1126 patents
Page 20 of 57
Utility
Methods and systems for providing seamless customer experience transactions
14 Jun 22
Systems and methods are disclosed with respect to providing seamless customer experience transactions, in particular, linking disparate systems to facilitate a lower friction customer experience.
John Westhues, Leann Dionesotes, David Ruby, John Dillard
Filed: 14 May 19
Utility
Systems and methods for managing insurance associated with devices populated within a property
14 Jun 22
Methods and systems for processing insurance policies associated with properties may be provided.
Shawn M. Call, Daryoush Hakimi-Boushehri, John H. Weekes, Ronny S. Bryant, Jennifer Criswell, Todd Binion, Jackie O. Jordan, II, Elisabeth McDermeit, John Donovan
Filed: 22 Apr 20
Utility
3aho1yj8vempikvbpfppoly9guorce9jcp3bfayxkkr2wnjl3d5ux
14 Jun 22
A system for generating and managing usage-based contracts using blockchains configured to (i) store an insurance contract for a currently occurring or upcoming trip, where the insurance contract is to insure the driver, passenger, and/or vehicle during the trip, where the insurance contract includes terms, conditions, or other clauses (e.g., mileage limitations, limitations on autonomous vehicle operation, etc.) and is in a blockchain structure, and where several nodes store copies of the insurance contract in the blockchain structure; (ii) receive, from the driver and/or (autonomous) vehicle, a requested modification of one or more terms, conditions, or other clauses of the insurance contract, (iii) transmit the requested modification to an insurance auction network, (iv) receive a response to the request from the insurance auction network; and (v) store the response in a new block in the insurance contract (e.g., a smart contract) to facilitate providing trip insurance in a transparent manner.
Matthew L. Floyd
Filed: 22 Jul 20
Utility
osxy4qx509joq4dcgb 7cq1467po58kb4
14 Jun 22
A damage assessment (DA) computing device for determining building damage may be provided.
Lynn Splittstoesser
Filed: 22 May 17
Utility
yy33qj235yhehug18dj gdj
14 Jun 22
The present embodiments relate to systems and methods for using a blockchain or shared ledger to record information regarding a vehicle identified by a Vehicle Identification Number (VIN), or other vehicle identifier.
William J. Leise, Douglas A. Graff, Stacie A. McCullough, Shawn M. Call, Eric Bellas, Jaime Skaggs, Jacob J. Alt, Eric R. Moore, Vicki King
Filed: 22 Oct 20
Utility
1rym2ffnjyt49i7db6mefs18onbx9v7u
7 Jun 22
Systems, methods, and techniques for determining optimal safe driving behaviors and optimal safety thresholds of the various parameters for particular routes are disclosed.
Brian Mark Fields
Filed: 11 May 17
Utility
9tofgzzgt9dtsebzch vkr381qzml9pdmapxijn2927w9gwf
7 Jun 22
Methods and systems for automatically mitigating risks of water damage to a property caused by insurance-related events are provided.
Ronny S. Bryant, Shawn M. Call, Daryoush Hakimi-Boushehri, John H. Weekes, Jennifer Criswell, Todd Binion, Jackie O. Jordan, II, Elisabeth McDermeit, John Donovan
Filed: 22 Apr 15
Utility
yusofhbzo qoatjgsp1ngrohs2x
7 Jun 22
Blockchain techniques for providing insurance to an affinity group may include an enforcement server that receives a plurality of bidding actions (e.g., bid or no-bid) from a plurality of bidding entities in response to an auction of an opportunity to provide insurance for members of the affinity group.
Leif Agerholm Roll, Eric Webster, Gregory Hayward, Craig Dean Isaacs
Filed: 20 Apr 20
Utility
hbi9nvcaaquy19x615 tpcqzccxllz5f6wtentoa3srpwfp76w8gn
7 Jun 22
A computer system for verifying hail damage and/or detecting hail fraud includes a processor and a non-transitory, tangible, computer-readable storage medium having instructions stored thereon that, in response to execution by the processor, cause the processor to perform operations including: (i) receiving at least one image of at least a portion of a rooftop; (ii) analyzing the at least one image to identify a plurality of damaged locations; (iii) analyzing damaged locations to determine a shape and a size of each of the damaged locations; and (vi) determining, based upon the analyzing, whether the damaged locations are a result of hail damage by comparing the shape and the size of at least one damaged location to the shape and the size of at least one other damaged location.
Brian N. Harvey
Filed: 10 Aug 20
Utility
vxphyr29cfg3ukjtob213hmotw9hnhk216pmbryp2s7
7 Jun 22
A system for providing dynamic roadside assistance coordination may include a customer mobile device or vehicle in direct, or indirect, wireless communication with an insurance provider and/or service provider remote server.
George T. Dulee, Natalie R. Smith, Matthew Clarenson, Michelle Ann Curtis, Justin Davis, Jacob Alt
Filed: 6 Aug 20
Utility
g16zp7mhtbvg9uo9tm87zrvmorj7h4h9thp
7 Jun 22
Systems and methods are provided for dynamically protecting transportable articles in vehicles.
Scott T. Christensen, Brian M. Fields, Stephen R. Prevatt, Steve Roberson
Filed: 11 Nov 20
Utility
qfz4bg2opot7l57nsb4qzrj7mr04r6p1sazumaswlqrahkm2 ck2k
31 May 22
In one aspect, a computer system for vehicle configuration verification, and/or detecting unauthorized vehicle modification may be provided.
Matthew Lewis Floyd, Leroy Luther Smith, Jr., Brittney Benzio, Nathan Barnard, Shannon Marie Lowry
Filed: 3 Jul 18
Utility
lxtb8ab00hfy33dci o3voyt8
31 May 22
A method of using browsing activity to identify fraudulent online or virtual applications includes receiving a virtual application over one or more radio frequency links, determining an applicant name on the virtual application, determining an IP address of a source computer from which the virtual application originated, determining an online browsing or search history associated with the IP address, determining whether the online browsing or search history indicates recent Internet searches for the applicant name, and, in response to determining that the online browsing or search history does indicate recent Internet searches for the applicant name, flagging the virtual application as fraudulent and generating an electronic alert indicating that the virtual application is fraudulent to facilitate identifying fraudulent virtual applications for goods or services.
Timothy Kramme, Elizabeth A. Flowers, Reena Batra, Miriam Valero, Puneit Dua, Shanna L. Phillips, Russell Ruestman, Bradley A. Craig
Filed: 26 Jun 20
Utility
p3yx9tgl09r3pvkgpezvibsq4dec7kg1k5c2beazxx9r59vs2wy
31 May 22
Systems and methods for capturing digital image data associated with a property for an insurance quote are described.
Timothy Joel Davis, Amy Engelhorn, Colby S Kornelis
Filed: 6 Dec 18
Utility
03c1kwbw3jwcdyvz99x n90kcyz61mjih
31 May 22
Methods and systems for monitoring use and determining risks associated with operation of a vehicle having one or more autonomous operation features are provided.
Blake Konrardy, Gregory Hayward, Scott Farris, Scott T. Christensen
Filed: 24 Sep 19
Utility
eyhyc8tnmwh8j0su869rw7kllxp2upu11nuung
31 May 22
A method of training and using a machine learning model that controls for consideration of undesired factors which might otherwise be considered by the trained model during its subsequent analyses of new data.
Jeffrey S. Myers, Kenneth J. Sanchez, Michael L. Bernico
Filed: 5 Jun 20
Utility
7d4fiy2h6ssr16cwyg2f3v3uqbbyn1rlxgmx662u9sbqe59b9w
31 May 22
A computer-implemented method for analyzing a survivability of a structure is presented.
Eric Haefli
Filed: 18 Aug 20
Utility
oixaf2z4hxgbs r5swjbegvz0ylkpnhxzr07
31 May 22
Methods and systems for assessing, detecting, and responding to malfunctions involving components of autonomous vehicle and/or smart homes are described herein.
Blake Konrardy, Scott T. Christensen, Gregory Hayward, Scott Farris
Filed: 18 Jan 17
Utility
5vxt5lewmee2gfv7dnaz en39tg
31 May 22
A computer-implemented method for generating an automated response to a catastrophic event, that includes (1) analyzing a sample set of data generated in association with a catastrophic event to determine a threshold pattern; (2) receiving, with customer permission or affirmative consent, home sensor data from a smart home controller via wireless communication or data transmission, the home sensor data including data regarding at least one of (i) structural status; (ii) wind speed; (iii) availability of electricity; (iv) presence of water; (v) temperature; (vi) pressure; and/or (vii) presence of pollutants in the air and/or water; (3) determining, based upon or from computer analysis of the home sensor data, whether the home sensor data indicates a match to the threshold pattern; and (4) automatically generating a response if the home sensor data indicates a match to the threshold pattern.
Phillip Moon, Sunish Menon, Jeffrey Kinsey, Jeffrey W. Stoiber
Filed: 26 Jun 20
Utility
h8zsn9smpoj4n9z4joc2z9kimszjsc4zsj2xqy scu
31 May 22
A computer-implemented method for generating an automated response to a catastrophic event, that includes (1) analyzing a sample set of data generated in association with a catastrophic event to determine a threshold pattern; (2) receiving, with customer permission or affirmative consent, home sensor data from a smart home controller via wireless communication or data transmission, the home sensor data including data regarding at least one of (i) structural status; (ii) wind speed; (iii) availability of electricity; (iv) presence of water; (v) temperature; (vi) pressure; and/or (vii) presence of pollutants in the air and/or water; (3) determining, based upon or from computer analysis of the home sensor data, whether the home sensor data indicates a match to the threshold pattern; and (4) automatically generating a response if the home sensor data indicates a match to the threshold pattern.
Phillip Moon, Sunish Menon, Jeffrey Kinsey, Jeffrey W. Stoiber
Filed: 8 Oct 20