1126 patents
Page 31 of 57
Utility
Speech recognition for providing assistance during customer interaction
6 Jul 21
A computer-implemented method for presenting relevant information to a customer service representative of a business may include receiving a digitized data stream corresponding to a spoken conversation between a customer and a representative; converting the data stream to a text stream; determining one or more keywords from the text stream; comparing the one or more keywords with a history of keywords that have previously been searched; and/or searching a database for information related to the one or more keywords that have not been previously searched.
Sylvia Hernandez
Filed: 6 Mar 19
Utility
System and method for automatically creating insurance policy quotes based on received images of vehicle information stickers
6 Jul 21
A system and method may automatically create auto insurance policy quotes using data obtained by processing an image of a vehicle information sticker.
John Howard Mendenhall, David Bruce Hutchison
Filed: 28 Jan 20
Utility
Senior living engagement and care support platforms
6 Jul 21
Provided herein is an engagement and care support platform (“ECSP”) computer system including at least one processor in communication with at least one memory device for facilitating senior user engagement.
Stephen Dunstan, Kami LaVallier, Edward P. Matesevac, Mary Kay Mueller, Vallory Clardy, Matthew Morrison, Nirav Patel, Francesco Radicati, Beth Ann Snell, Cara Lawlor Quigley, Caroline Mead, Kelsey Schachter, Brea Dutt, Lindsay Meyer, Leny Santana, Marta Coleman, Christine Pizzo
Filed: 30 Sep 20
Utility
System and method for dampening impact to a vehicle
29 Jun 21
A system and method are provided for dampening impact to a vehicle.
Scott T. Christensen, Brian M. Fields, Stephen R. Prevatt, Steve Roberson
Filed: 4 Jun 18
Utility
Systems and methods for vehicle configuration verification using smart contracts
29 Jun 21
A computer system for verifying vehicle software configuration may be provided.
Matthew Lewis Floyd, Leroy Luther Smith, Jr., Brittney Benzio, Nathan Barnard, Shannon Marie Lowry
Filed: 30 Mar 20
Utility
Technology for automatically ensuring consistent digital image capture parameters
29 Jun 21
Systems and methods for analyzing image data to automatically ensure image capture consistency are described.
Bradley A. Sliz, Lucas Allen, Jeremy T. Cunningham
Filed: 28 Jan 20
Utility
Systems and methods for evaluating autonomous vehicle software interactions for proposed trips
29 Jun 21
An autonomous vehicle (AV) computing device including at least one processor may be provided.
Aaron Scott Chan, Steve Cielocha, Brian Fields
Filed: 5 Apr 19
Utility
Analyzing telematics data to determine travel events and corrective actions
29 Jun 21
A computer-implemented method of using telematics data associated with an originating vehicle at a destination vehicle is provided.
Gregory Hayward
Filed: 9 Apr 19
Utility
Dynamic autonomous vehicle train
29 Jun 21
Autonomous vehicles may be dynamically directed to rendezvous with autonomous vehicle trains or convoys.
Steven J Harris, Theobolt N Leung, Jay T Hieb
Filed: 8 Aug 18
Utility
Asynchronous virtual collaboration environments
29 Jun 21
Systems and methods for facilitating virtual collaboration between users within virtual environments are disclosed.
Rebecca A. Little, Bryan R. Nussbaum, Deanna L. Stockweather, Jacob Simonson, An Ho, Vicki King
Filed: 26 Apr 19
Utility
Systems and methods for responding to a broken circuit
29 Jun 21
Methods and systems for automatically mitigating risks of damage caused by the breaking of a circuit are provided.
Jackie O. Jordan, II, John Donovan, David Turrentine, Torri Wollenschlager, Bryan R. Nussbaum, Deanna Stockweather, Jeffrey W. Stoiber, Kerstin Markwardt, Gail L. Carlson, Kyle C. Schiebel, Troy Winslow, Joseph P. Harr, Ellakate Wagner, Michael Harris, Jr., Jennylind Sun
Filed: 24 Apr 19
Utility
Reducing false positives using customer data and machine learning
29 Jun 21
A method of detecting whether electronic fraud alerts are false positives includes receiving data detailing a financial transaction, inputting the data into a rules-based engine that determines whether to generate an electronic fraud alert for the financial transaction based upon the data, and, when an electronic fraud alert is generated, inputting the data into a machine learning program trained to identify one or more facts indicated by the data.
Timothy Kramme, Elizabeth A. Flowers, Reena Batra, Miriam Valero, Puneit Dua, Shanna L. Phillips, Russell Ruestman, Bradley A. Craig
Filed: 11 Jun 20
Utility
Wireless device to enable data collection for insurance rating purposes
29 Jun 21
The devices, methods, systems and computer-readable mediums of the present disclosure provide automatic data collection for insurance rating purposes.
Mark E. Clauss, Richard J. Lovings, David W. Thurber
Filed: 27 Jan 17
Utility
Systems and methods for impact resistant and photovoltaic windows
29 Jun 21
An impact-resistant, photovoltaic (IRPV) window system is provided.
Larry Stevig
Filed: 13 Nov 18
Utility
Identifying property usage type based upon smart sensor data
29 Jun 21
A computer-implemented method for identifying a property usage type based upon sensor data includes, with customer permission or affirmative consent, receiving data generated by various sensors; generating a report that includes a listing of events recorded by each sensor; analyzing data from the report to determine a property usage type score; receiving data regarding types and levels of insurance coverage associated with the property usage type score; receiving data derived from a homeowner's insurance policy; comparing the types and levels of insurance coverage associated with the property usage type score with the types and levels of insurance coverage from the homeowner's current insurance policy; and transmitting a message to the homeowner to update their insurance policy if there are differences between (i) the insurance coverage that the homeowner has, and (ii) the insurance coverage the homeowner should have based upon the property usage type score.
Rajiv Shah, Michael S. Jacob, Sripriya Sundararaman, Jeffrey D. Hevrin, Jeffrey G. Kinsey, Phillip Sangpil Moon, EllaKate LeFebre, Sunish Menon, Jeffrey W. Stoiber, James Dykeman, Erin Olander, Lucas Allen
Filed: 16 Jun 20
Utility
Systems and methods for managing the operation of devices within a property
22 Jun 21
Methods and systems for managing the operation of devices within a property, and processing insurance policies associated therewith.
Shawn M. Call, Daryoush Hakimi-Boushehri, John H. Weekes, Ronny S. Bryant, Jennifer Criswell, Todd Binion, Jackie O. Jordan, II, Elisabeth McDermeit, John Donovan
Filed: 8 Nov 19
Utility
Systems and methods for determining cause of loss to a property
22 Jun 21
Methods and systems for assessing damage to a property associated with an insurance-related event are provided.
Daryoush Hakimi-Boushehri, Jackie O. Jordan, II, Shawn M. Call, John H. Weekes, Ronny S. Bryant, Jennifer Criswell, Todd Binion, Elisabeth McDermeit, John Donovan
Filed: 13 Mar 19
Utility
Structural characteristic extraction and insurance quote generating using 3D images
22 Jun 21
An insurance server for generating a quote associated with an object pictured in a three-dimensional (3D) image may be provided.
Timothy J Spader, George T Dulee, Jr., Donald Yuhas, Aaron Brucker, Chris Stroh, Jeffrey Mousty
Filed: 24 Jun 19
Utility
Systems and methods for automatically generating an escape route
22 Jun 21
Methods and systems for generating escape routes are provided.
Jackie O. Jordan, II, John Donovan, David Turrentine, Torri Wollenschlager, Bryan R. Nussbaum, Deanna L. Stockweather, Jeffrey W. Stoiber, Kerstin Markwardt, Gail L. Carlson, Kyle C. Schiebel, Troy Winslow, Joseph P. Harr, Ellakate Wagner, Michael Harris, Jr., Jennylind Sun
Filed: 10 Jan 20
Utility
Method and system for identifying security risks using graph analysis
22 Jun 21
Methods, systems, apparatus, and non-transitory computer readable media are described for identifying users who are likely to have unauthorized access to secure data files in an organizational network.
Abigail A. Scott, Ronald R. Duehr
Filed: 4 Apr 19