46 patents
Utility
Available vehicle parking space detection using machine learning
13 Dec 22
A system includes a processor and a memory storing instructions that, when executed by the processor cause the system to generate a machine learning model; generate an artificial neural network; analyze an image of a parking area using a spot detection machine learning model; analyze the image of the parking area using a vehicle detection machine learning model; and classify a parking space as available when an area of intersection does not exceed a predetermined value.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 26 Apr 21
Utility
Operations and Maintenance Techniques Subsystem for Secure Classified Remote Access As a Service
8 Dec 22
A computing system includes a processor, a network interface controller; a a secure classified remote access as a service application including instructions; and an information technology service management application including instructions wherein the information technology service management application is accessible to the secure classified remote access as a service application via the network interface controller; and wherein the instructions of the secure classified remote access application cause the system to: perform systematic monitoring operations and maintain a virtual hosting environment; perform a network vulnerability analysis; remediate a finding; and notify a user.
Marty Spain, Peter Joseph Dunn
Filed: 3 Sep 21
Utility
Out-of-band Management Continuous Monitoring for Secure Classified Remote Access As a Service
8 Dec 22
A computer-implemented method for providing continuous monitoring for a secure, classified remote access virtual desktop infrastructure to an end-user device includes: processing input packets, generating indexed logs, generating analytics or visualizations of the indexed logs, and facilitating viewing of the analytics or the visualizations.
Marty Spain, Peter Joseph Dunn
Filed: 8 Sep 21
Utility
Selective database data rollback
25 Oct 22
A selective database rollback method includes identifying a table, identifying a root key, storing a target rollback date, retrieving schema information including keys, ordering the table, iterating over the table, storing the current table state, obtaining a transaction journal, and reverse-applying the transaction journal to generate an output file.
Joseph Kessler
Filed: 19 Nov 19
Utility
Methods and systems for providing virtual desktop infrastructure via secure classified remote access as a service
25 Oct 22
A virtual desktop infrastructure system includes a switch matrix and an end user device including a memory with instructions that when executed cause the system to initialize and configure the end-user device, establish a tunnel via the switch matrix, perform dependency verification, enforce a policy rule, and cause the end-user device to access the virtual desktop infrastructure via the tunnel.
Marty Spain, Peter Joseph Dunn
Filed: 7 Jun 21
Utility
System and Method for Automated Information Technology Services Management
29 Sep 22
A computer-implemented method includes receiving a selection of an information technology service; initializing a machine avatar; establishing a network tunnel; and receiving network traffic.
Jeremy Guthrie, Jason Owens
Filed: 13 Jun 22
Utility
Available Parking Space Dispatch
15 Sep 22
A computer-implemented method includes identifying a vehicle using a trained convolutional neural network; analyzing an image of a parking area using a machine learning model; and transmitting an identification to a client computing device of the user.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 27 May 22
Utility
Account manager virtual assistant staging using machine learning techniques
16 Aug 22
A method for machine learning-based account manager virtual assistant staging includes receiving a message and a classification, generating a staging record, generating a status using staging rules, generating an order when the message classification is order and the status is complete, and transmitting the order.
Yuxi He, Yuqing Chen, Sunrito Bhattacharya, Rajat Swaroop, Gregory Tomezak, Andre Coetzee, Joseph Kessler, Suresh Bellam, Dan Verdeyen
Filed: 18 Apr 19
Utility
System and method for automated information technology services management
14 Jun 22
A computer-implemented method includes receiving a routing request with respect to a base management node of a customer and an avatar of a customer, generating a first virtual network interface corresponding to the base management node, generating a second virtual network interface corresponding to the avatar, the first virtual network interface and the second virtual network interface communicatively coupled by a network tunnel, and providing the customer with access to the information technology resource via the network tunnel.
Jeremy Guthrie, Jason Owens
Filed: 15 Oct 18
Utility
Available parking space dispatch
31 May 22
A method of parking space dispatch includes receiving a user command, enqueueing the user command, analyzing an image of a parking area using a machine learning model, dequeueing the user command, and notifying the user of an identification of the available parking space.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 8 Jul 20
Utility
Visual Programming Methods and Systems for Intent Dispatch
12 May 22
A computing system includes a processor; an input device; and a memory containing instructions that, when executed, cause the computing system to receive a data description corresponding to a graphical user interface control; identify the graphical user interface control using a trained convolutional neural network; and display an action palette.
Joseph Kessler, Suresh Bellam, Andre Coetzee, Dan Verdeyen
Filed: 27 Jan 22
Utility
Automated Graphical User Interface Control Methods and Systems Using Voice Commands
12 May 22
A computing system for enabling a user to control a legacy application of an enterprise using voice commands includes a processor and a memory storing instructions that, when executed by the one or more processors, cause the computing system to receive a user utterance; generate an output by analyzing the utterance using a speech-to-text application programming interface; and perform an action with respect to an element of the legacy application.
Joseph Kessler, Suresh Bellam, Andre Coetzee, Dan Verdeyen
Filed: 20 Jan 22
Utility
Smart Building Management Suite Using Robot Command and Control
28 Apr 22
A computer-implemented method includes displaying a bot client application including an active channel indicator, receiving bot input, analyzing the bot input, generating an output, and displaying the output.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 3 Jan 22
Utility
Method and Systems for Automated Security Badge Control Using Machine Learning
28 Apr 22
An authentication method includes receiving an initial user authentication factor; storing the initial authentication factor; receiving one or more user verification authentication factors; and authenticating the user when a verification authentication factor matches the initial authentication factor.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 10 Jan 22
Utility
Room Presence Methods and Systems
28 Apr 22
A method for delegating conference rooms using room presence detection includes identifying a human in a digital image using a trained machine learning model; updating room presence information; and determining a next-available conference room.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 10 Jan 22
Utility
Automated Check-in Techniques
28 Apr 22
A computer-implemented method for performing smart building automated check-in includes receiving a digital image of a visiting user; receiving a visited user selection; and transmitting a notification to a computing device of the visited user, the notification including an identifier of the visiting user.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 10 Jan 22
Utility
Visual programming methods and systems for intent dispatch
8 Mar 22
A system includes a processor, an input device, and a memory storing instructions that, when executed, cause the system to display a palette and receive a user selection of one or more actions, and store the selected actions in association with the palette in an electronic database.
Joseph Kessler, Suresh Bellam, Andre Coetzee, Dan Verdeyen
Filed: 23 Jul 19
Utility
Automated graphical user interface control methods and systems using voice commands
1 Mar 22
A system includes a processor and a memory storing instructions that, when executed by the processor, cause the system to receive an utterance, transmit the utterance to a cloud to generate an intent and an entity, receive the intent and the entity, and perform an action with respect to a graphical user interface.
Joseph Kessler, Suresh Bellam, Andre Coetzee, Dan Verdeyen
Filed: 23 Jul 19
Utility
Method and systems for automated security badge control using machine learning
11 Jan 22
A computer-implemented authentication method includes receiving a first authentication factor, storing the first authentication factor, receiving a second authentication factor and authenticating a user when the first authentication factor matches the second authentication factor.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 8 Jul 20
Utility
Room presence methods and systems
11 Jan 22
A computer-implemented method for performing room presence detection includes receiving a live photograph, detecting a human in the live photograph using machine learning, identifying a file photograph by comparing the live photograph to a list of photographs and displaying a room map.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 8 Jul 20