-
公开(公告)号:US20250110948A1
公开(公告)日:2025-04-03
申请号:US18375234
申请日:2023-09-29
Applicant: Intuit Inc.
Inventor: Tin Nguyen , Sayan Paul , Lin Tao
IPC: G06F16/242 , G06F16/28
Abstract: Systems and methods are disclosed for converting natural language queries to a query instruction set for searching a data warehouse. To generate a query instruction set from a natural language query, a system iteratively uses a generative artificial intelligence (AI) model and database query tools to generate a query instruction set in a stepwise manner. The system and generative AI model do not require a priori knowledge of data table contents in the data warehouse, which may include sensitive information. In addition, the system does not require access to the data warehouse to generate the query instruction set. Instead, the system is implemented to use structure information from the data warehouse, including table lists (such as table names) and table format information (such as column names) of tables in the data warehouse, and the generative AI model is a generally trained model to generate the query instruction set.
-
公开(公告)号:US11861003B1
公开(公告)日:2024-01-02
申请号:US18194028
申请日:2023-03-31
Applicant: INTUIT INC.
Inventor: Navid Imani Hossein Abad , Tin Nguyen
CPC classification number: G06F21/554 , G06N20/00 , G06F2221/033
Abstract: Certain aspects of the present disclosure provide techniques for identifying fraudulent user identifiers in a software application. An example method generally includes generating a vector representation of a user identifier. Using a first machine learning model and the vector representation of the user identifier, a fingerprint representative of the user identifier is generated. Using the first machine learning model and the generated fingerprint, a score is generated. The score generally describes a likelihood that the user identifier corresponds to a fraudulent user identifier. One or more similar user identifiers are identified based on the generated fingerprint and a second machine learning model. One or more actions are taken within a computing system relative to a user associated with the user identifier based on the generated score and the identified one or more similar user identifiers.
-