Loading...
Docoh

Accenture (ACN)

430 patents

Page 9 of 22
Utility
Creating Morphing Objects by Inkjet Printing Thermoresponsive Hydrogels
28 Apr 22
This document describes morphing objects that are created using hydrogels and techniques for creating and controlling the morphing objects.
Mark Benjamin Greenspan, Lavinia Andreea Danielescu, Jack Forman, Aditi Maheshwari
Filed: 26 Oct 21
Utility
Generating Attack Graphs In Agile Security Platforms
28 Apr 22
Implementations of the present disclosure include providing a graph representative of a network, a set of nodes representing respective assets, each edge representing one or more lateral paths between assets, the graph data including configurations affecting at least one impact that has an effect on an asset, determining multiple sets of fixes for configurations, each fix having a cost associated therewith, incorporating fix data of the sets of fixes into the graph, defining a set of fixes including one or more fixes from the multiple sets of fixes by defining an optimization problem that identifies one or more impacts that are to be nullified and executing resolving the optimization problem to define the set of fixes, each fix in the set of fixes being associated with a respective configuration in the graph, and scheduling performance of each fix in the set of fixes based on one or more operational constraints.
Eitan Hadar, Amin Hassanzadeh, Anup Nayak
Filed: 15 Dec 21
Utility
Generation of Counterfactual Explanations Using Artificial Intelligence and Machine Learning Techniques
28 Apr 22
In some implementations, a system may determine, based on a qualification model, a prediction output of an analysis of user information.
Rory McGRATH, Luca COSTABELLO, Nicholas McCARTHY
Filed: 27 Oct 20
Utility
Process Risk Calculation Based on Hardness of Attack Paths
28 Apr 22
Implementations are directed to receiving analytical attack graph (AAG) data representative of one or more AAGs, each AAG representing one or more lateral paths between configuration items within an enterprise network, calculating, for each configuration item in a set of configuration items, a process risk value for each impact in a set of impacts achievable within the configuration item, for a first impact, a first process risk value being calculated based on a multi-path formula in response to determining that multiple paths in the AAG lead to the first impact, and, for a second impact, a second process risk value being calculated based on a single-path formula in response to determining that a single path in the AAG leads to the second impact, and determining that at least one process risk value exceeds a threshold process risk value, and in response, adjusting one or more security controls within the enterprise network.
Amin Hassanzadeh, Anup Nayak, MD Sharif Ullah
Filed: 26 Oct 20
Utility
System and method for interactively guiding users through a procedure
26 Apr 22
An intelligent question and answer (Q&A) system and method for interactively guiding users through a procedure is disclosed.
Anutosh Maitra, Shubhashis Sengupta, Ajay Chatterjee, Abhisek Mukhopadhyay, Shivam Garg
Filed: 30 Jan 20
Utility
Prescriptive analytics based compute sizing correction stack for cloud computing resource scheduling
26 Apr 22
A multi-layer compute sizing correction stack may generate prescriptive compute sizing correction tokens for controlling sizing adjustments for computing resources.
Madhan Kumar Srinivasan, Arun Purushothaman, Guruprasad PV, Michael S. Eisenstein, Vijay Desai
Filed: 20 Jul 20
Utility
System and method for automating fault detection in multi-tenant environments
26 Apr 22
A system and method of automating fault prediction and remediation for a multi-tenant system is disclosed.
Emanuele Baldassarre, Luigi Lucca, Rino Guglietta, Jagaran Das
Filed: 20 Aug 20
Utility
Extracting actionable items from documents and assigning the actionable items to responsible parties
26 Apr 22
A method and system of automatically interpreting documents relating to regulatory directives to automatically identify actionable items and assigning each of the actionable items identified to the appropriate responsible party in a business.
Prashant Wason, Sridhar Kapa, Saikat Jana, Sagar Sanjeev
Filed: 29 Jul 19
Utility
Intelligent bill of materials advisor
26 Apr 22
A method and system for intelligently generating Bill of Materials (BoM) and tracking components of a build site.
Nitin Bajaj, Teresa Sheausan Tung, Sonali Parthasarathy, Reymonrod Geli Vasquez, Steven Robert Roberts, Colin Anil Puri, Elizabeth Ann Shay, Unnati Amin, Michael Nai-An Chen, Analiz Cabrera Hernandez, Trinidy Ray Combs
Filed: 16 Sep 20
Utility
System and method for mineral exploration
26 Apr 22
A system and method of identifying potential areas for mineral extraction is disclosed.
Vivek Vaidyanathan, Dinesh Kumar Vemula, Abhirama Rao, Bhudeep Hathi, Narendra Kumar, Swati Acharjee
Filed: 18 May 20
Utility
Network bandwidth management
26 Apr 22
Examples of network bandwidth management are provided.
Gurpreet Singh Bawa, Kaustav Pakira, Souvik Chakraborty, Rebecca Lynn Ruliffson
Filed: 4 Mar 20
Utility
System and method for intent discovery from multimedia conversation
26 Apr 22
This disclosure relates to systems and methods for discovering intents from multimedia conversations.
Antonio Penta, Osama M. Mohamed, Anandita Pal, Hilary Allen, Hakan Ozkok, Stephen J. O'Kennedy, Onur Can Sert, Andreea-Roxana Miu
Filed: 14 Jan 20
Utility
Digital content security and communication system using anonymized account classification and analysis
26 Apr 22
A digital content security and communication system is disclosed.
Anthony McDougall, Kenton Dalkeith Jurgs, Chia Jung Chang
Filed: 30 May 19
Utility
Upper Extremity Prosthetic with Energy Return System
21 Apr 22
An upper-extremity prosthetic is adapted to engage with an athletic ball.
Mark Benjamin Greenspan, Lavinia Andreea Danielescu
Filed: 28 Apr 21
Utility
Cognition Assistance
21 Apr 22
A system for providing cognition assistance including a contextual memory trainer, which receives preprocessed data including facial data, scene data, and activity data related to a video in association with temporal data and geographical location data of the camera that captured the video, where the scene data, the activity data, the geographical location data, and the temporal data collectively define spatiotemporal data.
Biju SUBRAHMANIAN, Bolaka MUKHERJEE, Vipin ANILKUMAR BHASIN
Filed: 21 Oct 20
Utility
Springs with Strain Feedback
21 Apr 22
Springs can provide energy return and have a conductivity that changes in relation to an amount of strain or deformation of the spring.
Mark Benjamin Greenspan, Lavinia Andreea Danielescu
Filed: 23 Apr 21
Utility
Processing Digitized Handwriting
21 Apr 22
A handwritten text processing system processes a digitized document including handwritten text input to generate an output version of the digitized document that allows users to execute text processing functions on the textual content of the digitized document.
Tara Lynn O'GARA, Sarat Chandra GURRAM, Jeffrey Thomas TURNER, Piper TUCKER, James Robert PRIESTAS
Filed: 19 Oct 20
Utility
Rendering Virtual Objects In 3D Environments
21 Apr 22
Systems, methods, devices, and other techniques for placing and rendering virtual objects in three-dimensional environments.
Matthew Thomas Short, Sunny Webb, Joshua Opel, Theo E. Christensen
Filed: 28 Dec 21
Utility
Enterprise Management System Using Artificial Intelligence and Machine Learning for Technology Analysis and Integration
21 Apr 22
A system may receive enterprise information associated with a client enterprise.
Rajendra Tanniru PRASAD, Bhaskar GHOSH, Aditi KULKARNI, Koushik M. VIJAYARAGHAVAN, Purnima JAGANNATHAN, Parul JAGTAP, Sangeetha JAYARAM, Badrinath PARAMESWAR, Manas MISHRA, Jeffson Felix DSOUZA, Gaurav GOENKA, Gaurav SOOD, Pradeep SENAPATI, Vaijayanthi RAMASWAMY, Ranjith THARAYIL, Mahesh Zurale
Filed: 21 Oct 20
Utility
Leveraging Attack Graphs of Agile Security Platform
21 Apr 22
Implementations of the present disclosure include receiving, from an agile security platform, attack graph (AG) data representative of one or more AGs, each AG representing one or more lateral paths within an enterprise network for reaching a target asset from one or more assets within the enterprise network, processing, by a security platform, data from one or more data sources to selectively generate at least one event, the at least one event representing a potential security risk within the enterprise network, and selectively generating, within the security platform, an alert representing the at least one event, the alert being associated with a priority within a set of alerts, the priority being is based on the AG data.
Dani Grabois, Eitan Hadar, Asher Genachowski
Filed: 13 Dec 21
Patents are sorted by USPTO publication date, most recent first