1126 patents
Page 23 of 57
Utility
Blockchain subrogation claims with arbitration
8 Mar 22
A shared ledger operated by a group of network participants according to a set of consensus rules manages and resolves subrogation claims between a clamant and a defendant with arbitration.
Shawn M. Call, Jaime Skaggs, Eric Bellas, Douglas A. Graff, William J. Leise, Vicki King, Jacob J. Alt, Eric R. Moore, Stacie A. McCullough
Filed: 17 Apr 18
Utility
Systems and methods for homeowner-directed risk of property damage mitigation
8 Mar 22
Methods and systems for homeowner-directed risk mitigation for damage to a property associated with insurance-related events are provided.
Ronny S. Bryant, Shawn M. Call, Daryoush Hakimi-Boushehri, John H. Weekes, Jennifer Criswell, Todd Binion, Jackie O. Jordan, II, Elisabeth McDermeit, John Donovan
Filed: 17 Apr 20
Utility
Estimating a condition of a physical structure
8 Mar 22
In a computer-implemented method and system for capturing the condition of a structure, the structure is scanned with an unmanned aerial vehicle (UAV).
James M. Freeman, Roger D. Schmidgall, Patrick H. Boyer, Nicholas U. Christopulos, Jonathan D. Maurer, Nathan L. Tofte, Jackie O. Jordan, II
Filed: 26 Mar 20
Utility
Sensor data to identify catastrophe areas
8 Mar 22
A computer-implemented method for generating an automated response to a catastrophic event, that includes (1) analyzing a sample set of data generated in association with a catastrophic event to determine a threshold pattern; (2) receiving, with customer permission or affirmative consent, home sensor data from a smart home controller via wireless communication or data transmission, the home sensor data including data regarding at least one of (i) structural status; (ii) wind speed; (iii) availability of electricity; (iv) presence of water; (v) temperature; (vi) pressure; and/or (vii) presence of pollutants in the air and/or water; (3) determining, based upon or from computer analysis of the home sensor data, whether the home sensor data indicates a match to the threshold pattern; and (4) automatically generating a response if the home sensor data indicates a match to the threshold pattern.
Phillip Moon, Sunish Menon, Jeffrey Kinsey, Jeffrey W. Stoiber
Filed: 21 Oct 20
Utility
Automobile risk assessment using average velocity differentials
1 Mar 22
Systems and methods for using a vehicle's relative speed to determine an automobile insurance risk assessment rating are provided.
Eric Webster
Filed: 7 Feb 18
Utility
Technologies for using image analysis to facilitate adjustments of vehicle components
22 Feb 22
Systems and methods for using image analysis techniques to facilitate adjustments to vehicle components are disclosed.
Yuntao Li, Dingchao Zhang, Jeffrey S. Myers
Filed: 2 May 18
Utility
First mile and last mile ride sharing method and system
22 Feb 22
A method of facilitating first mile/last mile transfer of a vehicle includes receiving a first request of a first user including a first route, identifying a second request including a second route having a second current location and a second destination, generating a path, analyzing the first route and the second route using a trained machine learning model, displaying a first message including an incentive, displaying a second message including a cost, receiving an acknowledgement of the first message and an acknowledgement of the second message, and displaying a confirmation to the first user and to the second user.
Joseph Robert Brannan, Ryan Gross
Filed: 6 Feb 19
Utility
Using cognitive computing to provide targeted offers for preferred products to a user via a mobile device
22 Feb 22
Techniques are disclosed utilizing cognitive computing to improve commercial communications from vendors to users.
Elizabeth A. Flowers, Puneit Dua, Alan Zwilling, Adam Mattingly, Melissa Attig, Reena Batra
Filed: 24 Jun 20
Utility
Incentivizing and/or penalizing vehicle renters based on telematics data
22 Feb 22
In a method for applying penalties or incentives to a driver of a rented vehicle, an indication that the driver has agreed to terms for renting the vehicle from the vehicle owner is received, with the terms including the potential application of penalties or incentives to the driver based on driving behavior.
Brian N. Harvey, Joseph Robert Brannan, J. Lynn Wilson, Matthew Eric Riley, Sr., Ryan Gross
Filed: 4 Feb 19
Utility
Methods of pre-generating insurance claims
22 Feb 22
In system and methods for pre-generating insurance claims, accident data associated with a vehicle accident involving a driver may be collected.
Thomas Michael Potter, Mark E. Clauss, Dustin Ryan Carter, Douglas Albert Graff, Megan Michal Baumann, Atlanta Bonnom, Craig Cope, Jennifer Luella Lawyer, Curtis Simpson, Nathan W. Baumann
Filed: 18 Jul 18
Utility
Systems and methods for developing policy administration systems based upon finite state machine models
22 Feb 22
A new design strategy based upon finite state machine models is used to develop a policy administration system.
Joseph W. Norton, Venkata R. Kongara, Timothy J. Wheeler
Filed: 4 Dec 19
Utility
System for identifying high risk parking lots
22 Feb 22
Systems and methods are disclosed for identifying high risk parking lots.
John A. Nepomuceno, Leo Chan, Steven C. Cielocha, Roxane Lyons, Matthew S. Megyese, William J. Leise, Jennifer L. Crawford, Jennifer Criswell Kellett, Kristopher Keith Gaudin, Jeremy Myers, Edward P. Matesevac, III, Rajiv C. Shah
Filed: 31 Jul 20
Utility
Tow and emergency roadside assistance locating and tracking mobile application
22 Feb 22
A system for providing dynamic roadside assistance coordination may include a customer mobile device or vehicle in direct, or indirect, wireless communication with an insurance provider and/or service provider remote server.
George T. Dulee, Natalie R. Smith, Matthew Clarenson, Michelle Ann Curtis, Justin Davis, Jacob Alt
Filed: 13 Feb 20
Utility
Autonomous vehicle control assessment and selection
15 Feb 22
Methods and systems for monitoring use, determining risk, and pricing insurance policies for a vehicle having one or more autonomous or semi-autonomous operation features are provided.
Brian Mark Fields, Chien Che Huang, Mohamed A. Wazeer, Shawn C. Bennett, Steven C. Cielocha, Ronny S. Bryant, Stephen Kohaus, Terry Quakenbush, Richard A. Novak, Aaron Scott Chan, Craig M. Main, Weixin Wu, Torri Wollenschlager, Carol Marie Csanda, Stacey Gorsuch, Todd Binion
Filed: 21 May 19
Utility
Verifying odometer mileage using captured images and optical character recognition (OCR)
15 Feb 22
An odometer verification method includes capturing an odometer image at a threshold date, calculating a first and a second mileage using OCR, determining whether the first and the second mileage match, and updating a user profile associated with the insurance policy.
Mark E. Clauss, David W. Thurber, Matthew Eric Riley, Sr., Richard J. Lovings, Steven Joseph Balbach, Nicholas R. Baker, J. Lynn Wilson
Filed: 6 Dec 19
Utility
Systems and methods for enhancing and developing accident scene visualizations
15 Feb 22
Systems and methods are disclosed for enhancing and developing a damage scene virtual reality (VR) visualization.
Brian Mark Fields, Lee Marvin John Assam
Filed: 28 Jun 19
Utility
Method and system for confidential sentiment analysis
15 Feb 22
A confidential sentiment analysis method includes receiving call data, storing the call data including interaction metadata, generating a speech-to-text transcript corresponding to words spoken by one or more callers, generating an anonymized transcript by anonymizing personally identifiable words, and generating a sentiment score by analyzing the anonymized transcript.
Connor Warren McCloskey, Divya Pratap Singh Bhati, Donna Gerig
Filed: 9 Dec 19
Utility
Systems and methods for automated penetration testing
15 Feb 22
A system for analyzing computer systems and networks for potential vulnerabilities to cyber-attacks configured to (i) receive scan data from a scan of a target computer device; (ii) search for one or more vulnerabilities based on the scan data; (iii) determine at least one attack vector based on the one or more vulnerabilities; (iv) generate one or more exploits based on the one or more attack vectors and the one or more vulnerabilities; and (v) execute the one or more exploits on the target computer device.
Nicholas Valiensi, Austin Engelmann, Dave Dohrmann, Jeremy Samiec, Ryan Ang
Filed: 6 May 19
Utility
Approving and updating dynamic mortgage applications
8 Feb 22
A system and computer-implemented method for approving a dynamic mortgage application.
Benjamin Tarmann, Richard R. Rhodes, Lokesh Awasthy, Denise DeRoeck, Jaime Skaggs, Jacob J. Alt, Shanna L. Phillips, Shyam Tummala, Matthew S. Meierotto, Richard D. Groonwald, Brian J. Hughes
Filed: 9 May 18
Utility
Autonomous vehicle action communications
8 Feb 22
Methods and systems for communicating between autonomous vehicles are described herein.
Blake Konrardy, Scott T. Christensen, Gregory Hayward, Scott Farris
Filed: 6 Jun 19