-
公开(公告)号:US20200304550A1
公开(公告)日:2020-09-24
申请号:US16896785
申请日:2020-06-09
Applicant: Intuit Inc.
Inventor: Efraim Feinstein
Abstract: A method includes establishing a network connection with a source computing device and an application services computing device, receiving, via the network connection, a source event stream at the application services computing device, and extracting a sample of the source event stream. The method further includes partitioning the sample of the source event stream into fields, identifying a field data type of a field of the multiple fields in the sample, identifying a distribution of values of the field in the sample, and extrapolating, from the sample of the source event stream, extrapolated functions for the fields. Extrapolating an extrapolated function is dependent on the field data type and the distribution of the field. The method further includes transforming, based on the plurality of extrapolated functions in the configuration file, the source event stream to obtain a transformed event stream, and analyzing, by a target machine learning model, the transformed event stream.
-
公开(公告)号:US11190562B2
公开(公告)日:2021-11-30
申请号:US16896785
申请日:2020-06-09
Applicant: Intuit Inc.
Inventor: Efraim Feinstein
Abstract: A method includes establishing a network connection with a source computing device and an application services computing device, receiving, via the network connection, a source event stream at the application services computing device, and extracting a sample of the source event stream. The method further includes partitioning the sample of the source event stream into fields, identifying a field data type of a field of the multiple fields in the sample, identifying a distribution of values of the field in the sample, and extrapolating, from the sample of the source event stream, extrapolated functions for the fields. Extrapolating an extrapolated function is dependent on the field data type and the distribution of the field. The method further includes transforming, based on the plurality of extrapolated functions in the configuration file, the source event stream to obtain a transformed event stream, and analyzing, by a target machine learning model, the transformed event stream.
-
3.
公开(公告)号:US20180033006A1
公开(公告)日:2018-02-01
申请号:US15220854
申请日:2016-07-27
Applicant: Intuit Inc.
Inventor: Jonathan R. Goldman , Monica Tremont Hsu , Efraim Feinstein
CPC classification number: G06Q20/405 , G06F21/6218 , G06Q40/10 , H04L63/1408
Abstract: Methods and systems of the present disclosure include identifying and addressing potential fictitious business entity-based fraud, according to one embodiment. The methods and systems identify fictitious business entities associated with fraudulent tax return filings, in one embodiment. According to one embodiment, the methods and systems acquire data associated with an employer identification number (EIN), apply the data to one or more predictive models to generate one or more risk scores to identify potentially suspicious EIN data, and perform one or more risk reduction actions based on the one or more risk scores, according to one embodiment.
-
公开(公告)号:US11829866B1
公开(公告)日:2023-11-28
申请号:US15855702
申请日:2017-12-27
Applicant: Intuit Inc.
Inventor: Efraim Feinstein , Riley F. Edmunds
CPC classification number: G06N3/08 , G06N3/045 , G06N3/047 , H04L63/0272 , H04L63/1425
Abstract: A method and system distinguish between anomalous members of a majority group and members of a target group. The system and method utilize a neural network architecture that attends to each level of a classification hierarchy. The system and method chain a semi-supervised autoencoder with a supervised classifier neural network. The autoencoder is trained in a semi-supervised manner with a machine learning process to identify user profile data that are typical of a majority class. The classifier neural network is trained in a supervised manner with a machine learning process to distinguish between user profile data that are anomalous members of the majority class and user profile data that are members of the target class.
-
公开(公告)号:US20180239870A1
公开(公告)日:2018-08-23
申请号:US15220981
申请日:2016-07-27
Applicant: Intuit Inc.
Inventor: Jonathan R. Goldman , Monica Tremont Hsu , Efraim Feinstein
CPC classification number: G06F19/328 , G06Q30/0185 , G06Q40/08 , G06Q50/22 , G16H40/20
Abstract: Methods and systems of the present disclosure include identifying and addressing potential healthcare-based fraud, according to one embodiment. The methods and systems identify potential healthcare-based fraud associated with potentially suspicious healthcare providers, patients, and/or claim submissions, in one embodiment. According to one embodiment, the methods and systems acquire data associated with a healthcare provider, patient, and/or claim submission; apply the data to one or more predictive models to generate one or more risk scores to identify potential healthcare-based fraud, and perform one or more risk reduction actions based on the one or more risk scores, according to one embodiment.
-
6.
公开(公告)号:US20180033089A1
公开(公告)日:2018-02-01
申请号:US15220623
申请日:2016-07-27
Applicant: Intuit Inc.
Inventor: Jonathan R. Goldman , Monica Tremont Hsu , Efraim Feinstein , Thomas M. Pigoski, II
CPC classification number: G06Q40/10 , H04L63/083 , H04L63/102 , H04L63/1466
Abstract: Account takeover is one of a number of types of Internet-centric crime (i.e., cybercrime) that includes the unauthorized access/use of a user's account with the user's identity or credentials (e.g., username and/or password). Because fraudsters acquire user credentials through phishing, spyware, or malware scams, it can be difficult to detect unauthorized access of a user's account. Methods and systems of the present disclosure identify and address potential account takeover activity, according to one embodiment. The methods and systems acquire system access data, apply the system access data to one or more predictive models to generate one or more risk scores, and perform one or more risk reduction actions based on the one or more risk scores, according to one embodiment. The financial system is a tax return preparation system according to one embodiment.
-
7.
公开(公告)号:US20180033009A1
公开(公告)日:2018-02-01
申请号:US15220759
申请日:2016-07-27
Applicant: Intuit Inc.
Inventor: Jonathan R. Goldman , Monica Tremont Hsu , Efraim Feinstein
CPC classification number: G06Q20/4016 , G06Q20/108 , G06Q20/4014 , G06Q40/10 , G06Q50/265 , H04L63/102 , H04L63/1408
Abstract: Account takeover and stolen identity refund fraud are types of Internet-centric crime (i.e., cybercrime) that include the unauthorized access or use of a user account or identity information to file a tax return in order to obtain a tax refund and/or tax credit from, for example, a state or federal revenue service. Because fraudsters access legitimate user accounts or use legitimate identity information to create user accounts, it can be difficult to detect fraudulent activity in user accounts. Methods and systems of the present disclosure facilitate the identification and prevention of potential fraudulent activity in a financial system, according to one embodiment. The methods and systems automate fraud claim receipt, predictive model training, risk score threshold improvement/optimization, and/or investigation of potentially affected user accounts, according to one embodiment.
-
-
-
-
-
-