Abstract: A system and method assigns documents to a list of documents for a project team to complete based on the level of each of various risks the project is identified to have, and whether the benefits of risk containment afforded by each document outweighs the cost of completion of the document when the risk or risks addressed by the document are at the level identified for the project.
Abstract: A system and method provides access to one or more web services requested from a web site by using an app on a smart device, such as a smart phone or tablet, or the smart device itself.
Type:
Grant
Filed:
September 19, 2021
Date of Patent:
September 19, 2023
Assignee:
Charles Schwab & Co., Inc.
Inventors:
Jay Desai, Konstantinos P. Konstantinides, Suwat Phruksawan, Toby R. Kendall, Patrick C. McGraw, Dominic E. Caudell, Valery Zubovsky, Charles E. Gotlieb
Abstract: A system and method uses a two-dimensional graphics library to generate an image representation that can be used by a three-dimensional graphics library to render the image.
Abstract: A system and method receives a request for an event that is not fully specified, and predicts sufficient details of the event to instruct a hardware distributor to route the 5 request to an agent that can handle the predicted request.
Abstract: A system and method on one computer records actions on objects performed on a second computer. If an object is deleted from the second computer, the first computer can restore to a point in time the state of the object on the second computer, including assignments made between it and other objects, using the recorded actions.
Abstract: A system and method receives a request for an event that is not fully specified, and predicts sufficient details of the event to instruct a hardware distributor to route the request to an agent that can handle the predicted request.
Abstract: A system and method synchronizes accounts across different computer systems using a matching computer system and a network, when the accounts on the source computer system are organized differently than they are on the destination computer system.
Abstract: A system and method provides security features for inter-computer communications. A user identifier of the user that cannot be used to log the user in to a data consolidating system is received by a matching system from the data consolidating system. The validity of the user is checked at the matching system and, in response to the checking, the user identifier is converted to a different user identifier and the different user identifier is provided to a data providing system by the matching system. The data providing system provides the data of the user in response, and the matching system forwards the data to the data consolidating system.
Abstract: A system and method allows a user to register one or more PINs on one or more user devices, and then authenticates the user to a server via the PIN and a token deposited on the user device being used by the user to allow access to an application on the user device. Individual tokens, or all tokens deposited on the user devices for a user account, may be invalidated, and the user is prevented from authenticating himself or herself via a PIN to allow access to an application on any device for which the last token deposited was invalidated, until the same or different PIN is registered for that device.
Abstract: A system and method allows users of a social network system to view different types of information based on rights and privileges associated with the information and attributes and characteristics of each user.
Type:
Grant
Filed:
August 28, 2017
Date of Patent:
January 17, 2023
Assignee:
Charles Schwab & Co., Inc.
Inventors:
Kenneth M. Bravmann, Benjamin N. Mattias, Jeffrey M. Weaver, Sandeep Reddy Chelamacherla Anand, John Murphy, Charles E. Gotlieb
Abstract: A system and method allows a light colored image of an object such as a check to be detected and captured on a light colored background for uploading to a server for processing. Detection involves detecting edges of objects on the image, drawing a rectangle around the detected edges, testing for an aspect ratio of the rectangle within an approved range, testing for the rectangle being outside of a margin of the image and being a certain percentage of the image, and testing for blur within a tolerable range.
Abstract: A system and method allows a matching system to mediate requests for information among different computer systems without storing information that can be used to log into those computer systems.
Abstract: A system and method allows a matching system to mediate requests for information among different computer systems without storing information that can be used to log into those computer systems.
Abstract: A system and method identifies a score for a user using the user's response to questions from a number of different financial and other-than-financial planning dimensions.
Abstract: A system, method and computer program product collects and provides for display operational status data in several levels of detail about multiple client computer systems.
Abstract: A system and method allows an app to be used to signal a server to authenticate a user using two factor authentication. The app is one previously associated with a user account, optionally using a different form of two factor authentication.
Abstract: A system and method assigns documents to a list of documents for a project team to complete based on the level of each of various risks the project is identified to have, and whether the benefits of risk containment afforded by each document outweighs the cost of completion of the document when the risk or risks addressed by the document are at the level identified for the project.
Abstract: A system and method detects and handles replay attacks using counters maintained for each of several different periods for various values of IP addresses and browser description attributes encountered.
Abstract: A system and method uses different authentication techniques, including weak passive authentication techniques, to authenticate users by generating a score and comparing it to a threshold selected according to the feature the user is requesting.