Patents by Inventor Efraim Feinstein
Efraim Feinstein has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11829866Abstract: A method and system distinguish between anomalous members of a majority group and members of a target group. The system and method utilize a neural network architecture that attends to each level of a classification hierarchy. The system and method chain a semi-supervised autoencoder with a supervised classifier neural network. The autoencoder is trained in a semi-supervised manner with a machine learning process to identify user profile data that are typical of a majority class. The classifier neural network is trained in a supervised manner with a machine learning process to distinguish between user profile data that are anomalous members of the majority class and user profile data that are members of the target class.Type: GrantFiled: December 27, 2017Date of Patent: November 28, 2023Assignee: Intuit Inc.Inventors: Efraim Feinstein, Riley F. Edmunds
-
Patent number: 11190562Abstract: A method includes establishing a network connection with a source computing device and an application services computing device, receiving, via the network connection, a source event stream at the application services computing device, and extracting a sample of the source event stream. The method further includes partitioning the sample of the source event stream into fields, identifying a field data type of a field of the multiple fields in the sample, identifying a distribution of values of the field in the sample, and extrapolating, from the sample of the source event stream, extrapolated functions for the fields. Extrapolating an extrapolated function is dependent on the field data type and the distribution of the field. The method further includes transforming, based on the plurality of extrapolated functions in the configuration file, the source event stream to obtain a transformed event stream, and analyzing, by a target machine learning model, the transformed event stream.Type: GrantFiled: June 9, 2020Date of Patent: November 30, 2021Assignee: Intuit Inc.Inventor: Efraim Feinstein
-
Publication number: 20200304550Abstract: A method includes establishing a network connection with a source computing device and an application services computing device, receiving, via the network connection, a source event stream at the application services computing device, and extracting a sample of the source event stream. The method further includes partitioning the sample of the source event stream into fields, identifying a field data type of a field of the multiple fields in the sample, identifying a distribution of values of the field in the sample, and extrapolating, from the sample of the source event stream, extrapolated functions for the fields. Extrapolating an extrapolated function is dependent on the field data type and the distribution of the field. The method further includes transforming, based on the plurality of extrapolated functions in the configuration file, the source event stream to obtain a transformed event stream, and analyzing, by a target machine learning model, the transformed event stream.Type: ApplicationFiled: June 9, 2020Publication date: September 24, 2020Applicant: Intuit Inc.Inventor: Efraim Feinstein
-
Patent number: 10715570Abstract: A method includes establishing a network connection with a source computing device and an application services computing device, receiving, via the network connection, a source event stream at the application services computing device, and extracting a sample of the source event stream. The method further includes partitioning the sample of the source event stream into fields, identifying a field data type of a field of the multiple fields in the sample, identifying a distribution of values of the field in the sample, and extrapolating, from the sample of the source event stream, extrapolated functions for the fields. Extrapolating an extrapolated function is dependent on the field data type and the distribution of the field. The method further includes transforming, based on the plurality of extrapolated functions in the configuration file, the source event stream to obtain a transformed event stream, and analyzing, by a target machine learning model, the transformed event stream.Type: GrantFiled: June 25, 2018Date of Patent: July 14, 2020Assignee: Intuit Inc.Inventor: Efraim Feinstein
-
Publication number: 20180239870Abstract: Methods and systems of the present disclosure include identifying and addressing potential healthcare-based fraud, according to one embodiment. The methods and systems identify potential healthcare-based fraud associated with potentially suspicious healthcare providers, patients, and/or claim submissions, in one embodiment. According to one embodiment, the methods and systems acquire data associated with a healthcare provider, patient, and/or claim submission; apply the data to one or more predictive models to generate one or more risk scores to identify potential healthcare-based fraud, and perform one or more risk reduction actions based on the one or more risk scores, according to one embodiment.Type: ApplicationFiled: July 27, 2016Publication date: August 23, 2018Applicant: Intuit Inc.Inventors: Jonathan R. Goldman, Monica Tremont Hsu, Efraim Feinstein
-
Publication number: 20180033006Abstract: Methods and systems of the present disclosure include identifying and addressing potential fictitious business entity-based fraud, according to one embodiment. The methods and systems identify fictitious business entities associated with fraudulent tax return filings, in one embodiment. According to one embodiment, the methods and systems acquire data associated with an employer identification number (EIN), apply the data to one or more predictive models to generate one or more risk scores to identify potentially suspicious EIN data, and perform one or more risk reduction actions based on the one or more risk scores, according to one embodiment.Type: ApplicationFiled: July 27, 2016Publication date: February 1, 2018Applicant: Intuit Inc.Inventors: Jonathan R. Goldman, Monica Tremont Hsu, Efraim Feinstein
-
Publication number: 20180033089Abstract: Account takeover is one of a number of types of Internet-centric crime (i.e., cybercrime) that includes the unauthorized access/use of a user's account with the user's identity or credentials (e.g., username and/or password). Because fraudsters acquire user credentials through phishing, spyware, or malware scams, it can be difficult to detect unauthorized access of a user's account. Methods and systems of the present disclosure identify and address potential account takeover activity, according to one embodiment. The methods and systems acquire system access data, apply the system access data to one or more predictive models to generate one or more risk scores, and perform one or more risk reduction actions based on the one or more risk scores, according to one embodiment. The financial system is a tax return preparation system according to one embodiment.Type: ApplicationFiled: July 27, 2016Publication date: February 1, 2018Applicant: Intuit Inc.Inventors: Jonathan R. Goldman, Monica Tremont Hsu, Efraim Feinstein, Thomas M. Pigoski, II
-
Publication number: 20180033009Abstract: Account takeover and stolen identity refund fraud are types of Internet-centric crime (i.e., cybercrime) that include the unauthorized access or use of a user account or identity information to file a tax return in order to obtain a tax refund and/or tax credit from, for example, a state or federal revenue service. Because fraudsters access legitimate user accounts or use legitimate identity information to create user accounts, it can be difficult to detect fraudulent activity in user accounts. Methods and systems of the present disclosure facilitate the identification and prevention of potential fraudulent activity in a financial system, according to one embodiment. The methods and systems automate fraud claim receipt, predictive model training, risk score threshold improvement/optimization, and/or investigation of potentially affected user accounts, according to one embodiment.Type: ApplicationFiled: July 27, 2016Publication date: February 1, 2018Applicant: Intuit Inc.Inventors: Jonathan R. Goldman, Monica Tremont Hsu, Efraim Feinstein
-
Patent number: 9881037Abstract: A system for determining a canonical title includes an interface and a processor. The interface is to receive a new title. The processor is to generate a set of n-grams based on the new title; look up n-grams in canonical database to assign one or more labels; and map the new title to a canonical title based on the one or more labels.Type: GrantFiled: April 14, 2016Date of Patent: January 30, 2018Assignee: Workday, Inc.Inventors: Vladimir Giverts, Jonathan Goldman, Adeyemi Ajao, Barzel Segal, Phil Monroe, Kristy Gateley, Jan Prach, Tarek Rabbani, Efraim Feinstein, Anuranjita Tewary, Lucian Lita
-
Publication number: 20160224596Abstract: A system for determining a canonical title includes an interface and a processor. The interface is to receive a new title. The processor is to generate a set of n-grams based on the new title; look up n-grams in canonical database to assign one or more labels; and map the new title to a canonical title based on the one or more labels.Type: ApplicationFiled: April 14, 2016Publication date: August 4, 2016Inventors: Vladimir Giverts, Jonathan Goldman, Adeyemi Ajao, Barzel Segal, Phil Monroe, Kristy Gateley, Jan Prach, Tarek Rabbani, Efraim Feinstein, Anuranjita Tewary, Lucian Lita
-
Patent number: 9342592Abstract: A method for normalizing raw titles to canonical titles is described. The method includes designating a set of canonical titles, generating a set of n-grams for each canonical title, assigning a set of attributes to each n-gram, assigning a set of labels to each of the attributes, and storing the labeled canonical title and labeled n-grams in a database. In some examples, a new title may be mapped to an existing canonical title in the database by generating a set of n-grams for the new title, looking up the n-grams in the database of canonical titles, retrieving the set of labels assigned to n-grams in the database that match n-grams from the new title, and assigning those labels to the corresponding attributes of the new title. The new title may then be mapped to a canonical title on the basis of similarly labeled attributes.Type: GrantFiled: July 29, 2013Date of Patent: May 17, 2016Assignee: Workday, Inc.Inventors: Vladimir Giverts, Jonathan Goldman, Adeyemi Ajao, Barzel Segal, Phil Monroe, Kristy Gateley, Jan Prach, Tarek Rabbani, Efraim Feinstein, Anuranjita Tewary, Lucian Lita
-
Patent number: 8689981Abstract: Systems and methods for the manipulation of particles within channels such as microfluidic channels are provided. In one set of embodiments, magnets are positioned around a channel. As a fluid containing magnetic and non-magnetic particles flows through the channel, the magnetic field created by the magnets can be used to transport the magnetic and/or non-magnetic particles to desired locations within the channel, which may useful in some cases for causing some separation of the particles. For example, the magnetic field may be used to transport magnetic or non-magnetic particles from a core fluid to a surrounding sheath fluid. In some cases, the magnetic field is used to transport non-magnetic particles to a small volume within the channel (e.g., a single-file row within the channel).Type: GrantFiled: April 8, 2010Date of Patent: April 8, 2014Assignee: President and Fellows of Harvard CollegeInventors: Howard A. Stone, Mara G. Prentiss, Pierre Striehl, Efraim Feinstein
-
Publication number: 20130065783Abstract: Provided herein are systems and related methods comprising (i) short stretches (e.g., 9 to 24 bases) of single-stranded nucleic acid (e.g., DNA) capture probes coated with RecA and, in some instances, bound to a solid substrate, and (ii) double-stranded nucleic acid (e.g., DNA or RNA) target(s).Type: ApplicationFiled: September 10, 2012Publication date: March 14, 2013Applicant: President and Fellows of Harvard CollegeInventors: Mara G. Prentiss, Efraim Feinstein, Claudia Danilowicz
-
Publication number: 20120080360Abstract: Systems and methods for the manipulation of particles within channels such as microfluidic channels are provided. In one set of embodiments, magnets are positioned around a channel. As a fluid containing magnetic and non-magnetic particles flows through the channel, the magnetic field created by the magnets can be used to transport the magnetic and/or non-magnetic particles to desired locations within the channel, which may useful in some cases for causing some separation of the particles. For example, the magnetic field may be used to transport magnetic or non-magnetic particles from a core fluid to a surrounding sheath fluid. In some cases, the magnetic field is used to transport non-magnetic particles to a small volume within the channel (e.g., a single-file row within the channel).Type: ApplicationFiled: April 8, 2010Publication date: April 5, 2012Applicant: President and Fellows of Harvard CollegeInventors: Howard A. Stone, Mara G. Prentiss, Pierre Striehl, Efraim Feinstein