-
公开(公告)号:US11321214B1
公开(公告)日:2022-05-03
申请号:US17068821
申请日:2020-10-12
Inventor: Rajiv Shah , Shannon Morrison , Jeremy Cunningham , Taylor Smith , Sripriya Sundararaman , Jing Wan , Jeffrey Hevrin , Ronald Duehr , Brad Sliz , Lucas Allen
Abstract: A computer-implemented method for determining features of a dataset that are indicative of anomalous behavior of one or more computers in a large group of computers comprises (1) receiving log files including a plurality of entries of data regarding connections between a plurality of computers belonging to an organization and a plurality of websites outside the organization, each entry being associated with the actions of one computer, (2) executing a time series decomposition algorithm on a portion of the features of the data to generate a first list of features, (3) implementing a plurality of traffic dispersion graphs to generate a second list of features, and (4) implementing an autoencoder and a random forest regressor to generate a third list of features.
-
22.
公开(公告)号:US10825097B1
公开(公告)日:2020-11-03
申请号:US15843761
申请日:2017-12-15
Inventor: Ryan Knuffman , Bradley A. Sliz , Lucas Allen
Abstract: A remotely-controlled (RC) and/or autonomously operated inspection device, such as a ground vehicle or drone, may capture one or more sets of imaging data indicative of at least a portion of an automotive vehicle, such as all or a portion of the undercarriage. The one or more sets of imaging data may be analyzed based upon data indicative of at least one of vehicle damage or a vehicle defect being shown in the one or more sets of imaging data. Based upon the analyzing of the one or more sets of imaging data, damage to the vehicle or a defect of the vehicle may be identified. The identified damage or defect may be compared to a claimed damage or defect to determine whether the claimed damage or defect occurred.
-
公开(公告)号:US10652257B1
公开(公告)日:2020-05-12
申请号:US15643716
申请日:2017-07-07
Inventor: Rajiv Shah , Shannon Morrison , Jeremy Cunningham , Taylor Smith , Sripriya Sundararaman , Jing Wan , Jeffrey Hevrin , Ronald Duehr , Brad Sliz , Lucas Allen
IPC: H04L29/06
Abstract: A computer-implemented method for detecting anomalous behavior of one or more computers in a large group of computers comprises (1) receiving log files including a plurality of entries of data regarding connections between a plurality of computers belonging to an organization and a plurality of websites outside the organization, each entry being associated with the actions of one computer, (2) applying a first plurality of algorithms to determine features of the data which may contribute to anomalous behavior of the computers, and (3) applying a second plurality of algorithms to determine which computers are behaving anomalously based upon the features.
-
公开(公告)号:US10587796B1
公开(公告)日:2020-03-10
申请号:US15900110
申请日:2018-02-20
Inventor: Bradley A. Sliz , Lucas Allen , Jeremy T. Cunningham
Abstract: Systems and methods for analyzing image data to automatically ensure image capture consistency are described. According to certain aspects, a server may access aerial and other image data and identify a set of parameters associated with the capture of the image data. The server may access a corresponding set of acceptable image capture parameters, and may compare the set of parameters to the set of acceptable parameters to determine whether image data is consistent with the set of acceptable parameters. In some embodiments, if the image data is not consistent, the server may generate a notification or instruction to cause an image capture component to recapture additional image data.
-
公开(公告)号:US10387966B1
公开(公告)日:2019-08-20
申请号:US15403376
申请日:2017-01-11
Inventor: Rajiv Shah , Michael Shawn Jacob , Sripriya Sundararaman , Jeffrey David Hevrin , Jeffrey Kinsey , Phillip Sangpil Moon , EllaKate LeFebre , Sunish Menon , Jeffrey Wilson Stoiber , James Nolan Dykeman , Erin Ann Olander , Lucas Allen
Abstract: A computer-implemented method for identifying a property usage type based upon sensor data includes, with customer permission or affirmative consent, receiving data generated by various sensors; generating a report that includes a listing of events recorded by each sensor; analyzing data from the report to determine a property usage type score; receiving data regarding types and levels of insurance coverage associated with the property usage type score; receiving data derived from a homeowner's insurance policy; comparing the types and levels of insurance coverage associated with the property usage type score with the types and levels of insurance coverage from the homeowner's current insurance policy; and transmitting a message to the homeowner to update their insurance policy if there are differences between (i) the insurance coverage that the homeowner has, and (ii) the insurance coverage the homeowner should have based upon the property usage type score.
-
-
-
-