Patents by Inventor Hongrui Gong

Hongrui Gong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11087245
    Abstract: A device may receive data that includes invoice data related to historical invoices from an organization, contact data related to historical contacts between the organization and various entities, and dispute data related to historical disputes between the organization and the various entities. The device may determine a profile for the data. The device may determine a set of supervised learning models for the historical invoices based on one or more of the historical contacts, the historical disputes, the historical invoices, or historical patterns related to the historical invoices. The device may determine, using the profile, a set of unsupervised learning models for the historical invoices independent of the one or more of the historical contacts, the historical disputes, or the historical patterns. The device may determine, utilizing a super model, a prediction for the invoice after the super model is trained. The device may perform one or more actions.
    Type: Grant
    Filed: January 11, 2019
    Date of Patent: August 10, 2021
    Assignee: Accenture Global Solutions Limited
    Inventors: Revathi Subramanian, Hongrui Gong, Ibrahim Ali Odeh Al-Shyoukh
  • Publication number: 20200273570
    Abstract: A device may receive, from multiple systems, data related to an individual. The device may anonymize, after receiving the data and using an anonymization technique, information included in the data that identifies the individual. The device may apply a formatting to the data after anonymizing the information that identifies the individual. The device may identify, after applying the formatting to the data, historical data related to the individual, to a provider associated with a claim for care, or to historical claims, and population data associated with demographics of the individual. The device may process, in association with identifying the historical data and the population data, the data using a machine learning model. The machine learning model may be associated with generating a prediction related to the individual or the care provided to the individual. The device may perform one or more actions based on the prediction.
    Type: Application
    Filed: February 22, 2019
    Publication date: August 27, 2020
    Inventors: Revathi SUBRAMANIAN, Hongrui GONG, Lingjun A. HE, Stewart DE SOTO, Aaron Goodman LEVINE
  • Publication number: 20200226503
    Abstract: A device may receive data that includes invoice data related to historical invoices from an organization, contact data related to historical contacts between the organization and various entities, and dispute data related to historical disputes between the organization and the various entities. The device may determine a profile for the data. The device may determine a set of supervised learning models for the historical invoices based on one or more of the historical contacts, the historical disputes, the historical invoices, or historical patterns related to the historical invoices. The device may determine, using the profile, a set of unsupervised learning models for the historical invoices independent of the one or more of the historical contacts, the historical disputes, or the historical patterns. The device may determine, utilizing a super model, a prediction for the invoice after the super model is trained. The device may perform one or more actions.
    Type: Application
    Filed: January 11, 2019
    Publication date: July 16, 2020
    Inventors: Revathi SUBRAMANIAN, Hongrui Gong, Ibrahim Ali Odeh Al-Shyoukh
  • Patent number: 10419427
    Abstract: In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.
    Type: Grant
    Filed: September 20, 2018
    Date of Patent: September 17, 2019
    Assignee: CA, Inc.
    Inventors: Steven L. Greenspan, Debra Danielson, Kenneth W. S. Morrison, Hongrui Gong
  • Publication number: 20190036904
    Abstract: In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.
    Type: Application
    Filed: September 20, 2018
    Publication date: January 31, 2019
    Inventors: Steven L. Greenspan, Debra Danielson, Kenneth W. S. Morrison, Hongrui Gong
  • Patent number: 10122706
    Abstract: In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.
    Type: Grant
    Filed: October 27, 2016
    Date of Patent: November 6, 2018
    Assignee: CA, Inc.
    Inventors: Steven L. Greenspan, Debra Danielson, Kenneth W. S. Morrison, Hongrui Gong
  • Publication number: 20180124033
    Abstract: In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.
    Type: Application
    Filed: October 27, 2016
    Publication date: May 3, 2018
    Inventors: Steven L. Greenspan, Debra Danielson, Kenneth W. S. Morrison, Hongrui Gong
  • Patent number: 9576290
    Abstract: A method of operating a computer system is disclosed. An eCommerce authentication request is received from a merchant node. The eCommerce authentication request has content including cardholder information. A risk score for the eCommerce authentication request is generated based on comparison of the cardholder information of the eCommerce authentication request to cardholder information of eCommerce authentication requests of a plurality of merchant nodes. The eCommerce authentication request is selectively provided to an authentication node based on the risk score.
    Type: Grant
    Filed: March 21, 2014
    Date of Patent: February 21, 2017
    Assignee: CA, Inc.
    Inventors: Revathi Subramanian, Paul C Dulany, Hongrui Gong, Kannan Shashank Shah
  • Patent number: 9563894
    Abstract: A method of operating a computer system is disclosed. An eCommerce authentication request is received from a merchant node. The eCommerce authentication request has content including merchant information. A risk score for the eCommerce authentication request is generated based on comparison of the merchant information of the eCommerce authentication request to merchant information of eCommerce authentication requests of a plurality of merchant nodes. The eCommerce authentication request is selectively provided to an authentication node based on the risk score.
    Type: Grant
    Filed: March 21, 2014
    Date of Patent: February 7, 2017
    Assignee: CA, Inc.
    Inventors: Revathi Subramanian, Paul C. Dulany, Hongrui Gong, Kannan Shashank Shah
  • Patent number: 9552582
    Abstract: A method of operating a computer system is disclosed. An eCommerce authentication request is received. Content of the eCommerce authentication request is processed through a non-linear analytical model to generate a risk score. The eCommerce authentication request is selectively provided to an authentication node based on the risk score. Related authentication gateway nodes and computer program products are disclosed.
    Type: Grant
    Filed: March 21, 2014
    Date of Patent: January 24, 2017
    Assignee: CA, Inc.
    Inventors: Revathi Subramanian, Paul C Dulany, Hongrui Gong, Kannan Shashank Shah
  • Publication number: 20160203485
    Abstract: A method of operating a computer system includes receiving from a merchant node an eCommerce authentication request for a pending eCommerce transaction associated with a user terminal. The eCommerce authentication request contains transaction information of the pending eCommerce transaction that includes a user terminal identifier. A risk score for the pending eCommerce transaction is generated based on similarities between the transaction information of the pending eCommerce transaction and a cluster of historical eCommerce transactions each containing transaction information including a user terminal identifier that matches the user terminal identifier of the pending eCommerce transaction. The eCommerce authentication request is selectively provided to an authentication node based on the risk score.
    Type: Application
    Filed: January 8, 2015
    Publication date: July 14, 2016
    Applicant: CA, INC.
    Inventors: Revathi Subramanian, Paul C. Dulany, Hongrui Gong, Kannan Shashank Shah
  • Publication number: 20150269579
    Abstract: A method of operating a computer system is disclosed. An eCommerce authentication request is received from a merchant node. The eCommerce authentication request has content including cardholder information. A risk score for the eCommerce authentication request is generated based on comparison of the cardholder information of the eCommerce authentication request to cardholder information of eCommerce authentication requests of a plurality of merchant nodes. The eCommerce authentication request is selectively provided to an authentication node based on the risk score.
    Type: Application
    Filed: March 21, 2014
    Publication date: September 24, 2015
    Applicant: CA, INC.
    Inventors: Revathi Subramanian, Paul C. Dulany, Hongrui Gong, Kannan Shashank Shah
  • Publication number: 20150269580
    Abstract: A method of operating a computer system is disclosed. An eCommerce authentication request is received from a merchant node. The eCommerce authentication request has content including merchant information. A risk score for the eCommerce authentication request is generated based on comparison of the merchant information of the eCommerce authentication request to merchant information of eCommerce authentication requests of a plurality of merchant nodes. The eCommerce authentication request is selectively provided to an authentication node based on the risk score.
    Type: Application
    Filed: March 21, 2014
    Publication date: September 24, 2015
    Applicant: CA, INC.
    Inventors: Revathi Subramanian, Paul C. Dulany, Hongrui Gong, Kannan Shashank Shah
  • Publication number: 20150269578
    Abstract: A method of operating a computer system is disclosed. An eCommerce authentication request is received. Content of the eCommerce authentication request is processed through a non-linear analytical model to generate a risk score. The eCommerce authentication request is selectively provided to an authentication node based on the risk score. Related authentication gateway nodes and computer program products are disclosed.
    Type: Application
    Filed: March 21, 2014
    Publication date: September 24, 2015
    Applicant: CA, INC.
    Inventors: Revathi Subramanian, Paul C. Dulany, Hongrui Gong, Kannan Shashank Shah
  • Patent number: 8346691
    Abstract: Computer-implemented systems and methods for determining a subset of unknown targets to investigate. For example, a method can be configured to receive a target data set, wherein the target data set includes known targets and unknown targets. A supervised model such as a neural network model is generated using the known targets. The unknown targets are used with the neural network model to generate values for the unknown targets. Analysis with an unsupervised model is performed using the target data set in order to determine which of the unknown targets are outliers. A comparison of list of outlier unknown targets is performed with the values for the unknown targets that were generated by the neural network model. The subset of unknown targets to investigate is determined based upon the comparison.
    Type: Grant
    Filed: September 6, 2007
    Date of Patent: January 1, 2013
    Assignee: SAS Institute Inc.
    Inventors: Revathi Subramanian, Vijay S. Desai, Hongrui Gong