58 patents
Utility
Selective database data rollback
9 Jan 24
A selective database rollback method includes identifying a table, identifying a root key, storing a target rollback date, retrieving schema information including keys, ordering the table, iterating over the table, storing the current table state, obtaining a transaction journal, and reverse-applying the transaction journal to generate an output file.
Joseph Kessler
Filed: 24 Oct 22
Utility
Techniques for Providing Natural Language Understanding (Nlu) Services to Contact Centers
4 Jan 24
Techniques for providing natural language understanding (NLU) services to contact centers are disclosed herein.
Casey Bleeker, Nathan A. Cartwright, Shawn Augenstein
Filed: 30 Jun 22
Utility
Voice-driven application prototyping using machine-learning techniques
17 Oct 23
A method includes capturing an event, analyzing the event to generate graphs, receiving a natural language utterance, identifying an entity and a command, modifying the graphs; and emitting an application prototype.
Joseph Kessler
Filed: 27 May 20
Utility
Modular Technologies for Servicing Telephony Systems
12 Oct 23
Modular technologies for servicing telephony systems are disclosed herein.
Nathan A. Cartwright, Christopher Deren, Darin C. Burleigh, Michael A. Robinson, Matthew Toltzien, Andrew Kleinheinz
Filed: 6 Apr 22
Utility
Automated check-in techniques
19 Sep 23
A computer-implemented method for performing smart building automated check-in includes receiving a digital image of a visiting user; receiving a visited user selection; and transmitting a notification to a computing device of the visited user, the notification including an identifier of the visiting user.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 10 Jan 22
Utility
Method and systems for automated security badge control using machine learning
12 Sep 23
An authentication method includes receiving an initial user authentication factor; storing the initial authentication factor; receiving one or more user verification authentication factors; and authenticating the user when a verification authentication factor matches the initial authentication factor.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 10 Jan 22
Utility
Artificial Intelligence Based Technologies for Improving Patient Appointment Scheduling and Inventory Management
27 Jul 23
Artificial intelligence (Al) based technologies for improving patient appointment scheduling and inventory management are disclosed herein.
Casey Bleeker, Nathan A. Cartwright
Filed: 21 Jan 22
Utility
Operations and maintenance techniques subsystem for secure classified remote access as a service
4 Jul 23
A computing system includes a processor, a network interface controller; a a secure classified remote access as a service application including instructions; and an information technology service management application including instructions wherein the information technology service management application is accessible to the secure classified remote access as a service application via the network interface controller; and wherein the instructions of the secure classified remote access application cause the system to: perform systematic monitoring operations and maintain a virtual hosting environment; perform a network vulnerability analysis; remediate a finding; and notify a user.
Marty Spain, Peter Joseph Dunn
Filed: 3 Sep 21
Utility
Out-of-band management continuous monitoring for secure classified remote access as a service
27 Jun 23
A computer-implemented method for providing continuous monitoring for a secure, classified remote access virtual desktop infrastructure to an end-user device includes: processing input packets, generating indexed logs, generating analytics or visualizations of the indexed logs, and facilitating viewing of the analytics or the visualizations.
Marty Spain, Peter Joseph Dunn
Filed: 8 Sep 21
Utility
Artificial Intelligence Based Technologies for Improving Patient Intake
16 Mar 23
Artificial intelligence (AI) based technologies for improving patient intake are disclosed herein.
Casey Bleeker, Nathan A. Cartwright
Filed: 8 Sep 22
Utility
Selective Database Data Rollback
23 Feb 23
A selective database rollback method includes identifying a table, identifying a root key, storing a target rollback date, retrieving schema information including keys, ordering the table, iterating over the table, storing the current table state, obtaining a transaction journal, and reverse-applying the transaction journal to generate an output file.
Joseph Kessler
Filed: 24 Oct 22
Utility
Methods and Systems for Providing Virtual Desktop Infrastructure Via Secure Classified Remote Access As a Service
16 Feb 23
An internet end-user device includes a processor, a network interface controller; and a memory including instructions that, when executed by the one or more processors cause the end-user device to configure the end-user device to use a red network and perform dependency verification of the end-user device.
Marty Spain, Peter Joseph Dunn
Filed: 24 Oct 22
Utility
Available vehicle parking space detection using machine learning
13 Dec 22
A system includes a processor and a memory storing instructions that, when executed by the processor cause the system to generate a machine learning model; generate an artificial neural network; analyze an image of a parking area using a spot detection machine learning model; analyze the image of the parking area using a vehicle detection machine learning model; and classify a parking space as available when an area of intersection does not exceed a predetermined value.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 26 Apr 21
Utility
Out-of-band Management Continuous Monitoring for Secure Classified Remote Access As a Service
8 Dec 22
A computer-implemented method for providing continuous monitoring for a secure, classified remote access virtual desktop infrastructure to an end-user device includes: processing input packets, generating indexed logs, generating analytics or visualizations of the indexed logs, and facilitating viewing of the analytics or the visualizations.
Marty Spain, Peter Joseph Dunn
Filed: 8 Sep 21
Utility
Operations and Maintenance Techniques Subsystem for Secure Classified Remote Access As a Service
8 Dec 22
A computing system includes a processor, a network interface controller; a a secure classified remote access as a service application including instructions; and an information technology service management application including instructions wherein the information technology service management application is accessible to the secure classified remote access as a service application via the network interface controller; and wherein the instructions of the secure classified remote access application cause the system to: perform systematic monitoring operations and maintain a virtual hosting environment; perform a network vulnerability analysis; remediate a finding; and notify a user.
Marty Spain, Peter Joseph Dunn
Filed: 3 Sep 21
Utility
Methods and systems for providing virtual desktop infrastructure via secure classified remote access as a service
25 Oct 22
A virtual desktop infrastructure system includes a switch matrix and an end user device including a memory with instructions that when executed cause the system to initialize and configure the end-user device, establish a tunnel via the switch matrix, perform dependency verification, enforce a policy rule, and cause the end-user device to access the virtual desktop infrastructure via the tunnel.
Marty Spain, Peter Joseph Dunn
Filed: 7 Jun 21
Utility
Selective database data rollback
25 Oct 22
A selective database rollback method includes identifying a table, identifying a root key, storing a target rollback date, retrieving schema information including keys, ordering the table, iterating over the table, storing the current table state, obtaining a transaction journal, and reverse-applying the transaction journal to generate an output file.
Joseph Kessler
Filed: 19 Nov 19
Utility
System and Method for Automated Information Technology Services Management
29 Sep 22
A computer-implemented method includes receiving a selection of an information technology service; initializing a machine avatar; establishing a network tunnel; and receiving network traffic.
Jeremy Guthrie, Jason Owens
Filed: 13 Jun 22
Utility
Available Parking Space Dispatch
15 Sep 22
A computer-implemented method includes identifying a vehicle using a trained convolutional neural network; analyzing an image of a parking area using a machine learning model; and transmitting an identification to a client computing device of the user.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 27 May 22
Utility
Account manager virtual assistant staging using machine learning techniques
16 Aug 22
A method for machine learning-based account manager virtual assistant staging includes receiving a message and a classification, generating a staging record, generating a status using staging rules, generating an order when the message classification is order and the status is complete, and transmitting the order.
Yuxi He, Yuqing Chen, Sunrito Bhattacharya, Rajat Swaroop, Gregory Tomezak, Andre Coetzee, Joseph Kessler, Suresh Bellam, Dan Verdeyen
Filed: 18 Apr 19