan 2000 A
6038551 Barlow et al. Mar 2000 A
6070147 Harms et al. May 2000 A
6070241 Edwards et al. May 2000 A
6072894 Payne Jun 2000 A
6073106 Rozen et al. Jun 2000 A
6073140 Morgan et al. Jun 2000 A
6078892 Anderson et al. Jun 2000 A
6085242 Chandra Jul 2000 A
6119103 Basch et al. Sep 2000 A
6121901 Welch et al. Sep 2000 A
6128602 Northington et al. Oct 2000 A
6128624 Papierniak et al. Oct 2000 A
6144957 Cohen et al. Nov 2000 A
6151601 Papierniak et al. Nov 2000 A
6157707 Baulier et al. Dec 2000 A
6157927 Schaefer et al. Dec 2000 A
6161139 Win et al. Dec 2000 A
6178442 Yamazaki Jan 2001 B1
6202053 Christiansen et al. Mar 2001 B1
6223171 Chaudhuri et al. Apr 2001 B1
6233588 Marchoili et al. May 2001 B1
6253202 Gilmour Jun 2001 B1
6256630 Gilai et al. Jul 2001 B1
6263334 Fayyad et al. Jul 2001 B1
6263337 Fayyad et al. Jul 2001 B1
6275824 O'Flaherty et al. Aug 2001 B1
6304869 Moore et al. Oct 2001 B1
6311169 Duhon Oct 2001 B2
6321205 Eder Nov 2001 B1
6339769 Cochrane et al. Jan 2002 B1
6366903 Agrawal et al. Apr 2002 B1
6393406 Eder May 2002 B1
6397197 Gindlesperger May 2002 B1
6405173 Honarvar Jun 2002 B1
6424878 Barker et al. Jul 2002 B1
6446200 Ball et al. Sep 2002 B1
6448980 Kumar et al. Sep 2002 B1
6453353 Win et al. Sep 2002 B1
6457012 Jatkowski Sep 2002 B1
6463533 Calamera et al. Oct 2002 B1
6496819 Bello et al. Dec 2002 B1
6496827 Kozam et al. Dec 2002 B2
6496931 Rajchel et al. Dec 2002 B1
6505168 Rothman et al. Jan 2003 B1
6523021 Monberg et al. Feb 2003 B1
6523022 Hobbs Feb 2003 B1
6523041 Morgan et al. Feb 2003 B1
6543683 Hoffman Apr 2003 B2
6564210 Korda et al. May 2003 B1
6574623 Laung et al. Jun 2003 B1
6574736 Andrews Jun 2003 B1
6581059 Barrett et al. Jun 2003 B1
6601173 Mohler Jul 2003 B1
6601234 Bowman-Amuah Jul 2003 B1
6647383 August et al. Nov 2003 B1
6651220 Penteroudakis et al. Nov 2003 B1
6658393 Basch et al. Dec 2003 B1
6708166 Dysart et al. Mar 2004 B1
6714944 Shapiro et al. Mar 2004 B1
6725381 Smith et al. Apr 2004 B1
6738748 Wetzer May 2004 B2
6748426 Shaffer et al. Jun 2004 B1
6750985 Rhoads Jun 2004 B2
6754665 Futagami et al. Jun 2004 B1
6766327 Morgan, Jr. et al. Jul 2004 B2
6766946 Iida et al. Jul 2004 B2
6782379 Lee Aug 2004 B2
6804346 Mewhinney Oct 2004 B1
6804701 Muret et al. Oct 2004 B2
6816871 Lee Nov 2004 B2
6845448 Chaganti et al. Jan 2005 B1
6850895 Brodersen et al. Feb 2005 B2
6868389 Wilkins et al. Mar 2005 B1
6910624 Natsuno Jun 2005 B1
6928487 Eggebraaten et al. Aug 2005 B2
6934714 Meinig Aug 2005 B2
6947989 Gullotta et al. Sep 2005 B2
6950858 Ogami Sep 2005 B2
6954757 Zargham et al. Oct 2005 B2
6976056 Kumar Dec 2005 B1
6983379 Spalink et al. Jan 2006 B1
6983478 Grauch et al. Jan 2006 B1
6985887 Sunstein et al. Jan 2006 B1
6999941 Agarwal Feb 2006 B1
7003504 Angus et al. Feb 2006 B1
7006614 Feinberg et al. Feb 2006 B2
7016907 Boreham et al. Mar 2006 B2
7028001 Muthuswamy et al. Apr 2006 B1
7028052 Chapman et al. Apr 2006 B2
7035699 Anderson et al. Apr 2006 B1
7035855 Kilger et al. Apr 2006 B1
7039176 Borodow et al. May 2006 B2
7039607 Watarai et al. May 2006 B2
7043476 Robson May 2006 B2
7043531 Seibel et al. May 2006 B1
7047251 Reed et al. May 2006 B2
7050982 Sheinson et al. May 2006 B2
7050989 Hurt et al. May 2006 B1
7062475 Szabo et al. Jun 2006 B1
7065566 Menard et al. Jun 2006 B2
7069240 Spero et al. Jun 2006 B2
7076475 Honarvar et al. Jul 2006 B2
7082435 Guzman et al. Jul 2006 B1
7092898 Mattick et al. Aug 2006 B1
7117172 Black Oct 2006 B1
7124144 Christianson et al. Oct 2006 B2
7133935 Hedy Nov 2006 B2
7136448 Venkataperumal et al. Nov 2006 B1
7155739 Bari et al. Dec 2006 B2
7167907 Shaffer et al. Jan 2007 B2
7184974 Shishido Feb 2007 B2
7185016 Rasmussen Feb 2007 B1
7188169 Buus et al. Mar 2007 B2
7194416 Provost et al. Mar 2007 B1
7200602 Jonas Apr 2007 B2
7219107 Beringer May 2007 B2
7222369 Vering et al. May 2007 B2
7228284 Vaillancourt et al. Jun 2007 B1
7234160 Vogel et al. Jun 2007 B2
7240059 Bayliss et al. Jul 2007 B2
7243369 Bhat et al. Jul 2007 B2
7246067 Austin et al. Jul 2007 B2
7249048 O'Flaherty Jul 2007 B1
7251625 Anglum Jul 2007 B2
7272591 Ghazal et al. Sep 2007 B1
7277900 Ganesh et al. Oct 2007 B1
7315837 Sloan et al. Jan 2008 B2
7328233 Salim et al. Feb 2008 B2
7333976 Auerbach et al. Feb 2008 B1
7340679 Botscheck et al. Mar 2008 B2
7346703 Cope Mar 2008 B2
7356516 Richey et al. Apr 2008 B2
7366694 Lazerson Apr 2008 B2
7367011 Ramsey et al. Apr 2008 B2
7370044 Mulhern et al. May 2008 B2
7373335 Cleghorn et al. May 2008 B2
7376603 Mayr et al. May 2008 B1
7383215 Navarro et al. Jun 2008 B1
7383988 Slonecker, Jr. Jun 2008 B2
7395273 Khan et al. Jul 2008 B2
7403942 Bayliss Jul 2008 B1
7421322 Silversmith et al. Sep 2008 B1
7421442 Gelb et al. Sep 2008 B2
7424439 Fayyad et al. Sep 2008 B1
7433864 Malik Oct 2008 B2
7451113 Kasower Nov 2008 B1
7460857 Roach, Jr. Dec 2008 B2
7467127 Baccash et al. Dec 2008 B1
7467401 Cicchitto Dec 2008 B2
7475118 Leiba et al. Jan 2009 B2
7478157 Bohrer et al. Jan 2009 B2
7483842 Fung et al. Jan 2009 B1
7490356 Lieblich et al. Feb 2009 B2
7505938 Lang et al. Mar 2009 B2
7529698 Joao May 2009 B2
7533179 Tarquini et al. May 2009 B2
7536346 Aliffi et al. May 2009 B2
7543739 Brown et al. Jun 2009 B2
7546266 Beirne et al. Jun 2009 B2
7546271 Chmielewski et al. Jun 2009 B1
7552089 Bruer et al. Jun 2009 B2
7556192 Wokaty, Jr. Jul 2009 B2
7559217 Bass Jul 2009 B2
7562093 Gelb et al. Jul 2009 B2
7562184 Henmi et al. Jul 2009 B2
7562814 Shao et al. Jul 2009 B1
7571138 Miri et al. Aug 2009 B2
7571473 Boydstun et al. Aug 2009 B1
7577934 Anonsen et al. Aug 2009 B2
7584126 White Sep 2009 B1
7584146 Duhon Sep 2009 B1
7587366 Grim, III et al. Sep 2009 B2
7593889 Raines et al. Sep 2009 B2
7596512 Raines et al. Sep 2009 B1
7596716 Frost et al. Sep 2009 B2
7603701 Gaucas Oct 2009 B2
7606725 Robertson et al. Oct 2009 B2
7613600 Krane Nov 2009 B2
7613671 Serrano-Morales et al. Nov 2009 B2
7630989 Weir et al. Dec 2009 B2
7634737 Beringer et al. Dec 2009 B2
7647344 Skurtovich, Jr. et al. Jan 2010 B2
7653592 Flaxman et al. Jan 2010 B1
7653688 Bittner Jan 2010 B2
7657540 Bayliss Feb 2010 B1
7668725 Alston Feb 2010 B2
7668840 Bayliss et al. Feb 2010 B2
7672833 Blume et al. Mar 2010 B2
7672865 Kumar et al. Mar 2010 B2
7672924 Scheurich et al. Mar 2010 B1
7672926 Ghazal et al. Mar 2010 B2
7676751 Allen et al. Mar 2010 B2
7685209 Norton et al. Mar 2010 B1
7689505 Kasower Mar 2010 B2
7698163 Reed et al. Apr 2010 B2
7698445 Fitzpatrick et al. Apr 2010 B2
7707059 Reed et al. Apr 2010 B2
7707164 Kapochunas et al. Apr 2010 B2
7707271 Rudkin et al. Apr 2010 B2
7711635 Steele et al. May 2010 B2
7720846 Bayliss May 2010 B1
7730078 Schwabe et al. Jun 2010 B2
7739139 Robertson et al. Jun 2010 B2
7742982 Chaudhuri et al. Jun 2010 B2
7747480 Agresta et al. Jun 2010 B1
7747559 Leitner et al. Jun 2010 B2
7752236 Williams et al. Jul 2010 B2
7756789 Welker et al. Jul 2010 B2
7765166 Beringer et al. Jul 2010 B2
7765311 Itabashi et al. Jul 2010 B2
7769696 Yoda Aug 2010 B2
7774270 MacCloskey Aug 2010 B1
7783515 Kumar et al. Aug 2010 B1
7788040 Haskell et al. Aug 2010 B2
7792715 Kasower Sep 2010 B1
7797252 Rosskamm et al. Sep 2010 B2
7797725 Lunt et al. Sep 2010 B2
7801812 Conlin et al. Sep 2010 B2
7801956 Cumberbatch et al. Sep 2010 B1
7810036 Bales et al. Oct 2010 B2
7814005 Imrey et al. Oct 2010 B2
7818228 Coulter Oct 2010 B1
7818229 Imrey et al. Oct 2010 B2
7818231 Rajan Oct 2010 B2
7832006 Chen et al. Nov 2010 B2
7836111 Shan Nov 2010 B1
7841008 Cole et al. Nov 2010 B1
7844604 Baio et al. Nov 2010 B2
7853518 Cagan Dec 2010 B2
7877304 Coulter Jan 2011 B1
7908242 Achanta Mar 2011 B1
7912842 Bayliss et al. Mar 2011 B1
7912865 Akerman et al. Mar 2011 B2
7930195 Heyns et al. Apr 2011 B2
7930242 Morris et al. Apr 2011 B2
7958126 Schachter Jun 2011 B2
7970679 Kasower Jun 2011 B2
7975299 Balducci et al. Jul 2011 B1
7983932 Kane Jul 2011 B2
7991688 Phelan et al. Aug 2011 B2
7991901 Tarquini et al. Aug 2011 B2
7996912 Spalink et al. Aug 2011 B2
8001153 Skurtovich, Jr. et al. Aug 2011 B2
8001235 Russ et al. Aug 2011 B2
8005759 Hirtenstein et al. Aug 2011 B2
8019843 Cash et al. Sep 2011 B2
8024264 Chaudhuri et al. Sep 2011 B2
8024778 Cash et al. Sep 2011 B2
8027871 Willams et al. Sep 2011 B2
8037097 Guo et al. Oct 2011 B2
8060424 Kasower Nov 2011 B2
8065233 Lee et al. Nov 2011 B2
8065264 Achanta Nov 2011 B1
8078453 Shaw Dec 2011 B2
8095458 Peterson et al. Jan 2012 B2
8099341 Varghese Jan 2012 B2
8104679 Brown Jan 2012 B2
8127986 Taylor et al. Mar 2012 B1
8131777 McCullouch Mar 2012 B2
8135607 Willams et al. Mar 2012 B2
8160960 Fei et al. Apr 2012 B1
8161104 Tomkow Apr 2012 B2
8175889 Girulat et al. May 2012 B1
8180654 Berkman et al. May 2012 B2
8195549 Kasower Jun 2012 B2
8201257 Andres et al. Jun 2012 B1
8214238 Fairfield et al. Jul 2012 B1
8219535 Kobori et al. Jul 2012 B1
8219771 Le Neel Jul 2012 B2
8224723 Bosch et al. Jul 2012 B2
8225395 Atwood et al. Jul 2012 B2
8234498 Britti et al. Jul 2012 B2
8239130 Upstill et al. Aug 2012 B1
8271313 Williams et al. Sep 2012 B2
8271378 Chaudhuri et al. Sep 2012 B2
8280805 Abrahams et al. Oct 2012 B1
8285656 Chang et al. Oct 2012 B1
8296229 Yellin et al. Oct 2012 B1
8312033 McMillan Nov 2012 B1
8321339 Imrey et al. Nov 2012 B2
8321952 Spalink et al. Nov 2012 B2
8326672 Haggerty et al. Dec 2012 B2
8340685 Cochran et al. Dec 2012 B2
8355967 Debie et al. Jan 2013 B2
8364518 Blake et al. Jan 2013 B1
8386377 Xiong et al. Feb 2013 B1
8392334 Hirtenstein et al. Mar 2013 B2
8433512 Lopatenko et al. Apr 2013 B1
8458074 Showalter Jun 2013 B2
8463919 Tarquini et al. Jun 2013 B2
8468198 Tomkow Jun 2013 B2
8473354 Psota et al. Jun 2013 B2
8478674 Kapczynski et al. Jul 2013 B1
8498930 Chung et al. Jul 2013 B2
8510184 Imrev et al. Aug 2013 B2
8515828 Wolf et al. Aug 2013 B1
8515844 Kasower Aug 2013 B2
8515862 Zhang et al. Aug 2013 B2
8560434 Morris et al. Oct 2013 B2
8560436 Ingram et al. Oct 2013 B2
8566029 Lopatenko et al. Oct 2013 B1
8566141 Nagdev et al. Oct 2013 B1
8572083 Snell et al. Oct 2013 B1
8583593 Achanta Nov 2013 B1
8589069 Lehman Nov 2013 B1
8600854 Mayr et al. Dec 2013 B2
8606666 Courbage et al. Dec 2013 B1
8626618 Psota et al. Jan 2014 B2
8639616 Rolenaitis et al. Jan 2014 B1
8639920 Stack et al. Jan 2014 B2
8671115 Skurtovich, Jr. et al. Mar 2014 B2
8694390 Imrey et al. Apr 2014 B2
8705718 Baniak et al. Apr 2014 B2
8725613 Celka et al. May 2014 B1
8732004 Ramos et al. May 2014 B1
8738515 Chaudhuri et al. May 2014 B2
8738516 Dean et al. May 2014 B1
8768914 Scriffignano et al. Jul 2014 B2
8775299 Achanta et al. Jul 2014 B2
8781882 Arboletti et al. Jul 2014 B1
8781953 Kasower Jul 2014 B2
8782217 Arone et al. Jul 2014 B1
8818888 Kapczynski et al. Aug 2014 B1
8825544 Imrey et al. Sep 2014 B2
8949981 Trollope et al. Feb 2015 B1
8954459 McMillan et al. Feb 2015 B1
8966649 Stack et al. Feb 2015 B2
8972400 Kapczynski et al. Mar 2015 B1
9553936 Dijk et al. Jun 2015 B2
9143541 Szamonek et al. Sep 2015 B1
9147042 Haller et al. Sep 2015 B1
9152727 Balducci et al. Oct 2015 B1
9256624 Skurtovich, Jr. et al. Feb 2016 B2
9268803 Kapochunas et al. Feb 2016 B2
9342783 Chang et al. May 2016 B1
9529851 Smith Dec 2016 B1
9595051 Stack et al. Mar 2017 B2
9684905 Haller et al. Jun 2017 B1
9710523 Skurtovich, Jr. et al. Jul 2017 B2
20010000536 Tarin Apr 2001 A1
20010011245 Duhon Aug 2001 A1
20010029470 Schultz et al. Oct 2001 A1
20010029482 Tealdi et al. Oct 2001 A1
20010037332 Miller et al. Nov 2001 A1
20010039532 Coleman, Jr. et al. Nov 2001 A1
20010049274 Degraeve Dec 2001 A1
20010049620 Blasko Dec 2001 A1
20020004736 Roundtree et al. Jan 2002 A1
20020010664 Rabideau et al. Jan 2002 A1
20020010701 Kosciuszko Jan 2002 A1
20020013827 Edstrom et al. Jan 2002 A1
20020026507 Sears et al. Feb 2002 A1
20020026519 Itabashi et al. Feb 2002 A1
20020033846 Balasubramanian et al. Mar 2002 A1
20020038312 Donner et al. Mar 2002 A1
20020049701 Nabe et al. Apr 2002 A1
20020049738 Epstein Apr 2002 A1
20020052884 Farber et al. May 2002 A1
20020069122 Yun et al. Jun 2002 A1
20020077964 Brody et al. Jun 2002 A1
20020082892 Raffel et al. Jun 2002 A1
20020091650 Ellis Jul 2002 A1
20020091706 Anderson et al. Jul 2002 A1
20020099628 Takaoka et al. Jul 2002 A1
20020099824 Bender et al. Jul 2002 A1
20020099936 Kou et al. Jul 2002 A1
20020103809 Starzl et al. Aug 2002 A1
20020103933 Garon et al. Aug 2002 A1
20020111816 Lortscher et al. Aug 2002 A1
20020111910 Walsh Aug 2002 A1
20020120757 Sutherland et al. Aug 2002 A1
20020128962 Kasower Sep 2002 A1
20020131565 Scheuring et al. Sep 2002 A1
20020133504 Vlahos et al. Sep 2002 A1
20020138297 Lee Sep 2002 A1
20020138470 Zhou Sep 2002 A1
20020143943 Lee et al. Oct 2002 A1
20020147801 Gullotta et al. Oct 2002 A1
20020156676 Ahrens et al. Oct 2002 A1
20020156797 Lee et al. Oct 2002 A1
20020161496 Yamaki Oct 2002 A1
20020161664 Shaya et al. Oct 2002 A1
20020165757 Lisser Nov 2002 A1
20020169747 Chapman et al. Nov 2002 A1
20020173984 Robertson et al. Nov 2002 A1
20020184255 Edd et al. Dec 2002 A1
20020188544 Wizon et al. Dec 2002 A1
20020198800 Shamrakov Dec 2002 A1
20020198824 Cook Dec 2002 A1
20030002671 Inchalik et al. Jan 2003 A1
20030009418 Green et al. Jan 2003 A1
20030018549 Fei et al. Jan 2003 A1
20030018578 Schultz Jan 2003 A1
20030023531 Fergusson Jan 2003 A1
20030041050 Smith et al. Feb 2003 A1
20030046311 Baidya et al. Mar 2003 A1
20030050882 Degen et al. Mar 2003 A1
20030055931 Cravo De Almeida et al. Mar 2003 A1
20030069839 Whittington et al. Apr 2003 A1
20030069943 Bahrs et al. Apr 2003 A1
20030097342 Whittingtom May 2003 A1
20030097380 Mulhern et al. May 2003 A1
20030101111 Dang et al. May 2003 A1
20030101344 Wheeler et al. May 2003 A1
20030105728 Yano et al. Jun 2003 A1
20030105733 Boreham Jun 2003 A1
20030105742 Boreham et al. Jun 2003 A1
20030115133 Bian Jun 2003 A1
20030135451 O'Brien et al. Jul 2003 A1
20030153299 Perfit et al. Aug 2003 A1
20030158749 Olchanski et al. Aug 2003 A1
20030158776 Landesmann Aug 2003 A1
20030163513 Schaeck et al. Aug 2003 A1
20030171942 Gaito Sep 2003 A1
20030191731 Stewart et al. Oct 2003 A1
20030195859 Lawrence Oct 2003 A1
20030200151 Ellenson et al. Oct 2003 A1
20030204429 Botscheck et al. Oct 2003 A1
20030212654 Harper et al. Nov 2003 A1
20030220858 Lam et al. Nov 2003 A1
20030229892 Sardera Dec 2003 A1
20040006488 Fitall et al. Jan 2004 A1
20040010458 Friedman Jan 2004 A1
20040015714 Abraham et al. Jan 2004 A1
20040015715 Brown Jan 2004 A1
20040019518 Abraham et al. Jan 2004 A1
20040019799 Vering et al. Jan 2004 A1
20040030649 Nelson et al. Feb 2004 A1
20040044673 Brady et al. Mar 2004 A1
20040052357 Logan et al. Mar 2004 A1
20040083215 de Jong Apr 2004 A1
20040088237 Moenickheim et al. May 2004 A1
20040088255 Zielke et al. May 2004 A1
20040098625 Lagadec et al. May 2004 A1
20040103147 Flesher et al. May 2004 A1
20040107132 Honarvar et al. Jun 2004 A1
20040107250 Marciano Jun 2004 A1
20040111359 Hudock Jun 2004 A1
20040117358 Von Kaenel et al. Jun 2004 A1
20040122696 Beringer Jun 2004 A1
20040128150 Lundegren Jul 2004 A1
20040128156 Beringer et al. Jul 2004 A1
20040128230 Oppenheimer et al. Jul 2004 A1
20040133509 McCoy et al. Jul 2004 A1
20040133513 McCoy et al. Jul 2004 A1
20040133515 McCoy et al. Jul 2004 A1
20040139025 Coleman Jul 2004 A1
20040141005 Banatwala et al. Jul 2004 A1
20040143482 Tivey et al. Jul 2004 A1
20040143546 Wood et al. Jul 2004 A1
20040143596 Sirkin Jul 2004 A1
20040153330 Miller et al. Aug 2004 A1
20040153448 Cheng et al. Aug 2004 A1
20040153521 Kogo Aug 2004 A1
20040167793 Masuoka et al. Aug 2004 A1
20040176995 Fusz Sep 2004 A1
20040193538 Raines Sep 2004 A1
20040199456 Flint et al. Oct 2004 A1
20040199789 Shaw et al. Oct 2004 A1
20040204948 Singletary et al. Oct 2004 A1
20040220865 Lozowski et al. Nov 2004 A1
20040220896 Finlay et al. Nov 2004 A1
20040220918 Scriffignano et al. Nov 2004 A1
20040221043 Su et al. Nov 2004 A1
20040225099 Hohberg et al. Nov 2004 A1
20040225594 Nolan, III et al. Nov 2004 A1
20040225596 Kemper et al. Nov 2004 A1
20040225643 Alpha et al. Nov 2004 A1
20040230527 Hansen et al. Nov 2004 A1
20040230534 McGough Nov 2004 A1
20040243588 Tanner et al. Dec 2004 A1
20040254935 Chagoly et al. Dec 2004 A1
20040267714 Frid et al. Dec 2004 A1
20050005168 Dick Jan 2005 A1
20050010513 Duckworth et al. Jan 2005 A1
20050010555 Gallivan Jan 2005 A1
20050027983 Klawon Feb 2005 A1
20050027995 Menschik et al. Feb 2005 A1
20050038737 Norris Feb 2005 A1
20050044036 Harrington et al. Feb 2005 A1
20050049991 Aggarwal Mar 2005 A1
20050055231 Lee Mar 2005 A1
20050058262 Timmins et al. Mar 2005 A1
20050060332 Bernstein et al. Mar 2005 A1
20050065809 Henze Mar 2005 A1
20050071328 Lawrence Mar 2005 A1
20050080821 Breil et al. Apr 2005 A1
20050086261 Mammone Apr 2005 A1
20050091164 Varble Apr 2005 A1
20050097039 Kulcsar et al. May 2005 A1
20050102180 Gailey et al. May 2005 A1
20050108041 White May 2005 A1
20050108396 Bittner May 2005 A1
20050108631 Amorin et al. May 2005 A1
20050113991 Rogers et al. May 2005 A1
20050114335 Wesinger, Jr. et al. May 2005 A1
20050114344 Wesinger, Jr. et al. May 2005 A1
20050114345 Wesinger, Jr. et al. May 2005 A1
20050131760 Manning et al. Jun 2005 A1
20050137899 Davies et al. Jun 2005 A1
20050144452 Lynch et al. Jun 2005 A1
20050154664 Guy et al. Jul 2005 A1
20050154665 Kerr Jul 2005 A1
20050154769 Eckart et al. Jul 2005 A1
20050171859 Harrington et al. Aug 2005 A1
20050187948 Monitzer et al. Aug 2005 A1
20050192008 Desai et al. Sep 2005 A1
20050208461 Krebs et al. Sep 2005 A1
20050209922 Hofmeister Sep 2005 A1
20050226224 Lee et al. Oct 2005 A1
20050246338 Bird Nov 2005 A1
20050257250 Mitchell et al. Nov 2005 A1
20050262158 Sauermann Nov 2005 A1
20050273849 Araujo et al. Dec 2005 A1
20050288998 Verma et al. Dec 2005 A1
20050289003 Thompson et al. Dec 2005 A1
20060004731 Seibel et al. Jan 2006 A1
20060015425 Brooks Jan 2006 A1
20060020611 Gilbert et al. Jan 2006 A1
20060029107 McCullough et al. Feb 2006 A1
20060032909 Seegar Feb 2006 A1
20060036543 Blagg et al. Feb 2006 A1
20060036748 Nusbaum et al. Feb 2006 A1
20060041464 Powers et al. Feb 2006 A1
20060041500 Diana et al. Feb 2006 A1
20060041670 Musseleck et al. Feb 2006 A1
20060059110 Madhok et al. Mar 2006 A1
20060064340 Cook Mar 2006 A1
20060069635 Ram et al. Mar 2006 A1
20060074986 Mallalieu et al. Apr 2006 A1
20060074991 Lussier et al. Apr 2006 A1
20060079211 Degraeve Apr 2006 A1
20060080233 Mendelovich et al. Apr 2006 A1
20060080251 Fried et al. Apr 2006 A1
20060085361 Hoerle et al. Apr 2006 A1
20060085454 Blegen et al. Apr 2006 A1
20060106668 Kim et al. May 2006 A1
20060129419 Flaxer et al. Jun 2006 A1
20060129422 Kim et al. Jun 2006 A1
20060136330 DeRoy et al. Jun 2006 A1
20060136595 Satyavolu Jun 2006 A1
20060143695 Grynberg Jun 2006 A1
20060149674 Cook et al. Jul 2006 A1
20060155573 Hartunian Jul 2006 A1
20060155780 Sakairi et al. Jul 2006 A1
20060161435 Atef et al. Jul 2006 A1
20060161554 Lucovsky et al. Jul 2006 A1
20060179050 Giang et al. Aug 2006 A1
20060184440 Britti et al. Aug 2006 A1
20060184585 Grear et al. Aug 2006 A1
20060195688 Drissi et al. Aug 2006 A1
20060218407 Toms Sep 2006 A1
20060229799 Nimmo et al. Oct 2006 A1
20060229943 Mathias et al. Oct 2006 A1
20060229961 Lyftogt et al. Oct 2006 A1
20060235935 Ng Oct 2006 A1
20060242047 Haggerty et al. Oct 2006 A1
20060253323 Phan et al. Nov 2006 A1
20060253358 Delgrosso et al. Nov 2006 A1
20060265259 Diana et al. Nov 2006 A1
20060267999 Cash et al. Nov 2006 A1
20060271457 Romain et al. Nov 2006 A1
20060271472 Cagan Nov 2006 A1
20060276171 Pousti Dec 2006 A1
20060277089 Hubbard et al. Dec 2006 A1
20060277092 Williams Dec 2006 A1
20060277141 Palmer Dec 2006 A1
20060282359 Nobili et al. Dec 2006 A1
20060282429 Hernandez-Sherrington et al. Dec 2006 A1
20060282819 Graham et al. Dec 2006 A1
20060288090 Kraft Dec 2006 A1
20060293932 Cash et al. Dec 2006 A1
20060293979 Cash et al. Dec 2006 A1
20060294199 Bertholf Dec 2006 A1
20070011020 Martin Jan 2007 A1
20070011083 Bird et al. Jan 2007 A1
20070022141 Singleton et al. Jan 2007 A1
20070022297 Britti et al. Jan 2007 A1
20070027778 Schellhammer et al. Feb 2007 A1
20070030282 Cash et al. Feb 2007 A1
20070038483 Wood Feb 2007 A1
20070038497 Britti et al. Feb 2007 A1
20070047714 Baniak et al. Mar 2007 A1
20070067285 Blume et al. Mar 2007 A1
20070067297 Kublickis Mar 2007 A1
20070067437 Sindambiwe Mar 2007 A1
20070094230 Subramaniam et al. Apr 2007 A1
20070094241 Blackwell et al. Apr 2007 A1
20070094264 Nair Apr 2007 A1
20070112582 Fenlon May 2007 A1
20070112667 Rucker May 2007 A1
20070112668 Celano et al. May 2007 A1
20070118393 Rosen et al. May 2007 A1
20070127702 Shaffer et al. Jun 2007 A1
20070130070 Williams Jun 2007 A1
20070156554 Nikoley et al. Jul 2007 A1
20070156589 Zimler et al. Jul 2007 A1
20070162414 Horowitz et al. Jul 2007 A1
20070174122 Howard et al. Jul 2007 A1
20070185797 Robinson Aug 2007 A1
20070192122 Routson et al. Aug 2007 A1
20070192347 Rossmark et al. Aug 2007 A1
20070204338 Aiello et al. Aug 2007 A1
20070208640 Banasiak et al. Sep 2007 A1
20070214000 Shahrabi et al. Sep 2007 A1
20070220611 Socolow et al. Sep 2007 A1
20070226010 Larsen Sep 2007 A1
20070226093 Chan et al. Sep 2007 A1
20070226129 Liao et al. Sep 2007 A1
20070244782 Chimento Oct 2007 A1
20070250441 Paulsen et al. Oct 2007 A1
20070250459 Schwarz et al. Oct 2007 A1
20070261114 Pomerantsev Nov 2007 A1
20070282730 Carpenter et al. Dec 2007 A1
20070282736 Conlin et al. Dec 2007 A1
20070284433 Domenica et al. Dec 2007 A1
20070288360 Seeklus Dec 2007 A1
20070294431 Adelman et al. Dec 2007 A1
20070299759 Kelly Dec 2007 A1
20080010206 Coleman Jan 2008 A1
20080021804 Deckoff Jan 2008 A1
20080027858 Benson Jan 2008 A1
20080028067 Berkhin et al. Jan 2008 A1
20080033742 Bernasconi Feb 2008 A1
20080033956 Saha et al. Feb 2008 A1
20080052182 Marshall Feb 2008 A1
20080052244 Tsuei et al. Feb 2008 A1
20080059224 Schechter Mar 2008 A1
20080059317 Chandran et al. Mar 2008 A1
20080059449 Webster et al. Mar 2008 A1
20080072316 Chang et al. Mar 2008 A1
20080082536 Schwabe et al. Apr 2008 A1
20080109444 Williams et al. May 2008 A1
20080109445 Williams et al. May 2008 A1
20080109875 Kraft May 2008 A1
20080115191 Kim et al. May 2008 A1
20080120569 Mann et al. May 2008 A1
20080162383 Kraft Jul 2008 A1
20080177655 Zalik Jul 2008 A1
20080183504 Highley Jul 2008 A1
20080183564 Tien et al. Jul 2008 A1
20080184270 Cole et al. Jul 2008 A1
20080195600 Deakter Aug 2008 A1
20080201401 Pugh et al. Aug 2008 A1
20080205655 Wilkins et al. Aug 2008 A1
20080208610 Thomas et al. Aug 2008 A1
20080208631 Morita et al. Aug 2008 A1
20080208735 Balet et al. Aug 2008 A1
20080208873 Boehmer Aug 2008 A1
20080216156 Kosaka Sep 2008 A1
20080244008 Wilkinson et al. Oct 2008 A1
20080249869 Angell et al. Oct 2008 A1
20080263058 Peden Oct 2008 A1
20080270209 Mauseth et al. Oct 2008 A1
20080270294 Lent et al. Oct 2008 A1
20080288283 Baldwin, Jr. et al. Nov 2008 A1
20080288361 Rego et al. Nov 2008 A1
20080294540 Celka et al. Nov 2008 A1
20080300962 Cawston et al. Dec 2008 A1
20080301016 Durvasula et al. Dec 2008 A1
20080301188 O'Hara Dec 2008 A1
20080306750 Wunder et al. Dec 2008 A1
20080312969 Raines et al. Dec 2008 A1
20080319889 Hammad Dec 2008 A1
20080320575 Gelb et al. Dec 2008 A1
20090006475 Udezue et al. Jan 2009 A1
20090018986 Alcorn et al. Jan 2009 A1
20090018996 Hunt et al. Jan 2009 A1
20090024428 Hudock, Jr. Jan 2009 A1
20090024505 Patel et al. Jan 2009 A1
20090031426 Dal Lago et al. Jan 2009 A1
20090043691 Kasower Feb 2009 A1
20090048877 Binns et al. Feb 2009 A1
20090055894 Lorsch Feb 2009 A1
20090060343 Rosca Mar 2009 A1
20090094237 Churi et al. Apr 2009 A1
20090094674 Schwartz et al. Apr 2009 A1
20090106846 Dupray et al. Apr 2009 A1
20090112650 Iwane Apr 2009 A1
20090113532 Lapidous Apr 2009 A1
20090119169 Chandratillake et al. May 2009 A1
20090126013 Atwood et al. May 2009 A1
20090132347 Anderson et al. May 2009 A1
20090138335 Lieberman May 2009 A1
20090144102 Lopez Jun 2009 A1
20090150166 Leite et al. Jun 2009 A1
20090150238 Marsh et al. Jun 2009 A1
20090164232 Chmielewski et al. Jun 2009 A1
20090164380 Brown Jun 2009 A1
20090183259 Rinek et al. Jul 2009 A1
20090210807 Xiao et al. Aug 2009 A1
20090216591 Buerger et al. Aug 2009 A1
20090216640 Masi Aug 2009 A1
20090222449 Hom et al. Sep 2009 A1
20090228918 Rolff et al. Sep 2009 A1
20090234665 Conkel Sep 2009 A1
20090234876 Schigel et al. Sep 2009 A1
20090240609 Cho et al. Sep 2009 A1
20090249440 Platt et al. Oct 2009 A1
20090254375 Martinez et al. Oct 2009 A1
20090254656 Vignisson et al. Oct 2009 A1
20090254971 Herz et al. Oct 2009 A1
20090271265 Lay et al. Oct 2009 A1
20090313049 Joao et al. Dec 2009 A1
20090313562 Appleyard et al. Dec 2009 A1
20090327120 Eze et al. Dec 2009 A1
20090328173 Jakobson et al. Dec 2009 A1
20100010935 Shelton Jan 2010 A1
20100011428 Atwood et al. Jan 2010 A1
20100023434 Bond Jan 2010 A1
20100030578 Siddique et al. Feb 2010 A1
20100030677 Melik-Aslanian et al. Feb 2010 A1
20100042583 Gervais Feb 2010 A1
20100049803 Ogilvie et al. Feb 2010 A1
20100094704 Subramanian et al. Apr 2010 A1
20100094758 Chamberlain et al. Apr 2010 A1
20100114724 Ghosh et al. May 2010 A1
20100114747 Kasower May 2010 A1
20100145836 Baker et al. Jun 2010 A1
20100169159 Rose et al. Jul 2010 A1
20100169264 O'Sullivan Jul 2010 A1
20100185546 Pollard Jul 2010 A1
20100188684 Kumara Jul 2010 A1
20100205076 Parson et al. Aug 2010 A1
20100211445 Bodington Aug 2010 A1
20100211636 Starkenburg et al. Aug 2010 A1
20100217837 Ansari et al. Aug 2010 A1
20100248681 Phills Sep 2010 A1
20100250338 Banerjee et al. Sep 2010 A1
20100250410 Song et al. Sep 2010 A1
20100250411 Ogrodski Sep 2010 A1
20100250497 Redlich et al. Sep 2010 A1
20100250509 Andersen Sep 2010 A1
20100268660 Ekdahl Oct 2010 A1
20100293090 Domenikos et al. Nov 2010 A1
20110009707 Kaundinya et al. Jan 2011 A1
20110016042 Cho et al. Jan 2011 A1
20110023115 Wright Jan 2011 A1
20110029388 Kendall et al. Feb 2011 A1
20110054981 Faith et al. Mar 2011 A1
20110060905 Stack et al. Mar 2011 A1
20110071950 Ivanovic Mar 2011 A1
20110078073 Annappindi et al. Mar 2011 A1
20110113084 Ramnani May 2011 A1
20110113086 Long et al. May 2011 A1
20110125595 Neal et al. May 2011 A1
20110126275 Anderson et al. May 2011 A1
20110137760 Rudie et al. Jun 2011 A1
20110137789 Kortina et al. Jun 2011 A1
20110142213 Baniak et al. Jun 2011 A1
20110161218 Swift Jun 2011 A1
20110164746 Nice et al. Jul 2011 A1
20110166988 Coulter Jul 2011 A1
20110178899 Huszar Jul 2011 A1
20110179139 Starkenburg et al. Jul 2011 A1
20110184838 Winters et al. Jul 2011 A1
20110196791 Dominguez Aug 2011 A1
20110202474 Mele et al. Aug 2011 A1
20110211445 Chen Sep 2011 A1
20110219421 Ullman et al. Sep 2011 A1
20110238566 Santos Sep 2011 A1
20110255688 Spalink et al. Oct 2011 A1
20110258050 Chan et al. Oct 2011 A1
20110264566 Brown Oct 2011 A1
20120011056 Ward et al. Jan 2012 A1
20120016948 Sinha Jan 2012 A1
20120029956 Ghosh et al. Feb 2012 A1
20120030216 Churi et al. Feb 2012 A1
20120030771 Pierson et al. Feb 2012 A1
20120047219 Feng et al. Feb 2012 A1
20120054592 Jaffe et al. Mar 2012 A1
20120066065 Switzer Mar 2012 A1
20120072464 Cohen Mar 2012 A1
20120078932 Skurtovich, Jr. et al. Mar 2012 A1
20120101939 Kasower Apr 2012 A1
20120106801 Jackson May 2012 A1
20120110467 Blake et al. May 2012 A1
20120110677 Abendroth et al. May 2012 A1
20120124498 Santoro et al. May 2012 A1
20120136763 Megdal et al. May 2012 A1
20120136774 Imrey et al. May 2012 A1
20120150587 Kruger et al. Jun 2012 A1
20120158654 Behren et al. Jun 2012 A1
20120173339 Flynt et al. Jul 2012 A1
20120179536 Kalb et al. Jul 2012 A1
20120198556 Patel et al. Aug 2012 A1
20120215682 Lent et al. Aug 2012 A1
20120216125 Pierce Aug 2012 A1
20120226916 Hahn et al. Sep 2012 A1
20120232958 Silbert Sep 2012 A1
20120265607 Belwadi Oct 2012 A1
20120284118 Mamich, Jr. et al. Nov 2012 A1
20120290660 Rao et al. Nov 2012 A1
20120323954 Bonalle et al. Dec 2012 A1
20130018811 Britti et al. Jan 2013 A1
20130031109 Roulson et al. Jan 2013 A1
20130031624 Britti et al. Jan 2013 A1
20130066676 Williams et al. Mar 2013 A1
20130124263 Amaro et al. May 2013 A1
20130125010 Strandell May 2013 A1
20130132151 Stibel et al. May 2013 A1
20130159168 Evans Jun 2013 A1
20130173481 Hirtenstein et al. Jul 2013 A1
20130185293 Boback Jul 2013 A1
20130226783 Haggerty et al. Aug 2013 A1
20130268357 Heath Oct 2013 A1
20130279676 Baniak et al. Oct 2013 A1
20130293363 Plymouth Nov 2013 A1
20130332338 Yan et al. Dec 2013 A1
20140025562 Rothrock et al. Jan 2014 A1
20140032265 Paprocki et al. Jan 2014 A1
20140032300 Zhang et al. Jan 2014 A1
20140040182 Gilder et al. Feb 2014 A1
20140136422 Jung et al. May 2014 A1
20140164112 Kala Jun 2014 A1
20140164519 Shah Jun 2014 A1
20140244353 Winters Aug 2014 A1
20140279329 Dancel Sep 2014 A1
20150326580 McMillan et al. Nov 2015 A1
Foreign Referenced Citations (65)
Number Date Country
0 419 889 Apr 1991 EP
0 458 698 Nov 1991 EP
0 559 358 Sep 1993 EP
0 977 128 Feb 2000 EP
1 077 419 Feb 2001 EP
0 772 836 Dec 2001 EP
1 850 278 Oct 2007 EP
2 088 743 Aug 2009 EP
1 322 809 Jul 1973 GB
10-222559 Aug 1998 JP
10-261009 Sep 1998 JP
10-293732 Nov 1998 JP
2000-331068 Nov 2000 JP
2001-297141 Oct 2001 JP
2001-344463 Dec 2001 JP
2001-357256 Dec 2001 JP
2002-149778 May 2002 JP
2002-163498 Jun 2002 JP
2002-259753 Sep 2002 JP
2003-271851 Sep 2003 JP
2003-316881 Nov 2003 JP
10-2000-0036594 Jul 2000 KR
10-2000-0063995 Nov 2000 KR
10-2001-0016349 Mar 2001 KR
10-2001-0035145 May 2001 KR
10-2002-0007132 Jan 2002 KR
10-2004-0078798 Sep 2004 KR
2 181 216 Apr 2002 RU
WO 950034155 Dec 1995 WO
WO 96000945 Jan 1996 WO
WO 98041931 Sep 1998 WO
WO 98041932 Sep 1998 WO
WO 98041933 Sep 1998 WO
WO 98049643 Nov 1998 WO
WO 99017225 Apr 1999 WO
WO 99017226 Apr 1999 WO
WO 99038094 Jul 1999 WO
WO 00004465 Jan 2000 WO
WO 00028441 May 2000 WO
WO 00055778 Sep 2000 WO
WO 00065469 Nov 2000 WO
WO 01009752 Feb 2001 WO
WO 01009792 Feb 2001 WO
WO 01010090 Feb 2001 WO
WO 01084281 Nov 2001 WO
WO 2004031986 Apr 2004 WO
WO 2004088464 Oct 2004 WO
WO 2004114160 Dec 2004 WO
WO 2005036859 Apr 2005 WO
WO 2005059781 Jun 2005 WO
WO 2006050278 May 2006 WO
WO 2006110873 Oct 2006 WO
WO 2008022289 Feb 2008 WO
WO 2008042614 Apr 2008 WO
WO 2008054403 May 2008 WO
WO 2008057853 May 2008 WO
WO 2008127288 Oct 2008 WO
WO 2009076555 Jun 2009 WO
WO 2009117518 Sep 2009 WO
WO 2010062537 Jun 2010 WO
WO 2010132492 Nov 2010 WO
WO 2010150251 Dec 2010 WO
WO 2011005876 Jan 2011 WO
WO 2013009920 Jan 2013 WO
WO 2014018900 Jan 2014 WO
Non-Patent Literature Citations (194)
Entry
Khare, et.al., Nutch: A Flexible and Scalable Open-Source Web Search Engine, CommerceNet Labs Technical Report Apr. 4, 2004, pp. 1-15.
Nelson, et al., Efficient, Automatic Web Resource Harvesting, WIDM'06, Nov. 10, 2006, pp. 1-8 (Year: 2006).
Tan, et al., Modeling of Web Robot Navigational Patterns, Technical Report, TR 00-038, University of Minnesota, 2000, pp. 1-7 (Year: 2000).
U.S. Appl. No. 12/705,489, filed Feb. 12, 2010, Bargoli et al.
U.S. Appl. No. 12/705,511, filed Feb. 12, 2010, Bargoli et al.
“Aggregate and Analyze Social Media Content: Gain Faster and Broader Insight to Market Sentiment,” SAP Partner, Mantis Technology Group, Apr. 2011, pp. 4.
“Consumer Reports Finds American-Made Vehicles Close Reliability Gap with European-Made Vehicle—As Japanese Continue to Set New Benchmarks for the Industry”, Consumer Reports: Consumers Union, Yonkers, NY, Apr. 2003.
“D&B Corporate Family Linkage”, D&B Internet Access for U.S. Contract Customers, https://www.dnb.com/ecomp/help/linkage.htm as printed Dec. 17, 2009, pp. 1.
“Data Loss Prevention (DLP) Software”, http://www.symantec.com/data-loss-prevention/ printed Apr. 8, 2013 in 8 pages.
“Data Protection”, http://compliantprocessing.com/data-protection/ printed Apr. 8, 2013 in 4 pages.
“Debt Settlement: Watch Video on how to Pay Your Debt Faster”, http://www.debtconsolidationcare.com/debt-settlement.html printed Jan. 9, 2013 in 6 pages.
“Fictitious Business Name Records”, Westlaw Database Directory, http://directoy.westlaw.com/scope/default.asp?db=FBN-ALL&RS-W . . . &VR=2.0 as printed Dec. 17, 2009, pp. 5.
“GLBA Compliance and FFIEC Compliance” http://www.trustwave.com/financial-services.php printed Apr. 8, 2013 in 1 page.
“Impac Funding Introduces Enhanced Website for Static Pool Tracking of MBS Transactions,” Waltham, MA; Webpage printed out from http://www.lewtan.com/press/1208044_Impac-Lewtan.htm on Mar. 20, 2008.
“Intelligent Miner Applications Guide”, IBM Corp., Apr. 2, 1999, Chapters 4-7, pp. 33-132.
“Name Availability Records”, Westlaw Database Directory, http://directoy.westlaw.com/scope/default.asp?db=NA-ALL&RS=W . . . &VR=2.0 as printed Dec. 17, 2009, pp. 5.
“Parse”, Definition from PC Magazine Encyclopedia, http://www/pcmag.com/encyclopedia_term_0,2542,t=parse&i=48862,00.asp as downloaded Mar. 5, 2012.
“PostX to Present at Internet Showcase”, PR Newswire, Apr. 28, 1997, pp. 2.
“PremierGuide Announces Release 3.0 of Local Search Platform”, Business Wire, Mar. 4, 2004, Palo Alto, CA, p. 5574.
“PrimeQ Lead Validation Techniques Gets Stronger”, http://66.102.7.104/search?q=cache:qXAdm0EXcwYJ:www.primeq.com/absolutenm/anmv . . . , 2 pages, Nov. 29, 2005.
“Qualifying for Debt Settlement”, http://www.certifieddebt.com/debt/settlement-qualifications.shtml printed Jan. 9, 2013 in 2 pages.
“Resolve Debt for Less: With Help from Freedom Financial” http://www.debtsettlementusa.com/ printed Jan. 9, 2013 in 6 pages.
“Settling Your Debts—Part 1 in Our Debt Settlement Series”, http://www.creditinfocenter.com/debt/settle_debts.shtml printed Jan. 9, 2013 in 6 pages.
“Japan's JAAI system appraises used cars over internet”, Asia Pulse, Mar. 3, 2000.
“Mosaic” (geodemography), available from http://en.wikipedia.org/wiki/Mosaic_(geodemography), as last modified Jul. 13, 2012. pp. 4.
“WashingtonPost.com and Cars.com launch comprehensive automotive web site for the Washington area”, PR Newswire, Oct. 22, 1998.
Actuate, “Delivering Enterprise Information for Corporate Portals”, White Paper, 2004, pp. 1-7.
AKL, Selim G., “Digital Signatures: A Tutorial Survey,” Computer, Feb. 1983, pp. 15-24.
Aktas et al., “Personalizing PageRank Based on Domain Profiles”, WEBKDD workshop: Webmining and Web Usage Analysis, Aug. 22, 2004, pp. 83-90.
Aktas et al., “Using Hyperlink Features to Personalize Web Search”, WEBKDD workshop: Webmining and Web Usage Analysis, Aug. 2004.
Authenticom, “What's in a Name?”, printed Apr. 1, 2009; http://web.archive.org/web/20070708185835/http://www.authenticom.com/story.html in 1 page.
Authenticom, Technical Specs, “Confidence Level Indicators (CLI)”, printed Dec. 31, 2005, http://www.authenticom.com/confidence_level_indicators.shtml in 1 page.
BackupBox, http://mybackupbox.com printed Feb. 8, 2013 in 2 pages.
Bitran et al., “Mailing Decisions in Catalog Sales Industry”, Management Science (JSTOR), vol. 42, No. 9, pp. 1364-1381, Sep. 1996.
BlueCava, “What We Do”, http://www.bluecava.com/what-we-do/, printed Nov. 5, 2012 in 3 pages.
Brick, et al. “Unit and Item Response, Weighting, and Imputation Procedures in the 1993 National Household Education Survey (NHES:93)” U.S. Department of Education. National Center for Education Statistics, Working Paper No. 97-05, Washington, D.C., pp. 30, Feb. 1997.
Burr Ph.D., et al., “Utility Payments as Alternative Credit Data: A Reality Check”, Asset Builders of America, Inc., Oct. 5, 2006, pp. 1-18, Washington, D.C.
Buxfer, http://www.buxfer.com/ printed Feb. 5, 2014 in 1 page.
Cáceres, et al., “Measurement and Analysis of IP Network Usage and Behavior”, IEEE Communications Magazine, pp. 144-151, May 2000.
Caliendo, et al., “Some Practical Guidance for the Implementation of Propensity Score Matching”, IZA:Discussion Paper Series, No. 1588, Germany, May 2005, pp. 32.
Census Geography, Excerpted from the Geographic Reference Manual, Nov. 1994, pp. 5.
Check, http://check.me/ printed Feb. 5, 2014 in 3 pages.
Chiba et al., “Mobility Management Schemes for Heterogeneity Support in Next Generation Wireless Networks”, 3rd EuroNGI Conference on, 2007, pp. 143-150.
Chores & Allowances, “Do Kids Have Credit Reports?” Oct. 15, 2007, http://choresandallowances.blogspot.com/2007/10/do-kids-have-credit-reports.html, pp. 5.
Chung, Charles; Internet Retailer, “Multi-channel retailing requires the cleanest data—but don't expect it from the customer”, Jan./Feb. 2002.
Cohen et al., “Optimizer: IBM's Multi Echelon Inventory System for Managing Service Logistics”, Interfaces, vol. 20, pp. 65-82, Jan.-Feb. 1990.
Davies, Donald W., “Applying the RSA Digital Signature to Electronic Mail,” Computer, Feb. 1983, pp. 55-62.
Declaration of Paul Clark, DSc. for Inter Partes Review of U.S. Pat. No. 8,504,628 (Symantec Corporation, Petitioner), dated Jan. 15, 2014 in 76 pages.
Dymi, Amilda, Need for Leads Spurs Some Upgrades, Origination News-Special Report, May 1, 2008, vol. vol. 17, Issue No. 8, pp. p. 24, Atlanta, Copyright 2008 SourceMedia, Inc.
Elmasri et al., “Fundamentals of Database Systems, Third Edition (Excerpts)”, Jun. 2000, pp. 253, 261, 268-270, 278-280, 585, 595.
Ettorre, “Paul Kahn on Exceptional Marketing,” Management Review, vol. 83, No. 11, Nov. 1994, pp. 48-51.
Exhibit D to Joint Claim Construction Statement, filed in Epsilon Data Management, LLC, No. 2:12-cv-00511-JRG (E.D. Tex.) (combined for pretrial purposes with RPost Holdings. Inc., et al. v. Experian Marketing Solutions. Inc., No. 2:12-cv-00513-JRG (E.D. Tex.)) Filed Jan. 14, 2014 in 9 pages.
Experian, “Experian Rental Payment Data,” http://www.experian.com/rentbureau/rental-data.html printed Nov. 22, 2013 in 2 pages.
Experian: Improve Outcomes Through Applied Customer Insight, Brochure, Nov. 2009, pp. 20.
Experian: Mosaic Geodemographic Lifestyle Segmentation on ConsumerView [Data Card], as printed from http://datacards.experian.com/market?page=research/datacard_print&prin, Apr. 6, 2012, pp. 4.
Experian: Mosaic Public Sector 2009 Launch, 2009, pp. 164.
Experian: Mosaic UK—Unique Consumer Classification Based on In-Depth Demographic Data, as printed from http://www.experian.co.uk/business-strategies/mosaic-uk.html, Jul. 30, 2012, pp. 2.
Experian: Mosaic UK—Optimise the Value of Your Customers and Locations, Now and in the Future, Brochure, 2010, pp. 24.
Experian: Mosaic United Kingdom, Brochure, Jun. 2009, pp. 24.
Experian: Mosaic USA, Brochure, May 2009, pp. 14.
Experian: Mosaic USA—Consumer Lifestyle Segmentation [Data Card], Dec. 2009, pp. 2.
Experian: Public Sector, as printed form http://publicsector.experian.co.uk/Products/Mosaicpublicsector.aspx, 2012, pp. 2.
Fenner, Peter, “Mobile Address Management and Billing for Personal Communications”, 1st International Conference on Universal Personal Communications, 1992, ICUPC '92 Proceedings, pp. 253-257.
First Amended Complaint in Civil Action No. 2:12-cv-511-JRG (Rpost Holdings, Inc. And Rpost Communications Limited V. Constant Contact, Inc.; et al.) filed Feb. 11, 2013 in 14 pages.
First Amended Complaint in Civil Action No. 2:12-cv-511-JRG (Rpost Holdings, Inc. And Rpost Communications Limited V. Epsilon Data Management, LLC.) filed Sep. 13, 2013 in 9 pages.
First Amended Complaint in Civil Action No. 2:12-cv-513-JRG (Rpost Holdings, Inc. And Rpost Communications Limited V. Experian Marketing Solutions, Inc.) filed Aug. 30, 2013 in 9 pages.
Fisher, Joseph, “Access to Fair Credit Reports: Current Practices and Proposed Legislation,” American Business Law Journal, Fall 1981, vol. 19, No. 3, p. 319.
Garcia-Molina, “Database Systems: The Complete Book”, Prentice Hall, 2002, pp. 713-715.
Gibbs, Adrienne; “Protecting Your Children from Identity Theft,” Nov. 25, 2008, http://www.creditcards.com/credit-card-news/identity-ID-theft-and-kids-children-1282.php, pp. 4.
Greco, Susan, The Rating Game: Grade your Leads to Clear the Pipe Dreams from you Sales Pipeline, Online Reprint, Jan. 1998, vol. vol. 20, Issue No. 1, p. 93 (1-3).
Haffar, Imad, “‘SPAM’: A Computer Model for Management of Spare-Parts Inventories in Agricultural Machinery Dealerships”, Computers and Electronics in Agriculture, vol. 12, Issue 4, Jun. 1995, pp. 323-332.
Handfield, Robert B. et al., “Managing Component Life Cycles in Dynamic Technological Environments”, International Journal of Purchasing and Materials Management, Tempe, vol. 30, No. 2, pp. 20-28, Spring 1994, ProQuest ID 590096.
Herron, Janna, “Social Media-Based Credit Score?”, http://www.bankrate.com/financing/credit-cards/social-media-based-credit-score/, posted Friday, Jan. 13, 2012, printed Nov. 22, 2013 in 2 pages.
Hojoki, http://hojoki.com printed Feb. 8, 2013 in 5 pages.
Hoofnagle, Chris Jay, “Identity Theft: Making the Known Unknowns Known,” Harvard Journal of Law & Technology, Fall 2007, vol. 21, No. 1, pp. 98-122.
ID Theft Assist, “Do You Know Where Your Child's Credit Is?”, Nov. 26, 2007, http://www.idtheftassist.com/pages/story14, pp. 3.
Ideon, Credit-Card Registry that Bellyflopped this Year, Is Drawing some Bottom-Fishers, The Wall Street Journal, Aug. 21, 1995, pp. C2.
IFTTT, “About IFTTT,” http://ifttt.com/wtf printed Feb. 18, 2013 in 4 pages.
Inderfurth et al., “Decision Support for Spare Parts Acquisition in Post Product Life Cycle”, Central European Journal of Operations Research, vol. 16, pp. 17-42, 2008 [Initially published online Dec. 21, 2007].
International Preliminary Report on Patentability and Written Opinion for Application No. PCT/US2012/046316, dated Jan. 14, 2014.
International Preliminary Report on Patentability for Application No. PCT/US2010/034434, dated Feb. 4, 2014.
International Preliminary Report on Patentability for Application No. PCT/US2013/052342, dated Feb. 5, 2015.
International Search Report and Written Opinion for Application No. PCT/US07/83055, dated Jan. 7, 2009.
International Search Report and Written Opinion for Application No. PCT/US09/37565, dated May 12, 2009.
International Search Report and Written Opinion for Application No. PCT/US09/60393, dated Dec. 23, 2009.
International Search Report and Written Opinion for Application No. PCT/US2010/034434, dated Jun. 23, 2010.
International Search Report and Written Opinion for Application No. PCT/US2012/046316, dated Sep. 28, 2012.
International Search Report and Written Opinion for Application No. PCT/US2013/052342, dated Nov. 21, 2013.
International Search Report and Written Opinion in PCT Application No. PCT/US07/76152, dated Mar. 20, 2009.
iovation, Device Identification & Device Fingerprinting, http://www.iovation.com/risk-management/device-identification printed Nov. 5, 2012 in 6 pages.
Jaro, Matthew A., “Probabilistic Linkage of Large Public Health Data Files,” Statistics in Medicine,1995, vol. 14, pp. 491-498.
Käki, Anssi, “Forecasting in End-Of-Life Spare Parts Procurement”, Master's Thesis—Helsinki University of Technology System Analysis Laboratory, Jul. 27, 2007.
Kim, Bowon et al., Optimal Pricing, EOL (End of Life) Warranty, and Spare Parts Manufacturing Strategy Amid Product Transition, European Journal of Operation Research, vol. 188, pp. 723-745, 2008 [Initially published online May 1, 2007].
Klein, et al., “A Constant-Utility Index of the Cost of Living”, The Review of Economic Studies, pp. 84-87, vol. XV-XVI, Kraus Reprint Corporation, New York, 1960.
Klein, et al., “An Econometric Model of the United States: 1929-1952”, North-Holland Publishing Company, Amsterdam, 1955, pp. 4-41.
Klein, Lawrence R., “The Keynesian Revolution”, New York, The MacMillan Company, 1947, pp. 56-189.
Krupp, James A.G.; “Forecasting for the Automotive Aftermarket”; The Journal of Business Forecasting Methods & Systems; Winter 1993-1994; 12, 4; ABI/Inform Global; pp. 8-12.
Lanubile, et al., “Evaluating Empirical Models for the Detection of High-Risk Components: Some Lessons Learned”, 20th Annual Software Engineering Workshop, Nov. 29-30, 1995, Greenbelt, Maryland, pp. 1-6.
Lapide, Larry, “New Developments in Business Forecasting”, The Journal of Business Forecasting, pp. 12-14, Spring 2002.
LeadVerifier: Why Should You Use LeadVerifier?, downloaded from www.leadverifier.com/LeadVerifier_Why.asp, dated Feb. 7, 2006 on www.archive.org.
LendingTree.com, “Lender Ratings & Reviews,” http://web.archive.org/web/20091015043716/http://www.lendingtree.com/lender-reviews/, Oct. 15, 2009, in 21 pages.
Leskovec, Jure, “Social Media Analytics: Tracking, Modeling and Predicting the Flow of Information through Networks”, WWW 2011-Tutorial, Mar. 28-Apr. 1, 2011, Hyderabad, India, pp. 277-278.
Li et al., “Automatic Verbal Information Verification for User Authentication”, IEEE Transactions on Speech and Audio Processing, vol. 8, No. 5, Sep. 2000, pp. 585-596.
LifeLock, Various Pages, www.lifelock.com/, 2007.
LifeLock; “How Can LifeLock Protect My Kids and Family?” http://www.lifelock.com/lifelock-for-people/how-we-do-it/how-can-lifelock-protect-my-kids-and-family printed Mar. 14, 2008 in 1 page.
Lobo, Jude, “MySAP.com Enterprise Portal Cookbook,” SAP Technical Delivery, Feb. 2002, vol. 1, pp. 1-13.
Loshin, Intelligent Enterprise: Better Insight for Business Decisions, “Value-Added Data: Merge Ahead”, Feb. 9, 2000, vol. 3, No. 3, 5 pages.
Manilla, http://www.manilla.com/how-it-works/ printed Feb. 5, 2014 in 1 page.
McNamara, Paul, “Start-up's pitch: The Envelope, please,” Network World, Apr. 28, 1997, vol. 14, No. 17, p. 33.
Medick et al., “German Agency to Mine Facebook to Assess Creditworthiness”, Jun. 7, 2012, http://www.spiegel.de/international/germany/german-credit-agency-plans-to-analyze-individual-facebook-pages-a-837539.html printed Nov. 22, 2013 in 2 pages.
MicroBilt, “PRBC Credit Reporting Agency—Payment Reporting Builds Credit,” retrieved from http://www.microbilt.com/nontraditional-credit-report.aspx and corresponding “Sample Report,” retrieved from http://www.microbilt.com/pdfs/PRBC%20Sample%20Report%20(complete).pdf printed Nov. 21, 2013 in 8 pages.
Microfinance Africa, “Philippines: Microfinance Players to get Their Own Credit Info Bureau,” Apr. 5, 2011, http://microfinanceafrica.net/microfinance-around-the-world/philippines-microfinance-players-to-get-their-own-credit-info-bureau/ printed Nov. 22, 2013 in 2 pages.
Microsoft, “Expand the Reach of Your Business,” Microsoft Business Solutions, 2004, in 16 pages.
Miller, Joe, “NADA used-car prices go online”, Automotive News, Jun. 14, 1999, p. 36.
Mint.com, http://www.mint.com/how-it-works/ printed Feb. 5, 2013 in 2 pages.
Moore, John R., Jr. “Forecasting and Scheduling for Past-Model Replacement Parts” Management Science, Application Series, vol. 18, No. 4, Part 1, Dec. 1971, pp. B200-B213.
Mover, “One API for the Cloud,” http://mover.io printed Feb. 6, 2013 in 3 pages.
Mvelopes, http://www.mvelopes.com/ printed Feb. 5, 2014 in 2 pages.
MyReceipts—How it Works, http://www.myreceipts.com/howItWorks.do, printed Oct. 16, 2012 in 1 page.
MyReceipts, http://www.myreceipts.com/, printed Oct. 16, 2012 in 1 page.
Ogg, Erica, “Apple Cracks Down on UDID Use”, http://gigaom.com/apple/apple-cracks-down-on-udid-use/ printed Nov. 5, 2012 in 5 Pages.
Organizing Maniac's Blog—Online Receipts Provided by MyQuickReceipts.com, http://organizingmaniacs.wordpress.com/2011/01/12/online-receipts-provided-by-myquickreceipts-com/ dated Jan. 12, 2011 printed Oct. 16, 2012 in 3 pages.
Otixo, “Your Dashboard for the Cloud,” http://Otixo.com/product printed Feb. 6, 2013 in 3 pages.
Packer, A. H., “Simulation and Adaptive Forecasting an Applied to Inventory Control”, Operations Research, vol. 15, No. 4, pp. 660-679, Jul. 1965.
PersonalCapital.com, http://www.personalcapital.com/how-it-works printed Feb. 5, 2014 in 5 pages.
Peters, Peter-Paul, “A Spare Parts Configurator for the European Service Business” (Graduation Report); Honeywell, Industrial Service Logistic Center; Amsterdam, The Netherlands; 80 Pgs.; Mar. 2000.
Petition for Covered Business Method Patent Review in U.S. Pat. No. 8,161,104 (Experian Marketing Solutions, Inc., Epsilon Data Management, LLC, and Constant Contact, Inc., v. Rpost Communications Limited) dated Jan. 29, 2014 in 90 pages.
Pipes, http://pipes.yahoo.com/pipes printed Feb. 18, 2013 in 1 page.
Planet Receipt—Home, http://www.planetreceipt.com/home printed Oct. 16, 2012 in 1 page.
Planet Receipt—Solutions & Features, http://www.planetreceipt.com/solutions-features printed Oct. 16, 2012 in 2 pages.
Ponniah, Paulraj, “Data Warehousing Fundamentals: A Comprehensive Guide for IT Professionals”, Wiley-Interscience Publication, pp. 257-289, 377-397, Aug. 3, 2001.
Porter, G. Zell, “An Economic Method for Evaluating Electronic Component Obsolescence Solutions”, Retrieved from the web at www.gidep.org/data/dmsms/library/zell.pdf, May 1998, pp. 1-9.
PostX, “PostX® Envelope and ActiveView”, http://web.archive.org/web/19970714203719/http://www.postx.com/priducts_fm.html, Jul. 14, 1997 (retrieved Nov. 7, 2013) in 2 pages.
PR Web: Press Release Newswire, Anchor Launches LeadVerifier to Verify, Correct and Enhance Internet Leads, Jul. 19, 2005, pp. 2 pages, Farmingdale, NY.
Primadesk, http://primadesk.com printed Feb. 8, 2013 in 1 page.
Rahm, et al. “Data Cleaning: Problems and Current Approaches”, Bulletin of the IEEE Computer Society Technical Committee on Data Engineering, Dec. 2000, vol. 23, No. 4, pp. 11.
Raman, et al., “Potter's Wheel: An Interactive Data Cleaning System”, Proceedings of the 27th VLDB Conference, Roma, Italy, 2001, pp. 10.
Rap Interactive, Inc. and Web Decisions: Proudly Presents Live Decisions, A Powerful New Information and Technology Resource that Revolutionizes Interactive Marketing, downloaded from www.webdecisions.com/pdf/LiveDecisions_Bro.pdf, as printed on Aug. 13, 2007.
Real IQ, “Lead Metrix”, downloaded from http://www.realiq.com/leadmetrix.html, 1 page, Aug. 17, 2006.
Real IQ, “Mortgage Industry”, downloaded from http://www.realiq.com/mortgage.html, 4 pages, Aug. 17, 2006.
Real IQ, RealIQ.com, retrieved from web.archive.org http://replay.web.archive.org/20051212152337/http://www.realiq.com/mortgage.html as printed on Apr. 28, 2011, pp. 2.
Roos, Gina, “Web-Based Service Helps OEMs Cure Parts Obsolescence Blues”, Electronic Engineering Times, p. 86, Oct. 8, 2001, Dialog 09056737 78968668.
Santarini, Michael, “Forecasts the Probable Obsolescence of Components—Module Predicts Parts Life”, Electronic Engineering Times, Jan. 11, 1999, p. 48(1), Dialog 0607160353548246.
SAS, “SAS® Information Delivery Portal”, Fact Sheet, 2008, in 4 pages.
Sawyers, Arlena, “NADA to Offer Residual Guide”, Automotive News, May 22, 2000, p. 3.
Sax, Michael M., Data Collection and Privacy Protection: An International Perspective, Presentation: Managing Online Risk and Liability Conference, Aug. 31, 1999, pp. 58.
Schneier, B. “Applied Cryptography”, John Wiley & Sons, Second Edition, pp. 435-447, 1996.
ServiceObjects, “DOTS Web Services—Product Directory”, http://www.serviceobjects.com/products/directory_of_web_services.asp printed Aug. 17, 2006 in 4 pages.
ServiceObjects, “Real-Time Customer Intelligence for a Nickel”, http://www.serviceobjects.com/products/default.asp, printed Aug. 17, 2006 in 3 pages.
ShoeBoxed, https://www.shoeboxed.com/sbx-home/ printed Oct. 16, 2012 in 4 pages.
Smith, Richard M., “The Web Bug FAQ”, Nov. 11, 1999, Version 1.0, pp. 4.
Smith, Wendell R., “Product Differentiation and Market Segmentation as Alternative Marketing Strategies”, The Journal of Marketing, The American Marketing Association, Brattleboro, Vermont, Jul. 1956, vol. XXI, pp. 3-8.
Source Code Appendix attached to U.S. Appl. No. 08/845,722 by Venkatraman et al., Exhibit A, Part 1 & 2, pp. 32.
Stallings, W. “Cryptography and Network Security Principles and Practice”, Prentice Hall, Second Edition, pp. 295, 297, Jul. 15, 1998.
Stone, “Linear Expenditure Systems and Demand Analysis: An Application to the Pattern of British Demand”, The Economic Journal: The Journal of the Royal Economic Society, Sep. 1954, pp. 511-527, vol. LXIV, Macmillan & Co., London.
Storage Made Easy(SME), http://storagemadeeasy.com printed Feb. 6, 2013 in 1 page.
Sullivan, Laurie, “Obsolete-Parts Program Thriving”, EBN, Manhasset, Issue 1296, p. 26, Jan. 2002, ProQuest 10 101195090.
Tao, Lixin, “Shifting Paradigms with the Application Service Provider Model”; Concordia University, IEEE, Oct. 2001, Canada.
TARGUSinfo: Intermark Media Slashes Returned Lead Costs, Improves Affiliate Relations, downloaded from www.targusinfo.com, as printed Apr. 1, 2009, 4 pgs.
TARGUSinfo: Lead Verification, Verify Your Leads With Unique Accuracy and Ease, downloaded from www.targusinfo.com/solutions/verify/Default.asp, as printed Aug. 1, 2006.
Thoemmes, Felix, “Propensity Score Matching in SPSS”, Center for Educational Science and Psychology, University of Tübingen, Jan. 2012.
Vamosi, Robert, “How to Handle ID Fraud's Youngest Victims,” Nov. 21, 2008, http://news.cnet.com/8301-10789_3-10105303-57.html.
Various Posts from the http://www.2p.wrox.com Forums: http://web.archive.org/web/2005045221950/http://p2p.wrox.com/topic.asp?TOPIC_ID=6513 , dated Nov. 15, 2003-Oct. 7, 2004.
Web Decisions, “Live Decisions”, downloaded from http://www.webdecisions.com, 2 pages, Sep. 18, 2006.
Web Page posted at: http://web.archive.org/web20040805124909/http://www.oracle.com/technology/sample_codete/tech/pl_sql/htdocs/x/Case/start.htm, pp. 1-4 of the webpages posted on Jan. 7, 2003.
Web Pages printed Nov. 2, 2004 of Internet Draft entitled “Tunneling SSL Through a WWW Proxy”, Luotonen, Ari, Netscape Communications Corporation (Dec. 14, 1995); 4 pages. http://muffin.doit.org/docs/rfc/tunneling.sub.--ssl.html.
Webpage printed out from http://www.fairisaac.com/NR/rdonlyres/AC4C2F79-4160-4E44-B0CB-5C899004879A/0/ScoreNetnetworkBR.pdf on Mar. 4, 2008.
Webpage printed out from http://www.jpmorgan.com/cm/ContentServer?c=TS_Content&pagename=jpmorgan%2Fts%FTS_Content%2FGeneral&cid=1139403950394 on Mar. 20, 2008, Feb. 13, 2006, New York, NY.
Webster, Lee R., “Failure Rates & Life Cycle Costs”, Consulting-Specifying Engineer; 23, 4; ABI/INFORM Global, Apr. 1998, p. 42.
Williams, Mark, “Results of the 1998 NASFAA Salary Survey”, News from NASFAA, 1998.
Working, Holbrook, “Statistical Laws of Family Expenditure”, Journal of the American Statistical Association, pp. 43-56, vol. 38, American Statistical Association, Washington, D.C., Mar. 1943.
Yodlee | Money Center, https://yodleemoneycenter.com/ printed Feb. 5, 2014 in 2 pages.
You Need a Budget, http://www.youneedabudget.com/features printed Feb. 5, 2014 in 3 pages.
Zapier, “Integrate Your Web Services,” http://www.Zapier.com printed Feb. 18, 2013 in 3 pages.
U.S. Appl. No. 12/058,632, Systems and Methods for Data Verification, filed Mar. 28, 2008.
U.S. Appl. No. 13/620,103, Systems and Methods for Data Verification, filed Sep. 14, 2012.
Corepoint Health, “The Continuity of Care Document—Changing the Landscape of Healthcare Information Exchange,” Jan. 2009, pp. 9.
“Experian Helps Verify the Identity of Patients and Provide Secure Enrollment to Healthcare Portals by Integrating with Major Electronic Medical Records Platform,” http://press.experian.com/United-States/Press-Release/experian-helps-verify-the-identify-of-patients-and-provide-secure-enrollment-to-healthcare.aspx?&p=1, Dec. 19, 2013, pp. 2.
Glenn, Brandon, “Multi-provider patient portals get big boost with ONC ruling”, Feb. 25, 2013, http://medicaleconomics.modernmedicine.com/medical-economics/news/user-defined-tags/meaningful-use/multi-provider-patient-portals-get-big-boost in 2 pages.
Healow.com, Various screenshots from page titled “Health and Online Wellness,” https://healow.com/apps/jsp/webview/index.jsp printed Aug. 19, 2013 in 4 pages.
Healthspek.com, “How Good Are We?” http://healthspek.com/how-good-are-we/ printed Jan. 21, 2014 in 2 pages.
“Healthspek Users Can Now Import Their Doctors' Records into Their Personal Health Record,” PRWeb, Nashville, TN, Jan. 14, 2014, pp. 1 http://www.prweb.com/releases/2014/01/prweb11485346.htm.
igiHealth.com, “Orbit® PHR: Personal Health Record (PHR),” http://www.igihealth.com/consumers/orbit_phr.html, printed Jan. 21, 2014 in 2 pages.
InsightsOne.com, “Healthcare,” http://insightsone.com/healthcare-predictive-analytics/ printed Mar. 6, 2014 in 5 pages.
Tennant, Don, “How a Health Insurance Provider Uses Big Data to Predict Patient Needs,” http://www.itbusinessedge.com/blogs/from-under-the-rug/how-a-health-insurance-provider-uses-big-data-to-predict-patient-needs.html, printed Mar. 6, 2014 in 2 pages.
Application as filed in U.S. Appl. No. 11/893,609, filed Aug. 16, 2007.
Official Communication in Australian Patent Application No. 2012281182, dated Jul. 8, 2014.
Official Communication in Australian Patent Application No. 2012281182, dated May 19, 2015.
Official Communication in Chinese Patent Application No. 201280041782.2, dated Mar. 4, 2016.
Official Communication in European Patent Application No. 12811546.6, dated Nov. 25, 2014.
Official Communication in European Patent Application No. 12811546.6, dated Sep. 18, 2015.
Official Communication in Russian Patent Application No. 2014101674/08, dated Dec. 15, 2014.
MERit Credit Engine™, Diagram, http://creditengine.net/diagram.htm, copyright 1997, pp. 1.
“STAGG Variables Sum Up Credit Attributes for Automated Decisions”, PRWeb, May 11, 2011, pp. 2. http://www.prweb.com/releases/2011/5/prweb8404324.htm.
Related Publications (1)
Number Date Country
20160328476 A1 Nov 2016 US
Provisional Applications (1)
Number Date Country
60921188 Mar 2007 US
Continuations (2)
Number Date Country
Parent 13620103 Sep 2012 US
Child 15155882 US
Parent 12058632 Mar 2008 US
Child 13620103 US