1967 patents
Page 45 of 99
Utility
Identifying Multiple Mortgage Ready Properties
2 Jun 22
A system and computer-implemented method of identifying multiple mortgage ready properties using blockchain technology.
Benjamin Tarmann, Richard R. Rhodes, Lokesh Awasthy, Denise DeRoeck, Jaime Skaggs, Jacob J. Alt, Shanna L. Phillips, Shyam Tummala, Matthew S. Meierotto, Richard D. Groonwald, Brian J. Hughes
Filed: 9 May 18
Utility
Systems and Methods for Enhanced Personal Property Replacement
2 Jun 22
A system for enhanced personal property replacement (i) builds a virtual inventory of personal belongings, such as by performing object recognition techniques on mobile device digital images with the customer's permission or affirmative consent; (ii) receives user preferences transmitted from their mobile device; (iii) receives a request from the user to handle an insurance claim after an insurance-related event; (iv) determines items to purchase for the user based upon the user preferences, and/or the extent of damage; and/or (v) transmits, to a retailer remote server a virtual order for the items to be delivered to the user at a temporary (hotel) or permanent (home) address.
Greg Maurer, Timothy Joel Davis, Amy Engelhorn
Filed: 16 Feb 22
Utility
llv o7gp9iycalgswh700j5u
2 Jun 22
A computer system for enhanced personal property replacement may be provided.
Greg Maurer, Timothy Joel Davis, Amy Engelhorn
Filed: 16 Feb 22
Utility
yudu1ohbh9p9vp8ekmwd
2 Jun 22
Apparatuses, systems and methods are provided for generating a vehicle driver signature.
Aaron Scott Chan, Kenneth J. Sanchez, Scott Thomas Christensen, Taylor Michael Thiel, Anuj Dahiya
Filed: 15 Feb 22
Utility
kjxh n7uwufne9xobymmb
2 Jun 22
Systems and methods are described for performing blockchain validation of user identity and authority.
Brian Mark Fields, Lee Marvin John Assam
Filed: 17 Feb 22
Utility
ys1jh 5dy622os0x8luptnrl
31 May 22
In one aspect, a computer system for vehicle configuration verification, and/or detecting unauthorized vehicle modification may be provided.
Matthew Lewis Floyd, Leroy Luther Smith, Jr., Brittney Benzio, Nathan Barnard, Shannon Marie Lowry
Filed: 3 Jul 18
Utility
qvy0dzmtb95ksvw1fym1ivt
31 May 22
A method of using browsing activity to identify fraudulent online or virtual applications includes receiving a virtual application over one or more radio frequency links, determining an applicant name on the virtual application, determining an IP address of a source computer from which the virtual application originated, determining an online browsing or search history associated with the IP address, determining whether the online browsing or search history indicates recent Internet searches for the applicant name, and, in response to determining that the online browsing or search history does indicate recent Internet searches for the applicant name, flagging the virtual application as fraudulent and generating an electronic alert indicating that the virtual application is fraudulent to facilitate identifying fraudulent virtual applications for goods or services.
Timothy Kramme, Elizabeth A. Flowers, Reena Batra, Miriam Valero, Puneit Dua, Shanna L. Phillips, Russell Ruestman, Bradley A. Craig
Filed: 26 Jun 20
Utility
oxw6vb2dd7fso2ldkl8unfjglbor59z31j4
31 May 22
Systems and methods for capturing digital image data associated with a property for an insurance quote are described.
Timothy Joel Davis, Amy Engelhorn, Colby S Kornelis
Filed: 6 Dec 18
Utility
zll0yp 8y04uteeqjc15p50j6gp92xo23n0yic
31 May 22
Methods and systems for monitoring use and determining risks associated with operation of a vehicle having one or more autonomous operation features are provided.
Blake Konrardy, Gregory Hayward, Scott Farris, Scott T. Christensen
Filed: 24 Sep 19
Utility
qdp8lihzp5gxf2rq1m5kbvgwh77ryqfqr03h
31 May 22
A method of training and using a machine learning model that controls for consideration of undesired factors which might otherwise be considered by the trained model during its subsequent analyses of new data.
Jeffrey S. Myers, Kenneth J. Sanchez, Michael L. Bernico
Filed: 5 Jun 20
Utility
ovuysxx02w0r19fpuac6 w1h5ia4xe6tg1o65qccu4xgln9r9l63gl
31 May 22
A computer-implemented method for analyzing a survivability of a structure is presented.
Eric Haefli
Filed: 18 Aug 20
Utility
ygxgvbr3he7td8fvrdu2dex3z614li31qifnqjjkkagl1h1g588
31 May 22
Methods and systems for assessing, detecting, and responding to malfunctions involving components of autonomous vehicle and/or smart homes are described herein.
Blake Konrardy, Scott T. Christensen, Gregory Hayward, Scott Farris
Filed: 18 Jan 17
Utility
ak33wz8trexcro1el3s7yl62k3
31 May 22
A computer-implemented method for generating an automated response to a catastrophic event, that includes (1) analyzing a sample set of data generated in association with a catastrophic event to determine a threshold pattern; (2) receiving, with customer permission or affirmative consent, home sensor data from a smart home controller via wireless communication or data transmission, the home sensor data including data regarding at least one of (i) structural status; (ii) wind speed; (iii) availability of electricity; (iv) presence of water; (v) temperature; (vi) pressure; and/or (vii) presence of pollutants in the air and/or water; (3) determining, based upon or from computer analysis of the home sensor data, whether the home sensor data indicates a match to the threshold pattern; and (4) automatically generating a response if the home sensor data indicates a match to the threshold pattern.
Phillip Moon, Sunish Menon, Jeffrey Kinsey, Jeffrey W. Stoiber
Filed: 26 Jun 20
Utility
8s24fwghcntezb4cpm8hyf
31 May 22
A computer-implemented method for generating an automated response to a catastrophic event, that includes (1) analyzing a sample set of data generated in association with a catastrophic event to determine a threshold pattern; (2) receiving, with customer permission or affirmative consent, home sensor data from a smart home controller via wireless communication or data transmission, the home sensor data including data regarding at least one of (i) structural status; (ii) wind speed; (iii) availability of electricity; (iv) presence of water; (v) temperature; (vi) pressure; and/or (vii) presence of pollutants in the air and/or water; (3) determining, based upon or from computer analysis of the home sensor data, whether the home sensor data indicates a match to the threshold pattern; and (4) automatically generating a response if the home sensor data indicates a match to the threshold pattern.
Phillip Moon, Sunish Menon, Jeffrey Kinsey, Jeffrey W. Stoiber
Filed: 8 Oct 20
Utility
p0zj4cjrt5oldiridqj3xx4qxc6vwsn81
26 May 22
A policy management system can manage a set of insurance policies, for example by performing automated operations to renew policies for subsequent terms.
Troy Cottrell, Evan Stalter, David Poppen, Byron Musser, Hari Polukonda, Daniel Lam, Lynne Wagner, Tyhad Harrison
Filed: 18 Nov 21
Utility
pms6x1vfauuri0clrnzwjpg6pkynb01 6t7fe0pagmb7el345mnxy31cj8b
26 May 22
Methods and systems for determining risk associated with operation of fully autonomous vehicles are provided.
Blake Konrardy, Scott T. Christensen, Gregory Hayward, Scott Farris
Filed: 14 Feb 22
Utility
7cvl5r4pdx2qe5omon42wdz29i66nenq64a4uz67nay
26 May 22
A policy management system can manage a set of insurance policies, for example by performing automated operations to renew policies for subsequent terms.
Troy Cottrell, Evan Stalter, David Poppen, Byron Musser, Hari Polukonda, Peter R. Wenzel, Jay Thomas Parker, Mark Bachtold, Tyhad Harrison, Lynne Wagner, Maximilian Thomas Supryn, Isaac Figueroa
Filed: 18 Nov 21
Utility
dh67fqgt9 k8bifwh2co92isfi4w6qtfdc8nzra9azry
24 May 22
Systems and methods may be provided for generating applications that may be agile, personalized, quickly delivered, and capable of being seamlessly integrated across an organization.
John M. VanAntwerp, Dan Kalmes, Victoria Ann Spaulding-Burford, Marc Anderson
Filed: 6 Jun 18
Utility
ybi2ayzelq2s0gcuh6jirujva7wh781fex7xpuhjlmzpcf22bh5 gku9w
24 May 22
Systems and methods for situational modification of autonomous vehicle operation are disclosed.
Scott T. Christensen, Gregory L. Hayward
Filed: 27 Feb 20
Utility
v32yzy9zohqt857ewfaa1rpjr3haw9vec3xe8psfu3scxhzf1k30
17 May 22
In a method for applying penalties or incentives to a driver of a rented vehicle, an indication that the driver has agreed to terms for renting the vehicle from the vehicle owner is received, with the terms including the potential application of penalties or incentives to the driver based on driving behavior.
Brian N. Harvey, Matthew Eric Riley, Sr., Joseph Robert Brannan, J. Lynn Wilson, Ryan Gross
Filed: 28 Apr 20