155 patents
Page 8 of 8
Utility
Order Status
21 Jan 21
Given information identifying a user who is not logged into a system, the user is provided a guest order status of one or more pharmacy orders; the guest order status masks sensitive information of the user.
Vijay I. Kukreja, Domenic Vecchiarelli, Himanshu Gupta, Dianna Southiseng
Filed: 1 Oct 20
Utility
Pharmacy database access methods and systems
19 Jan 21
An electronic image that includes information related to a pharmacy prescription of a user of a first account (e.g., a store account) is received from a client device.
Andrew Schwartz, Carolyn Conrad, Sabrina Kwauk
Filed: 7 Dec 15
Utility
Pharmacy authentication methods and systems
12 Jan 21
An electronic image that includes information related to a pharmacy prescription of a user of a first account (e.g., a store account) is received from a client device.
Scott Douglas Haigh, Alfred John Pritchard, II, Andrew Jay Schwartz
Filed: 30 Sep 15
Utility
Intelligent pre-processing and fulfillment of mixed orders
14 Dec 20
A pre-processing and fulfillment system and method are described.
Nathaniel D. Gilman, Himanshu Gupta, David Harkins, John R. Hoenick, Renee L. Hoyceanyls, Dustin W. Humphreys, Eric G. Parrish, Grant D. Pill, Matthew K. Scott, Jared P. Tancrelle, Brian A. Tilzer, Patrick J. Walsh
Filed: 28 Feb 18
Utility
Incorporating risk-based decision in standard authentication and authorization systems
23 Nov 20
Embodiments of the disclosure provide a method for enhancing standard authentication systems to include risk-based decisions.
Salil Kumar Jain, Abbie Barbir, Derek Swift
Filed: 18 Jul 17
Utility
Clinic Wait-Time Visibility and Reservations
14 Oct 20
A plurality of clinics proximate a physical location of a client device of a user is identified, and wait-time information is transmitted to the client device.
Lisa Marie Runci, Kathryn Gillmeister, James Dyson, IV
Filed: 28 Jun 20
Utility
Detecting allergic reaction and alerting a guardian device
12 Oct 20
A method for detecting allergic reaction and alerting a guardian device includes registering a wearable device to associate the wearable device with the guardian device.
Sriram Ganesan
Filed: 28 Jan 20
Utility
Approximate String Matching In a Cyber Security Environment
30 Sep 20
A method for performing approximate string matching comprises: obtaining a predefined distance error threshold and user information, the user information including a list of strings; calculating distance metrics for pairs of strings in the list of strings; determining a positive list and a negative list based on the calculated distance metrics for the pairs of strings; determining histogram representations of the list of strings; determining true positive rates and false positive rates for one or more histogram thresholds based on the positive list, the negative list, and calculated histogram distances between pairs within the histogram representations; and obtaining an acceptable histogram threshold from the one or more histogram thresholds based on an acceptable true positive rate and an acceptable false positive rate.
Salil Kumar Jain, David Dyer
Filed: 24 Mar 19
Utility
Efficacy Measures for Unsupervised Learning In a Cyber Security Environment
30 Sep 20
A method for performing searches of user information comprises: receiving an initial dataset including the user information; calculating distance metrics between pairs of data in the initial dataset; performing unsupervised learning on the initial dataset to obtain a plurality of total number of clusters, each total number of clusters covering the initial dataset; determining efficacy measures for each total number of clusters using a plurality of distance metric thresholds; determining a desired efficacy measure in the efficacy measures, the desired efficacy measure corresponding to a desired distance metric threshold in the plurality of distance metric thresholds; determining a desired total number of clusters in the plurality of total number of clusters, the desired total number of clusters corresponding to the desired distance metric threshold; and performing unsupervised learning on the initial dataset using the desired total number of clusters to obtain a number of data representations of the user information.
Salil Kumar Jain, David Dyer
Filed: 25 Mar 19
Utility
Computing infrastructure scalability assessment
14 Sep 20
Embodiments of the disclosure provide a method of assessing scalability of a computing infrastructure performed by a scalability server, the scalability server comprising a processor to execute computer executable instructions stored on a non-transitory computer readable medium, so that when the instructions are executed, the server performs the method comprising: (a) receiving growth data from one or more client devices, the growth data including growth projection of subunits of an organization; (b) receiving application and infrastructure information from a database, the application and infrastructure information including a list of application and infrastructure resources of the computing infrastructure; (c) determining scalability of the computing infrastructure using the growth data and the application and infrastructure information; (d) monitoring real-time performance of the computing infrastructure; and (e) determining a priority of infrastructure components to be upgraded using the scalability of the computer infrastructure, the real-time performance of the computing infrastructure, the growth data, and the application and infrastructure information.
Mark Riesbeck
Filed: 28 Sep 17
Utility
Shared Keys Based on Multiple Features
9 Sep 20
A method for secret sharing utilizing multiple features of an input includes: receiving a registration input; obtaining features from the registration input; generating a secret key and a plurality of shared keys according to a shared secret scheme; associating each of the plurality of shared keys with a respective feature of the registration input; generating a plurality of additional features associated with additional keys having a similar format as a shared key associated with a respective feature; storing the plurality of shared keys associated with respective features together with the plurality of additional keys associated with additional features; and encrypting an element to be protected by the secret key using the secret key.
Salil Kumar Jain
Filed: 21 May 20
Utility
Clinic wait-time visibility and reservations
29 Jun 20
A plurality of clinics proximate a physical location of a client device of a user is identified, and wait-time information is transmitted to the client device.
Lisa Marie Runci, Kathryn Gillmeister, James Dyson, IV
Filed: 6 Dec 15
Utility
Data analysis reporting tool
20 Apr 20
The technology described herein improves presentation of data housed in large data stores (e.g., an enterprise data warehouse) by providing digital reporting tools (e.g., specific computer systems and software) to easily present analysis data to users.
Karin Berger, James Chalker, Wayne Paul Comer, II, Robert Darin, Sheri Faust, Kim Fordiani, Stacey Goodall, Mir Mujtaba Ali
Filed: 1 Feb 17
Utility
Prescription filling by image
20 Apr 20
An electronic image of a paper prescription is received; prescription information is extracted from the image, and a communication is sent to the prescribing physician for approval.
John Robert Hoenick, William A. McKibbin, Jeffrey M. Hoffman, Dustin W. Humphreys
Filed: 17 Aug 15
Design
Bottle cap
24 Feb 20
Bennett P. Daley, Ryan Neil Peter Hall, Michael David Miller, Daniel Nelsen, Peter Rezac, Timothy Andrew Vanderpoel
Filed: 15 May 18