Patents by Inventor Glenn A. Kramer
Glenn A. Kramer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230325582Abstract: Provided are systems and methods for dynamically transforming an unstructured document to a structured document prior to, during, or subsequent to transfer of information via the unstructured document. The transformation may be based on processing a variety of factors, such as the content of the unstructured document, request from a first party transferring the document, identity or characteristics of the first party, request from a second party requesting the document, and identity or characteristics of the second party.Type: ApplicationFiled: March 16, 2023Publication date: October 12, 2023Inventors: Mark A. Shapiro, Bryan J. Federowicz, Glenn A. Kramer
-
Publication number: 20230177370Abstract: In an aspect, the present disclosure provides a system comprising a computer processor and a storage device having instructions stored thereon that are operable, when executed by the computer processor, to cause the computer processor to: (i) receive clinical data of a subject and a set of treatment options for a disease or disorder of the subject, wherein the set of treatment options corresponds to clinical outcomes having future uncertainty; (ii) access a prediction module comprising a trained machine learning model that determines probabilistic predictions of clinical outcomes of the set of treatment options based at least in part on clinical data of test subjects; and (iii) apply the prediction module to at least the clinical data of the subject to determine probabilistic predictions of clinical outcomes of the set of treatment options.Type: ApplicationFiled: December 5, 2022Publication date: June 8, 2023Inventors: Asher Wasserman, Mark Shapiro, Jeffrey C. Shrager, Glenn A. Kramer
-
Patent number: 8706599Abstract: An automated method is provided for generating investment criteria for an investment vehicle that includes a pool of escrow deposits from a plurality of merger and acquisition transactions. An escrow history database is maintained of data derived from historical behavior of escrows from a plurality of previous merger and acquisition transactions. An escrow pool database is maintained of current escrow deposit data from a plurality of current merger and acquisition transactions. The escrow pool database includes the current deposit amounts in the pool of escrow deposits, and stated terms governing the release of each deposit amount in the pool of the escrow deposits. A set of investment criteria for selecting an asset pool is generated using a processor operating on the escrow history database and the escrow pool database. The set of investment criteria includes maturity metrics selected from the group consisting of weighted average maturity, convexity, and maturity distribution profile.Type: GrantFiled: November 8, 2012Date of Patent: April 22, 2014Assignee: Shareholder Representative Services, LLCInventors: William P. Koenig, Glenn A. Kramer, Mark B. Vogel
-
Publication number: 20130317995Abstract: A method is provided for annotating portions of a transactional legal document related to a merger or acquisition of a business entity. An electronic data source is maintained that stores data related to a plurality of different metrics in merger or acquisition transactions. At least some of the data is updated as new merger or acquisition transactions occur. Portions of a legal document are electronically annotated with one or more annotations that graphically display data related to different metrics in merger or acquisition transactions. The annotations are created using the data stored in the electronic data source. The annotations reflect the most current data stored in the electronic data source. At least some of the annotations change over time as new merger or acquisition transactions occur.Type: ApplicationFiled: May 22, 2013Publication date: November 28, 2013Inventors: William P. KOENIG, Glenn A. KRAMER, Daniel A. URBANO, Mark B. VOGEL
-
Patent number: 8566750Abstract: Systems and methods for assigning weights to a plurality of objects are defined. Metrics associated with the objects are defined. A cursor is displayed and movement of the cursor is constrained by a control weight shape. Movement of the cursor within the control weight shape defines the weights assigned to the metrics. A display weight shape including a plurality of display weight factors is displayed. Each of the display weight factors corresponds to one of the metrics and their display corresponds to the weights assigned to the metrics.Type: GrantFiled: December 19, 2007Date of Patent: October 22, 2013Assignee: Bespoke Innovations SARLInventor: Glenn A. Kramer
-
Publication number: 20130254126Abstract: A method is provided for annotating portions of a transactional legal document related to a merger or acquisition of a business entity. An electronic data source is maintained that stores data related to a plurality of different metrics in merger or acquisition transactions. At least some of the data is updated as new merger or acquisition transactions occur. Portions of a legal document are electronically annotated with one or more annotations that graphically display data related to different metrics in merger or acquisition transactions. The annotations are created using the data stored in the electronic data source. The annotations reflect the most current data stored in the electronic data source. At least some of the annotations change over time as new merger or acquisition transactions occur.Type: ApplicationFiled: July 5, 2012Publication date: September 26, 2013Applicant: SHAREHOLDER REPRESENTATIVE SERVICES, LLC.Inventors: William P. KOENIG, Glenn A. Kramer, Daniel A. Urbano, Mark B. Vogel
-
Patent number: 8356333Abstract: A system and method for indicating to a user that a networked site is authentic includes a verification application configured to send a request to verify the authenticity of the networked site together with identity information about the site to a verification server. The verification application has access to encrypted user-customized information that was previously selected by a user and is encrypted and stored focally on the end-user device. The verification server verifies whether the networked site is authentic and is further configured to enable decryption of the encrypted user-customized information when a networked site is verified as authentic, so that the user-customized information can be presented to the user.Type: GrantFiled: September 6, 2007Date of Patent: January 15, 2013Assignee: Bespoke Innovations SarlInventor: Glenn A Kramer
-
Patent number: 8302170Abstract: A method for securing communications between a server and an application downloaded over a network onto a client of the server is disclosed. A first request is received from the client, and in response a session credential security token is generated and sent to the client. A second request is received from the client to download the application and includes the value of the session credential security token. The server verifies that the value of the session credential security token is valid and, if so, generates a second security token that is tied to the session credential security token. The second token is embedded in application code and then the application code is sent to the client. A subsequent request for data from the application running on the client includes the value of the session credential security token and the value of the embedded security token.Type: GrantFiled: September 22, 2009Date of Patent: October 30, 2012Assignee: Bespoke Innovations S.a.r.l.Inventors: Glenn A. Kramer, Thomas H. Van Vleck
-
Publication number: 20100077216Abstract: A method for securing communications between a server and an application downloaded over a network onto a client of the server is disclosed. A first request is received from the client, and in response a session credential security token is generated and sent to the client. A second request is received from the client to download the application and includes the value of the session credential security token. The server verifies that the value of the session credential security token is valid and, if so, generates a second security token that is tied to the session credential security token. The second token is embedded in application code and then the application code is sent to the client. A subsequent request for data from the application running on the client includes the value of the session credential security token and the value of the embedded security token.Type: ApplicationFiled: September 22, 2009Publication date: March 25, 2010Applicant: BESPOKE INNOVATIONS S.A.R.L.Inventors: Glenn A. KRAMER, Thomas H. VAN VLECK
-
Publication number: 20100031022Abstract: A system and method for indicating to a user that a networked site is authentic includes a verification application configured to send a request to verify the authenticity of the networked site together with identity information about the site to a verification server. The verification application has access to encrypted user-customized information that was previously selected by a user and is encrypted and stored focally on the end-user device. The verification server verifies whether the networked site is authentic and is further configured to enable decryption of the encrypted user-customized information when a networked site is verified as authentic, so that the user-customized information can be presented to the user.Type: ApplicationFiled: September 6, 2007Publication date: February 4, 2010Applicant: COLUMBUS VENURE CAPITAL S .A. R. L.Inventor: Glenn A. KRAMER
-
Publication number: 20090164948Abstract: Systems and methods for assigning weights to a plurality of objects are defined. Metrics associated with the objects are defined. A cursor is displayed and movement of the cursor is constrained by a control weight shape. Movement of the cursor within the control weight shape defines the weights assigned to the metrics. A display weight shape including a plurality of display weight factors is displayed. Each of the display weight factors corresponds to one of the metrics and their display corresponds to the weights assigned to the metrics.Type: ApplicationFiled: December 19, 2007Publication date: June 25, 2009Applicant: COLUMBUS VENTURE CAPITAL S.A.R.L.Inventor: Glenn A. Kramer
-
Publication number: 20090077373Abstract: A system and method are disclosed for presenting a message relating to a networked site on an end-user device, the message preferably originating from a third party that is not a provider of the site. The end-user device receives a message blob containing the message and associated verification information when the networked site is accessed. A verification application then sends a request to verify the authenticity of a message blob to a verification server. If the verification server verifies that the message blob is authentic based on the verification information, presentation of the site-specific information on the end-user device is enabled.Type: ApplicationFiled: September 12, 2008Publication date: March 19, 2009Applicant: COLUMBUS VENTURE CAPITAL S. A. R. L.Inventor: Glenn A. KRAMER
-
Publication number: 20030140007Abstract: In one embodiment, an architecture that consummates an electronic transaction between a first electronic device, such as a merchant device or an acquirer device, and a second electronic device, such as an issuer device, by establishing a communication between the first electronic device and the second electronic device via a communication linkage, such as the Internet. Payment information is transmitted, corresponding to a payment instrument of a party, such as a consumer purchasing goods or services from the merchant, from the first electronic device to the second electronic device. The second electronic device receives the payment information, evaluates the payment information based on the payment instrument, and ultimately transmits approval of the transaction from the second electronic device to the first electronic device, including settling the payment using an electronic transmission of monetary value.Type: ApplicationFiled: July 2, 2002Publication date: July 24, 2003Inventors: Glenn A. Kramer, Jay C. Weber
-
Patent number: 6363363Abstract: An architecture is disclosed allowing a server to communicate bidirectionally with a gateway over a first communication link, over which service requests are initiated by the server. In response to a transaction received from a host legacy system at the gateway, the gateway parses one or more transaction response values from the host message, maps the one or more transaction response values to a canonical response code, and stores the canonical response code in a transaction log. According to a broad aspect of a preferred embodiment of the invention, communication networks that employ transactions between applications must effectively manage transactions that flow over the network. In addition, networking systems must also detect counterfeit transactions, especially, when the networking systems are utilized for financial transactions. An active, on-line database is utilized as a transaction log to track original requests, valid retrys and detect fradulant transactions.Type: GrantFiled: August 24, 1999Date of Patent: March 26, 2002Assignee: VeriFone, Inc.Inventors: Daniel R. Haller, Trong Nguyen, Kevin T. B. Rowney, David A. Berger, Glenn A. Kramer
-
Patent number: 6327574Abstract: A system and method provide for the interpretation and augmenting of structured documents electronically delivered to an individual consumer's computer using consumer profiles developed from and maintained with information reflecting the consumer's online and offline transactions, by selecting the variable content alternatives encoded in the structured documents that most closely match the consumer's profile. The consumer profiles are logically controlled by the consumer's computer, thus providing for enhanced security over information that is personal and confidential to the consumer, yet still allowing third parties such as web sites and others electronically delivering structured documents to the consumer to have such documents customized based on the consumer's profile.Type: GrantFiled: February 1, 1999Date of Patent: December 4, 2001Assignee: Encirq CorporationInventors: Glenn A. Kramer, Mark B. Vogel
-
Patent number: 6324525Abstract: In one embodiment, an architecture that consummates an electronic transaction between a first electronic device, such as an acquirer device, a second electronic device, such as an issuer device, and a plurality of electronic terminals, such as merchant terminals, by establishing a communication between the plurality of devices and terminals and accumulating transactions that are approved by the second electronic device. Then, periodically the plurality of transactions are settled using a transfer of monetary value between the first electronic device and the second electronic device. For example, the present invention uses electronic cash transfer to replace conventional settlement, which requires the use of a third-party settlement service.Type: GrantFiled: July 22, 1998Date of Patent: November 27, 2001Assignee: Hewlett-Packard CompanyInventors: Glenn A. Kramer, Jay C. Weber
-
Patent number: 6286099Abstract: The present invention provides for determining point of interaction device security properties for secure transmission of a transaction between a plurality of electronic devices, such as point of interaction (POI) devices or computer systems (or both), over a public communication system, such as the Internet. In one embodiment, a communication is established between a first electronic device and a second electronic device using a public network. Digital certificates are then exchanged to validate the parties and to provide a secure channel for transmission of data. Device security properties of the first electronic device are determined based on information transmitted by the first electronic device to the second electronic device thereby allowing the second electronic device to accept or reject a transaction request from the first electronic device based (in part) on the device security properties of the first electronic device.Type: GrantFiled: July 23, 1998Date of Patent: September 4, 2001Assignee: Hewlett-Packard CompanyInventor: Glenn A. Kramer
-
Patent number: 6253027Abstract: Secure transmission of data is provided between a plurality of computer systems over a public communication system, such as the Internet. Secure transmission of data is provided from a customer computer system to a merchant computer system, and for the further secure transmission of payment information regarding a payment instrument from the merchant computer system to a payment gateway computer system. The payment gateway system evaluates the payment information and returns a level of authorization of credit via a secure transmission to the merchant which is communicated to the customer by the merchant. The merchant can then determine whether to accept the payment instrument tendered or deny credit and require another payment instrument. An architecture that provides support for additional message types that are not SET compliant is provided by a preferred embodiment of the invention. A server communicating bidirectionally with a gateway is disclosed.Type: GrantFiled: June 17, 1996Date of Patent: June 26, 2001Assignee: Hewlett-Packard CompanyInventors: Jay C. Weber, Kevin T. B. Rowney, Glenn A. Kramer
-
Patent number: 6163772Abstract: Secure transmission of data is provided between a plurality of computer systems over a public communication system, such as the Internet. For example, secure transmission of data is provided between a merchant server and an acquirer gateway using Secure Electronic Transaction (SET) compliant messages. However, gateway-initiated messages are not SET compliant. Accordingly, secure transmission of data using additional messages that are not SET compliant is provided in accordance with one embodiment of the present invention. In one embodiment, a method for virtual point of sale processing using gateway-initiated messages, includes establishing a first communication link (e.g., operating under the Internet Protocol) between an acquirer gateway and a merchant server, the first communication link being initiated by the acquirer gateway, and transmitting a gateway-initiated message (e.g.Type: GrantFiled: June 26, 1998Date of Patent: December 19, 2000Assignee: Hewlett-Packard CompanyInventors: Glenn A. Kramer, Jay C. Weber
-
Patent number: 6072870Abstract: Secure transmission of data is provided between a plurality of computer systems over a public communication system, such as the Internet. Secure transmission of data is provided from a customer computer system to a merchant computer system, and for the further secure transmission of payment information from the merchant computer system to a payment gateway computer system. The payment gateway system formats transaction information appropriately and transmits the transaction to the particular host legacy system. The host legacy system evaluates the payment information and returns a level of authorization of credit to the gateway which packages the information to form a secure transaction which is transmitted to the merchant which is in turn communicated to the customer by the merchant. The merchant can then determine whether to accept the payment instrument tendered or deny credit and require another payment instrument.Type: GrantFiled: June 17, 1996Date of Patent: June 6, 2000Assignee: VeriFone Inc.Inventors: Trong Nguyen, Daniel R. Haller, Glenn A. Kramer