Abstract: In an illustrative embodiment, systems and methods for monitoring insurance claims include identifying, based on predetermined monitoring frequency, insurance claims identified for vulnerability detection processing. Vulnerability detection features may be extracted from data files of the claims, which provide an indication of claim handling deficiencies that can cause claim leakage. A trained vulnerability detection data model can be used to detect claim handling vulnerabilities within the extracted vulnerability detection features where each of the vulnerabilities may include a likelihood of the vulnerability resulting in claim leakage. The vulnerability detection data model may be trained with a data set customized to a respective insurance provider for each claim. Vulnerability scores indicating an overall likelihood of claim leakage can be calculated for the claims based on the detected claim handling vulnerabilities.
Type:
Grant
Filed:
May 15, 2023
Date of Patent:
March 11, 2025
Assignee:
Futurity Group, Inc.
Inventors:
John Wang, Michael Cummings, Hari Nathan, Ching Lau
Abstract: In an illustrative embodiment, methods and systems for automatically labeling unstructured data include accessing unstructured data representing data entry and analyzing the unstructured data by applying natural language processing to a text component of the unstructured data to obtain a set of term counts of words and/or phrases identified in the text component. Analyzing may include applying at least one clustering algorithm to the set of term counts to determine a term cluster, identifying a preexisting term cluster most closely matching the term cluster, and applying, to the unstructured data, a predefined label corresponding to the preexisting term cluster. The unstructured data may be analyzed to obtain formatting counts of formatting elements, and a formatting cluster may be determined and applied to match to a preexisting formatting cluster, thus deriving a predefined label corresponding to the preexisting formatting cluster.
Abstract: In an illustrative embodiment, systems and methods for monitoring insurance claims include identifying, based on predetermined monitoring frequency, insurance claims identified for vulnerability detection processing. Vulnerability detection features may be extracted from data files of the claims, which provide an indication of claim handling deficiencies that can cause claim leakage. A trained vulnerability detection data model can be used to detect claim handling vulnerabilities within the extracted vulnerability detection features where each of the vulnerabilities may include a likelihood of the vulnerability resulting in claim leakage. The vulnerability detection data model may be trained with a data set customized to a respective insurance provider for each claim. Vulnerability scores indicating an overall likelihood of claim leakage can be calculated for the claims based on the detected claim handling vulnerabilities.
Type:
Application
Filed:
May 15, 2023
Publication date:
September 7, 2023
Applicant:
Futurity Group, Inc.
Inventors:
John WANG, Michael Cummings, Hari Nathan, Ching Lau
Abstract: In an illustrative embodiment, systems and methods for monitoring insurance claims include identifying, based on predetermined monitoring frequency, insurance claims identified for vulnerability detection processing. Vulnerability detection features may be extracted from data files of the claims, which provide an indication of claim handling deficiencies that can cause claim leakage. A trained vulnerability detection data model can be used to detect claim handling vulnerabilities within the extracted vulnerability detection features where each of the vulnerabilities may include a likelihood of the vulnerability resulting in claim leakage. The vulnerability detection data model may be trained with a data set customized to a respective insurance provider for each claim. Vulnerability scores indicating an overall likelihood of claim leakage can be calculated for the claims based on the detected claim handling vulnerabilities.
Type:
Grant
Filed:
March 4, 2021
Date of Patent:
July 11, 2023
Assignee:
Futurity Group, Inc.
Inventors:
John Wang, Michael Cummings, Hari Nathan, Ching Lau
Abstract: In an illustrative embodiment, methods and systems for automatically labeling unstructured data include accessing unstructured data representing data entry and analyzing the unstructured data by applying natural language processing to a text component of the unstructured data to obtain a set of term counts of words and/or phrases identified in the text component. Analyzing may include applying at least one clustering algorithm to the set of term counts to determine a term cluster, identifying a preexisting term cluster most closely matching the term cluster, and applying, to the unstructured data, a predefined label corresponding to the preexisting term cluster. The unstructured data may be analyzed to obtain formatting counts of formatting elements, and a formatting cluster may be determined and applied to match to a preexisting formatting cluster, thus deriving a predefined label corresponding to the preexisting formatting cluster.
Abstract: In an illustrative embodiment, methods and systems for automatically labeling unstructured data include accessing unstructured data representing data entry and analyzing the unstructured data by applying natural language processing to a text component of the unstructured data to obtain a set of term counts of words and/or phrases identified in the text component. Analyzing may include applying at least one clustering algorithm to the set of term counts to determine a term cluster, identifying a preexisting term cluster most closely matching the term cluster, and applying, to the unstructured data, a predefined label corresponding to the preexisting term cluster. The unstructured data may be analyzed to obtain formatting counts of formatting elements, and a formatting cluster may be determined and applied to match to a preexisting formatting cluster, thus deriving a predefined label corresponding to the preexisting formatting cluster.
Abstract: In an illustrative embodiment, systems and methods for monitoring insurance claims include identifying, based on predetermined monitoring frequency, insurance claims identified for vulnerability detection processing. Vulnerability detection features may be extracted from data files of the claims, which provide an indication of claim handling deficiencies that can cause claim leakage. A trained vulnerability detection data model can be used to detect claim handling vulnerabilities within the extracted vulnerability detection features where each of the vulnerabilities may include a likelihood of the vulnerability resulting in claim leakage. The vulnerability detection data model may be trained with a data set customized to a respective insurance provider for each claim. Vulnerability scores indicating an overall likelihood of claim leakage can be calculated for the claims based on the detected claim handling vulnerabilities.
Type:
Application
Filed:
March 4, 2021
Publication date:
January 27, 2022
Applicant:
Futurity Group, Inc.
Inventors:
John WANG, Michael Cummings, Hari Nathan, Ching Lau
Abstract: In an illustrative embodiment, systems and methods for monitoring insurance claims include identifying, based on predetermined monitoring frequency, insurance claims identified for vulnerability detection processing. Vulnerability detection features may be extracted from data files of the claims, which provide an indication of claim handling deficiencies that can cause claim leakage. A trained vulnerability detection data model can be used to detect claim handling vulnerabilities within the extracted vulnerability detection features where each of the vulnerabilities may include a likelihood of the vulnerability resulting in claim leakage. The vulnerability detection data model may be trained with a data set customized to a respective insurance provider for each claim. Vulnerability scores indicating an overall likelihood of claim leakage can be calculated for the claims based on the detected claim handling vulnerabilities.
Type:
Grant
Filed:
December 19, 2019
Date of Patent:
April 13, 2021
Assignee:
Futurity Group, Inc.
Inventors:
John Wang, Michael Cummings, Hari Nathan, Ching Lau
Abstract: In an illustrative embodiment, systems and methods for monitoring insurance claims include identifying, based on predetermined monitoring frequency, insurance claims identified for vulnerability detection processing. Vulnerability detection features may be extracted from data files of the claims, which provide an indication of claim handling deficiencies that can cause claim leakage. A trained vulnerability detection data model can be used to detect claim handling vulnerabilities within the extracted vulnerability detection features where each of the vulnerabilities may include a likelihood of the vulnerability resulting in claim leakage. The vulnerability detection data model may be trained with a data set customized to a respective insurance provider for each claim. Vulnerability scores indicating an overall likelihood of claim leakage can be calculated for the claims based on the detected claim handling vulnerabilities.
Type:
Application
Filed:
December 19, 2019
Publication date:
July 2, 2020
Applicant:
Futurity Group, Inc.
Inventors:
John WANG, Michael Cummings, Hari Nathan, Ching Lau
Abstract: A loudspeaker is formed integrally with a rectangular ceiling tile which is provided with electrical contacts for connecting the loudspeaker in series or parallel combinations with other loudspeaker-tile assemblies and for supplying power to the loudspeaker from a bus, such as the T-bar which supports the ceiling tile in a typical suspended ceiling installation. A plurality of these loudspeaker-tile assemblies can be used as part of either the ceiling or wall of a large room into which sound is to be transmitted. The loudspeakers are completely concealed from view. Different electrical delay lines can be connected to various speakers in the array of speakers to produce desired acoustical effects.