Patents by Inventor Hongrui Gong
Hongrui Gong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11087245Abstract: A device may receive data that includes invoice data related to historical invoices from an organization, contact data related to historical contacts between the organization and various entities, and dispute data related to historical disputes between the organization and the various entities. The device may determine a profile for the data. The device may determine a set of supervised learning models for the historical invoices based on one or more of the historical contacts, the historical disputes, the historical invoices, or historical patterns related to the historical invoices. The device may determine, using the profile, a set of unsupervised learning models for the historical invoices independent of the one or more of the historical contacts, the historical disputes, or the historical patterns. The device may determine, utilizing a super model, a prediction for the invoice after the super model is trained. The device may perform one or more actions.Type: GrantFiled: January 11, 2019Date of Patent: August 10, 2021Assignee: Accenture Global Solutions LimitedInventors: Revathi Subramanian, Hongrui Gong, Ibrahim Ali Odeh Al-Shyoukh
-
Publication number: 20200273570Abstract: A device may receive, from multiple systems, data related to an individual. The device may anonymize, after receiving the data and using an anonymization technique, information included in the data that identifies the individual. The device may apply a formatting to the data after anonymizing the information that identifies the individual. The device may identify, after applying the formatting to the data, historical data related to the individual, to a provider associated with a claim for care, or to historical claims, and population data associated with demographics of the individual. The device may process, in association with identifying the historical data and the population data, the data using a machine learning model. The machine learning model may be associated with generating a prediction related to the individual or the care provided to the individual. The device may perform one or more actions based on the prediction.Type: ApplicationFiled: February 22, 2019Publication date: August 27, 2020Inventors: Revathi SUBRAMANIAN, Hongrui GONG, Lingjun A. HE, Stewart DE SOTO, Aaron Goodman LEVINE
-
Publication number: 20200226503Abstract: A device may receive data that includes invoice data related to historical invoices from an organization, contact data related to historical contacts between the organization and various entities, and dispute data related to historical disputes between the organization and the various entities. The device may determine a profile for the data. The device may determine a set of supervised learning models for the historical invoices based on one or more of the historical contacts, the historical disputes, the historical invoices, or historical patterns related to the historical invoices. The device may determine, using the profile, a set of unsupervised learning models for the historical invoices independent of the one or more of the historical contacts, the historical disputes, or the historical patterns. The device may determine, utilizing a super model, a prediction for the invoice after the super model is trained. The device may perform one or more actions.Type: ApplicationFiled: January 11, 2019Publication date: July 16, 2020Inventors: Revathi SUBRAMANIAN, Hongrui Gong, Ibrahim Ali Odeh Al-Shyoukh
-
Patent number: 10419427Abstract: In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.Type: GrantFiled: September 20, 2018Date of Patent: September 17, 2019Assignee: CA, Inc.Inventors: Steven L. Greenspan, Debra Danielson, Kenneth W. S. Morrison, Hongrui Gong
-
Publication number: 20190036904Abstract: In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.Type: ApplicationFiled: September 20, 2018Publication date: January 31, 2019Inventors: Steven L. Greenspan, Debra Danielson, Kenneth W. S. Morrison, Hongrui Gong
-
Patent number: 10122706Abstract: In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.Type: GrantFiled: October 27, 2016Date of Patent: November 6, 2018Assignee: CA, Inc.Inventors: Steven L. Greenspan, Debra Danielson, Kenneth W. S. Morrison, Hongrui Gong
-
Publication number: 20180124033Abstract: In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.Type: ApplicationFiled: October 27, 2016Publication date: May 3, 2018Inventors: Steven L. Greenspan, Debra Danielson, Kenneth W. S. Morrison, Hongrui Gong
-
Patent number: 9576290Abstract: A method of operating a computer system is disclosed. An eCommerce authentication request is received from a merchant node. The eCommerce authentication request has content including cardholder information. A risk score for the eCommerce authentication request is generated based on comparison of the cardholder information of the eCommerce authentication request to cardholder information of eCommerce authentication requests of a plurality of merchant nodes. The eCommerce authentication request is selectively provided to an authentication node based on the risk score.Type: GrantFiled: March 21, 2014Date of Patent: February 21, 2017Assignee: CA, Inc.Inventors: Revathi Subramanian, Paul C Dulany, Hongrui Gong, Kannan Shashank Shah
-
Patent number: 9563894Abstract: A method of operating a computer system is disclosed. An eCommerce authentication request is received from a merchant node. The eCommerce authentication request has content including merchant information. A risk score for the eCommerce authentication request is generated based on comparison of the merchant information of the eCommerce authentication request to merchant information of eCommerce authentication requests of a plurality of merchant nodes. The eCommerce authentication request is selectively provided to an authentication node based on the risk score.Type: GrantFiled: March 21, 2014Date of Patent: February 7, 2017Assignee: CA, Inc.Inventors: Revathi Subramanian, Paul C. Dulany, Hongrui Gong, Kannan Shashank Shah
-
Patent number: 9552582Abstract: A method of operating a computer system is disclosed. An eCommerce authentication request is received. Content of the eCommerce authentication request is processed through a non-linear analytical model to generate a risk score. The eCommerce authentication request is selectively provided to an authentication node based on the risk score. Related authentication gateway nodes and computer program products are disclosed.Type: GrantFiled: March 21, 2014Date of Patent: January 24, 2017Assignee: CA, Inc.Inventors: Revathi Subramanian, Paul C Dulany, Hongrui Gong, Kannan Shashank Shah
-
Publication number: 20160203485Abstract: A method of operating a computer system includes receiving from a merchant node an eCommerce authentication request for a pending eCommerce transaction associated with a user terminal. The eCommerce authentication request contains transaction information of the pending eCommerce transaction that includes a user terminal identifier. A risk score for the pending eCommerce transaction is generated based on similarities between the transaction information of the pending eCommerce transaction and a cluster of historical eCommerce transactions each containing transaction information including a user terminal identifier that matches the user terminal identifier of the pending eCommerce transaction. The eCommerce authentication request is selectively provided to an authentication node based on the risk score.Type: ApplicationFiled: January 8, 2015Publication date: July 14, 2016Applicant: CA, INC.Inventors: Revathi Subramanian, Paul C. Dulany, Hongrui Gong, Kannan Shashank Shah
-
Publication number: 20150269579Abstract: A method of operating a computer system is disclosed. An eCommerce authentication request is received from a merchant node. The eCommerce authentication request has content including cardholder information. A risk score for the eCommerce authentication request is generated based on comparison of the cardholder information of the eCommerce authentication request to cardholder information of eCommerce authentication requests of a plurality of merchant nodes. The eCommerce authentication request is selectively provided to an authentication node based on the risk score.Type: ApplicationFiled: March 21, 2014Publication date: September 24, 2015Applicant: CA, INC.Inventors: Revathi Subramanian, Paul C. Dulany, Hongrui Gong, Kannan Shashank Shah
-
Publication number: 20150269580Abstract: A method of operating a computer system is disclosed. An eCommerce authentication request is received from a merchant node. The eCommerce authentication request has content including merchant information. A risk score for the eCommerce authentication request is generated based on comparison of the merchant information of the eCommerce authentication request to merchant information of eCommerce authentication requests of a plurality of merchant nodes. The eCommerce authentication request is selectively provided to an authentication node based on the risk score.Type: ApplicationFiled: March 21, 2014Publication date: September 24, 2015Applicant: CA, INC.Inventors: Revathi Subramanian, Paul C. Dulany, Hongrui Gong, Kannan Shashank Shah
-
Publication number: 20150269578Abstract: A method of operating a computer system is disclosed. An eCommerce authentication request is received. Content of the eCommerce authentication request is processed through a non-linear analytical model to generate a risk score. The eCommerce authentication request is selectively provided to an authentication node based on the risk score. Related authentication gateway nodes and computer program products are disclosed.Type: ApplicationFiled: March 21, 2014Publication date: September 24, 2015Applicant: CA, INC.Inventors: Revathi Subramanian, Paul C. Dulany, Hongrui Gong, Kannan Shashank Shah
-
Patent number: 8346691Abstract: Computer-implemented systems and methods for determining a subset of unknown targets to investigate. For example, a method can be configured to receive a target data set, wherein the target data set includes known targets and unknown targets. A supervised model such as a neural network model is generated using the known targets. The unknown targets are used with the neural network model to generate values for the unknown targets. Analysis with an unsupervised model is performed using the target data set in order to determine which of the unknown targets are outliers. A comparison of list of outlier unknown targets is performed with the values for the unknown targets that were generated by the neural network model. The subset of unknown targets to investigate is determined based upon the comparison.Type: GrantFiled: September 6, 2007Date of Patent: January 1, 2013Assignee: SAS Institute Inc.Inventors: Revathi Subramanian, Vijay S. Desai, Hongrui Gong