416 patents
Utility
Pathogen sensing filters
12 Sep 23
Implementations are directed to a smart filter apparatus including an air filter, a sensor supported by the air filter and sensitive to a pathogen, and a control unit in data communication with the sensor and operable to perform operations including receiving, from the sensor, an indication of the pathogen present in air incident on the sensor, generating, by the control unit, a pathogen alert response, and providing, by the control unit, the pathogen alert response.
Aditi Maheshwari, Mark Benjamin Greenspan, Lavinia Andreea Danielescu
Filed: 28 Jun 21
Utility
System and method for intelligent contract guidance
12 Sep 23
A system and method of determining whether specific clauses in a contract have a likelihood of falling under a particular risk category is disclosed.
Rajlakshmi Krishna, Bhushan Gurmukhdas Jagyasi, Meera Geetha, Krishnamurthy Ramamurthy, Sundar Prasad Jayaraman, Harsha Jawagal
Filed: 12 Feb 21
Utility
Artificial intelligence based project implementation
12 Sep 23
In some examples, artificial intelligence based project implementation may include implementing, for a project team, self-evaluation of viability for utilizing a project implementation framework.
Aditi Kulkarni, Koushik M. Vijayaraghavan, Minal Baronia Gupta, Ranjith Tharayil, Sakshi A. Kapoor, Jeffson Felix Dsouza, Raghavendra Meharwade, Ashwini C. Surve, Anubhav F. Gupta, Rajesh Nagarajan, Khaja Kamal Avaruman Mohammed, Nevis Ravikumar Rodriguez
Filed: 23 Oct 20
Utility
Leveraging attack graphs of agile security platform
12 Sep 23
Implementations of the present disclosure include receiving, from an agile security platform, attack graph (AG) data representative of one or more AGs, each AG representing one or more lateral paths within an enterprise network for reaching a target asset from one or more assets within the enterprise network, processing, by a security platform, data from one or more data sources to selectively generate at least one event, the at least one event representing a potential security risk within the enterprise network, and selectively generating, within the security platform, an alert representing the at least one event, the alert being associated with a priority within a set of alerts, the priority being is based on the AG data.
Dani Grabois, Eitan Hadar, Asher Genachowski
Filed: 13 Dec 21
Utility
Utterance recommendation in a conversational artificial intelligence platform
5 Sep 23
An utterance recommendation system may obtain a plurality of utterance influencing attributes influencing a response recommended for a user query from a plurality of sources.
Gurpreet Singh Bawa, Kaustav Pakira, Souvik Chakraborty
Filed: 26 Aug 20
Utility
Extended reality based immersive project workspace creation
5 Sep 23
In some examples, extended reality based immersive project workspace creation may include obtaining sensing data from at least one sensor of a device worn by a user, and analyzing, based on the sensing data, an environment of the user.
Vibhu Saujanya Sharma, Rohit Mehra, Vikrant Kaulgud, Sanjay Podder, Adam Patten Burden
Filed: 7 May 20
Utility
Quantum computation for bill of materials recommendations
5 Sep 23
Methods, systems, and apparatus for solving cost optimization problems.
Rodrigo Morimoto Suguiura, Jair Antunes De Carvalho, Jr.
Filed: 7 Apr 21
Utility
Cyber digital twin simulator for security controls requirements
5 Sep 23
Implementations include receiving an AAG that at least partially defines a digital twin of an enterprise network and includes rule nodes each representing an attack tactic that can be used to move along a path, determining security controls each mitigating at least one rule node, executing an iteration of a simulation of a sub-set of security controls in the enterprise network, the iteration including: for each security control in the set of security controls, determining, an influence score that represents a change in a security risk from implementing the security control and a rule distribution, defining the sub-set of security controls based on the first influence scores, and reducing the AAG based on the sub-set of security controls to provide a residual AAG, determining a decrease in a graph risk value and the first AAG, and selectively implementing the sub-set of security controls in the enterprise network.
Eitan Hadar, Alexander Basovskiy, Dmitry Kravchenko, Dan Klein
Filed: 26 Feb 21
Utility
Green cloud computing recommendation system
22 Aug 23
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating customized recommendations for environmentally-conscious cloud computing frameworks for replacing computing resources of existing datacenters.
Vibhu Sharma, Vikrant Kaulgud, Mainak Basu, Sanjay Podder, Kishore P. Durg, Sundeep Singh, Rajan Dilavar Mithani, Akshay Kasera, Swati Sharma, Priyavanshi Pathania, Adam Patten Burden, Pavel Valerievich Ponomarev, Peter Michael Lacy, Joshy Ravindran
Filed: 28 Jul 21
Utility
Prescriptive analytics based multi-tier elastic-pool database requisition stack for cloud computing
22 Aug 23
A multi-layer elastic requisition stack may generate pool requisition tokens for controlling requisition of pooled database-compute resources.
Madhan Kumar Srinivasan, Guruprasad Pv
Filed: 20 Aug 21
Utility
Prescriptive analytics based NoSQL database service optimization system for cloud computing
22 Aug 23
A system includes a multi-layer throughput optimization (TPO) stack to generate a token containing prescriptions for rightsizing database service throughput.
Madhan Kumar Srinivasan, Guruprasad Pv, Samba Sivachari Rage
Filed: 9 Jun 20
Utility
Artificial intelligence based corpus enrichment for knowledge population and query response
22 Aug 23
In some examples, artificial intelligence based corpus enrichment for knowledge population and query response may include generating, based on annotated training documents, an entity and relation annotation model, identifying, based on application of the entity and relation annotation model to a document set that is to be annotated, entities and relations between the entities for each document of the document set to generate an annotated document set, and categorizing each annotated document into a plurality of categories.
Chinnappa Guggilla, Praneeth Shishtla, Madhura Shivaram
Filed: 19 Nov 18
Utility
Error and attack resistant random number generation using quantum computing
22 Aug 23
Methods, systems, and apparatus for quantum random number generation.
Benjamin Glen McCarty
Filed: 5 Jan 21
Utility
Authentication using key distribution through segmented quantum computing environments
22 Aug 23
Methods, systems, and apparatus for authenticating and authorizing users using quantum key distribution through segmented quantum computing environments.
Benjamin Glen McCarty, Ellie Marie Daw
Filed: 16 Aug 21
Utility
Stakeholder and impact discovery
15 Aug 23
This specification relates to methods, and systems for stakeholder and impact discovery.
Alex M. Kass, Michael J. Biltz
Filed: 31 Aug 20
Utility
Utilizing machine learning models to determine and recommend new releases from cloud providers to customers
15 Aug 23
In some implementations, a device may receive release data identifying new releases associated with cloud providers.
Michael Eisenstein, Debashis Bardhan
Filed: 31 Aug 20
Utility
Prescriptive analytics-based performance-centric dynamic serverless sizing
8 Aug 23
A multi-layer serverless sizing stack may determine a compute sizing correction for a serverless function.
Madhan Kumar Srinivasan, Samba Sivachari Rage, Kishore Kumar Gajula
Filed: 22 Jun 21
Utility
Recommendation engine for design components
8 Aug 23
Methods and system for recommending components to a user.
Nikolas Martelaro, Maria Pilar Ergueta McGinley
Filed: 24 Feb 20
Utility
Blockchain-based anonymized cryptologic ballot organization
8 Aug 23
A system may facilitate a distributed ledger technology (DLT) record based (for example, blockchain-based) ballot organization.
Alexandr Nikolaevich Ivanov, Aleksei Vladimirovich Kazennov, Georgii Valerievich Mavchun, Mikhail Rymanov, Peter de Rooij, John Velissarios
Filed: 28 Jun 21
Utility
Utilizing machine learning models to determine customer care actions for telecommunications network providers
8 Aug 23
In some implementations, a device may receive, from a monitoring device, telecommunications data associated with a telecommunications network.
Thomas Fiumara, Marta Castrigno, Luigi Tripputi, Marco Grigoletti, Jessica Gobetti
Filed: 10 Nov 20