-
公开(公告)号:US11651254B2
公开(公告)日:2023-05-16
申请号:US16922421
申请日:2020-07-07
Applicant: INTUIT INC.
Inventor: Archana Kataria , Sankararaman Chidambaram
CPC classification number: G06N5/04 , G06F11/079 , G06F11/0751 , G06F11/0769
Abstract: Systems and methods that may be used to provide an inference-based incident detection and reporting process. In one or more embodiments, an inference model may be used to track and analyze changes and incident data from various sources of record to quickly predict potential sources of errors and help focus in on the root cause of a software incident.
-
公开(公告)号:US11650996B1
公开(公告)日:2023-05-16
申请号:US16143151
申请日:2018-09-26
Applicant: INTUIT INC.
Inventor: Madelaine Daianu , Xiao Xiao , Ling Feng Wei , Itai Jeczmien , Andre Luis , Jonathan Lunt , Charles Showley
IPC: G06F16/2457 , G06N20/00 , G06F40/30 , G06Q40/12 , G06N5/04 , G06F16/951
CPC classification number: G06F16/24575 , G06F16/951 , G06F40/30 , G06N20/00 , G06Q40/123 , G06N5/04
Abstract: Certain aspects of the present disclosure provide techniques for determining query intent and complexity based on text input. One example method generally includes receiving, from a user device, a text query and preprocessing the text query to generate a query vector. The method further includes providing the query vector to an intent model configured to output a user intent of the text query and providing the query vector to a complexity model configured to output a complexity of the text query. The method further includes receiving the user intent of the text query from the intent model and receiving the complexity of the text query from the complexity model. The method further includes determining, based on the user intent and the complexity of the query, a routing target for the text query and routing the text query to the routing target.
-
公开(公告)号:US11647066B2
公开(公告)日:2023-05-09
申请号:US17327481
申请日:2021-05-21
Applicant: Intuit Inc.
Inventor: Ryan David Kruger , Lucas R. Doran , Jeffrey Wilson Kester , Bernadette Alexandra Mora , Sandeep Nayak
IPC: H04L67/01 , H04L67/02 , G06F9/451 , H04L67/1008 , H04L67/1029
CPC classification number: H04L67/01 , G06F9/452 , H04L67/02 , H04L67/1008 , H04L67/1029
Abstract: A method implements an embedded remote desktop in integrated module. An integrated application is received, by a client device, from an integrated server. The integrated application includes an access link to a remote server and integrated application content that references live information from a live application. The live application is executing concurrently with the integrated application and is configured to produce the live information responsive to the integrated application content. A connection is established to the remote application. The remote application establishes a connection to the live application. The live information is received at the client device. A user input is received responsive to the live information. The user input is transmitted to the integrated server.
-
公开(公告)号:US11647020B2
公开(公告)日:2023-05-09
申请号:US16825437
申请日:2020-03-20
Applicant: INTUIT INC.
Inventor: Gleb Keselman
CPC classification number: H04L63/0853 , H04L9/3247 , H04L63/083 , H04L63/10
Abstract: Certain aspects of the present disclosure provide techniques for access control. Embodiments include receiving, by a satellite component of an access control system, a request from a computing device to verify an identity of the computing device, wherein the request comprises one or more characteristics of the computing device. Embodiments include verifying, by the satellite component, that the one or more characteristics of the computing device are valid, the verifying comprising one or more interactions with a management entity related to the computing device. Embodiments include generating, by the satellite component, a signed document that is trusted by a control component of the access control system. Embodiments include providing, by the satellite component, the signed document to the computing device for use in requesting credentials from the control component to access a secure resource.
-
125.
公开(公告)号:US11646014B1
公开(公告)日:2023-05-09
申请号:US17814759
申请日:2022-07-25
Applicant: INTUIT INC.
Inventor: Shrutendra Harsola , Sourav Prosad , Viswa Datha Polavarapu
IPC: G10L15/16 , G10L15/197 , G06N3/045 , G06N3/047
CPC classification number: G10L15/16 , G06N3/045 , G06N3/047 , G10L15/197
Abstract: An ensemble of machine learning models used for real-time prediction of text for an electronic chat with an expert user. A global machine learning model, e.g., a transformer model, trained with domain specific knowledge makes a domain specific generalized prediction. Another machine learning model, e.g., an n-gram model, learns the specific style of the expert user as the expert user types to generate more natural, more expert user specific text. If specific words cannot be predicted with a desired probability level, another word level machine learning model, e.g., a word completion model, completes the words as the characters are being typed. The ensemble therefore produces real-time, natural, and accurate text that is provided to the expert user. Continuous feedback of the acceptance/rejection of predictions by the expert is used to fine tune one or more machine learning models of the ensemble in real time.
-
公开(公告)号:US11645723B2
公开(公告)日:2023-05-09
申请号:US16527703
申请日:2019-07-31
Applicant: Intuit Inc.
Inventor: Jay JieBing Yu , Matthew Sivertson , Gang Wang , Vinay Kumar , Jeffery Weber , Bojan Beran
IPC: G06F12/00 , G06F16/00 , G06Q40/12 , G06F16/332 , G06F16/958 , G06F40/14
CPC classification number: G06Q40/123 , G06F16/3329 , G06F16/986 , G06F40/14
Abstract: A method for providing user content that may receive, from a user device, a request for content. The method may obtain, in response to the request, a field identifier from a multiple of field identifiers according to a priority for a multiple of fields corresponding to the field identifiers. The field identifier may correspond to a field. The method may obtain application content based on the field identifier. The method may generate declarative content from the application content. The declarative content may express the application content in a declarative programming language. The method may transmit, to the user device, the declarative content.
-
公开(公告)号:US11645056B2
公开(公告)日:2023-05-09
申请号:US17376526
申请日:2021-07-15
Applicant: Intuit Inc.
Inventor: Samarinder Singh Thind , Rajat Khare , Neelam Singh , Suresh Krishna Devanathan , Deepak Radhakrishna
Abstract: Capturing dependencies between variables using a variable agnostic object is disclosed. A system is configured to obtain an indication of a first dependency of a first variable to a second variable via a programming interface and depict the first dependency, the first variable, and the second variable in a first instance of a variable agnostic object in a source code. The system is also configured to obtain an indication of a second dependency of a third variable to a fourth variable via the programming interface and depict the second dependency, the third variable, and the fourth variable in a second instance of the variable agnostic object in the source code. The system is also configured to compile the source code to generate a computer-executable program capturing the first dependency and the second dependency based on the first instance and the second instance of the variable agnostic object.
-
公开(公告)号:US20230137553A1
公开(公告)日:2023-05-04
申请号:US17512887
申请日:2021-10-28
Applicant: Intuit Inc.
Inventor: Aviv BEN ARIE , Or BASSON , Nitzan BAVLY , Yair HORESH
IPC: G06N20/00
Abstract: Systems and methods for identifying suspected anomalies in time series data are disclosed. An example method may receiving time series data for at least one quantity, the time series data including values of the at least one quantity at each of a plurality of times, determining a list of gradients for the time series data, each gradient in the list of gradients based on two or more values of the time series data separated by a specified number of values of the time series data, deriving a plurality of statistics based on the determined list of gradients, and performing a supervised machine learning process based on the derived plurality of statistics to generate a trained machine learning model for identifying one or more suspected anomalies in the time series data.
-
公开(公告)号:US20230134689A1
公开(公告)日:2023-05-04
申请号:US17515327
申请日:2021-10-29
Applicant: Intuit Inc.
Inventor: Nghiem LE , Leandro ALVES , Nikolas TERANI , Eugene BENDERSKY , Taylor CRESSY
Abstract: A system receives a request for payment of a transaction between a vendor and a consumer, and sends a first request to a database associated with the online service for historical transactions and personal attributes of the vendor concurrently with sending a second request to a number of third-party services for credit information and personal attributes of the consumer. The system receives information responsive to the first and second requests from the database and the third-party services, respectively, and obtains a risk score for the transaction based on an application of one or more risk assessment rules to the received information by a machine learning model trained with at least the historical transactions and the personal attributes of the vendor. In some aspects, the system determines whether to advance funds to the vendor, prior to requesting payment from a consumer account, based at least in part on the risk score.
-
公开(公告)号:US20230132670A1
公开(公告)日:2023-05-04
申请号:US17515377
申请日:2021-10-29
Applicant: Intuit Inc.
Inventor: Amit Shriram Kalamkar , Vigith Maurice , Avik Basu
IPC: G06N20/00
Abstract: A method for metrics-based anomaly detection involves receiving an anomaly analysis request for an asset and obtaining metrics associated with the asset. Each of the metrics includes time series data. The method further involves detecting that one of the metrics is a counter. The detection involves seasonally differencing the metric, obtaining a regression line by performing a linear regression on the metric, and determining that an angle of the regression line exceeds a predetermined threshold angle. The method also involves training models for the metrics, the training including training a counter-specific model for the metric that is a counter. The method further involves determining, using the models after the training, at least one metric that is anomalous.
-
-
-
-
-
-
-
-
-