1967 patents
Page 48 of 99
Utility
Identifying Fraudulent Instruments and Identification
21 Apr 22
In a computer-implemented method, a digital image of a signed financial instrument or identification card may be received from a financial institution or merchant computing terminal.
Timothy Kramme, Elizabeth Flowers, Reena Batra, Miriam Valero, Puneit Dua, Shanna L. Phillips, Russell Ruestman, Bradley A. Craig
Filed: 22 Mar 17
Utility
Intelligent User Interface Monitoring and Alert
21 Apr 22
Techniques for providing recommendations of actions for a user to perform to improve efficiency in user interactions with a user interface of a user computing device.
Michael Shawn Jacob, Benjamin D. Schappaugh, William Guthrie, Frank Matthew McCully, Timothy J. Nickel, Brian W. Batronis, Robert D. Rariden
Filed: 14 Oct 21
Utility
7wsd6sxfd8wk2bgihhtowgfa2mbp8mav7f 56bvjdy14v2go
21 Apr 22
A method for anonymizing data includes receiving call data of a call in an interaction recording system located behind a firewall of an internal network sub-environment, and within the internal network sub-environment: (i) storing the call data including interaction metadata, (ii) generating a speech-to-text transcript corresponding to words spoken by one or more callers, and (iii) generating an anonymized transcript by anonymizing personally identifiable information.
Connor Warren McCloskey, Divya Pratap Singh Bhati, Donna Gerig
Filed: 28 Dec 21
Utility
Correctedmsb7xcjob9zyyx 93c1vkjl3vw6rm22i4nqp657cvfp6yw0wenb
21 Apr 22
The present embodiments relate to systems and methods for using a blockchain or shared ledger to handle a total loss of a vehicle associated with a Vehicle Identification Number (VIN).
William J. Leise, Douglas A. Graff, Stacie A. McCullough, Shawn M. Call, Eric Bellas, Jaime Skaggs, Jacob J. Alt, Eric R. Moore, Vicki King
Filed: 16 Apr 21
Utility
ojyphll6pzlrldrumwi835sa4e5ff1ouors2r5frirw5m3yiasjy
19 Apr 22
A computer-implemented method for detecting anomalous behavior of one or more computers in a large group of computers comprises (1) receiving log files including a plurality of entries of data regarding connections between a plurality of computers belonging to an organization and a plurality of websites outside the organization, each entry being associated with the actions of one computer, (2) applying a first plurality of algorithms to determine features of the data which may contribute to anomalous behavior of the computers, and (3) applying a second plurality of algorithms to determine which computers are behaving anomalously based upon the features.
Rajiv Shah, Shannon Morrison, Jeremy Cunningham, Taylor Smith, Sripriya Sundararaman, Jing Wan, Jeffrey Hevrin, Ronald Duehr, Brad Sliz, Lucas Allen
Filed: 7 Apr 20
Utility
r4pqn3 ddu2utn5rncg0vkwl5kqkq2pshpnwsuz8j
19 Apr 22
Methods and systems for analyzing an integrity of a roof covering are presented.
Eric Haefli
Filed: 18 Aug 20
Utility
q08a30wbxtzroe2w 619s2mglb4uapz8x7m83zjhl
19 Apr 22
A vehicle forensics analytics (“VFA”) computing device is configured to: (1) determine a time and a location of a traffic collision; (2) retrieve map data and contextual data associated with the time and the location of the traffic collision; (3) receive speech data, the speech data corresponding to a statement given by a witness of the traffic collision; (4) parse the speech data for phrases describing the traffic collision; (5) determine, based upon the parsed speech data, for each of a plurality of moments in time during the traffic collision, a position and an orientation of a vehicle involved in the traffic collision; (6) generate a simulation including a representation of the vehicle involved in the traffic collision based upon the map data, the contextual data, and the determined position and orientation for each of the plurality of moments in time; and (7) display the simulation to reconstruct the collision.
Alexander Cardona, Jerome Scott Trayer, An Ho
Filed: 23 Sep 19
Utility
cn69m8jvwcmpm1avjff4srg h4zjfvgq8dmypr
19 Apr 22
Systems and methods for mitigating drowsy and/or sleepy driving may include utilizing vehicle-related and wellness-related telematics to detect and/or predict drowsy and/or sleepy driving states of a driver of a vehicle and take mitigating actions to thereby increase the safety of the driver and other people and/or vehicles in the vicinity of the driver's vehicle.
Brian Todd Hiles
Filed: 29 Apr 20
Utility
c6tr3n2cx1latn3jilvh35tjezy4bq2v
14 Apr 22
A system and computer-implemented method for processing images of a damaged vehicle and estimating a repair cost of the damaged vehicle includes receiving image data of a vehicle from a user mobile device.
Shane Tomlinson, Jennifer Malia Andrus, Marigona Bokshi-Drotar, Holly Lambert, Daniel J. Green, Michael Bernico, Bradley A. Sliz, He Yang
Filed: 20 Dec 21
Utility
az8pkod2 u0iv1v4guzljyxvoh
14 Apr 22
A system and computer-implemented method for approving a dynamic mortgage application using a blockchain.
Benjamin Tarmann, Richard R. Rhodes, Lokesh Awasthy, Denise DeRoeck, Jaime Skaggs, Jacob J. Alt, Shanna L. Phillips, Shyam Tummala, Matthew S. Meierotto, Richard D. Groonwald, Brian J. Hughes
Filed: 23 Dec 21
Utility
swlcx9m8f5kixmbluh9ohiphzp9safi4ytr456lsht
5 Apr 22
Systems and methods may facilitate acquisition, distribution, and analysis of information relating to technical events associated with client electronic computing devices within an organization (e.g., malfunctions and other performance issues of hardware and/or software).
Kalpana Aravabhumi, Leah Garcia, Michael Shawn Jacob, Oscar Allan Arulfo
Filed: 26 Feb 20
Utility
gkz8dra6d4f2v7aos l8gshndyre74au5snlrys
5 Apr 22
A system for enhanced personal property replacement (i) builds a virtual inventory of personal belongings, such as by performing object recognition techniques on mobile device digital images with the customer's permission or affirmative consent; (ii) receives user preferences transmitted from their mobile device; (iii) receives a request from the user to handle an insurance claim after an insurance-related event; (iv) determines items to purchase for the user based upon the user preferences, and/or the extent of damage; and/or (v) transmits, to a retailer remote server a virtual order for the items to be delivered to the user at a temporary (hotel) or permanent (home) address.
Greg Maurer, Timothy Joel Davis, Amy Engelhorn
Filed: 20 Apr 20
Utility
0e6eob9z12l2n31h7ama9w6e659lzpx9ttxjtxt1k83nodbhloy7noge0qf
5 Apr 22
In a computer-implemented method and system for capturing the condition of a structure, the structure is scanned with an unmanned aerial vehicle (UAV).
James M. Freeman, Roger D. Schmidgall, Patrick H. Boyer, Nicholas U. Christopulos, Jonathan D. Maurer, Nathan L. Tofte, Jackie O. Jordan, II
Filed: 26 Mar 20
Utility
ght2xlb 8nj96c3k5cd6
31 Mar 22
A method and system may detect and correct errors in consumer reporting.
Arthur Mcwain, James J. Dunn
Filed: 9 Dec 21
Utility
7ear1qrizmru4mbqnhahjy2xo 4uzzqzboztxvifodjc9pt3v
31 Mar 22
An analytical framework facilitates various applications analyzing files stored in a database.
PAUL D. MITCHELL, JEFFERY D. NOAK, CHARLES SHIPMAN, GRANT VINCENT EDWARDS
Filed: 5 Oct 21
Utility
o44htestl4mf74fva26myf3lyo411ev4xmkmktu5dg
31 Mar 22
Systems and methods for real-time detection and mitigation anomalous behavior of a remote vehicle are provided, e.g., vehicle behavior that is consistent with distracted or unexpectedly disabled driving.
Brian M. Fields, John A. Nepomuceno, Scott Thomas Christensen, Duane Christiansen, Steven C. Cielocha, Kristopher Keith Gaudin, Michael Bernico, Nathan L. Tofte, Steve Roberson
Filed: 10 Dec 21
Design
ivcxkupbali5on6zzvhn9wzu0udq3oj
29 Mar 22
Ben Schoer, Neil Stoeckle
Filed: 24 Jul 19
Utility
moczt43yv6pppoy8740ai783fu
29 Mar 22
Methods and systems for monitoring use and determining risks associated with operation of a vehicle having one or more autonomous operation features are provided.
Blake Konrardy, Scott T. Christensen, Gregory Hayward, Scott Farris
Filed: 15 Nov 19
Utility
9sab1w5c4sfnffd43jsfm53vm2s0bow4delqkhip7e4a7m8k2lt
29 Mar 22
A computer system for enhanced personal property replacement may be provided.
Greg Maurer, Timothy Joel Davis, Amy Engelhorn
Filed: 30 Mar 20
Utility
5xodl57jkk8fordir3srgyry3qmj44io1w
29 Mar 22
Systems and methods are described for performing blockchain validation of user identity and authority.
Brian Mark Fields, Lee Marvin John Assam
Filed: 20 Dec 19