Intuit Patent Applications

SYSTEM AND METHOD FOR DETECTING FRAUD AMONG TAX EXPERTS

Granted: February 4, 2021
Application Number: 20210035235
A method and system trains, with a machine learning process, an analysis model to detect anomalous behavior of tax professionals affiliated with a tax return preparation system. The analysis model is trained with a training set that includes contextual and behavioral data for a plurality of historical tax professionals. The trained analysis model then analyzes and generates risk scores for current tax professionals based on current behavioral and contextual data associated with the…

METHOD AND SYSTEM FOR IDENTIFYING, TRACKING, AND PREDICTING THE LOCATION OF MOVING MERCHANTS

Granted: February 4, 2021
Application Number: 20210035196
Customer transaction data is processed to determine transaction locations for transactions, including transactions whose locations are not initially known. The transaction location data is then utilized to identify merchants that are mobile merchants, and the mobile merchant locations are periodically recalculated and tracked. Customer transaction data is further utilized to identify relationships between mobile merchants and customers of those mobile merchants. Merchant and customer…

METHOD AND SYSTEM FOR REAL-TIME AUTOMATED IDENTIFICATION OF FRAUDULENT INVOICES

Granted: February 4, 2021
Application Number: 20210035119
Known fraudulent invoice data, including defined and known fraudulent invoice feature data, is used to train a machine learning-based fraudulent invoice detection model to generate a fraudulent invoice score for invoices indicating a determined probability that a given invoice is fraudulent. The machine learning-based fraudulent invoice detection model is then used to generate a fraudulent invoice score for subsequent invoices before those invoices are paid by, and in some cases before…

ANOMALY DETECTION AND CLUSTERING IN FINANCIAL DATA CHANNEL MIGRATION

Granted: February 4, 2021
Application Number: 20210034917
A method and system determines whether or not a new data acquisition process is working for individual financial accounts of users of a data management system. The method and system trains an analysis model with a machine learning process. The trained analysis model then analyzes financial data obtained by both an old data acquisition process and the new data acquisition process. The trained analysis model identifies whether the new data acquisition process is working properly based on…

GENERATING STRUCTURED REPRESENTATIONS OF FORMS USING MACHINE LEARNING

Granted: February 4, 2021
Application Number: 20210034858
A method may include acquiring, from a document, document elements and attributes describing the document elements. One or more of the attributes may be geometric attributes describing a placement of the corresponding document element within the document. The method may further include deriving features for the document elements using the attributes, detecting form components using the features, clustering the form components into line objects of a structured representation by applying…

REGION PROPOSAL NETWORKS FOR AUTOMATED BOUNDING BOX DETECTION AND TEXT SEGMENTATION

Granted: February 4, 2021
Application Number: 20210034856
Arbitrary image data may be transformed into data suitable for optical character recognition (OCR) processing. A processor may generate a plurality of intermediate feature layers of an image using convolutional neural network (CNN) processing. For each intermediate feature layer, the processor may generate at least one text proposal using a region proposal network (RPN). The at least one text proposal may comprise a portion of the intermediate feature layer that is predicted to contain…

NEURAL NETWORK SYSTEM FOR TEXT CLASSIFICATION

Granted: February 4, 2021
Application Number: 20210034707
A computer-implemented method is provided to perform text classification with a neural network system. The method includes providing a computing device to receive input datasets including user input question text and feed the datasets to the neural network system. The neural network system includes one or more neural networks configured to extract and concatenate character-based features, word-based features from the question datasets and clickstream embeddings of clickstream data to…

REGION PROPOSAL NETWORKS FOR AUTOMATED BOUNDING BOX DETECTION AND TEXT SEGMENTATION

Granted: February 4, 2021
Application Number: 20210034700
A processor may generate a plurality of intermediate feature layers of an image using convolutional neural network (CNN) processing. For each intermediate feature layer, the processor may generate a plurality of text proposals using a region proposal network (RPN). Each text proposal may comprise a portion of the intermediate feature layer that is predicted to contain text. The processor may perform OCR processing on image data within a plurality of regions of the image to generate a…

METHOD AND SYSTEM FOR USING TEST DEPOSITS TO DETECT UNLISTED ACCOUNTS ASSOCIATED WITH USERS OF A DATA MANAGEMENT SYSTEM

Granted: January 28, 2021
Application Number: 20210027365
Test deposit mechanisms used by financial institutions to link accounts are used to identify undisclosed accounts associated with users of a data management system. The potential existence of undisclosed accounts is determined based on the assumption that the presence of test deposit transactions in user account data is a strong indication that an undisclosed user account exists. Using this assumption, transaction data from user accounts disclosed to a user data management system is…

MULTI-USER TIME TRACKING MESH NETWORK

Granted: January 28, 2021
Application Number: 20210029762
A transceiver of a mobile device may receive a beacon transmitted by a mesh network member mobile device. A processor of the mobile device may extract a crew ID from the beacon. The processor may determine that the crew ID matches a crew ID of a user logged into the mobile device. In response to determining that the crew ID matches the crew ID of the user, the processor may generate a reply beacon. The transceiver may transmit the reply beacon. The transceiver may receive a response to…

DETECTING LIFE EVENTS BY APPLYING ANOMALY DETECTION METHODS TO TRANSACTION DATA

Granted: January 28, 2021
Application Number: 20210027302
Machine learning-based anomaly detection methods are used to identify a change in a user's streaming transaction data. If a threshold level of change in the user's transaction data is detected, the user is then identified as potentially having experienced a life event. Then, after a user is identified has having potentially experienced a life event, individual user transactions are processed and analyzed to determine the specific life event the user has most likely experienced. The user…

SEARCHING AND SCORING USING PHRASES AND/OR MULTIPLE WORDS

Granted: January 28, 2021
Application Number: 20210026879
A processor may identify a combination term including at least two individual terms within at least one source of truth stored in a memory in communication with the processor. The processor may identify at least one document including the at least two of the individual search terms. The processor may determine a document weight for the at least one document based on the combination search term and the at least two of the individual search terms within the combination search term. The…

IDENTITY RESOLUTION FOR FRAUD RING DETECTION

Granted: January 21, 2021
Application Number: 20210019762
This disclosure provides systems, methods and apparatuses for identifying fraudulent accounts associated with an electronic payment service. In some implementations, a computing device may retrieve a data set including a number of attributes for each of a multitude of accounts, and may construct a plurality of different graphs each based on a unique set of the attributes. Each graph may include a plurality of nodes linked together by a multitude of edges, where each node identifies a…

MULTI-USER TIME TRACKING MESH NETWORK

Granted: January 7, 2021
Application Number: 20210007163
A transceiver of a mobile device may receive a beacon transmitted by a mesh network member mobile device. A processor of the mobile device may extract a crew ID from the beacon. The processor may determine that the crew ID matches a crew ID of a user logged into the mobile device. In response to determining that the crew ID matches the crew ID of the user, the processor may generate a reply beacon. The transceiver may transmit the reply beacon. The transceiver may receive a response to…

REPRESENTATION LEARNING FOR TAX RULE BOOTSTRAPPING

Granted: December 17, 2020
Application Number: 20200394263
A rule having text is pre-processed by replacing terms with dummy tokens. A first machine learning model (MLM) uses the dummy tokens to generate a dependency graph with nodes related by edges tagged with dependency tags. A second MLM uses the dependency graph to generate a canonical version with node labels. The node labels are sorted into a lexicographic order to form a document. A third MLM uses the document to generate a machine readable vector (MRV) that embeds the document as a…

INTEGRATING INVOICE RELATED FINANCIAL TRANSACTION DATA INTO A PERSONAL FINANCIAL MANAGEMENT AND BILL PAYMENT SYSTEM

Granted: December 10, 2020
Application Number: 20200387978
Financial transaction data is obtained and integrated into a personal financial management and bill payment system. Payment method data associated with the financial transaction data is obtained from the personal financial management and bill payment system. The payment method data is then used to more accurately and automatically identify tax related financial transactions for processing as tax related financial transactions having tax ramifications.

CENTRALIZED AUTHENTICATION AND AUTHORIZATION WITH CERTIFICATE MANAGEMENT

Granted: December 3, 2020
Application Number: 20200382323
At least one processor of a central authority separate from a computing process may establish a first trust relationship between the computing process and a central authority separate from the computing process. The establishing may include authenticating the computing process, which may include providing a signed token to the computing process, receiving a request for the certificate from the computing process including the signed token and policy ID data, determining that the computing…

BIAS PREDICTION AND CATEGORIZATION IN FINANCIAL TOOLS

Granted: December 3, 2020
Application Number: 20200380597
A processor may obtain financial data for a user. The processor may process the financial data to generate feature data indicative of at least one feature. The processor may compare the at least one feature to at least one threshold value to determine that the user has a cognitive bias affecting a financial preference of the user and associated with the at least one threshold value. The at least one threshold value may denote a threshold for membership in a cluster of unlabeled users…

METHOD AND SYSTEM FOR INCREASING USE OF MOBILE DEVICES TO PROVIDE ANSWER CONTENT IN A QUESTION AND ANSWER BASED CUSTOMER SUPPORT SYSTEM

Granted: November 12, 2020
Application Number: 20200357009
Reduction in latency between question submissions and response submissions in a question and answer based customer support system is reduced by facilitating the use of mobile devices by customer support personnel to submit question responses. The answerability of a question from a mobile device is predicted by analyzing the attributes of the question itself before the answer is generated. Questions being entered into the question and answer based customer support system that are…

REPLACING A POTENTIALLY THREATENING VIRTUAL ASSET

Granted: November 12, 2020
Application Number: 20200358811
Big data analysis methods and machine learning based models are used to provide offer recommendations to consumers that are probabilistically determined to be relevant to a given consumer. Machine learning based matching of user attributes and offer attributes is first performed to identify potentially relevant offers for a given consumer. A de-duplication process is then used to identify and eliminate any offers represented in the offer data that the consumer has already seen, has…