1480 patents
Page 20 of 74
Utility
Automatic anonymous visitor identity resolution using machine learning
17 Jan 23
A method for automatic anonymous visitor identity resolution using machine learning, which includes generating a visitor histogram set from visitor events of a visitor event stream that include a visitor identifier and an internet protocol address, filtering a set of user identifiers into a candidate set of user identifiers based on the internet protocol address, obtaining one or more user histogram sets generated from user events that include user identifiers from the candidate set of user identifiers, and mapping the visitor identifier to a user identifier of the candidate set of user identifiers using a machine learning model and a histogram similarity matrix generated from the visitor histogram set, the one or more user histogram sets, and a set of histogram similarity functions.
Jeyendran Balakrishnan
Filed: 29 Apr 20
Utility
Ad hoc electronic messaging using financial transaction data
17 Jan 23
The disclosed embodiments provide a system that facilitates electronic communication among users.
Christopher Z. Lesner, Alexander S. Ran
Filed: 20 Mar 20
Utility
Processing of computer readable tables in a datalake
17 Jan 23
Systems and methods for identifying one or more master tables of a datalake are described.
Saikiran Sri Thunuguntla, Sirsha Chatterjee, Anishkumar Ss, Sidharth Kumar
Filed: 31 Mar 22
Utility
Intent prediction by machine learning with word and sentence features for routing user requests
17 Jan 23
Systems and methods may be used to generate and use intent predictions to enhance user experience.
Zhewen Fan, Kyle Brown, Sparsh Gupta
Filed: 24 Aug 20
Utility
System and method for matching specialists and potential clients
17 Jan 23
Potential client/small business data and specialist profile data for multiple, and in various embodiments, hundreds, thousands, tens of thousands, hundreds of thousands, millions, tens of millions, or even hundreds of millions or more, potential clients/small businesses and specialists are used to train one or more matching models in an offline training environment using machine learning techniques.
Xinli Bao, Neil Jelmert Jorgensen, Bharatwaja Namatherdhala
Filed: 12 Feb 18
Utility
Integrated event processing and policy enforcement
10 Jan 23
A method may include receiving an event from an event source.
Amit Shriram Kalamkar, Edward Kihyen Lee
Filed: 29 Nov 19
Utility
Object relational mapper for non-relational databases
10 Jan 23
This disclosure relates to increasing database functionality in non-relational databases using an object relational mapper to provide updates to table field values across a plurality of separate tables and provide virtual table functionality through compound search operations and condensed table structures.
Jason Lashmet
Filed: 17 Feb 20
Utility
Pagination processing and display of data sets
10 Jan 23
A method including receiving a request for a report on a data set.
Jayanth Saimani, Shikha Gupta
Filed: 7 Oct 21
Utility
Integrity protection for homomorphic computations
10 Jan 23
Systems and methods for securely verifying integrity of application responses are disclosed.
Yair Horesh, Margarita Vald, Yaron Sheffer
Filed: 27 Apr 22
Utility
System, method, and computer-readable medium for capacity-constrained recommendation
10 Jan 23
This disclosure provides systems, methods and apparatuses for recommending items to users of a recommendation system.
Shlomi Medalion, Sigalit Bechler, Oren Sar Shalom, Guy Maman
Filed: 27 Jul 20
Utility
Generating replacement sentences for a particular sentiment
10 Jan 23
Certain aspects of the present disclosure provide techniques for generating a replacement sentence with the same or similar meaning but a different sentiment than an input sentence.
Manav Kohli, Cindy Osmon, Nicholas Roberts
Filed: 6 Oct 21
Utility
Methods and systems for privacy preserving inference generation in a distributed computing environment
10 Jan 23
Certain aspects of the present disclosure provide techniques for performing inferences in a distributed computing environment.
Yair Horesh, Yehezkel Shraga Resheff
Filed: 26 Oct 20
Utility
Systems and mechanism to control the lifetime of an access token dynamically based on access token use
10 Jan 23
A data management system manages secured data for a plurality of users.
Parul Jain, Doug Foiles, Erik Peterson
Filed: 9 Nov 20
Utility
Defining and Debugging Module Completeness Graphs Based on Interactive User Interface Checklist Elements
5 Jan 23
Certain aspects of the present disclosure provide techniques for encoding rules defining a completeness of input, including receiving a first input comprising one or more tuples, wherein a tuple of the one or more tuples comprises one or more fields associated with an operation, one or more indicators, and one or more modifiers; receiving a second input associated with the one or more tuples; providing, to a knowledge engine, the first input and the second input; receiving, from the knowledge engine, a result based on the first input and the second input; determining, based on the result, a first symbol associated with a first tuple of the one or more tuples; and displaying the first symbol, wherein the first symbol indicates whether the first tuple is complete.
David Alan HANEKAMP, JR., Eric KNUDTSON, Anoop MAKWANA
Filed: 30 Jun 21
Utility
Predicting Custom Fields from Text
5 Jan 23
A method predicts custom fields from text.
Vignesh Thirukazhukundram Subramaniam, Shrutendra Harsola, Vikas Raturi, Naveen Kumar Kaveti
Filed: 30 Jun 21
Utility
Defining and Debugging Module Completeness Graphs Based on Interactive User Interface Checklist Elements
5 Jan 23
Certain aspects of the present disclosure provide techniques for defining a completeness of input, including receiving a first input, comprising: a set of fields associated with an operation; a set of indicators, wherein at least one indicator in the set of indicators is associated with a field in the set of fields; and a set of modifiers, wherein each modifier is associated with at least one indicator in the set of indicators, wherein a combination of the set of indicators and the set of modifiers indicates fields of the set of fields that require input to execute the operation; receiving a second input associated with the set of indicators and the set of modifiers; receiving, from the knowledge engine, a result based on the second input; and determining whether the second input contains required input to the fields that require input based on the result.
David Alan HANEKAMP, JR., Eric KNUDTSON, Anoop MAKWANA
Filed: 30 Jun 21
Utility
Customer Recognition System
5 Jan 23
A method implements a customer recognition system.
Runhua Zhao, Sonam Sikaria, Jaiyao Liu, Linhong Kang, Byron Tang, Bilal Rizvi
Filed: 30 Jun 21
Utility
Validation as a service for third parties using homomorphic encryption
3 Jan 23
Systems and methods for validating credentials are disclosed.
Shlomi Medalion, Alexander Zicharevich, Yehezkel Shraga Resheff, Ido Meir Mintz
Filed: 31 Mar 20
Utility
Homomorphic key derivation
3 Jan 23
A processor of a remote crypto cluster (RCC) may receive a public key from a client device through at least one network.
Gleb Keselman, Yaron Sheffer, Alon Rosen
Filed: 15 Mar 21
Utility
Multi-user time tracking mesh network
3 Jan 23
A transceiver of a mobile device may receive a beacon transmitted by a mesh network member mobile device.
Nathan A. McIntyre, Devin Shively, Joshua Andrew Yundt
Filed: 14 Oct 20