1480 patents
Page 45 of 74
Utility
System and method for responding to search queries using customer self-help systems associated with a plurality of data management systems
17 Aug 21
A customer self-help system employs artificial intelligence and machine learning to identify self-help content that is responsive to a user query by analyzing and searching a plurality of customer self-help systems.
Igor A. Podgorny, Benjamin Indyk, Faraz Sharafi, Matthew Cannon, Darren Duc Dao
Filed: 25 Sep 17
Utility
Oracle-aided Protocol for Compact Data Storage for Applications Using Computations Over Fully Homomorphic Encrypted Data
12 Aug 21
Systems and methods that may implement an Oracle-aided protocol for producing and using FHE encrypted data.
Margarita VALD, Laetitia KAHN, Boaz SAPIR, Yaron SHEFFER, Yehezkel Shraga RESHEFF
Filed: 6 Feb 20
Utility
System and Method for Predicting Support Escalation
12 Aug 21
A method and system train an analysis model with a machine learning process to predict whether a current user of the data management system will contact customer assistance agents of the data management system.
Andrew Mattarella-Micke, Pavlo Malynin, David S. Grayson, Tianhao Luo
Filed: 10 Feb 20
Utility
Methods, systems, and computer program product for automatic generation of software application code
10 Aug 21
Disclosed are techniques for automatic generation of software application code.
Timothy B. Doyle
Filed: 25 Oct 19
Utility
System and method for providing request driven, trigger-based, machine learning enriched contextual access and mutation on a data graph of connected nodes
10 Aug 21
A method and system monitors activity of a user of a data management system and detects a trigger event in the activity of the user.
Sahil Sharma, Divya Kumar, Rajshekhar Desai, Bhargava Narayana, Arun Kumar A, Zeerak Mehdi
Filed: 28 Nov 18
Utility
Method and system for semantic search with a data management system
10 Aug 21
A method and system provides assistance to users of a data management system.
Hrishikesh V. Ganu, Aminish Sharma
Filed: 15 May 18
Utility
Location detection based on IP addresses and transactions
10 Aug 21
A method is disclosed.
Liron Hayman, Shimon Shahar
Filed: 28 Aug 18
Utility
Method and system for identifying potential fraud activity in a tax return preparation system, at least partially based on data entry characteristics of tax return content
10 Aug 21
Stolen identity refund fraud is one of a number of types of Internet-centric crime (i.e., cybercrime) that includes the unauthorized use of a person's or business' identity information to file a tax return in order to illegally obtain a tax refund from, for example, a state or federal revenue service.
Kyle McEachern, Brent Rambo
Filed: 4 Apr 17
Utility
Methods, systems and computer program products for facilitating user interaction with tax return preparation programs
10 Aug 21
A system for facilitating user interaction with a tax return preparation program includes a completion graph parser configured to identify a portion of a tax return completion graph corresponding to a tax topic.
Paul F. Hubbard, Tyler Thomas Krupicka, Andrew Scott Jeddeloh, Nankun Huang, Amir R. Eftekhari
Filed: 30 Apr 16
Utility
Computerized tax return preparation system and computer generated user interfaces for tax topic completion status modifications
10 Aug 21
A modular, computerized tax return preparation application engine including modular tax logic engine and interface controller components loosely coupled to each other and a modular completion monitor.
Gang Wang, Sasha Mikhael Perez, Kevin M. McCluskey, Alex G. Balazs, Ronald Jason Char
Filed: 27 Jul 16
Utility
System and Method for Providing Automated and Unsupervised Inline Question Answering
5 Aug 21
Systems and methods configured to provide automated and unsupervised inline question-answering in an online community.
Chang LIU, Pankaj GUPTA, Homa FOROUGHI
Filed: 3 Feb 20
Utility
Automatic Keyphrase Labeling Using Search Queries
5 Aug 21
Automatic keyphrase labeling and machine learning training may include a processor extracting a plurality of keywords from at least one search query that resulted in a selection of a document appearing in a search result.
Yair HORESH, Yehezkel Shraga RESHEFF, Oren Sar SHALOM, Alexander ZHICHAREVICH
Filed: 3 Feb 20
Utility
Systems and Methods of Business Categorization and Service Recommendation
5 Aug 21
A method for recommending offerings to a business may include: receiving a request for recommended business offerings from a device; receiving business data associated with a business from the device, the business data comprising invoice data associated with the business; embedding the business data to a vector space to obtain a business vector, the vector space comprising a plurality of other vectors associated with other businesses; calculating a relation metric between the business vector and a vector of the plurality of other vectors, the vector being associated with a second business, the relation metric representing a degree of relation between the business and the second business; determining that the relation metric is above a pre-defined threshold value; and responsive to the determining, sending business data associated with the second business to the device, the business data associated with the second business comprising invoice data associated with the second business.
Erez Katzenelson, Elik Sror, Shlomi Medalion, Shimon Shahar, Shir Meir Lador, Sigalit Bechler, Alexander Zhicharevich, Onn Bar
Filed: 3 Feb 20
Utility
Method and System for Adaptively Reducing Feature Bit-size for Homomorphically Encrypted Data Sets Used to Train Machine Learning Models
5 Aug 21
Certain aspects of the present disclosure provide techniques for adaptively reducing the bit size of features in a training data set used to train a machine learning model.
Yair HORESH, Yehezkel Shraga RESHEFF, Shimon SHAHAR
Filed: 3 Feb 20
Utility
Systems and Methods of Business Categorization and Service Recommendation
5 Aug 21
In one aspect, the present disclosure relates to a method of generating business descriptions performed by a server, said method may include: receiving a plurality of invoices, each invoice being associated with a business of a plurality of businesses; extracting a plurality of texts from the plurality of invoices; embedding the plurality of texts to a vector space to obtain a plurality of invoice vectors; generating a plurality of clusters in the vector space, each cluster of the plurality of clusters comprising at least one invoice vector of the plurality of invoice vectors; generating a description for a cluster, the description for the cluster representing all invoice vectors assigned to the cluster; for each business of the plurality of businesses that has at least one invoice vector assigned to the cluster, associating the business with the description; and indexing the plurality of businesses within a database by the generated descriptions.
Erez Katzenelson, Elik Sror, Shlomi Medalion, Shimon Shahar, Shir Meir Lador, Sigalit Bechler, Alexander Zhicharevich, Onn Bar
Filed: 3 Feb 20
Utility
Policy based adaptive identity proofing
3 Aug 21
Certain aspects of the present disclosure provide techniques for determining an identity of a user requesting access to a resource.
Antonio Fuentes, Douglas L. Foiles, Jeremy Luchau, Ergang Sun
Filed: 1 Aug 18
Utility
System, Method and User Interface for Determining an Employee's Labor Cost Rate
29 Jul 21
Systems, methods and a graphical user interface for determining an employee's real-time labor cost, which may be based on the employee's wages and other employer costs that add to the cost of using an employee for a particular project.
Smitha Prasad PAPOLU, Pawandeep SINGH, Paulina ZENG, Kelly LAWSON
Filed: 28 Jan 20
Utility
Application Quality Index
29 Jul 21
A computer-implemented method for determining an Application Quality Index (AQI) Score of a software-as-a-service (SAAS) multi-tenant application to a SAAS system is provided.
Jarred I. KENEALLY, Manas Kumar MUKHERJEE
Filed: 24 Jan 20
Utility
Contextual Multi-channel Speech to Text
29 Jul 21
A method for improving a transcription may include identifying, in the transcription, reliable channel tokens of an utterance of a reliable channel and an unreliable channel token of an utterance of an unreliable channel, and generating, using a machine learning model, a vector embedding for the unreliable channel token and vector embeddings for the reliable channel tokens.
Oren Sar Shalom, Yair Horesh, Alexander Zhicharevich, Elik Sror, Adi Shalev, Yehezkel Shraga Resheff
Filed: 24 Jan 20
Utility
Composite Machine Learning System for Label Prediction and Training Data Collection
29 Jul 21
The present disclosure provides a composite machine learning system for a transaction labeling service.
Yu-Chung HSIAO, Lei PEI, Meng CHEN, Nhung HO
Filed: 16 Apr 21