Tue, 24 Nov 2015 08:00:00 ESTThe specification discloses a method of doing business over the public Internet, particularly, a method which enables access to legacy management tools used by a telecommunications enterprise in the management of the enterprise business to the enterprise customer, to enable the customer to more effectively manage the business conducted by the customer through the enterprise, this access being provided over the public Internet. This method of doing business is accomplished with one or more secure web servers which manage one or more secure client sessions over the Internet, each web server supporting secure communications with the client workstation; a web page backplane application capable of launching one or more management tool applications used by the enterprise. Each of the management tool applications provide a customer interface integrated within said web page which enables interactive Web/Internet based communications with the web servers; each web server, supports communication of messages entered via the integrated customer interface to one or more remote enterprise management tool application servers which interact with the enterprise management tool applications to provide associated management capabilities to the customer.
Tue, 18 Aug 2015 08:00:00 EDTThe present invention provides a method and a system for providing at least one communications service to one or more service providers by a communications service provider. Communications capabilities of the communications service provider are sliced into a plurality of virtual slices and each of the plurality of virtual slices is configured for a different service provider from among the one or more service providers. At least one communications service is provided to each of the one or more service providers through a respective configured virtual slice by the communications service provider. Each of the one or more service providers further provides the communications service to a user through the respective configured virtual slice in collaboration with the communications service provider.
Tue, 28 Jul 2015 08:00:00 EDTA fact checking system verifies the correctness of information and/or characterizes the information by comparing the information with one or more sources. The fact checking system automatically monitors, processes, fact checks information and indicates a status of the information.
Tue, 09 Jun 2015 08:00:00 EDTAn apparatus for performing data entry by a user includes a first electronic device configured to be attached to a person's head and including a display for viewing by the person; and a second electronic device configured to be attached to a person's forearm and used in combination with the first electronic device. The first and second electronic devices are configured for wirelessly communications with each other, at least some of the wireless communications representing user input by the person for interfacing with a user interface displayed to the person on the display of the first electronic device, whereby data entry by the person is accomplished. The first electronic device is configured to wirelessly transmit data entered by the person to a computer system for electronic storage in a non-transitory computer readable medium.
Tue, 09 Jun 2015 08:00:00 EDTA method and system for transmitting data between devices within a fueling environment comprising a wireless mesh network wherein the devices are configured to communicate via the wireless mesh network. A wireless communication device is connected to each device, and a middleware executed by the wireless communication device handles communications between the devices and the wireless mesh network.
Tue, 26 May 2015 08:00:00 EDTA Virtual Single Account (VSA) system and method that provides a mobile user with automatic authentication and connection to a remote network via local access networks with a single password, where the local access networks may be independent of the remote network. A mobile user has a single authentication credential for one VSA that is utilized by a VSA client installed on a mobile computing device. The VSA client provides for automatically authenticating and connecting the user's mobile device to a current local access network, and the target remote network such as the user's office network. All authentication credentials are encrypted using a key generated from the user's VSA password that is generated from the user's single password. The VSA client derives the key from the submitted VSA password and decrypts all authentication credentials that are required in order to connect the mobile device to the current local access network and thereafter to the office network.
Tue, 26 May 2015 08:00:00 EDTAn authentication challenge system for performing secondary authentication for an account associated with an online store is described. In one embodiment, the authentication challenge system includes a question generation engine, which can derive a series of questions based upon activity associated with a user account of an online store; a network interface, which can transport the series of one or more questions derived by the question generation engine to authenticate the user to the online store; a confidence engine, which can determine a required confidence level for a successful authentication, and can compute a confidence score of the user identity; and a quality engine, which can adjust the question generation engine and the confidence engine based upon an analysis of question and answer metrics across multiple accounts of the online store. The online store can include digital media, such as music, movies, books or applications for electronic computing devices.
Tue, 26 May 2015 08:00:00 EDTAn information handling system includes a host mapped general purpose input output (GPIO), a shared memory, a board management controller, and a cryptography engine. The host mapped GPIO includes a plurality of registers. The board management controller is in communication with the host mapped GPIO and with the shared memory, and is configured to control accessibility to the plurality of registers in the GPIO, and to control write accessibility of the shared memory based on a private key received from a basic input output system requesting accessibility to the plurality of registers and write accessibility of the shared memory. The cryptography engine is in communication with the board memory controller, and is configured to authenticate the private key received from the board management controller.
Tue, 26 May 2015 08:00:00 EDTA method and apparatus for extracting advertisement keywords in association with situations of scenes of video include: establishing a knowledge database including a classification hierarchy for classifying situations of scenes of video and an advertisement keyword list, segmenting a video script corresponding to a received video in units of scenes, and determining a situation corresponding to each scene with reference to the knowledge database, and extracting an advertisement keyword corresponding to the situation of a scene of the received video with reference to the knowledge database.
Tue, 26 May 2015 08:00:00 EDTIn one example, a method includes receiving an indication of an input gesture detected at a presence-sensitive input device, where the input gesture includes one or more input points and each input point is detected at a respective location of the presence-sensitive input device. The method may also include determining a focal point of the input gesture, and determining a radius length. The method may also include determining a shape centered at the focal point and having a size determined based on the radius length. The method may also include responding to a change in a geometric property of the shape by scaling information included in a graphical user interface, where the scaling of the information being centered at the focal point.
Tue, 26 May 2015 08:00:00 EDTDigital rights management (DRM) can be effectively implemented through use of an anchor point and binding records within a user's anchor point domain. Assigning security levels to various components within an anchor point based DRM system and evaluating them against a security criterion provides additional protection against authorized access of the digital content. The content provider may specify the security criterion (e.g., a security level threshold), and the ability to use the digital content is denied or granted based on the ability of components to satisfy this criterion. For example, the ability to use a digital property instance is granted to a content handler that satisfies the security criterion and denied to a content handle that does not satisfy the security criterion.
Tue, 26 May 2015 08:00:00 EDTA method for tracking a user's movements between network addresses can include, subsequent to a request for a (current) network address from a user, receiving the network address and an identifier for a region associated with the network address. The method can also include locating a record that contains the identifier for the region and a time that immediately precedes the request for the network address from the user. The record may further contain a prior network address. The method can further include generating an entry for a table that includes the identifier for the region, the current network address, and the prior network address. A server computer or a client computer can generate the entry. Improved accountability and improved user profile accuracy can be obtained with the method. A data processing system readable medium can comprise code that includes instructions for carrying out the method.
Tue, 26 May 2015 08:00:00 EDTA system and method are disclosed for rationalizing configurations associated with one or more products. The system includes a database associated with one or more customers. The system further includes an order analysis system coupled with the database. The order analysis system is capable of rationalizing the differences between configurations of various combinations of options that are stored in the database.
Tue, 26 May 2015 08:00:00 EDTA unified search service may collect information related to an enterprise from at least one of publicly available data and private enterprise data. In some implementations, crowd sourcing may be used to determine a source list of one or more sources of information. Authored content can be generated, such as by combining one or more items of information from the public data with one or more items of information from the private enterprise data. Further, in some implementations, a public index may be generated from the public data, and one or more affiliation indexes may be generated from the private enterprise data. For example, a first affiliation index may contain confidential enterprise information, while a second affiliation index may contain non-confidential enterprise information. A user's affiliation to the enterprise may be taken into consideration when determining which indexes to use when responding to a search request from the user.
Tue, 26 May 2015 08:00:00 EDTSystems and methods described and suggested herein utilize various techniques to assess the degree of specificity of search queries. By assessing the degree of specificity of search queries, the systems and methods may be used to determine where the submitting users' intentions fall along the continuum between specific and general searching. Thus, the systems and methods may be used to, among other uses, deliver search results that more closely coincide with the users' intentions. For example, if data associated with a search query indicates that users typically submit the search query with the intention of specific searching, embodiments may tailor search results to include a limited number of highly relevant search-result items. On the other hand, for example, if data associated with a search query indicates that users typically submit the search query with the intention of general searching, embodiments may tailor search results to include a diverse set of search-result items from multiple categories.
Tue, 26 May 2015 08:00:00 EDTVarious embodiments enable a device to perform tasks such as processing an image to recognize and locate text in the image, and providing the recognized text an application executing on the device for performing a function (e.g., calling a number, opening an internet browser, etc.) associated with the recognized text. In at least one embodiment, processing the image includes substantially simultaneously or concurrently processing the image with at least two recognition engines, such as at least two optical character recognition (OCR) engines, running in a multithreaded mode. In at least one embodiment, the recognition engines can be tuned so that their respective processing speeds are roughly the same. Utilizing multiple recognition engines enables processing latency to be close to that of using only one recognition engine.
Tue, 26 May 2015 08:00:00 EDTA catalog builder is disclosed. This invention relates to data management systems, and more particularly to catalog creation mechanisms in data management systems. Present day data management systems employ catalog builder tools. However, the catalog builders cannot be configured as per the requirements of the users. Further, there are no mechanism to configure custom catalogs and associated metadata. The disclosed catalog builder may be employed to configure an online central repository on the fly and build a catalog. The catalog builder is equipped with a central repository. Further, catalog builder is also provided with advanced search features and analytical capabilities in order to search for the data specified by the user and fetch the data from the central repository. The catalog builder is also provided with clustering and segmentation capabilities in order to slice and dice the data.
Tue, 26 May 2015 08:00:00 EDTA mode-based method of social networking comprising storing in a database profile information for a plurality of users, event information for a plurality of events and a mode associated with each event, receiving by a plurality of computerized user devices a selection of a mode and one or more geographic proximity parameter selections from a each of plurality of users, displaying, event information for an event having a same mode as the first user, profile information for one or more other users among the plurality of users having selected the same mode as the first user and located within a geographic proximity parameter selected by the first user, and a density of a plurality of users located within the geographic proximity parameter selected by the first user wherein the density is represented by a color corresponding to the mode.
Tue, 26 May 2015 08:00:00 EDTProvided are a method, computer program product, and system for generating a recommendation for transfer of ownership of content. At least one characteristic of a first owner is determined. At least one characteristic of the content is determined. A second owner for the content is determined based on the at least one characteristic of the first owner, and the at least one content characteristic. The recommendation for transfer of ownership is generated, based at least in part on the determination of the second owner.
Tue, 26 May 2015 08:00:00 EDTA method for sending a transactional message assigns a universal transactional account (UTA) identifier to a customer, associates the assigned UTA identifier with a customer account corresponding to the customer, assigns an account network address corresponding to a service provider, stores, in a routing database, the UTA identifier in association with the account network address, creates, using a second terminal including a processor, the transactional message comprising the UTA identifier and a value, and sends the transactional message to the service provider, the sending the transactional message to the service provider including using the routing database to look up the account network address corresponding to the UTA identifier and transmitting the transactional message to the account network address.
Tue, 26 May 2015 08:00:00 EDTA computer implemented method to exchange virtual goods in a virtual environment includes receiving funds at a trading platform from a buyer. The buyer is provided with a first secret that the buyer can decrypt and a second secret that the buyer cannot decrypt. The buyer is authenticated to a seller using the first secret. A virtual item is delivered from the seller to the buyer in response to authenticating. The buyer delivers to the seller the second secret for decryption by the seller. The seller is authenticated at the trading platform with the second secret. The seller is supplied with the funds.
Tue, 26 May 2015 08:00:00 EDTA license consignment method and system for a portable device playing a right-protected content with a license is provided for improving utilization reliability and manageability of a license by enabling a license server to manage the license consigned by the portable device. The method includes selecting a license to be consigned to a license server, transmitting the license server license information corresponding to the selected license, and transmitting, when the license is not downloaded in a certain time, a download trigger message to the portable device.
Tue, 26 May 2015 08:00:00 EDTA system and method of delivering a media package to an on-line downloading store are disclosed. The method includes receiving a media file into a compressor application in which at least one compression job is assigned for the media file. The method further includes receiving setting data and destination data for storing a media package associated with processing the media file. The method next includes retrieving pre-defined asset metadata based on user-submitted credential data and vendor identification data, receiving contract acceptance data based on a pre-existing contract associated with the media file and generating a media package configured for ingestion into the on-line media store for each at least one compression job assigned to the media file.
Tue, 26 May 2015 08:00:00 EDTDisclosed is an information providing apparatus comprising first reception control means for controlling the reception, from a first information processing apparatus, of user identification data for identifying a user of the first information processing apparatus and a request for purchasing a content, first transmission control means for controlling in response to the request for purchasing the content the transmission of the request for purchasing the content to a second information processing apparatus, second reception control means for controlling the reception of the content and usage conditions thereof supplied from the second information processing apparatus, storage control means for controlling the storing of the content and usage conditions thereof in correlation with the user identification data, third reception control means for controlling the reception of the user identification data and a request for sending the content supplied from the first information processing apparatus, and second transmission control means for controlling, in response to the request for sending the content, the transmission of the content stored in correlation with the user identification data.
Tue, 26 May 2015 08:00:00 EDTInformation from a package is read. An encryption key is generated from the information read from the package. A text unit is encrypted using the encryption key. The encrypted text unit is affixed to the package.
Tue, 26 May 2015 08:00:00 EDTSystems, apparatus and methods for providing an un-personalized and un-embossed mobile companion prepaid card to a consumer having a mobile wallet account. An embodiment includes a wallet provider computer receiving an approval request from an agent device for a mobile companion prepaid card for a consumer. The process includes the wallet provider computer determining an issuer financial institution (FI) associated with the mobile companion prepaid card, transmitting the approval request to an issuer FI processor, receiving an approval message, and transmitting the approval message and a request to a consumer's mobile device to provide cardholder verification met hod (CVM) data. The method also includes receiving and validating the CVM data, transmitting a mobile companion prepaid card activation request, receiving a confirmation message indicating activation, and transmitting a message confirming activation of the mobile companion prepaid card to the consumer's mobile device.
Tue, 26 May 2015 08:00:00 EDTAccording to one embodiment, a securities trading system comprises a plurality of order sharing devices and a plurality of ordering devices. The order sharing device sends each telegram to the ordering device of a master system and the order sharing device of a slave system. The order sharing device sends each of the telegrams to the ordering device of the slave system to switch from the slave system to the master system when a failure is detected in the ordering device of the master system. The ordering device calculates statistics from market information, and uses the statistics to judge whether to permit the placement of an order with the stock exchange apparatus in the case of the master system.
Tue, 26 May 2015 08:00:00 EDTThe present invention provides a method implemented by a computer for generating an image on a display that represents a plurality of transactions as lines connecting points in the display indicative of a source and an origin for the respective transactions. For each of the lines, an anti-aliasing process is used to determine a coverage value for each pixel of the display that represents the extent to which the line covers each pixel, and a record of a cumulative coverage value for each pixel is maintained in an image buffer. When the lines have been rendered into the image buffer, the method comprises determining a maximum and a minimum of the cumulative coverage values stored in the image buffer, scaling the cumulative coverage value for each pixel, and rendering each pixel onto the display by using the scaled cumulative coverage value to determine a transparency for the pixel.
Tue, 26 May 2015 08:00:00 EDTEmbodiments of the invention provide methods and systems for performing a payment transaction. A method for performing a payment transaction may include receiving purchase information from a merchant and associating the purchase information with an identifier. The method may also include transmitting the identifier to the merchant and receiving the identifier from a wireless device of a customer. The wireless device may obtain the identifier by receiving a code from a merchant device and by interpreting the code. The method may additionally include associating the identifier with the purchasing information, determining a payment account associated with the customer, transmitting a request to a payment service provider system to provide funds for the payment transaction, and receiving an authorization from the payment service provider system to provide the funds. The method may additionally include transmitting a confirmation of the authorization to the merchant.
Tue, 26 May 2015 08:00:00 EDTA business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction. In some operations, software creates, updates, or otherwise processes information related to a financial instrument impairment attribute values analytical result business object.
Tue, 26 May 2015 08:00:00 EDTA cloud computing system for object location, object identification, object picking, object picking by line, object loading onto one or more transport devices, or object delivery that can include using a cloud based server comprising a cloud based processor in communication with a cloud based data storage. The cloud based server can be in communication with at least one mobile processor in communication with a mobile data storage and a display. The method can also include sending instructions to an operator from the cloud based computer to a mobile processor associated with an operator to instruct the operator to perform a logistics operation. The logistic operation can include one or more of object location, object identification, object picking, object picking by line, object loading onto one or more transport devices, and object delivery.
Tue, 26 May 2015 08:00:00 EDTA system for locating goods stored in a storage area includes a computer, radio frequency transceivers and modular hangers. Ordered goods are placed in storage units that each have addresses at a central filling center. The filled storage units are shipped to local storage areas where they are coupled to hook units to form modular hangers and stored on rails. The identifications of the goods and the electronic addresses for corresponding hangers are stored on a local computer database. When a user wants to pick up goods stored in the containers, the user inputs the identification or order information for the goods and the computer will cause the radio frequency transmitter to emit a data packet that includes a search address and illumination data. The hangers compare the search address to the electronic address. If there is a match, the hanger is illuminated so the ordered goods can be found.
Tue, 26 May 2015 08:00:00 EDTA computer implemented method, data processing system, and a computer program product configures components in a data processing system. A request for a vaguely specified component for implementation into a data processing system is received. Responsive to receiving the request, at least one corresponding component is identified. The corresponding component is then displayed to a user for implementation of the corresponding component.
Tue, 26 May 2015 08:00:00 EDTAn image of an item is obtained in one or more computing devices. The item is identified from the image based at least in part on data derived from reference images that are each associated with one or more items. Catalog data corresponding to the item is associated with the image. The catalog data is added to a merchant catalog in an electronic marketplace.
Tue, 26 May 2015 08:00:00 EDTAn assembly includes a transaction product and an auxiliary vehicle. The transaction product includes a folded sheet configured to be repeatedly folded and unfolded between a collapsed position and an extended position. The folded sheet defines a substantially planar surface defining a printed track. The transaction product comprises an account identifier statically connected thereto. The account identifier links the transaction product to at least one of an account and a record and is machine readable by a point-of-sale terminal. The auxiliary vehicle includes a microcontroller, one or more sensors, a motor, and at least one movable component. The microcontroller actuates the motor to induce movement of the at least one movable component propelling the auxiliary vehicle along and following the printed track based on detection of a location of the printed track as determined by the one or more sensors.
Tue, 26 May 2015 08:00:00 EDTA method that improves and enhances the customer's in-store shopping experience. The consumer product of purchase interest or intent to buy expresses (or self-announces via technology) it's match (or fit based on known or understood buying habits, customer taste, tendencies, etc) against the customer preferences during an in-store shopping experience.
Tue, 26 May 2015 08:00:00 EDTA method for providing a content gift to a gift-receiving terminal is provided. The method includes a gift server communicating with the gift-receiving terminal over a wireless communication link to determine what content is owned by the gift-receiving terminal. The method further includes the gift server generating catalog data including at least one content gift targeted for the gift receiving terminal. Further included in the method is the gift server wirelessly transmitting the catalog data to a gift-giving terminal. Additionally, the method includes the gift server receiving a selection of a content gift from the gift-giving terminal over a wireless communication link. Further included is the gift server facilitating delivery of the selected content gift to the gift-receiving terminal.
Tue, 26 May 2015 08:00:00 EDTAn e-commerce outsourcing system and method provides hosts with transparent, context-sensitive e-commerce supported pages. The look and feel of a target host is captured for future use. The host is provided with one or more links for inclusion within a page on the host website that correlates with a selected commerce object, which may be contextually related to material in the page. The commerce object can be a product, a product category, or a dynamic selection indicator. Upon activation of the provided link, a visitor computer is served with a page with the look and feel of the host website and with content based upon the associated commerce object. Where the commerce object is a dynamic selection indicator, the content is selected at the time of activation based upon an analysis of the page containing the activated link.
Tue, 26 May 2015 08:00:00 EDTA system for viewing shopping information on a social networking platform is disclosed. At the social networking platform, the system receives a request from a user device corresponding to a first user of the social networking platform to view a list of a second user of the social networking platform. The list may include items offered for transaction on a network-based commerce server. In response to receiving the request from the user device, the system forwards the request to the network-based commerce server, and then receives updated information for at least one item on the list from the network-based corner server. Then, the system communicates the updated information received from the network-based commerce server to the user device.
Tue, 26 May 2015 08:00:00 EDTSystems and methods for crediting a retailer for an online purchase made by a consumer while the consumer is located within or in the proximity of a store location of the retailer are provided. After browsing a retail location for a product, a consumer can purchase the product from an Internet merchant different than that of the retailer using a mobile or networked client device. The client device can include a module for determining the location of the client device at the time of purchase and include the location information with information used to complete the purchase of the product. This location information can include an actual geographic location, a store identifier, or a retailer identifier. The online merchant can match the location information with retailer information to determine whether a credit for the purchase should be given to a retailer.
Tue, 26 May 2015 08:00:00 EDTThe present invention extends to methods, systems, and computer program products for approximating alternate currency equivalents in digital receipts. In response to a user request, item prices in one currency in a digital receipts (e.g., for retail sales transactions) can be approximated in a second different currency. Digital receipts with approximated item prices can be presented on a display at a mobile device. Currency conversion can be handled at a receipt data server or at the mobile device. Currency conversion can be performed locally or can be referred to a conversion server. Item prices in digital receipts can be converted from and/or to any of a variety of different currencies.
Tue, 26 May 2015 08:00:00 EDTThe risk of fraud in point of sale credit card transactions is reduced by providing independently-routed verification by communication between the authorized user of the credit card and the issuer of the credit card through a trusted intermediary.
Tue, 26 May 2015 08:00:00 EDTConfigurations for targeting nearby geographic locations for managing content are disclosed. The subject technology identifies one or more geographic locations for targeting content from a campaign for delivery to users and the campaign associated with a content sponsor. One or more geographic locations that are nearby the one or more geographic locations associated with the campaign are automatically presented to the content sponsor, including presenting candidate nearby geographic locations and estimated reach information along with each candidate geographic location. The subject technology receives a selection of one or more candidate geographic locations for inclusion in the campaign, and adds the selection to the campaign.
Tue, 26 May 2015 08:00:00 EDTA location aware user interface on a wireless handset is described. The location aware user interface comprises a location module configured to transmit a location message to a remote server via a network. The remote server is configured to determine whether the wireless handset is within a geofence. The user interface further comprises a display module configured to display at least one content item associated with the geofence. The user interface also comprises an input module configured to receive a user-created content item and transmit the received user-created content item to the remote server. The remote server is configured to associate the content item with the geofence in which the wireless handset is located.
Tue, 26 May 2015 08:00:00 EDTApparatus and method for optimizing different amounts of output products derived from an initial biomass material. The method includes obtaining economic data of costs and availability of raw materials and resources, and prices that would be paid for output products derived, performing calculations to determine an optimum amount of each of the output products; and controlling processes that generate the output products. In some embodiments, the processes convert initial biomass materials into intermediate and output products, an economic engine that obtains economic data relating to costs of initial materials and prices that would be paid for output products derived from the raw materials, and performs calculations to determine an optimum amount of each of the output products, and valves that are controlled by the economic engine to route variable amounts of the initial biomass materials to the processes to obtain a mix of output products that provides an optimum profit.
Tue, 26 May 2015 08:00:00 EDTA mechanism, in a data processing system, is provided for defining marketing strategies. The mechanism dynamically obtains information related to customer interactions associated with a plurality of customers, analyzes the information to identify patterns, selects patterns to define a marketing strategy for a marketer, and defines a marketing strategy based on the selected patterns.
Tue, 26 May 2015 08:00:00 EDTA system and method for automatic or semi-automatic selection of service or processing providers is disclosed. In one embodiment of the present invention allows the user to input a set of preferences, and from that input automatically selects a service or processing provider that matches the attributes that are important the user as derived from the input preferences. In another embodiment, the process is semi-automatic in that the user provides a set of preferences, and the present invention filters and the service or processing providers and presents a limited number of them that match the user's preferences and from which the user can select one for processing of the particular task.
Tue, 26 May 2015 08:00:00 EDTA Configuration Management DataBase (CMDB) is utilized to cause resources, which are modeled in and managed by the CMDB, to be in compliance with a newly implemented resource rule. In one embodiment, a computer-implementable method includes the step of, in response to detecting a rule change, transmitting a new rule to a rule control logic in a resource management database, wherein the rule change changes a rule for an attribute of a resource in a data processing system, and wherein the resource management database describes attributes of resources in the data processing system.
Tue, 26 May 2015 08:00:00 EDTA medical kiosk designed to provide tele-med services, check-in services, and/or prescription services for a user. The medical kiosk can include a user video conferencing system that is designed to enable the user to have a real-time or near real-time tele-conference with a medical provider located remotely from the medical kiosk.
Tue, 26 May 2015 08:00:00 EDTDescribed herein is a descriptive framework to facilitate large scale demand responsive transit. In accordance with one aspect of the framework, one or more trip requests from one or more commuter devices are received. A trip request indicates at least one start location and at least one end location. In addition, vehicle information is received from one or more available vehicles. The vehicle information indicates at least one current location of a vehicle. An adaptive route for the vehicle may be planned based on the one or more trip requests and the vehicle information. Update information of the adaptive route may be communicated to the vehicle and the one or more commuter devices.