Intuit Patent Applications

HOMOMORPHIC KEY DERIVATION

Granted: July 1, 2021
Application Number: 20210203494
A processor of a remote crypto cluster (RCC) may receive a public key from a client device through at least one network. The processor of the RCC may obtain an encrypted specific key and a blinded project key from at least one data source through the at least one network. The processor of the RCC may derive a derived key in blind based on the encrypted specific key and the blinded project key. The processor of the RCC may send the derived key in blind to the client device

METHODS AND SYSTEMS TO CREATE A CONTROLLER IN AN AUGMENTED REALITY (AR) ENVIRONMENT USING ANY PHYSICAL OBJECT

Granted: July 1, 2021
Application Number: 20210201581
This disclosure provides systems, methods and apparatus for manipulating virtual objects in a virtual reality (VR) environment. In some implementations, an augmented reality (AR) system determines an orientation of a physical object in the real-world space based at least in part on images or video of the physical object captured by an image capture device, and generates a virtual object representative of the physical object based at least in part on the orientation and the at least one…

LARGE SCALE AND HIGH THROUGHPUT VIDEO IDENTITY MONITORING AND VERIFICATION

Granted: June 24, 2021
Application Number: 20210194872
Systems and methods for verifying identifies of parties to a video conference call are disclosed. An example method includes storing a plurality of first facial encodings each associated with one or more images of a registered agent, receiving, during the video conference call, a second facial encoding associated with one or more images of a person participating in the video conference call, determining that a specified registered agent is scheduled as a party to the video conference…

MACHINE LEARNING MODELS WITH IMPROVED SEMANTIC AWARENESS

Granted: June 24, 2021
Application Number: 20210192136
A method including inputting, into a phrase recognition model comprising a neural network, a vector comprising a plurality of ngrams of text. The method also includes applying, using the phrase recognition model, a filter to the plurality of ngrams during execution. The filter has a skip word setting of at least one. The method also includes determining, based on the skip word setting, at least one ngram in the vector to be skipped to form at least one skip word. The method also includes…

AUTOMATED VALIDATION OF DIGIT SEQUENCES IN TRANSACTIONS

Granted: June 17, 2021
Application Number: 20210182803
A method may include extracting, from a transaction, a routing transit number (RTN) and an account number, embedding the RTN to obtain an RTN vector, embedding the account number to obtain an account number matrix, combining, using a trained machine learning model, the RTN vector and the account number matrix to obtain a combined matrix, and classifying the account number as invalid. The classifying may include applying the trained machine learning model to the combined matrix.

METHOD AND SYSTEM FOR PREDICTING RELEVANT OFFERINGS FOR USERS OF DATA MANAGEMENT SYSTEMS USING MACHINE LEARNING PROCESSES

Granted: June 17, 2021
Application Number: 20210182906
A method and system provides a data management system that provides data management services and products to users. The method and system provides a predictive model that generates probability scores indicating the likelihood that current users of the data management system would select promotional messages if the promotional messages are presented to the current users.

SYSTEMS AND METHODS USING FINANCIAL INFORMATION TO GENERATE A SOCIAL GRAPH AND DETERMINE PRODUCT AND OTHER OFFERINGS BASED ON CONNECTIONS WITHIN THE SOCIAL GRAPH

Granted: June 17, 2021
Application Number: 20210182905
Systems and methods that may be used to generate and use a social graph generated by user financial transaction data (i.e., a financial transaction-based social graph). Connections and other data within the financial transaction-based social graph can be used for targeted product offerings, other offerings, and or advertisements via e.g., collaborative filtering and user segmentation and profiling.

METHOD AND SYSTEM TO DETERMINE BUSINESS SEGMENTS ASSOCIATED WITH MERCHANTS

Granted: June 17, 2021
Application Number: 20210182877
The business segment associated with a merchant is automatically and accurately determined by applying machine learning techniques to actual financial documents associated with a merchant. In some examples, once the business segment associated with a merchant user of a data management system is identified, this information is used to identify potentially fraudulent and/or other criminal activity such as fraudulent merchants, criminal financial transactions, and fraudulent invoices.

SYSTEMS AND METHODS USING FINANCIAL INFORMATION TO GENERATE A SOCIAL GRAPH AND DETERMINE PRODUCT AND OTHER OFFERINGS BASED ON CONNECTIONS WITHIN THE SOCIAL GRAPH

Granted: June 17, 2021
Application Number: 20210182876
Systems and methods that may be used to generate and use a social graph generated by user financial transaction data (i.e., a financial transaction-based social graph). Connections and other data within the financial transaction-based social graph can be used for targeted product offerings, other offerings, and or advertisements via e.g., collaborative filtering and user segmentation and profiling.

SHAREABLE AND NESTED TRANSACTIONS ON HASH CHAINS

Granted: June 17, 2021
Application Number: 20210182841
A method for using shareable and nested transaction on hash chains includes storing transaction data of a transaction of a hash chain. A lock block is appended to the hash chain. Appending the lock block includes setting a tail block identifier of the hash chain from a preceding tail block of a preceding transaction to the lock block. A data block is appended to the hash chain. Appending the data block includes setting the tail block identifier of the hash chain to the data block. The…

AD HOC CONTACT DATA CAPTURE

Granted: June 17, 2021
Application Number: 20210182473
Ad hoc contact data capture includes establishing a connection to a software application. A browser renders a source page from a source server. An extension of the browser receives a page event from the browser after rendering the page, the page event identifying a selected location of the source page. Ad hoc contact data capture further includes identifying source data from the source page after receiving the page event, calculating a distance between a contact element of the source…

PREVENTING UNEXPECTED BEHAVIOR IN SOFTWARE SYSTEMS DUE TO THIRD PARTY ARTIFACTS

Granted: June 17, 2021
Application Number: 20210182054
A method including executing a software application in an enterprise environment. The software application interacts with an artifact as part of execution of the software application. The method also includes receiving an updated artifact for the software application at a source control system. The updated artifact comprises an updated dependency endpoint. The updated artifact is published by a third party. The method also includes adjusting the updated dependency endpoint for the…

DEEP LEARNING APPROACH TO MITIGATE THE COLD-START PROBLEM IN TEXTUAL ITEMS RECOMMENDATIONS

Granted: June 3, 2021
Application Number: 20210165848
A method for mitigating cold starts in recommendations includes receiving a request that identifies a requested page and identifying a content vector of the requested page. The content vector is generated based on providing text of the requested page to a neural network text encoder. The method further includes selecting, based on a rank engine and the content vector, a link to a cold start page that does not satisfy a threshold level of interaction data. The rank engine ranks the…

INTEGRATED EVENT PROCESSING AND POLICY ENFORCEMENT

Granted: June 3, 2021
Application Number: 20210165725
A method may include receiving an event from an event source. The event may correspond to event data. The event source may be a container executing an image. The image may correspond to image metadata including attributes describing the image. The method may further include combining the event data with the image metadata to obtain enriched data, detecting, using the enriched data, a deviation from a policy, and in response to detecting the deviation from the policy, performing an action…

METHOD AND SYSTEM FOR GENERATING SYNTHETIC DATA USING A REGRESSION MODEL WHILE PRESERVING STATISTICAL PROPERTIES OF UNDERLYING DATA

Granted: May 27, 2021
Application Number: 20210158129
A method for generating a synthetic dataset involves generating discretized synthetic data based on driving a model of a cumulative distribution function (CDF) with random numbers. The CDF is based on a source dataset. The method further includes generating the synthetic dataset from the discretized synthetic data by selecting, for inclusion into the synthetic dataset, values from a multitude of entries of the source dataset, based on the discretized synthetic data, and providing the…

DATA STRUCTURES AND METHODS FOR ENABLING CROSS DOMAIN RECOMMENDATIONS BY A MACHINE LEARNING MODEL

Granted: May 20, 2021
Application Number: 20210149671
A machine learning method. A source domain data structure and a target domain data structure are combined into a unified data structure. First data in the source domain data structure are latent with respect to second data in the target domain data structure. The unified data structure includes user vectors that combine the first data and the second data. The user vectors are transformed into a transformed data structure by applying a mapping function to the user vectors. The mapping…

MODEL SELECTION IN A FORECASTING PIPELINE TO OPTIMIZE TRADEOFF BETWEEN FORECAST ACCURACY AND COMPUTATIONAL COST

Granted: May 20, 2021
Application Number: 20210150384
Systems and methods for forecasting future values of data streams are disclosed. One example method may include receiving information characterizing each of a plurality of forecasting models, retrieving historical data for each of a plurality of data streams, determining one or more constraints, dynamically selecting one of the plurality of forecasting models for each of the data streams based on accuracy metrics for the forecasting models, estimating cost metrics associated with each…

HIERARCHICAL DEEP NEURAL NETWORK FORECASTING OF CASHFLOWS WITH LINEAR ALGEBRAIC CONSTRAINTS

Granted: May 20, 2021
Application Number: 20210150259
Systems and methods for forecasting cashflows across one or more accounts of a user disclosed. One example method may include retrieving a data set for each of a plurality of accounts from a database, constructing a graph including a plurality of nodes linked together by a multitude of edges, wherein each node identifies a time series value corresponding to one of the accounts, and each edge indicates a time series value of a corresponding set of transactions occurring between a…

SYSTEM AND METHOD FOR CORRECTION OF ACQUIRED TRANSACTION TEXT FIELDS

Granted: May 20, 2021
Application Number: 20210150129
Transactions include text fields, such as description fields. Transactions are extracted from financial institutions using web-scraping extraction. In the process of extracting transactions, errors can be introduced into text fields, such as the inclusion of a space within a word or the removal of a space between words. A statistical approach is applied to the text fields. When two alternative text fields are presented, the alternative that statistically includes more common tokens, such…

PRE-TRAINED CONTEXTUAL EMBEDDING MODELS FOR NAMED ENTITY RECOGNITION AND CONFIDENCE PREDICTION

Granted: May 20, 2021
Application Number: 20210149993
At least one processor may obtain a document comprising text tokens. The at least one processor may determine, based on a pre-trained language model, word embeddings corresponding to the text tokens. The at least one processor may determine, based on the word embeddings, named entities corresponding to the text tokens; and one or more accuracy predictions corresponding to the named entities. The at least one processor may compare the one or more accuracy predictions with at least one…