Loading...
Docoh

Accenture (ACN)

392 patents

Page 4 of 20
Utility
System and method for automatically identifying and resolving computing errors
21 Jun 22
The proposed system and method provide streamlined procedures for automatically identifying and resolving computing errors that improve efficiency and accuracy by providing a way to automatically monitor log files, automatically find and identify errors in the log files, automatically find solutions the identified errors from a variety of sources, and automatically implement the found solutions.
Vidyasagar Honnappa, Chandramouli Muralitharan
Filed: 20 Apr 20
Utility
Intelligent record generation
21 Jun 22
Examples of a record generation system are provided.
Chinnappa Guggilla, Praneeth Medhatithi Shishtla, Madhura Shivaram, Harinarayan Ojha, Anirudh Murthy, Sumeet Sawarkar
Filed: 26 May 20
Utility
Facilitating merging of concept hierarchies
21 Jun 22
A device may identify a first concept hierarchy of a first multimedia presentation and a second concept hierarchy of a second multimedia presentation.
Sanjay Podder, Bruno Marra, Neville Dubash, Venkatesh Subramanian, Nisha Ramachandra, Padmaraj Bhat, Karthik Acharyulu, Subramanian Palanisami, Kaushik Turlapaty
Filed: 20 May 19
Utility
Blockchain enhanced entitlement control
21 Jun 22
Systems and methods for entitlement tracking and control with blockchain technology are provided.
Kevin Matthew Mintz, Arthur R. Leinen, III, Melanie Jean Cutlan, Richard Thomas Meszaros
Filed: 29 Apr 20
Utility
Closed loop monitoring based privileged access control
21 Jun 22
In some examples, closed loop monitoring based privileged access control may include identifying a ticket that includes a specification of an incident that is to be remedied and determining an intent of the ticket.
Sanjeev Shukla, Gaurav Tandon, Chetan Kulshrestha, Alok Panda, Sayon Roy Choudhury, Anil Vilas Renuse, Catherine Marie-Luise Ploehn
Filed: 16 Dec 20
Utility
System for detecting and preventing malware execution in a target system
21 Jun 22
A system for detecting and preventing execution of malware on a target system includes an interface for receiving training data.
Vicknesh Manoselvam
Filed: 5 Feb 20
Utility
Generating Attack Graphs In Agile Security Platforms
16 Jun 22
Implementations of the present disclosure include providing, by a security platform, graph data defining a graph that is representative of an enterprise network, the graph including nodes and edges between nodes, a set of nodes representing respective assets within the enterprise network, and a node representing a process executed within a system of the enterprise, each edge representing at least a portion of one or more lateral paths between assets in the enterprise network, determining, for each asset, a contribution value indicating a contribution of a respective asset to operation of the process, determining, for each asset, an impact value based on a total value of the process and a respective contribution value of the asset, and implementing one or more remediations based on a set of impact values determined for the assets, each remediation mitigating a cyber-security risk within the enterprise network.
Eitan Hadar, Amin Hassanzadeh, Dani Grabois, Gil Fidel, Avraham Dayan
Filed: 7 Mar 22
Utility
Utilizing Machine Learning Models for Data-driven Customer Segmentation
16 Jun 22
A device may receive purchase data identifying purchases by users of user devices and identifying non-temporal data associated with the users, and may preprocess the purchase data to generate sequences of multivariate and multimodal symbols.
Luca COSTABELLO, Sumit PAI, Fiona BRENNAN, Adrianna JANIK
Filed: 30 Sep 21
Utility
Method for positioning of an accessory unit on a patient for a magnetic resonance examination
14 Jun 22
Techniques are disclosed for assisting in positioning an accessory unit on a patient for a magnetic resonance examination.
Katharina Hesels, Jonas Vollmer, Sabine Norosinski, George William Ferguson, Roman Achleitner
Filed: 17 May 19
Utility
Predicting and Scheduling a frequency of scanning areas where occurrences of an actual state of a cloud environment departing from a desired state are high
14 Jun 22
Implementations include actions of receiving, by an intelligent quality assurance (iQA) platform, a desired state (DS) file including data indicative of a desired state of a cloud computing environment, triggering, by the iQA platform, an auto-discovery process to provide an actual state of the cloud computing environment based on cloud resources instantiated within the cloud environment, and application resources executing within the cloud environment, the auto-discovery process including retrieving first credentials to enable automated access to the cloud computing environment, determining, by the iQA platform, a delta between the actual state, and the desired state, and providing, by the iQA platform, a report including the delta.
Jayanti Vemulapati, Murtuza Chitalwala
Filed: 31 Jul 19
Utility
Artificial intelligence (AI) based chatbot creation and communication system
14 Jun 22
A system for creating and managing an artificial conversational entity using an artificial intelligence (AI) based communications system is disclosed.
Hemant Manaharlal Kakkad, Richa Gupta, Nitin Kumar Gupta
Filed: 20 Jun 18
Utility
Recommending machine learning techniques, features, and feature relevance scores
14 Jun 22
A device may identify, for a first analytics application, a first set of characteristics and obtain, for a second analytics application, a second set of characteristics.
Janardan Misra, Divya Rawat, Shubhashis Sengupta
Filed: 17 May 18
Utility
Intelligent case management platform
14 Jun 22
A device may obtain customer data, associated with a customer identifier, that includes an indication of a recency of a past purchase, a frequency of past purchases, and/or a monetary value associated with past purchases by a customer associated with the customer identifier.
Anshul Gupta, Annie Thomas, Subhajit Ghosh
Filed: 21 Aug 18
Utility
Targeted content selection using a federated learning system
14 Jun 22
A device may obtain configuration data for a server-side model.
Md. Faisal Zaman, Hasan Samin Syed
Filed: 18 Sep 20
Utility
Optimizing Breakeven Points for Enhancing System Performance
9 Jun 22
Examples of a process optimization system are provided.
Gurpreet SINGH BAWA, Kaustav Pakira, Tejas Anant Wagh
Filed: 23 Feb 22
Utility
Method and System for Provisioning Cloud Service on Vehicle
9 Jun 22
Embodiments of this disclosure disclose provisioning a cloud service on a vehicle.
Paul Sundar Singh, Manisha Suri Sriraman, Abhilash Manu, Deepa Rajendran, Divyanshu Shekhar, Avanish Singh
Filed: 12 Aug 21
Utility
Privacy Preserving User Authentication
9 Jun 22
Examples of privacy preserving authentication are provided.
Amin HASSANZADEH, Aditi MAHESHWARI
Filed: 7 Dec 20
Utility
Test Case Optimization and Prioritization
9 Jun 22
Methods, systems, and apparatuses, including computer programs encoded on computer-storage media, for prioritizing test cases.
Sandeep Bhat, Rohit Shrikant Patwardhan, Rahul Ghanashyam Joglekar
Filed: 24 Feb 22
Utility
Intelligent Privacy Data Governance System
9 Jun 22
A system for governing user privacy data may include detecting a dark data source in a data ecosystem including data sources storing user privacy data.
Trisha Goswami, Ashraf AlZanoun, Lisa Suzanne Wilson, Tegbir Singh Harika, Arun Ravindran, Jayanti Vemulapati
Filed: 27 Aug 21
Utility
Utilizing Computer Vision and Machine Learning Models for Determining Utilization Metrics for a Space
9 Jun 22
In some implementations, a device may receive image data identifying images of a space with racks and objects stored on the racks.
Samantha Kingman LEE, Marc BOSCH RUIZ, Paul Michael OTT, Vijay RAMAN
Filed: 3 Dec 20
Patents are sorted by USPTO publication date, most recent first