34 patents
Utility
Techniques for Providing Natural Language Understanding (Nlu) Services to Contact Centers
4 Jan 24
Techniques for providing natural language understanding (NLU) services to contact centers are disclosed herein.
Casey Bleeker, Nathan A. Cartwright, Shawn Augenstein
Filed: 30 Jun 22
Utility
Modular Technologies for Servicing Telephony Systems
12 Oct 23
Modular technologies for servicing telephony systems are disclosed herein.
Nathan A. Cartwright, Christopher Deren, Darin C. Burleigh, Michael A. Robinson, Matthew Toltzien, Andrew Kleinheinz
Filed: 6 Apr 22
Utility
Artificial Intelligence Based Technologies for Improving Patient Appointment Scheduling and Inventory Management
27 Jul 23
Artificial intelligence (Al) based technologies for improving patient appointment scheduling and inventory management are disclosed herein.
Casey Bleeker, Nathan A. Cartwright
Filed: 21 Jan 22
Utility
Artificial Intelligence Based Technologies for Improving Patient Intake
16 Mar 23
Artificial intelligence (AI) based technologies for improving patient intake are disclosed herein.
Casey Bleeker, Nathan A. Cartwright
Filed: 8 Sep 22
Utility
Selective Database Data Rollback
23 Feb 23
A selective database rollback method includes identifying a table, identifying a root key, storing a target rollback date, retrieving schema information including keys, ordering the table, iterating over the table, storing the current table state, obtaining a transaction journal, and reverse-applying the transaction journal to generate an output file.
Joseph Kessler
Filed: 24 Oct 22
Utility
Methods and Systems for Providing Virtual Desktop Infrastructure Via Secure Classified Remote Access As a Service
16 Feb 23
An internet end-user device includes a processor, a network interface controller; and a memory including instructions that, when executed by the one or more processors cause the end-user device to configure the end-user device to use a red network and perform dependency verification of the end-user device.
Marty Spain, Peter Joseph Dunn
Filed: 24 Oct 22
Utility
Operations and Maintenance Techniques Subsystem for Secure Classified Remote Access As a Service
8 Dec 22
A computing system includes a processor, a network interface controller; a a secure classified remote access as a service application including instructions; and an information technology service management application including instructions wherein the information technology service management application is accessible to the secure classified remote access as a service application via the network interface controller; and wherein the instructions of the secure classified remote access application cause the system to: perform systematic monitoring operations and maintain a virtual hosting environment; perform a network vulnerability analysis; remediate a finding; and notify a user.
Marty Spain, Peter Joseph Dunn
Filed: 3 Sep 21
Utility
Out-of-band Management Continuous Monitoring for Secure Classified Remote Access As a Service
8 Dec 22
A computer-implemented method for providing continuous monitoring for a secure, classified remote access virtual desktop infrastructure to an end-user device includes: processing input packets, generating indexed logs, generating analytics or visualizations of the indexed logs, and facilitating viewing of the analytics or the visualizations.
Marty Spain, Peter Joseph Dunn
Filed: 8 Sep 21
Utility
System and Method for Automated Information Technology Services Management
29 Sep 22
A computer-implemented method includes receiving a selection of an information technology service; initializing a machine avatar; establishing a network tunnel; and receiving network traffic.
Jeremy Guthrie, Jason Owens
Filed: 13 Jun 22
Utility
Available Parking Space Dispatch
15 Sep 22
A computer-implemented method includes identifying a vehicle using a trained convolutional neural network; analyzing an image of a parking area using a machine learning model; and transmitting an identification to a client computing device of the user.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 27 May 22
Utility
Visual Programming Methods and Systems for Intent Dispatch
12 May 22
A computing system includes a processor; an input device; and a memory containing instructions that, when executed, cause the computing system to receive a data description corresponding to a graphical user interface control; identify the graphical user interface control using a trained convolutional neural network; and display an action palette.
Joseph Kessler, Suresh Bellam, Andre Coetzee, Dan Verdeyen
Filed: 27 Jan 22
Utility
Automated Graphical User Interface Control Methods and Systems Using Voice Commands
12 May 22
A computing system for enabling a user to control a legacy application of an enterprise using voice commands includes a processor and a memory storing instructions that, when executed by the one or more processors, cause the computing system to receive a user utterance; generate an output by analyzing the utterance using a speech-to-text application programming interface; and perform an action with respect to an element of the legacy application.
Joseph Kessler, Suresh Bellam, Andre Coetzee, Dan Verdeyen
Filed: 20 Jan 22
Utility
Smart Building Management Suite Using Robot Command and Control
28 Apr 22
A computer-implemented method includes displaying a bot client application including an active channel indicator, receiving bot input, analyzing the bot input, generating an output, and displaying the output.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 3 Jan 22
Utility
Method and Systems for Automated Security Badge Control Using Machine Learning
28 Apr 22
An authentication method includes receiving an initial user authentication factor; storing the initial authentication factor; receiving one or more user verification authentication factors; and authenticating the user when a verification authentication factor matches the initial authentication factor.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 10 Jan 22
Utility
Room Presence Methods and Systems
28 Apr 22
A method for delegating conference rooms using room presence detection includes identifying a human in a digital image using a trained machine learning model; updating room presence information; and determining a next-available conference room.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 10 Jan 22
Utility
Automated Check-in Techniques
28 Apr 22
A computer-implemented method for performing smart building automated check-in includes receiving a digital image of a visiting user; receiving a visited user selection; and transmitting a notification to a computing device of the visited user, the notification including an identifier of the visiting user.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 10 Jan 22
Utility
LCP Pricing Tool
30 Sep 21
Methods and systems for determining a set of lowest corresponding price data related to a salable unit are disclosed herein.
Sandy Marshall
Filed: 25 Mar 20
Utility
Available Parking Space Dispatch
23 Sep 21
A method of parking space dispatch includes receiving a user command, enqueueing the user command, analyzing an image of a parking area using a machine learning model, dequeueing the user command, and notifying the user of an identification of the available parking space.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 8 Jul 20
Utility
Smart Building Management Suite Using Robot Command and Control
23 Sep 21
A computer-implemented method includes displaying a bot client application including an active channel indicator, receiving bot input, analyzing the bot input, generating an output, and displaying the output.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 8 Jul 20
Utility
Method and Systems for Automated Security Badge Control Using Machine Learning
23 Sep 21
A computer-implemented authentication method includes receiving a first authentication factor, storing the first authentication factor, receiving a second authentication factor and authenticating a user when the first authentication factor matches the second authentication factor.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 8 Jul 20