24 patents
Utility
Selective database data rollback
9 Jan 24
A selective database rollback method includes identifying a table, identifying a root key, storing a target rollback date, retrieving schema information including keys, ordering the table, iterating over the table, storing the current table state, obtaining a transaction journal, and reverse-applying the transaction journal to generate an output file.
Joseph Kessler
Filed: 24 Oct 22
Utility
Voice-driven application prototyping using machine-learning techniques
17 Oct 23
A method includes capturing an event, analyzing the event to generate graphs, receiving a natural language utterance, identifying an entity and a command, modifying the graphs; and emitting an application prototype.
Joseph Kessler
Filed: 27 May 20
Utility
Automated check-in techniques
19 Sep 23
A computer-implemented method for performing smart building automated check-in includes receiving a digital image of a visiting user; receiving a visited user selection; and transmitting a notification to a computing device of the visited user, the notification including an identifier of the visiting user.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 10 Jan 22
Utility
Method and systems for automated security badge control using machine learning
12 Sep 23
An authentication method includes receiving an initial user authentication factor; storing the initial authentication factor; receiving one or more user verification authentication factors; and authenticating the user when a verification authentication factor matches the initial authentication factor.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 10 Jan 22
Utility
Operations and maintenance techniques subsystem for secure classified remote access as a service
4 Jul 23
A computing system includes a processor, a network interface controller; a a secure classified remote access as a service application including instructions; and an information technology service management application including instructions wherein the information technology service management application is accessible to the secure classified remote access as a service application via the network interface controller; and wherein the instructions of the secure classified remote access application cause the system to: perform systematic monitoring operations and maintain a virtual hosting environment; perform a network vulnerability analysis; remediate a finding; and notify a user.
Marty Spain, Peter Joseph Dunn
Filed: 3 Sep 21
Utility
Out-of-band management continuous monitoring for secure classified remote access as a service
27 Jun 23
A computer-implemented method for providing continuous monitoring for a secure, classified remote access virtual desktop infrastructure to an end-user device includes: processing input packets, generating indexed logs, generating analytics or visualizations of the indexed logs, and facilitating viewing of the analytics or the visualizations.
Marty Spain, Peter Joseph Dunn
Filed: 8 Sep 21
Utility
Available vehicle parking space detection using machine learning
13 Dec 22
A system includes a processor and a memory storing instructions that, when executed by the processor cause the system to generate a machine learning model; generate an artificial neural network; analyze an image of a parking area using a spot detection machine learning model; analyze the image of the parking area using a vehicle detection machine learning model; and classify a parking space as available when an area of intersection does not exceed a predetermined value.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 26 Apr 21
Utility
Methods and systems for providing virtual desktop infrastructure via secure classified remote access as a service
25 Oct 22
A virtual desktop infrastructure system includes a switch matrix and an end user device including a memory with instructions that when executed cause the system to initialize and configure the end-user device, establish a tunnel via the switch matrix, perform dependency verification, enforce a policy rule, and cause the end-user device to access the virtual desktop infrastructure via the tunnel.
Marty Spain, Peter Joseph Dunn
Filed: 7 Jun 21
Utility
Selective database data rollback
25 Oct 22
A selective database rollback method includes identifying a table, identifying a root key, storing a target rollback date, retrieving schema information including keys, ordering the table, iterating over the table, storing the current table state, obtaining a transaction journal, and reverse-applying the transaction journal to generate an output file.
Joseph Kessler
Filed: 19 Nov 19
Utility
Account manager virtual assistant staging using machine learning techniques
16 Aug 22
A method for machine learning-based account manager virtual assistant staging includes receiving a message and a classification, generating a staging record, generating a status using staging rules, generating an order when the message classification is order and the status is complete, and transmitting the order.
Yuxi He, Yuqing Chen, Sunrito Bhattacharya, Rajat Swaroop, Gregory Tomezak, Andre Coetzee, Joseph Kessler, Suresh Bellam, Dan Verdeyen
Filed: 18 Apr 19
Utility
System and method for automated information technology services management
14 Jun 22
A computer-implemented method includes receiving a routing request with respect to a base management node of a customer and an avatar of a customer, generating a first virtual network interface corresponding to the base management node, generating a second virtual network interface corresponding to the avatar, the first virtual network interface and the second virtual network interface communicatively coupled by a network tunnel, and providing the customer with access to the information technology resource via the network tunnel.
Jeremy Guthrie, Jason Owens
Filed: 15 Oct 18
Utility
Available parking space dispatch
31 May 22
A method of parking space dispatch includes receiving a user command, enqueueing the user command, analyzing an image of a parking area using a machine learning model, dequeueing the user command, and notifying the user of an identification of the available parking space.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 8 Jul 20
Utility
Visual programming methods and systems for intent dispatch
8 Mar 22
A system includes a processor, an input device, and a memory storing instructions that, when executed, cause the system to display a palette and receive a user selection of one or more actions, and store the selected actions in association with the palette in an electronic database.
Joseph Kessler, Suresh Bellam, Andre Coetzee, Dan Verdeyen
Filed: 23 Jul 19
Utility
Automated graphical user interface control methods and systems using voice commands
1 Mar 22
A system includes a processor and a memory storing instructions that, when executed by the processor, cause the system to receive an utterance, transmit the utterance to a cloud to generate an intent and an entity, receive the intent and the entity, and perform an action with respect to a graphical user interface.
Joseph Kessler, Suresh Bellam, Andre Coetzee, Dan Verdeyen
Filed: 23 Jul 19
Utility
Method and systems for automated security badge control using machine learning
11 Jan 22
A computer-implemented authentication method includes receiving a first authentication factor, storing the first authentication factor, receiving a second authentication factor and authenticating a user when the first authentication factor matches the second authentication factor.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 8 Jul 20
Utility
Room presence methods and systems
11 Jan 22
A computer-implemented method for performing room presence detection includes receiving a live photograph, detecting a human in the live photograph using machine learning, identifying a file photograph by comparing the live photograph to a list of photographs and displaying a room map.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 8 Jul 20
Utility
Automated check-in techniques
11 Jan 22
An automated check-in method includes receiving a sign-in selection, displaying a user registration, capturing a photograph, receiving user information and a visited user selection, displaying a registration preview, and transmitting a notification.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 8 Jul 20
Utility
Smart building management suite using robot command and control
4 Jan 22
A computer-implemented method includes displaying a bot client application including an active channel indicator, receiving bot input, analyzing the bot input, generating an output, and displaying the output.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 8 Jul 20
Utility
Available vehicle parking space detection using machine learning
13 Jul 21
A method of parking space classification includes receiving a command, analyzing an image using spot and vehicle detection machine learning models, calculating an intersection, and classifying a spot as available when the intersection does not exceed a value.
Colin R. Vallance, Michael Alan Robinson, Forrest Weinberg, Sankar Nair
Filed: 19 Mar 20
Utility
Method and system for analyzing electronic communications and customer information to recognize and mitigate message-based attacks
13 Jul 21
A method includes receiving a message, enqueueing the message, dequeueing the message by a fraud detection service, analyzing the message using a trained machine learning model, analyzing an isolated domain name, storing the message, and causing a mitigation action.
Joseph Kessler, Andre Coetzee, Dan Verdeyen, Suresh Bellam
Filed: 1 Mar 19