810 patents
Utility
Method and system for extracting information from a document
16 Jan 24
A method for extracting information from a document, comprising: receiving an identification of an entity to be extracted from the document; identifying candidates from the document, each candidate corresponding to a given element contained in the document and having a given location within the document; embedding the candidates, thereby obtaining an embedding vector for each candidate; for each candidate, comparing in a semantic space the respective embedding vector to previous embedding vectors associated with previous entity values previously chosen for the entity, thereby obtaining a first comparison result; for each candidate, comparing in a pixel space the given location within the document of the candidate to a location associated with the previous entity values previously chosen for the entity, thereby obtaining a second comparison result; sorting the candidates using the first and second comparison results obtained for each candidate, thereby obtaining sorted candidates; and outputting the sorted candidates.
Archy De Berker, Simon Lemieux
Filed: 23 Oct 20
Utility
Software architecture and user interface for process visualization
9 Jan 24
An embodiment may involve a definition of a process, wherein the process is referenced by a parent entry, wherein the process includes a set of stages, wherein the stages in the set of stages are respectively associated with sets of activities, and wherein a process design application was used to define the process.
Douglas Bradley, Meredith Van Lier, Chris Widlowski, Yaron Guez, Jacob Burman, Suzanne Lai
Filed: 5 Nov 20
Utility
Synchronization of a shared service configuration across computational instances
19 Dec 23
An embodiment may involve: transmitting, by a non-production computational instance and to a central computational system, a configuration for a service provided by the central computational system, wherein the non-production computational instance is arranged to test the configuration; appending, to the configuration at the non-production computational instance, a synchronization identifier to indicate that the configuration has been synchronized with the central computational system; receiving, by a production computational instance and from the non-production computational instance, a copy of the configuration; reading, by the production computational instance, the synchronization identifier from the copy of the configuration; determining that the synchronization identifier is not reflected as part of a synchronization history maintained at the production computational instance; and, in response to determining that the synchronization identifier is not reflected in the synchronization history, transmitting, by the production computational instance, the copy of the configuration to the central computational system.
Peng Wang, Shoujing Li
Filed: 10 Mar 23
Utility
Automatic automation recommendation
12 Dec 23
At least service task data and application utilization data are collected.
Jebakumar Mathuram Santhosm Swvigaradoss, Manjeet Singh
Filed: 15 Mar 21
Utility
Merging duplicate items identified by a vulnerability analysis
5 Dec 23
An embodiment may involve a plurality of configuration items and an unmatched configuration item, wherein the unmatched configuration item is associated with a first set of attribute values and a first vulnerability, wherein the first vulnerability is associated with a first set of field values.
Brian James Waplington
Filed: 7 Feb 23
Utility
Remote network management infrastructure for cloud-based deployments
5 Dec 23
A software architecture within a public cloud network may include units of: (i) a plurality of computational instances respectively related to managed networks, (ii) a plurality of servers configurable as load simulators, (iii) administrative components configured to deploy and update the software architecture, and (iv) shared infrastructure services, wherein the units of the software architecture are implemented on virtual machines of the public cloud network and are connected to but logically isolated from one another by way of different access controls or policies.
William Joseph Schuller, Jude Ian McQuaid, Antony Chan
Filed: 14 Feb 22
Utility
Hardware normalization for a managed network
5 Dec 23
An embodiment involves persistent storage and one or more processors.
Eric Charles Ferrington, Venkat Rao Vadranam, Vishal Reddy Wudaru, Thankaselvi Kumaresan, Jugal Kishore, Vijaya Sankara Gopisetty, Uttej Kumar Reddy Gade, Saurabh Dewan
Filed: 31 Aug 22
Utility
Machine learning platform with model storage
5 Dec 23
A request to perform a prediction using a machine learning model of a specific entity is received.
Virendra Kumar Mehta, Sriram Palapudi
Filed: 2 Oct 20
Utility
Machine translation of chat sessions
5 Dec 23
An embodiment may involve a database containing a first user profile that specifies a first preferred language of a first user and a second user profile that specifies a second preferred language of a second user.
Samantha Santo, Jebakumar Mathuram Santhosam Swvigaradoss, Ankit Goel, Prashant Pandey, John Botica, Rajesh Voleti, Laxmi Prasanna Mustala, Rishabh Verma, Satya Sarika Sunkara
Filed: 19 Dec 22
Utility
Automatically detecting and isolating objects in images
5 Dec 23
Systems and methods for automatically detecting and isolating objects in images.
Ying Zhang
Filed: 24 Sep 19
Utility
Failure prediction in a computing system based on machine learning applied to alert data
28 Nov 23
An embodiment may involve persistent storage containing a machine learning trainer application configured to apply one or more learning algorithms.
Matthew Lawrence Watkins, Dinesh Kumar Kishorkumar Surapaneni, Baskar Jayaraman
Filed: 14 Jan 22
Utility
Incremental update for offline data access
28 Nov 23
A system includes persistent storage containing data used by software applications, and a server application configured to perform operations, including identifying a subset of the data, where the subset is used to generate a full offline payload for a particular software application and that includes user interface (UI) components selected for the particular software application based on the subset of the data.
David Tamjidi, Audrey Chen, Sean Andrew Bradley Bowrin, George Webster, Michal Henryk Borowiec, Daniel Whiting
Filed: 14 Dec 21
Utility
Determining application security and correctness using machine learning based clustering and similarity
28 Nov 23
A computing system includes persistent storage configured to store representations of software applications installed on computing devices, and a software application configured to perform operations, including retrieving, from the persistent storage, a first plurality of representations of a first plurality of software applications installed on a particular computing device and a second plurality of representations of a second plurality of software applications installed on a reference computing device.
Shay Herzog, Aakash Umeshbhai Bhagat, Olga Zateikin, Robert Bitterfeld, Asaf Garty
Filed: 19 Mar 21
Utility
Multiple task transfer learning
28 Nov 23
Systems and methods relating to multitask transfer learning.
Alexandre Lacoste, Boris Oreshkin
Filed: 25 Jul 19
Utility
Matching machine generated data entries to pattern clusters
21 Nov 23
Machine generated data entries are received.
Prabodh Saha, Shambhavi Meenakshi Kamakshivalli, Tirumala Reddy Annem, Nitin Chugh
Filed: 4 Mar 21
Utility
Automatically evaluating summarizers
21 Nov 23
Content to be summarized is received and analyzed using an extractive summarizer to determine a reference extractive summary of the content.
Partha Sarathi Mukherjee
Filed: 18 Oct 21
Utility
System and methods for querying and updating databases
14 Nov 23
Systems and method for improving query performance by querying an appropriate database engine based on the operation of the query request is provided.
Siddharth Rajendra Shah, Jeremy Norris, Olivier Baxa, Josef Mart
Filed: 3 Nov 22
Utility
Document routing based on document contents
14 Nov 23
Systems and methods for routing a document based on the contents of this document.
Marie-Claude Cote, Alexei Nordell-Markovits, Andrej Todosic
Filed: 26 Sep 19
Utility
Network security through linking vulnerability management and change management
14 Nov 23
A computational instance may contain a plurality of vulnerable items and a plurality of change requests, wherein at least some of the vulnerable items are assigned to a vulnerability group, the vulnerable items represent hardware or software components that exhibit known vulnerabilities, and the change requests represent additions, removals, or modifications of the hardware or software components.
Anna Anatolyevna Vester, Lisa Sherilyn Henderson, Antonio Challita, Betsy Cherian, John Anthony Rissone, Hnin Haymar, James Gavin Erbes
Filed: 25 Oct 21
Utility
Session signatures
7 Nov 23
A plurality of session signatures and a plurality of inference flags are stored in association with each other, each session signature representing a combination of flag values, each flag value signifying a key event.
Erich Zirnhelt
Filed: 9 Nov 21