-
公开(公告)号:US20220237604A1
公开(公告)日:2022-07-28
申请号:US17717811
申请日:2022-04-11
申请人: SAP SE
发明人: Jesper Lind , Suchitra Sundararaman
IPC分类号: G06Q20/40 , G06N20/00 , G06Q40/00 , G06K9/62 , G06N3/02 , G06F40/284 , G06Q20/04 , G06Q20/38 , G06T7/73 , G06N3/08 , G06T7/00 , G06V30/224 , G06V30/413 , G06V30/414 , G06V30/418
摘要: The present disclosure involves systems, software, and computer implemented methods for transaction auditing. One example method includes determining valid pixel-based pattern(s) that are included in valid reference images. Fraudulent pixel-based pattern(s) that are included in fraudulent reference images are determined. A request to classify an image is received. A determination is made as to whether pixel values in the image match a valid pixel-based pattern or a fraudulent pixel-based pattern. In response to determining that the pixel values match a valid pixel-based pattern, a likelihood of classifying the first image as a valid image is increased. In response to determining that the pixel values match a fraudulent pixel-based pattern, a likelihood that the image as a fraudulent image is increased. The image is classified in response to the request as either a valid image or a fraudulent image based on the likelihoods.
-
公开(公告)号:US20220237606A1
公开(公告)日:2022-07-28
申请号:US17717880
申请日:2022-04-11
申请人: SAP SE
发明人: Jesper Lind , Suchitra Sundararaman
IPC分类号: G06Q20/40 , G06V30/413 , G06V30/414 , G06V30/418 , G06F40/284 , G06K9/62 , G06N3/02 , G06N3/08 , G06N20/00 , G06Q20/04 , G06Q20/38 , G06Q40/00 , G06T7/00 , G06T7/73 , G06V30/224
摘要: The present disclosure involves systems, software, and computer implemented methods for transaction auditing. One example method includes determining valid pixel-based pattern(s) that are included in valid reference images. Fraudulent pixel-based pattern(s) that are included in fraudulent reference images are determined. A request to classify an image is received. A determination is made as to whether pixel values in the image match a valid pixel-based pattern or a fraudulent pixel-based pattern. In response to determining that the pixel values match a valid pixel-based pattern, a likelihood of classifying the first image as a valid image is increased. In response to determining that the pixel values match a fraudulent pixel-based pattern, a likelihood that the image as a fraudulent image is increased. The image is classified in response to the request as either a valid image or a fraudulent image based on the likelihoods.
-
公开(公告)号:US20210398118A1
公开(公告)日:2021-12-23
申请号:US17464217
申请日:2021-09-01
申请人: SAP SE
IPC分类号: G06Q20/40 , G06N20/00 , G06Q40/00 , G06K9/18 , G06K9/00 , G06K9/62 , G06N3/02 , G06F40/284 , G06Q20/04 , G06Q20/38 , G06T7/73 , G06N3/08 , G06T7/00
摘要: The present disclosure involves systems, software, and computer implemented methods for transaction auditing. One example method includes receiving receipt data associated with an entity. Policy questions associated with the entity are associated with at least one policy question answer that corresponds to a conformance or a violation of a policy selected by the entity. For each policy question, a machine learning policy model is identified for the policy question that includes, for each policy question answer, receipt data features that correspond to the policy question answer. The machine learning policy model is used to automatically determine a selected policy question answer to the policy question by comparing features of extracted tokens to respective receipt data features of the policy question answers that are included in the machine learning policy model. In response to determining that the selected policy question answer corresponds to a policy violation, an audit alert is generated.
-
公开(公告)号:US12039615B2
公开(公告)日:2024-07-16
申请号:US18149769
申请日:2023-01-04
申请人: SAP SE
发明人: Suchitra Sundararaman , Jesper Lind , Juliy Broyda , Lev Sigal , Anton Ioffe , Yuri Arshavski
IPC分类号: G06F18/24 , G06F40/284 , G06N3/02 , G06N3/08 , G06N20/00 , G06Q20/04 , G06Q20/38 , G06Q20/40 , G06Q40/12 , G06T7/00 , G06T7/73 , G06V30/224 , G06V30/40 , G06V30/413 , G06V30/414 , G06V30/418 , G06F16/2455
CPC分类号: G06Q40/12 , G06F18/24 , G06F40/284 , G06N3/02 , G06N3/08 , G06N20/00 , G06Q20/045 , G06Q20/389 , G06Q20/40 , G06Q20/4016 , G06T7/0002 , G06T7/74 , G06V30/224 , G06V30/40 , G06V30/413 , G06V30/414 , G06V30/418 , G06F16/24564 , G06T2207/20061 , G06T2207/30176
摘要: The present disclosure involves systems, software, and computer implemented methods for transaction auditing. One example method includes training at least one machine learning model to determine features that can be used to determine whether an image is an authentic image of a document or an automatically generated document image, using a training set of authentic images and a training set of automatically generated document images. A request to classify an image as either an authentic image of a document or an automatically generated document image is received. The machine learning model(s) are used to classify the image as either an authentic image of a document or an automatically generated document image, based on features included in the image that are identified by the machine learning model(s). A classification of the image is provided. The machine learning model(s) are updated based on the image and the classification of the image.
-
公开(公告)号:US20220237605A1
公开(公告)日:2022-07-28
申请号:US17717840
申请日:2022-04-11
申请人: SAP SE
发明人: Jesper Lind , Suchitra Sundararaman
IPC分类号: G06Q20/40 , G06V30/413 , G06V30/414 , G06V30/418 , G06F40/284 , G06K9/62 , G06N3/02 , G06N3/08 , G06N20/00 , G06Q20/04 , G06Q20/38 , G06Q40/00 , G06T7/00 , G06T7/73 , G06V30/224
摘要: The present disclosure involves systems, software, and computer implemented methods for transaction auditing. One example method includes determining valid pixel-based pattern(s) that are included in valid reference images. Fraudulent pixel-based pattern(s) that are included in fraudulent reference images are determined. A request to classify an image is received. A determination is made as to whether pixel values in the image match a valid pixel-based pattern or a fraudulent pixel-based pattern. In response to determining that the pixel values match a valid pixel-based pattern, a likelihood of classifying the first image as a valid image is increased. In response to determining that the pixel values match a fraudulent pixel-based pattern, a likelihood that the image as a fraudulent image is increased. The image is classified in response to the request as either a valid image or a fraudulent image based on the likelihoods.
-
公开(公告)号:US11113689B2
公开(公告)日:2021-09-07
申请号:US16577997
申请日:2019-09-20
申请人: SAP SE
IPC分类号: G06Q20/40 , G06N20/00 , G06Q40/00 , G06K9/18 , G06K9/00 , G06K9/62 , G06N3/02 , G06F40/284 , G06Q20/04 , G06Q20/38 , G06T7/73 , G06N3/08 , G06T7/00 , G06F16/2455
摘要: The present disclosure involves systems, software, and computer implemented methods for transaction auditing. One example method includes receiving receipt data associated with an entity. Policy questions associated with the entity are associated with at least one policy question answer that corresponds to a conformance or a violation of a policy selected by the entity. For each policy question, a machine learning policy model is identified for the policy question that includes, for each policy question answer, receipt data features that correspond to the policy question answer. The machine learning policy model is used to automatically determine a selected policy question answer to the policy question by comparing features of extracted tokens to respective receipt data features of the policy question answers that are included in the machine learning policy model. In response to determining that the selected policy question answer corresponds to a policy violation, an audit alert is generated.
-
公开(公告)号:US11568400B2
公开(公告)日:2023-01-31
申请号:US16711642
申请日:2019-12-12
申请人: SAP SE
发明人: Suchitra Sundararaman , Jesper Lind , Juliy Broyda , Lev Sigal , Anton Ioffe , Yuri Arshavski
IPC分类号: G06K9/62 , G06Q20/40 , G06N20/00 , G06Q40/00 , G06N3/02 , G06F40/284 , G06Q20/04 , G06Q20/38 , G06T7/73 , G06T7/00 , G06V30/224 , G06V30/413 , G06V30/414 , G06V30/418 , G06N3/08 , G06F16/2455
摘要: The present disclosure involves systems, software, and computer implemented methods for transaction auditing. One example method includes training at least one machine learning model to determine features that can be used to determine whether an image is an authentic image of a document or an automatically generated document image, using a training set of authentic images and a training set of automatically generated document images. A request to classify an image as either an authentic image of a document or an automatically generated document image is received. The machine learning model(s) are used to classify the image as either an authentic image of a document or an automatically generated document image, based on features included in the image that are identified by the machine learning model(s). A classification of the image is provided. The machine learning model(s) are updated based on the image and the classification of the image.
-
公开(公告)号:US11308492B2
公开(公告)日:2022-04-19
申请号:US16711679
申请日:2019-12-12
申请人: SAP SE
发明人: Jesper Lind , Suchitra Sundararaman
IPC分类号: G06Q40/00 , G06Q20/40 , G06N20/00 , G06K9/18 , G06K9/00 , G06K9/62 , G06N3/02 , G06F40/284 , G06Q20/04 , G06Q20/38 , G06T7/73 , G06N3/08 , G06T7/00 , G06F16/2455
摘要: The present disclosure involves systems, software, and computer implemented methods for transaction auditing. One example method includes determining valid pixel-based pattern(s) that are included in valid reference images. Fraudulent pixel-based pattern(s) that are included in fraudulent reference images are determined. A request to classify an image is received. A determination is made as to whether pixel values in the image match a valid pixel-based pattern or a fraudulent pixel-based pattern. In response to determining that the pixel values match a valid pixel-based pattern, a likelihood of classifying the first image as a valid image is increased. In response to determining that the pixel values match a fraudulent pixel-based pattern, a likelihood that the image as a fraudulent image is increased. The image is classified in response to the request as either a valid image or a fraudulent image based on the likelihoods.
-
公开(公告)号:US20210004798A1
公开(公告)日:2021-01-07
申请号:US16577997
申请日:2019-09-20
申请人: SAP SE
摘要: The present disclosure involves systems, software, and computer implemented methods for transaction auditing. One example method includes receiving receipt data associated with an entity. Policy questions associated with the entity are associated with at least one policy question answer that corresponds to a conformance or a violation of a policy selected by the entity. For each policy question, a machine learning policy model is identified for the policy question that includes, for each policy question answer, receipt data features that correspond to the policy question answer. The machine learning policy model is used to automatically determine a selected policy question answer to the policy question by comparing features of extracted tokens to respective receipt data features of the policy question answers that are included in the machine learning policy model. In response to determining that the selected policy question answer corresponds to a policy violation, an audit alert is generated.
-
公开(公告)号:US12073397B2
公开(公告)日:2024-08-27
申请号:US17717811
申请日:2022-04-11
申请人: SAP SE
发明人: Jesper Lind , Suchitra Sundararaman
IPC分类号: G06Q40/00 , G06F18/24 , G06F40/284 , G06N3/02 , G06N3/08 , G06N20/00 , G06Q20/04 , G06Q20/38 , G06Q20/40 , G06Q40/12 , G06T7/00 , G06T7/73 , G06V30/224 , G06V30/413 , G06V30/414 , G06V30/418 , G06F16/2455
CPC分类号: G06Q20/40 , G06F18/24 , G06F40/284 , G06N3/02 , G06N3/08 , G06N20/00 , G06Q20/045 , G06Q20/389 , G06Q20/4016 , G06Q40/12 , G06T7/0002 , G06T7/74 , G06V30/224 , G06V30/413 , G06V30/414 , G06V30/418 , G06F16/24564 , G06T2207/20061 , G06T2207/30176
摘要: The present disclosure involves systems, software, and computer implemented methods for transaction auditing. One example method includes determining valid pixel-based pattern(s) that are included in valid reference images. Fraudulent pixel-based pattern(s) that are included in fraudulent reference images are determined. A request to classify an image is received. A determination is made as to whether pixel values in the image match a valid pixel-based pattern or a fraudulent pixel-based pattern. In response to determining that the pixel values match a valid pixel-based pattern, a likelihood of classifying the first image as a valid image is increased. In response to determining that the pixel values match a fraudulent pixel-based pattern, a likelihood that the image as a fraudulent image is increased. The image is classified in response to the request as either a valid image or a fraudulent image based on the likelihoods.
-
-
-
-
-
-
-
-
-