Processing

Please wait...

Settings

Settings

Goto Application

Offices all Languages en Stemming true Single Family Member false Include NPL false
RSS feed can only be generated if you have a WIPO account

Save query

A private query is only visible to you when you are logged-in and can not be used in RSS feeds

Query Tree

Refine Options

Offices
All
Specify the language of your search keywords
Stemming reduces inflected words to their stem or root form.
For example the words fishing, fished,fish, and fisher are reduced to the root word,fish,
so a search for fisher returns all the different variations
Returns only one member of a family of patents
Include Non-Patent literature in results

Full Query

AIapplicationfieldsTelecommunicationsVideoconferencing

Side-by-side view shortcuts

General
Go to Search input
CTRL + SHIFT +
Go to Results (selected record)
CTRL + SHIFT +
Go to Detail (selected tab)
CTRL + SHIFT +
Go to Next page
CTRL +
Go to Previous page
CTRL +
Results (First, do 'Go to Results')
Go to Next record / image
/
Go to Previous record / image
/
Scroll Up
Page Up
Scroll Down
Page Down
Scroll to Top
CTRL + Home
Scroll to Bottom
CTRL + End
Detail (First, do 'Go to Detail')
Go to Next tab
Go to Previous tab

Analysis

1.20220308943System and AI pattern model for actionable alerts for events within a ChatOps platform
US 29.09.2022
Int.Class G06F 9/54
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
9Arrangements for program control, e.g. control units
06using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
46Multiprogramming arrangements
54Interprogram communication
Appl.No 17210853 Applicant KYNDRYL, INC. Inventor Raghuram Srinivasan

In an approach for building a machine learning model that predicts the appropriate action to resolve a malfunction or system error, a processor receives an alert that a malfunction or a system error has occurred. A processor creates a workspace on a ChatOps platform integrated with a chatbot and one or more tools. A processor inputs data relating to the alert in a natural language format. A processor processes the data using a natural language processing algorithm. Responsive to determining a pre-set threshold for outputting the appropriate action is not met, a processor establishes a conversation between two or more support service agents in the workspace. A processor monitors the conversation using the natural language processing algorithm. A processor analyzes a transcript of the conversation using text analytics or pattern matching. A processor creates and trains a machine learning model to predict the appropriate action in future iterations.

2.20250053832Systems, Methods and Apparatus for Machine Learning Predictive Analytics
US 13.02.2025
Int.Class G06N 5/022
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
5Computing arrangements using knowledge-based models
02Knowledge representation; Symbolic representation
022Knowledge engineering; Knowledge acquisition
Appl.No 18448966 Applicant Ryan Newsome Inventor Ryan Newsome

Systems, methods and apparatus of machine-learning-predictive-analytics, the method performed by a predictive analytic control computer and including receiving from a second computer a training-profile data that describes one or more contributions of resources that are associated and identified with particular entities, receiving from a third computer a training-profile data that are associated and identified with the particular entities, that does not describe one or more contributions of resources the training-profile data, and that includes data that is that is received from additional computers that host websites and applications that focus on communication, community-based input, interaction, content-sharing and collaboration that describe a first set of features and representations of issues of interest of the particular entities, generating a machine-learning-predictive-analytic model by a machine learning-predictive-analytic trainer in reference to the training-profile data, generating predictions from the machine-learning-predictive-analytic model and from a second set of features and representations of issues of interest.

3.20180139047Cryptographic key control based on debasing condition likelihood estimation
US 17.05.2018
Int.Class H04L 9/14
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communications; Network security protocols
14using a plurality of keys or algorithms
Appl.No 15236043 Applicant Venafi, Inc. Inventor Matthew Woods

In representative embodiments, systems and methods to calculate the likelihood that presented cryptographic key material is untrustworthy are disclosed. A predictive model based on a debasing condition and a dataset is created by evaluating the dataset relative to the debasing condition. For example, if certificate revocation is selected as the debasing condition, the dataset is analyzed to produce a predictive model that determines the likelihood that a presented certificate is untrustworthy based on similarity to already revoked certificates. The predictive model can include a supervised learning model like a logistic regression model or a deep neural network model. The system can be used in conjunction with existing security infrastructures or can be used as a separate infrastructure. Based on the likelihood score calculated by the model, a relying system can reject the cryptographic key material, accept the cryptographic key material or take other further action.

4.20200195435Cryptographic key control based on debasing condition likelihood estimation
US 18.06.2020
Int.Class H04L 9/14
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communications; Network security protocols
14using a plurality of keys or algorithms
Appl.No 16692319 Applicant Venafi, Inc. Inventor Matthew Woods

In representative embodiments, systems and methods to calculate the likelihood that presented cryptographic key material is untrustworthy are disclosed. A predictive model based on a debasing condition and a dataset is created by evaluating the dataset relative to the debasing condition. For example, if certificate revocation is selected as the debasing condition, the dataset is analyzed to produce a predictive model that determines the likelihood that a presented certificate is untrustworthy based on similarity to already revoked certificates. The predictive model can include a supervised learning model like a logistic regression model or a deep neural network model. The system can be used in conjunction with existing security infrastructures or can be used as a separate infrastructure. Based on the likelihood score calculated by the model, a relying system can reject the cryptographic key material, accept the cryptographic key material or take other further action.

5.20250356207TRAINING A REINFORCEMENT LEARNING MACHINE LEARNING MODEL
US 20.11.2025
Int.Class G06N 3/092
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
3Computing arrangements based on biological models
02Neural networks
08Learning methods
092Reinforcement learning
Appl.No 19042673 Applicant Royal Bank of Canada Inventor Tristan SYLVAIN

One or more computer processors are used to train a reinforcement learning machine learning model, such as a contextual bandit machine learning model. A training dataset is inputted to the reinforcement learning machine learning model. The reinforcement learning machine learning model is trained based on the training dataset. During the training, an entropy of the reinforcement learning machine learning model is determined. Based on the feedback, feedback is generated. The reinforcement learning machine learning model is further trained based on the feedback.

6.11347997Systems and methods using angle-based stochastic gradient descent
US 31.05.2022
Int.Class G06N 3/04
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
3Computing arrangements based on biological models
02Neural networks
04Architecture, e.g. interconnection topology
Appl.No 17342070 Applicant Chongya Song Inventor Chongya Song

Systems and methods for optimizing and/or solving objective functions are provided. Angle-based stochastic gradient descent (AG-SGD) can be used to alleviate pattern deviation(s) not resolved by related art systems and methods. AG-SGD can use the angle between the current gradient (CG) and the previous gradient (PG) to determine the new gradient (NG).

7.20200349229Open domain targeted sentiment classification using semisupervised dynamic generation of feature attributes
US 05.11.2020
Int.Class G06F 17/00
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
17Digital computing or data processing equipment or methods, specially adapted for specific functions
Appl.No 16599951 Applicant King Fahd University of Petroleum and Minerals Inventor Shadi Abudalfa

Methods for classification of microblogs using semi-supervised open domain targeted sentiment classification. A hidden Markov model support vector machine (SVM HMM) is trained with a training dataset combined with discrete features. A portion of the training dataset is clustered by k-means clustering to generate cluster IDs which are normalized and combined with the discrete features. After formatting, the combined dataset is applied to the SVM HMM and the C parameter, which is optimized by calculating a zero-one error at each iteration. The open domain targeted sentiment classification methods uses less labelled data than previous sentiment analysis techniques, thus decreasing processing costs. Additionally, a supervised learning model for improving the accuracy of open domain targeted sentiment classification is presented using an SVM HMM.

8.4163833DEEP NEURAL NETWORK MODEL DESIGN ENHANCED BY REAL-TIME PROXY EVALUATION FEEDBACK
EP 12.04.2023
Int.Class G06N 3/04
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
3Computing arrangements based on biological models
02Neural networks
04Architecture, e.g. interconnection topology
Appl.No 22186944 Applicant INTEL CORP Inventor CUMMINGS DANIEL J
The present disclosure is related to artificial intelligence (AI), machine learning (ML), and Neural Architecture Search (NAS) technologies, and in particular, to Deep Neural Network (DNN) model engineering techniques that use proxy evaluation feedback. The DNN model engineering techniques discussed herein provide near real-time feedback on model performance via low-cost proxy scores without requiring continual training and/or validation cycles, iterations, epochs, etc. In conjunction with the proxy-based scoring, semi-supervised learning mechanisms are used to map proxy scores to various model performance metrics. Other embodiments may be described and/or claimed.
9.20200160997Method for detection and diagnosis of lung and pancreatic cancers from imaging scans
US 21.05.2020
Int.Class A61B 5/00
AHUMAN NECESSITIES
61MEDICAL OR VETERINARY SCIENCE; HYGIENE
BDIAGNOSIS; SURGERY; IDENTIFICATION
5Measuring for diagnostic purposes ; Identification of persons
Appl.No 16673397 Applicant University of Central Florida Research Foundation, Inc. Inventor Ulas Bagci

A method of detecting and diagnosing cancers characterized by the presence of at least one nodule/neoplasm from an imaging scan is presented. To detect nodules in an imaging scan, a 3D CNN using a single feed forward pass of a single network is used. After detection, risk stratification is performed using a supervised or an unsupervised deep learning method to assist in characterizing the detected nodule/neoplasm as benign or malignant. The supervised learning method relies on a 3D CNN used with transfer learning and a graph regularized sparse MTL to determine malignancy. The unsupervised learning method uses clustering to generate labels after which label proportions are used with a novel algorithm to classify malignancy. The method assists radiologists in improving detection rates of lung nodules to facilitate early detection and minimizing errors in diagnosis.

10.20250323822REAL-TIME MONITORING ECOSYSTEM
US 16.10.2025
Int.Class H04L 41/0631
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
41Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
06Management of faults, events, alarms or notifications
0631using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
Appl.No 19248372 Applicant Citibank, N.A. Inventor Japan Mehta

A network system to provide real-time integration and processing of user data with infrastructure data to generate solutions to user pain points. Real-time user data, including feedback and interactions, is generally not uniform and overwhelmingly large. The system provides solutions to user pain-points at scale, which, in some instances, may be unknown to the service provider. The system does so by contextually linking user data and categorizing it into standardized taxonomies. The infrastructure data is then analyzed against the taxonomies by the system's AI/ML network. The system then provides one or more pain point identifications and solutions. The system may also provide an interface to visualize the taxonomies, pain points, and trend analysis of the pain points.