-
1.
公开(公告)号:US20210065191A1
公开(公告)日:2021-03-04
申请号:US16557962
申请日:2019-08-30
Applicant: Intuit Inc.
Inventor: Natalie De Shetler , Henry Venturelli , Taylor Cressy , Nikolas Terani
Abstract: In general, in one aspect, one or more embodiments relate to a method including receiving, in a business rules engine, input data from disparate data sources. The input data describes a merchant and an application by the merchant to use an electronic payments system for processing transactions between the merchant and customers. Featurization is performed on the input data to form a machine readable vector. By applying the machine readable vector as input to a machine learning model in a machine learning layer, a risk score is predicted. The machine learning model is trained using training data describing use of the electronic payments system by other merchants. The risk score is an estimated probability of the merchant being unable to satisfy an obligation of using the electronic payments system. A business rules engine, based on the risk score, limits use of the electronic payments system by the merchant.
-
公开(公告)号:US20230035639A1
公开(公告)日:2023-02-02
申请号:US17389532
申请日:2021-07-30
Applicant: Intuit Inc.
Inventor: Runhua Zhao , Vinay Patlolla , Nikolas Terani , Taylor J. Cressy , Henry Venturelli
IPC: G06Q20/40 , G06F16/338 , G06F16/33 , G06F16/35
Abstract: A method may include generating a vector from unstructured data included in an untransformed transaction, and determining, for the vector, a cluster ID of cluster IDs by matching the vector with a matching cluster vector of cluster vectors. The method may further include generating a query using the cluster ID and the untransformed transaction, and transforming, using the cluster IDs, untransformed transactions to transformed transactions. The transformed transactions may each include a cluster ID. The method may further include generating, using the query, a query result from features of the transformed transactions, generating a fraud score using the query result, and presenting the fraud score and the cluster ID.
-
公开(公告)号:US11379842B2
公开(公告)日:2022-07-05
申请号:US16841967
申请日:2020-04-07
Applicant: INTUIT INC.
Inventor: Henry Venturelli , Runhua Zhao , Damayanti Sengupta , Nicholas John Stang , Zeyu Li
Abstract: Certain aspects of the present disclosure provide techniques for detecting fraudulent transactions in a transaction processing system. An example method generally includes receiving a request to process a transaction. An input data set including a vector representing the transaction and a plurality of vectors representing historical transactions is generated. The input data set is divided into a plurality of ragged tensors corresponding to non-overlapping time segments of variable length and having a plurality of vectors associated with dates within each time segment A reduced input data set is generated by generating, for each respective ragged tensor of the plurality of ragged tensors, a respective representative vector using max pooling over vectors in the ragged tensor. A fraudulent transaction score is generated based on the reduced input data set using a fraud detection model. The transaction is processed based, at least in part, on the fraudulent transaction score.
-
公开(公告)号:US12229780B2
公开(公告)日:2025-02-18
申请号:US17389532
申请日:2021-07-30
Applicant: Intuit Inc.
Inventor: Runhua Zhao , Vinay Patlolla , Nikolas Terani , Taylor J. Cressy , Henry Venturelli
IPC: G06Q40/00 , G06F16/338 , G06Q20/40 , G06N20/00
Abstract: A method may include generating a vector from unstructured data included in an untransformed transaction, and determining, for the vector, a cluster ID of cluster IDs by matching the vector with a matching cluster vector of cluster vectors. The method may further include generating a query using the cluster ID and the untransformed transaction, and transforming, using the cluster IDs, untransformed transactions to transformed transactions. The transformed transactions may each include a cluster ID. The method may further include generating, using the query, a query result from features of the transformed transactions, generating a fraud score using the query result, and presenting the fraud score and the cluster ID.
-
5.
公开(公告)号:US11645656B2
公开(公告)日:2023-05-09
申请号:US16557962
申请日:2019-08-30
Applicant: Intuit Inc.
Inventor: Natalie De Shetler , Henry Venturelli , Taylor Cressy , Nikolas Terani
CPC classification number: G06Q20/4016 , G06F17/18 , G06N20/00
Abstract: In general, in one aspect, one or more embodiments relate to a method including receiving, in a business rules engine, input data from disparate data sources. The input data describes a merchant and an application by the merchant to use an electronic payments system for processing transactions between the merchant and customers. Featurization is performed on the input data to form a machine readable vector. By applying the machine readable vector as input to a machine learning model in a machine learning layer, a risk score is predicted. The machine learning model is trained using training data describing use of the electronic payments system by other merchants. The risk score is an estimated probability of the merchant being unable to satisfy an obligation of using the electronic payments system. A business rules engine, based on the risk score, limits use of the electronic payments system by the merchant.
-
公开(公告)号:US11288673B1
公开(公告)日:2022-03-29
申请号:US16525208
申请日:2019-07-29
Applicant: Intuit Inc.
Inventor: Henry Venturelli , Natalie De Shetler
Abstract: A method is disclosed. The method includes obtaining an access request associated with a user for a software application; obtaining a plurality of verification attributes associated with the user; generating a fraud score for the access request by feeding a supervised machine learning (ML) classifier with a feature vector for the user that is based on the plurality of verification attributes; selecting a first unsupervised ML anomaly detector of a plurality of unsupervised ML anomaly detectors based on the fraud score; generating an anomaly score for the access request by feeding the first unsupervised ML anomaly detector with an augmented feature vector for the user that is based on the plurality of verification attributes and the fraud score; and processing the access request based on the anomaly score.
-
-
-
-
-