-
公开(公告)号:US10776890B1
公开(公告)日:2020-09-15
申请号:US15679258
申请日:2017-08-17
Applicant: Express Scripts Strategic Development, Inc.
Inventor: Stanislav Samarin , Christopher G. Lehmuth , Robert Monzyk
IPC: G06F19/00 , G06F16/903 , G06Q50/22 , G06Q10/04
Abstract: Data threat evaluation systems and methods are described. A data model structure includes a root object query that, when executed, returns a third data subset from the plurality of data types that predate a known threat, the third data subset including data types in both the first data subset and the second data subset; and a model schema to extract, from the third data subset, data types of the first subset that predicate and indicate the threat, the model schema to produce at least an individualized data threat regression model, a script originator regression model, and a script filler data threat regression model using the extracted data types. The system may use the individualized data threat regression model, the script originator regression model, and the script filler data threat regression model back on the data set to identify potential threats. The system can be applied as a fraud, waste or abuse detector.
-
公开(公告)号:US11361381B1
公开(公告)日:2022-06-14
申请号:US15999135
申请日:2018-08-17
Applicant: Express Scripts Strategic Development, Inc.
Inventor: Christopher G. Lehmuth , Robert Monzyk , Stanislav Samarin
Abstract: Data threat evaluation systems and methods are described. A data model structure includes a data subset from the plurality of data types that predate a known threat; this third data subset includes data types from both a first data subset and a second data subset. A model schema extracts, from the data subset, data types of the first subset that predicate and indicate the threat, the model schema to produce at least an individualized data threat regression model, a script originator regression model, and a script filler data threat regression model using the extracted data types. The system may use the models back on the data set to identify potential threats. The system can operate to integrate data to predict fraud, waste or abuse.
-