-
公开(公告)号:US11956200B1
公开(公告)日:2024-04-09
申请号:US18175752
申请日:2023-02-28
Applicant: UIPCO, LLC
Inventor: Gregory Brian Meyer , Mark Anthony Lopez , Nolan Serrao , Victor Kwak , Ryan Thomas Russell , Christopher Russell , Ruthie D. Lyle
IPC: G06F15/16 , G06Q10/107 , H04L51/212 , H04L51/226 , H04L51/58 , H04L67/5683 , H04W4/80
CPC classification number: H04L51/58 , G06Q10/107 , H04L51/212 , H04L51/226 , H04L67/5683 , H04W4/80
Abstract: A system and method for improving the download time of emails in an environment in which a server distributes emails to persons working in close proximity to each other. When these persons receive multi-recipient emails intended for several or all of these persons, the server distributing the emails delivers the multi-recipient emails to the first one of the persons who logged on to read his or her emails on his or her personal computer, for distribution to the other persons over a personal area network. This reduces the download time for the persons downloading their emails at a subsequent time.
-
公开(公告)号:US11824872B1
公开(公告)日:2023-11-21
申请号:US16886838
申请日:2020-05-29
Applicant: UIPCO, LLC
Inventor: Gregory Brian Meyer , Mark Anthony Lopez , Ravi Durairaj , Nolan Serrao , Victor Kwak , Ryan Thomas Russell , Christopher Russell , Ruthie D. Lyle
CPC classification number: H04L63/1416 , G06F21/6245 , G06N5/04 , G06N20/00 , G06Q50/265 , H04L63/102 , H04L63/1425 , G06Q30/0185 , G06Q40/02
Abstract: A system and method for detecting an anomaly based on user interaction with a mobile computing device is disclosed. The method includes activating, on the mobile computing device, an application, which is configured to store the machine learning model and the behavioral profile generated by the machine learning model in the memory of the mobile computing device; receive, track, and store in the memory of the mobile computing device an input pattern including navigation information and identification information inputted from the user during the user interaction with the mobile computing device; detect anomaly based on the user interaction with the mobile computing device by comparing the stored behavioral profile with the stored input pattern; and prohibit user to have further access to the financial application including user accounts in response to detection of the anomaly.
-
公开(公告)号:US11463587B1
公开(公告)日:2022-10-04
申请号:US16808888
申请日:2020-03-04
Applicant: UIPCO, LLC
Inventor: Kristopher Williams , Reynaldo Medina, III , Mark Anthony Lopez , Amy Daali
Abstract: Predictive mapping technology is used to route a telephone call from a user to a customer service representative. The disclosed technology can use any one or more of the following factors to map a telephone call from a user to a customer service representative: (1) a sentiment score based on a topic of conversation; (2) an experience score of the customer service representative with a topic of conversation; and (3) a performance score of the customer service representative in managing a topic of conversation.
-
公开(公告)号:US11997219B1
公开(公告)日:2024-05-28
申请号:US16799672
申请日:2020-02-24
Applicant: UIPCO, LLC
Inventor: Ryan Thomas Russell , Emily Kathleen Krebs , Stacy Callaway Huggar , Jeffrey Neal Pollack , Yevgeniy Viatcheslavovich Khmelev , Mark Anthony Lopez
CPC classification number: H04L9/3268 , G06F21/6209 , G06F21/84 , H04L9/30 , H04L63/0272 , H04L63/083 , H04L63/102 , H04L63/105 , H04L63/107 , H04L2463/082 , H04N7/18
Abstract: To protect corporate information technology (IT) networks, corporations or organizations can design their networks with secure technology. For example, before an employee can remotely access his or her company's network via a user device, a server associated with the company's network can setup an exemplary secure digital certificate for the user device. The secure digital certificate includes a public Internet Protocol (IP) address associated with a router used by the user device to access the Internet. When employee attempts to remotely access his or her company's network, the user device or a router associated with the user device can send the secure digital certificate along with a current public IP address of the router used by the user device to access the Internet. In some embodiments, if the public IP address included in the digital certificate matches the current public IP address, the user device can access the company's network.
-
公开(公告)号:US11720121B1
公开(公告)日:2023-08-08
申请号:US18053445
申请日:2022-11-08
Applicant: UIPCO, LLC
Inventor: Ravi Durairaj , Gregory Brian Meyer , Oscar Roberto Tijerina , Sean Carl Mitchem , Stacy Callaway Huggar , Ruthie D. Lyle , Nathan Lee Post , Mark Anthony Lopez , Nolan Serrao
CPC classification number: G05D1/0287 , B60W60/001 , F41H11/08 , B60W2556/45
Abstract: Methods and systems for deploying autonomous vehicles to form a barricade in a coordinated response to an imminent threat are described. In one embodiment, a method for deploying autonomous vehicles to form a barricade is described. The method includes determining at least one location for a barricade and determining a plurality of autonomous vehicles that are available to form the barricade. The method also includes sending instructions to the plurality of autonomous vehicles to form the barricade at the at least one location. In response to the instructions, the plurality of autonomous vehicles are configured to move to the at least one location and form the barricade.
-
公开(公告)号:US11631068B1
公开(公告)日:2023-04-18
申请号:US16799615
申请日:2020-02-24
Applicant: UIPCO, LLC
Inventor: Emily Kathleen Krebs , Stacy Callaway Huggar , Jeffrey Neal Pollack , Yevgeniy Viatcheslavovich Khmelev , Mark Anthony Lopez , Ryan Thomas Russell
Abstract: Image processing techniques can be used to determine whether a person has installed an unauthorized device on or in a kiosk. For example, an image processing server can determine whether a person's hand(s) are engaging in abnormal behavior by obtaining recorded images of the person's hand(s) that extend towards the kiosk to perform an action, and by comparing the information in the recorded images with a set of previously known information about other persons' hands that are similarly extended towards the kiosk.
-
7.
公开(公告)号:US11470685B1
公开(公告)日:2022-10-11
申请号:US16942866
申请日:2020-07-30
Applicant: UIPCO, LLC
Inventor: Gregory Brian Meyer , Mark Anthony Lopez , Ravi Durairaj , Nolan Serrao , Victor Kwak , Ryan Thomas Russell , Christopher Russell , Ruthie D. Lyle
Abstract: A system and method for reducing wireless traffic among a plurality of IoT devices and an access point is disclosed. The method and system may establish communication among a plurality of Internet of Things (IOT) devices and establish a set of similar IoT devices from among the plurality of IoT devices. One of the similar IoT devices may be designated as a managing IoT device and the remaining IoT devices in set of similar IoT devices may be designated as controlled IoT devices. Wireless traffic from the access point may be transmitted through the managing IoT device to controlled IoT devices. Wireless traffic from the controlled IoT devices may be transmitted to the access point through the managing IoT device. Thus, wireless traffic between the access point and controlled IoT devices is reduced.
-
公开(公告)号:US11146679B1
公开(公告)日:2021-10-12
申请号:US16887392
申请日:2020-05-29
Applicant: UIPCO, LLC
Inventor: Gregory Brian Meyer , Mark Anthony Lopez , Ravi Durairaj , Nolan Serrao , Victor Kwak , Ryan Thomas Russell , Christopher Russell , Ruthie D. Lyle
IPC: H04M3/493
Abstract: A system and method for providing an interactive voice response dialogue by using a cloud computing system coupled to a mobile computing device. The cloud computing system may receive a request from a mobile computing device to initiate communication with an interactive voice response system having a tree structure including audio files in the cloud computing system. An interactive voice response dialogue may be conducted using the cloud computing system when the mobile computing device does not have the capacity to receive the one or more files. When the mobile computing device does have the capacity to receive the one or more files, one or more files may be transmitted from the cloud computing system to the mobile computing device, so that he mobile computing device may conduct the interactive voice response dialogue.
-
公开(公告)号:US10986226B1
公开(公告)日:2021-04-20
申请号:US16842613
申请日:2020-04-07
Applicant: UIPCO, LLC
Inventor: Emily Kathleen Krebs , Stacy Callaway Huggar , Jeffrey Neal Pollack , Yevgeniy Viatcheslavovich Khmelev , Mark Anthony Lopez , Ryan Thomas Russell
Abstract: When a customer service representative (CSR) calls a customer, the customer may be able to authenticate himself or herself by providing the CSR with personal identifying information. However, the CSR may be unable to provide information to authenticate himself or herself to the customer. Thus, this patent document describes authentication techniques that can allow the CSR to authenticate himself or herself to the customer. For example, before or during a call that the second person (e.g., CSR) initiates to call a first person (e.g., customer), a notification message may be sent to the first person's user device. The content of notification message displayed on the user device may provide information to the first person which can allow the first person to determine whether the second person is trustworthy.
-
公开(公告)号:US11836232B1
公开(公告)日:2023-12-05
申请号:US17219140
申请日:2021-03-31
Applicant: UIPCO, LLC
Inventor: Ravi Durairaj , Gregory Brian Meyer , Oscar Roberto Tijerina , Sean Carl Mitchem , Stacy Callaway Huggar , Ruthie D. Lyle , Nathan Lee Post , Mark Anthony Lopez , Nolan Serrao
CPC classification number: G06F21/32 , G06F21/34 , G06V40/162 , G06V40/175
Abstract: A method and system of performing an authentication of a person in order to activate a smart card for access to a secured resource is disclosed. The system and method are configured to collect image data and compare the image data to facial model data stored on the smart card. The system detects whether there is a match between the image data and any facial signatures previously collected and stored in the smart card. If there is a match, the system verifies an identity of the person and can be configured to automatically activate the smart card for a limited period of time.
-
-
-
-
-
-
-
-
-