413 patents
Utility
Utilizing a Machine Learning Model to Transform a Legacy Application to a Low-code/no-code Application
18 Jan 24
A device may receive an application for transforming legacy applications into low-code/no-code applications to be managed by a low-code/no-code platform, and may execute the application for a legacy application of the legacy applications.
Rajesh PAPPU, Surender SUBRAMANIAN, Jeevak BALASUBRAMANIAM, Vijay BASKARAN
Filed: 12 Jul 22
Utility
Inclusive Product Design
18 Jan 24
Systems and methods for inclusive product design are disclosed.
Anshul U. GUPTA, Meeta LAL BUDHRANI, Akshay TUTIKA, Jyoti BISHNOI, Yogesh KANOI, Vinivesh RAINA, Suman NELLI
Filed: 12 Jul 22
Utility
Providing Energy Efficient Dynamic Redundancy Elimination for Stored Data
18 Jan 24
A device may identify unique segments within data objects, of an object corpus stored in a data structure, as elements, and may generate an embedding space based on unique elements and mappings of the data objects to embeddings.
Janardan MISRA, Naveen Gordhan BALANI
Filed: 12 Jul 22
Utility
Programming Code Vulnerability Remediation
11 Jan 24
A code remediation system accesses a programming code including vulnerabilities such as potential secrets and remediates at least a subset of the potential secrets to generate modified programming code wherein the subset of potential secrets which are determined to be actual secrets are replaced with access mechanisms to storage locations on a vault wherein the actual secrets are secured.
Malek BEN SALEM, Ganesh Devarajan, John Donovan Delmare, JR., Krishna Mohan Dasari, Mário Lauande Lacroix, Cristian Daniel Ariza, Mohnish Gahlot
Filed: 3 Jul 23
Utility
Generative Network-based Floor Plan Generation
11 Jan 24
In some examples, generative network-based floor plan generation may include receiving, for a floor plan that is to be classified, a layout graph for which user constraints are encoded as a plurality of room types.
Kumar ABHINAV, Alpana DUBEY
Filed: 10 Jul 23
Utility
Utilizing Machine Learning Models to Analyze an Impact of a Change Request
11 Jan 24
A device may receive and process a change request, work items, and IT data, to generate processed data.
Pritha LATHA, Aditi KULKARNI, Koushik M. VIJAYARAGHAVAN, Rajesh NAGARAJAN, Gaurav SOOD, Sujan KUMAR SAHA, Aparna Samir JOSHI
Filed: 7 Jul 22
Utility
Index Modeling
4 Jan 24
An index modeling system that generates index models that predict values of an attribute of a supply chain for a commodity is disclosed.
Ajay VASAL, Robert GIMENO FEU, Siddharth Narain SINGH, Ghanshyam DEVNANI, Nadine TUPAIKA, Poppy Elizabeth Mary BREWER, Venkatesh Venkatesh CG, Amar DEEP BEHERA, Omkar H. PAWASKAR, Ajay Kumar ROUTH
Filed: 5 Jan 23
Utility
Discovering, Assessing, and Remediating Cloud Native Application Risks Due to Security Misconfigurations
4 Jan 24
A device may generate a knowledge model based on a knowledge model schema, data residency constraints, and a data classification ontology associated with a cloud application, and may perform a dynamic flow analysis of the cloud application data and the data source identifiers to generate a data flow graph.
Kanchanjot Kaur PHOKELA, Kapil SINGI, Kuntal DEY, Vikrant KAULGUD, Adam Patten BURDEN
Filed: 28 Jun 23
Utility
Systems and Methods to Improve Trust In Conversations with Deep Learning Models
4 Jan 24
The present disclosure relates to a system, a method, and a product for using deep learning models to quantify and/or improve trust in conversations.
Lan GUAN, Neeraj D VADHAN, Guanglei XIONG, Anwitha PARUCHURI, Sukryool KANG, Sujeong CHA, Anupam Anurag TRIPATHI, Thomas Wayne HANCOCK, Jill GENGELBACH-WYLIE, Jayashree SUBRAHMONIA
Filed: 27 May 22
Utility
System and Methods for Dynamic Workload Migration and Service Utilization Based on Multiple Constraints
28 Dec 23
The present disclosure provides systems and methods supporting dynamic migration of jobs (e.g., workloads, containers, service requests, etc.) between execution environments.
Kaushik Amar Das, Kapil Singi, Kuntal Dey, Vikrant Kaulgud, Gopal Sarma Pingali, Padmanaban Sukumaran
Filed: 23 Jun 23
Utility
Generating a Customer Journey Based on Reasons for Customer Interactions and Times Between Customer Interactions
28 Dec 23
A device may receive raw data and metadata associated with a customer, and may transform the raw data and the metadata into unified data.
Surya Raghavendra VADLAMANI, Arun VENKATESAN, Mohammad ZUHAIB, Shreya THAKARE, Brandon Nicholas BUTZ
Filed: 24 Jun 22
Utility
System and Methods for Dynamic Workload Migration and Service
28 Dec 23
Systems and methods supporting discovery and quantification of vulnerabilities in software code are disclosed.
Kaushik Amar Das, Narendranath Sukhavasi, Kuntal Dey, Kapil Singi, Vikrant Kaulgud, Adam Patten Burden
Filed: 23 Jun 23
Utility
Detection and Classification of Impediments
21 Dec 23
Systems and methods for detecting, classifying, and managing impediments are disclosed.
Vinu Varghese, Anto Jose, Balaji Janarthanam, Selvakuberan Karuppasamy, Saumyabrata Mitra, Karthik Srikantamurthy, Ravi Kant Gaur, Ragav Devanathan, Nirav Jagdish Sampat
Filed: 21 Jun 22
Utility
List and Tabular Data Extraction System and Method
21 Dec 23
A system and method for automating and improving tabular and list-based data extraction from a variety of document types is disclosed.
Andre Chatzistamatiou, Florin Cremenescu, Yizhen Dai, Ludo Gerardus Wilhelmus van Alst
Filed: 29 Aug 22
Utility
Automated Prediction of Cyber-security Attack Techniques Using Knowledge Mesh
21 Dec 23
Implementations include a computer-implemented method for reducing cyber-security risk, comprising: selecting one or more modules for inclusion in a knowledge mesh, wherein each module is associated with a respective aspect and maintains a knowledge graph specific to the respective aspect, wherein each knowledge graph is generated using data from one or more cyber-security repositories and includes nodes and connections between the nodes; receiving a query corresponding to a first node of a first knowledge graph included in the knowledge mesh; generating a response to the query by identifying connections between the first node of the first knowledge graph and at least one node of at least one other knowledge graph included in the knowledge mesh; and identifying, based on the response to the query, one or more actions to reduce cyber-security risk.
Gal Engelberg, Dan Klein, Moshe Hadad, Hodaya Binyamini
Filed: 15 Jun 23
Utility
Automated Cyber-security Attack Method Prediction Using Detected Vulnerabilities
21 Dec 23
Implementations include a computer-implemented method for reducing cyber-security risk, comprising: accessing a knowledge mesh including a plurality of modules, wherein each module is associated with a respective aspect and maintains a knowledge graph specific to the respective aspect, wherein each knowledge graph is generated using data from one or more cyber-security repositories and includes nodes and connections between the nodes; performing an information completion process to generate connections between nodes of knowledge graphs maintained by different modules of the knowledge mesh, including performing at least one of: inheritance-based inference; natural language processing classifier-based inference; or natural language processing-based object matching inference; and identifying, using the generated connections between the nodes of the knowledge graphs, one or more actions to reduce cyber-security risk.
Hodaya Binyamini, Louis William DiValentin, Gal Engelberg, Dan Klein, Moshe Hadad, Petra Genc, Roei Levi
Filed: 15 Jun 23
Utility
Intelligent Collaborative Decision Generation System with Iterative Prediction of Link Set in Knowledge Graph
14 Dec 23
This application relates generally to intelligent and explainable link prediction in knowledge graph systems that automatically incorporate user feedback.
Christophe Gueret, Sumit Pai, Luca Costabello, Rory McGrath
Filed: 12 Jun 23
Utility
Intelligent Collaborative Decision Generation System with Link Prediction Assisted by User Feedback
14 Dec 23
This application relates generally to intelligent and explainable link prediction in knowledge graph systems that automatically incorporate user feedback.
Christophe Gueret, Sumit Pai, Luca Costabello, Rory McGrath
Filed: 12 Jun 23
Utility
Determining an Optimum Quantity of Fractional Non-fungible Tokens to Generate for Content and a Content Exchange
14 Dec 23
A device may identify standard parameters and real-time parameters associated with content of a content type, and may process the content type, the standard parameters, and the real-time parameters, with a parameter unification model, to generate derived parameters for the content.
Srikanth G. RAO, Mathangi SANDILYA, Anand VIJENDRA, Sagnik MAZUMDER, Abhinav SHUKLA, Ravi Shankar NORI
Filed: 27 May 22
Utility
Utilizing Machine Learning Models to Generate an Optimized Digital Marketing Simulation
14 Dec 23
A device may receive and transform metric data and share of voice data, associated with digital marketing by an entity, into transformed data, may generate model data from the transformed data, and may divide the model data into training data, test data, and validation data.
Keshav RASTOGI, Amitava DEY, Lakshay CHHABRA, Sanjay S. SHARMA
Filed: 14 Jun 22