Abstract: A computer-implemented method for providing tenant aware, variable length, deduplication of data stored on a non-transitory computer readable storage medium. The method is performed at least in part by circuitry and the data comprises a plurality of data items. Each of the plurality of data items is associated with a particular tenant of a group of tenants that store data on the storage medium.
Abstract: A computer-implemented method for providing tenant aware, variable length, deduplication of data stored on a non-transitory computer readable storage medium. The method is performed at least in part by circuitry and the data comprises a plurality of data items. Each of the plurality of data items is associated with a particular tenant of a group of tenants that store data on the storage medium.
Abstract: A computer-implemented method for matching user inputted text to stored text. The user inputted text is compared to each of the text strings stored in a database using a Levenshtein distance algorithm. For each comparison, the Levenshtein distance is analyzed to determine exact matches, non-matches, and probable matches. Probable matches are further analyzed using a keyboard distance algorithm to differentiate between matches and non-matches.
Type:
Grant
Filed:
May 19, 2020
Date of Patent:
November 3, 2020
Assignee:
Bottomline Technologies (de), Inc.
Inventors:
Melissa Kutsch, Jessica Moran, Brian Amend, Sean Glerum
Abstract: A computer-implemented method for matching user inputted text to stored text. The user inputted text is compared to each of the text strings stored in a database using a Levenshtein distance algorithm. For each comparison, the Levenshtein distance is analyzed to determine exact matches, non-matches, and probable matches. Probable matches are further analyzed using a keyboard distance algorithm to differentiate between matches and non-matches.
Type:
Application
Filed:
May 19, 2020
Publication date:
September 3, 2020
Applicant:
Bottomline Technologies (de) Inc.
Inventors:
Melissa Kutsch, Jessica Moran, Brian Amend, Sean Glerum
Abstract: A unique user interface for improving machine learning algorithms is described herein. The user interface comprises an icon with multiple visual indicators displaying the machine learning confidence score. When a mouse hovers over the icon, a set of icons are displayed to accept the teaching user's input. In addition, the words that drove the machine learning confidence score are highlighted with formatting so that the teaching user can understand what drove the machine learning confidence score.
Type:
Grant
Filed:
March 12, 2019
Date of Patent:
August 4, 2020
Assignee:
Bottomline Technologies, Inc.
Inventors:
Michael Marcinelli, Flora Kidani, John Canneto, Anne Baron, Jonathan Hewitt, William Cashman
Abstract: A computer-implemented method for matching user inputted text to stored text. The user inputted text is compared to each of the text strings stored in a database using a Levenshtein distance algorithm. For each comparison, the Levenshtein distance is analyzed to determine exact matches, non-matches, and probable matches. Probable matches are further analyzed using a keyboard distance algorithm to differentiate between matches and non-matches.
Type:
Grant
Filed:
January 24, 2019
Date of Patent:
June 30, 2020
Assignee:
Bottomline Technologies, Inc
Inventors:
Brian Amend, Sean Glerum, Melissa Kutsch, Jessica Moran
Abstract: A method for using machine learning techniques to analyze past decisions (made be administrators concerning account opening requests) and to recommend whether an account opening request should be allowed or denied.
Type:
Application
Filed:
November 9, 2018
Publication date:
May 14, 2020
Applicant:
Bottomline Technologies (DE), Inc.
Inventors:
Leonardo Gil, Peter Cousins, Alexey Skosyrskiy
Abstract: A method for securing data by embedding the data in a data structure and utilizing a sensor device to detect transfer of the data structure. The data is embedded such that the data is only accessible by first executing an executable program. If the executable program determines that the device attempting to access the data (the accessing device) does not have permission to access the data, then the executable program destroys all or a portion of the data. If the data structure is transferred to another device, a sensor device positioned to detect the data structure when transferred will identify the data. If the sensor device determines that the data structure is not permitted to be transferred, then the sensor device destroys all or a portion of the data.
Abstract: A method for securing data by embedding the data in a data structure and utilizing a sensor to detect transfer of the data structure. The data is embedded such that the data is only accessible by first executing an executable program. If the executable program determines that the device attempting to access the data (the accessing device) does not have permission to access the data, then the executable program destroys the data. If the data structure is transferred to another device, a sensor positioned to detect the data structure when transferred will identify the data. If the sensor determines that the data structure is not permitted to be transferred, then the sensor destroys the data.
Abstract: A method and device for providing notification of improper access to secure data on a mobile device. The mobile device detects a request to record content displayed on a display of the mobile device. A determination is then made regarding whether the content that was displayed on the screen when the request to record was received is protected content. If the displayed content was protected, then a third party is notified that a security breach has been detected. A remedial action is also performed regarding the security breach.
Abstract: A computer-implemented method for providing tenant aware, variable length, deduplication of data stored on a non-transitory computer readable storage medium. The method is performed at least in part by circuitry and the data comprises a plurality of data items. Each of the plurality of data items is associated with a particular tenant of a group of tenants that store data on the storage medium.
Abstract: A computer-implemented method for matching user inputted text to stored text. The user inputted text is compared to each of the text strings stored in a database using a Levenshtein distance algorithm. For each comparison, the Levenshtein distance is analyzed to determine exact matches, non-matches, and probable matches. Probable matches are further analyzed using a keyboard distance algorithm to differentiate between matches and non-matches.
Type:
Application
Filed:
January 24, 2019
Publication date:
May 23, 2019
Applicant:
Bottomline Technologies (DE), Inc.
Inventors:
Brian Amend, Sean Glerum, Melissa Kutsch, Jessica Moran
Abstract: A computer-implemented method for providing tenant aware, variable length, deduplication of data stored on a non-transitory computer readable storage medium. The method is performed at least in part by circuitry and the data comprises a plurality of data items. Each of the plurality of data items is associated with a particular tenant of a group of tenants that store data on the storage medium.
Abstract: A computer-implemented method for matching user inputted text to stored text. The user inputted text is compared to each of the text strings stored in a database using a Levenshtein distance algorithm. For each comparison, the Levenshtein distance is analyzed to determine exact matches, non-matches, and probable matches. Probable matches are further analyzed using a keyboard distance algorithm to differentiate between matches and non-matches.
Type:
Grant
Filed:
June 3, 2016
Date of Patent:
March 19, 2019
Assignee:
Bottomline Technologies (de), Inc.
Inventors:
Brian Amend, Sean Glerum, Melissa Kutsch, Jessica Moran
Abstract: A financial messaging apparatus configured to encapsulate and transmit a financial message along with actions to a mobile device. The actions relate to rules that are associated with characteristics of the financial message.
Type:
Grant
Filed:
February 12, 2018
Date of Patent:
November 27, 2018
Assignee:
BOTTOMLINE TECHNOLOGIES (DE) INC.
Inventors:
Leo Gil, Matthew Doherty, Brian Smith Mclaughlin
Abstract: A system and method is presented for receiving required information (i.e., clearing information) for performing a global electronic funds transfer. The system and method generates a form for receiving the clearing information from a user. The form includes clearing information fields that are each configured to accept an element of clearing information. The clearing information fields of the form are dynamically updated based on clearing information rules. The clearing information rules define a relationship between at least one of the clearing information fields and the clearing information received from the user. The dynamically updated form is provided to the user to input further clearing information.
Type:
Grant
Filed:
March 15, 2013
Date of Patent:
April 17, 2018
Assignee:
BOTTOMLINE TECHNOLOGIES (DE) INC.
Inventors:
Nicole Pierrette Dwyer, Nicholas Anthony Griffin, Michael Alan Vigue, Eric Campbell
Abstract: The present disclosure provides a financial messaging apparatus configured to encapsulate and transmit a financial message along with actions to a mobile device. The actions relate to rules that are associated with characteristics of the financial message.
Type:
Grant
Filed:
September 18, 2014
Date of Patent:
March 27, 2018
Assignee:
Bottomline Technologies (DE) Inc.
Inventors:
Leo Gil, Matthew Doherty, Brian Smith Mclaughlin
Abstract: According to an aspect, a computing device includes a processor; a computer readable memory; a display screen; a touch sensitive panel overlying the display screen; and computing device application instructions coded in the computer readable memory and executed by the processor to: display a user-selectable photograph on the display screen, the user-selectable photograph including a group of fiducials, generate captured pattern data, the captured pattern data representing coordinate values on the touch sensitive panel where touched by a user, and provide for authentication of the user based on a comparison of the captured pattern data and respective locations of the group of fiducials included in the user-selectable photograph.
Type:
Grant
Filed:
January 31, 2013
Date of Patent:
May 30, 2017
Assignee:
BOTTOMLINE TECHNOLOGIES (DE) INC.
Inventors:
Brian Smith McLaughlin, Leonardo B. Gill, Marshall Joseph Tracy, Erik Vaughn Mitchell, Jeffrey Todd Dixon
Abstract: According to an aspect, a computing device includes a processor; a computer readable memory; a display screen; a touch sensitive panel overlying the display screen; and computing device application instructions coded in the computer readable memory and executed by the processor to: display a user-selectable photograph on the display screen, the user-selectable photograph including a group of fiducials, generate captured pattern data, the captured pattern data representing coordinate values on the touch sensitive panel where touched by a user, and provide for authentication of the user based on a comparison of the captured pattern data and respective locations of the group of fiducials included in the user-selectable photograph.
Type:
Grant
Filed:
June 16, 2014
Date of Patent:
January 3, 2017
Assignee:
Bottomline Technologies, Inc.
Inventors:
Brian Smith McLaughlin, Leonardo B. Gil, Marshall Joseph Tracy, Erik Vaughn Mitchell, Jeffrey Todd Dixon, Durgaprasad Nagalla, Venkatesh Mohanraj
Abstract: The invention includes methods and systems for analyzing data to determine trends in the data and to identify outliers. The methods and systems include a learning algorithm whereby a data space is co-populated with artificial, evenly distributed data, and then the data space is carved into smaller portions whereupon the number of real and artificial data points are compared. Through an iterative process, clusters having less than evenly distributed real data are discarded. Additionally, a final quality control measurement is used to merge clusters that are too similar to be meaningful. The invention is widely applicable to data analytics, generally, including financial transactions, retail sales, elections, and sports.