Abstract: Techniques are disclosed for determining application experience of a user. One embodiment presented herein includes a computer-implemented method, which includes receiving, at a computing device, eye tracking data of a user interacting with at least a first page of an application. The computer-implemented method further includes determining, based at least on the eye tracking data, at least a current user experience regarding the first page. The computer-implemented method further includes predicting, based on evaluating the current user experience, that the user is likely to discontinue use of the application. The computer-implemented method further includes determining, based at least on the prediction, an intervention that reduces a likelihood of the user discontinuing use of the application, and interacting with the user according to the intervention.
Type:
Grant
Filed:
November 2, 2022
Date of Patent:
July 2, 2024
Assignee:
INTUIT INC.
Inventors:
Igor A. Podgorny, Benjamin Indyk, Michael J. Graves
Abstract: A method including setting an initial lookback path length for a current path in a directed acyclic graph. The current path includes a subset of the nodes connected by a sequence of the edges. The method also includes querying, for a current lookback path length, whether a matching key is present in a transition probability dictionary (TPD). The method also includes querying, responsive to the matching key being present in the TPD for the current lookback path length, whether a matching value is present for the matching key. The matching value includes a sample path in the TPD that matches the current path. Responsive to the matching value being present in the TPD for the matching key, a next node associated with the matching value is returned. The next node is connectable in a valid operational relationship to a last node in the current path.
Type:
Grant
Filed:
April 28, 2023
Date of Patent:
July 2, 2024
Assignee:
Intuit Inc.
Inventors:
Nazif Utku Demiroz, Ashton Phillips Griffin, Robert Pienta, Luis Enrique Castro
Abstract: Described herein are example implementations for generating a perturbation seed for the perturbation of electronic data. A system obtains a plurality of datapoints (with one or more statistics calculated from the plurality of datapoints to be perturbed based on a perturbation seed). The system calculates one or more metrics from the plurality of datapoints. The system also generates, for each of the one or more metrics, a rounded metric by rounding the metric. The system further generates the perturbation seed. Generating the perturbation seed includes hashing the one or more rounded metrics. Rounding a metric may be to a defined place value (such as the second most significant place value), and a binary output of hashing the one or more rounded metrics may be converted to a number. The system may perturb one or more statistics based on the perturbation seed and output the one or more perturbed statistics.
Abstract: In a collection technique, a user (such as a taxpayer) provides information (such as income-tax information) by submitting an image of a document, such as an income-tax summary or form. In particular, the user may provide a description of the document. In response, the user is prompted for the information associated with the field in the document. Then, the user provides the image of a region in the document that includes the field. Based on the image, the information is extracted, and the field in the form is populated using the extracted information. The prompting, receiving, extracting and populating operations may be repeated for one or more additional fields in the document.
Abstract: In general, the invention relates to a method involving allowing access to a financial application by a third-party extension based on a single license to use the financial application, where the third-party extension was developed by a third-party developer using one or more tools in a software development kit (SDK) for the financial application and where the financial application stores first transaction data obtained for a first user of the financial application, monitoring operations performed on the financial application by the third-party extension to detect operations that migrate transaction data to a competitive application, using distributed computing software adjust a risk index that is associated with the third-party extension, determining that the risk index exceeds a pre-defined threshold, and controlling future access to the financial application by the third-party extension.
Abstract: A method implements image background removal. The method includes receiving an image and processing the image using a first color distance threshold to generate a first alpha mask. The method further includes processing the first alpha mask using a cartesian edge threshold and a second color distance threshold to generate a second alpha mask. The method further includes presenting the image combined with the second alpha mask in a combined image.
Type:
Grant
Filed:
March 31, 2023
Date of Patent:
July 2, 2024
Assignee:
Intuit Inc.
Inventors:
Benjamin Nathaniel Leathers, Frank Andrew Vaughan
Abstract: Systems and methods for lean parsing are disclosed. An example method is performed by one or more processors of a system and includes retrieving form data including first sentence segments and second sentence segments, determining a first predicate structure for each of the sentence segments based on a set of operators within the first set of sentence segments, identifying known tokens within the second set of sentence segments, each of the known tokens appearing on a list of predetermined tokens, identifying new tokens within the second set of sentence segments, each of the new tokens not on the list, mapping each known and new token to at least one operator, determining a second predicate structure for each sentence segment based on the mapping, and generating a predicate argument structure incorporating the first and second predicate structures, the predicate argument structure ready for mapping to at least one machine executable function.
Abstract: A method implements input validation using mathematical expressions. The method includes receiving an input string, scanning the input string to locate a hit string matching a hit expression from a validation package, and converting the hit string to a list of values corresponding to characters from the hit string. The method further includes validating the hit string by evaluating a validation expression from the validation package using the list of values to generate a validation result and returning the validation result.
Type:
Grant
Filed:
October 31, 2022
Date of Patent:
June 25, 2024
Assignee:
Intuit Inc.
Inventors:
Yerucham Berkowitz, Eugene Zeiniss, Dan Sharon, Elad Shmidov
Abstract: A system for explaining tax questions for an electronic tax return preparation program includes a computing device having a tax logic agent and a user interface controller. The computing device executes the tax logic agent, which analyzes a completeness graph to identify a required variable. The tax logic agent also determines whether an explanation asset is indexed to the required variable in the completeness graph, and sends an identity of the required variable to a user interface controller. The user interface controller generates a tax question corresponding to the required variable. When the tax logic agent determines that an explanation asset is indexed to the required variable in the completeness graph, the computing device presents the tax question and the explanation asset. When an explanation asset is not indexed to the required variable in the completeness graph, the computing device presents the tax question without the explanation asset.
Type:
Grant
Filed:
October 26, 2016
Date of Patent:
June 25, 2024
Assignee:
INTUIT INC.
Inventors:
Gang Wang, Sasha Mikhael Perez, Jennifer L. Keenan, Arien C. Ferrell, Michael J. Graves
Abstract: Systems and methods that may be used to provide policies and protocols for blocking decryption capabilities in symmetric key encryption using a unique protocol in which key derivation may include injecting a random string into each key derivation. For example, a policy may be assigned to each client device indicating whether the client device has been assigned encryption only permission or full access permission to both encrypt and decrypt data. The disclosed protocol prevents client devices with encryption only permission from obtaining keys for decryption.
Type:
Application
Filed:
October 11, 2023
Publication date:
June 20, 2024
Applicant:
INTUIT INC.
Inventors:
Margarita VALD, Julia ZARUBINSKY, Yaron SHEFFER, Sergey BANSHATS
Abstract: A processor may receive a call transcript including text and form a text string including at least a portion of the text. The processor may generate a situation description of the call transcript, which may comprise processing the text string using a transformer-based machine learning model. The processor may generate a trouble description of the call transcript, which may comprise creating a sentence embedding of the situation description, creating sentence embeddings for a plurality of utterances within the portion of the text, determining respective similarities between the sentence embedding of the situation description and each of the sentence embeddings for each respective one of the plurality of utterances, and selecting at least one of the plurality of utterances having at least one highest determined respective similarity as the trouble description. The processor may store a call summary comprising the situation description and the trouble description in a non-transitory memory.
Type:
Grant
Filed:
July 30, 2021
Date of Patent:
June 18, 2024
Assignee:
INTUIT INC.
Inventors:
Zhewen Fan, Byungkyu Kang, Wan Yu Zhang, Carlos A. Oliveira, Wenxin Xiao
Abstract: Systems and methods that may be used to provide a predictive tax loan or other monetary advance before the loan recipient (e.g., a taxpayer) prepares and files its tax return. A risk of providing a predictive tax loan or monetary advance is modeled separately from a machine learning model used to determine the anticipated tax refund amount and tax loan. The disclosed systems and methods may also predict accurate tax withholdings based on multiple machine learning models from multiple services, including non-payroll related services.
Abstract: Knowledge about a user is used to determine whether one or more messages received by the user are malicious. The knowledge about the user may be based on the user's financial history such as transaction records. Particularly, a classifier model is trained on a supervised approach using a dataset containing, for example, a categorization of incoming messages (e.g., password change message), the user's aggregated transaction records, message attributes, user attributes, and corresponding classification labels. After the training, the classifier model is deployed to determine whether an incoming message is malicious.
Abstract: Aspects of the present disclosure provide techniques for application navigation recommendations using machine learning. Embodiments include determining one or more pages accessed by a user within an application. Embodiments include providing one or more inputs to a machine learning model based on the one or more pages accessed by the user. Embodiments include receiving, from the machine learning model based on the one or more inputs, one or more predicted pages. Embodiments include displaying, in a user interface, one or more elements recommending the one or more predicted pages to the user. Embodiments include receiving a selection of a given element of the one or more elements. Embodiments include navigating within the user interface, based on the selection, to a given page of the one or more predicted pages that corresponds to the given element.
Type:
Grant
Filed:
May 18, 2022
Date of Patent:
June 18, 2024
Assignee:
Intuit Inc.
Inventors:
Deepankar Mohapatra, Ronnie Douglas Douthit, Mithilesh Kumar Singh, Manish Omprakash Bhatia, Jessica Colleen Danby, Somin Heo
Abstract: An entry validation system executed by a processor, may compare an entry into a user interface (UI) field with at least one range of valid entries. The at least one range of valid entries may be generated by a machine learning (ML) system by clustering known valid data using a clustering algorithm producing a lowest number of clusters that absorbs all of the known valid data within the clusters. In response to the comparing, the entry validation system may provide a determination of validity or invalidity to an application displaying the UI field. The determination of validity may cause the entry to be processed by the application, and the determination of invalidity may cause the application to reject the entry.
Abstract: A method implements calibrated risk scoring and sampling. Features are extracted from a record. A risk score, associated with the record, is generated from the features using a machine learning model. The record is mapped to a risk bucket using the risk score. The risk bucket may include multiple risk bucket records. The record is selected from the risk bucket records with a sampling threshold corresponding to the risk bucket. A form prepopulated with values from the record is presented to a client device.
Type:
Grant
Filed:
July 30, 2021
Date of Patent:
June 18, 2024
Assignee:
Intuit Inc.
Inventors:
Kate Elizabeth Swift-Spong, Shivakumara Narayanaswamy, Carlos A. Oliveira, Byungkyu Kang, Farzaneh Khoshnevisan, Zhewen Fan, Runhua Zhao, Wan Yu Zhang
Abstract: A processor may receive an image and determine a number of foreground pixels in the image. The processor may obtain a result of optical character recognition (OCR) processing performed on the image. The processor may identify at least one bounding box surrounding at least one portion of text in the result and overlay the at least one bounding box on the image to form a masked image. The processor may determine a number of foreground pixels in the masked image and a decrease in the number of foreground pixels in the masked image relative to the number of foreground pixels in the image. Based on the decrease, the processor may modify an aspect of the OCR processing for subsequent image processing.