-
1.
公开(公告)号:US10937109B1
公开(公告)日:2021-03-02
申请号:US14991460
申请日:2016-01-08
Applicant: Intuit Inc.
Inventor: Luis Felipe Cabrera , William T. Laaser
IPC: G06Q40/00
Abstract: A method and system provides a tax refund confidence indicator to a user of a tax return preparation system, according to one embodiment. The method and system include receiving user current tax related data from a user and receiving historical tax related data associated with previously prepared tax returns. The method and system further includes generating estimated tax refund data and confidence score data indicative of the reliability of the estimated tax refund data. The method and system include providing the estimated tax refund data and the confidence score data to the user.
-
公开(公告)号:US10387173B1
公开(公告)日:2019-08-20
申请号:US15902832
申请日:2018-02-22
Applicant: Intuit Inc.
Inventor: Wolfgang Paulus , Luis Felipe Cabrera , Mike Graves
Abstract: Emotional state data is used to tailor the user experience of an interactive software system, by monitoring and obtaining data about a user's emotional state. Invoice data is further used, and organized in a particular manner for presentation to the user based on a predicted future emotional state of the user. Emotional state data is analyzed and used to dynamically modify the user's experience by selecting user experience components and invoice presentation characteristics based on the analysis of the user's emotional state data. Different types of user experience components can be utilized to adjust the user experience to adapt to the user's new emotional state, prevent the user from entering an undesirable emotional state, and/or encourage the user to enter into a desirable emotional state.
-
公开(公告)号:US09894069B2
公开(公告)日:2018-02-13
申请号:US14069921
申请日:2013-11-01
Applicant: Intuit Inc.
Inventor: Brett Weaver , Sabu Kuruvila Philip , Troy Otillio , Jinglei Whitehouse, III , Oleg Gryb , Jeffrey M. Wolfe , Ankur Jain , M. Shannon Lietz , Luis Felipe Cabrera
CPC classification number: H04L63/10 , G06F21/10 , G06F21/6218 , H04L9/0838 , H04L63/0457 , H04L63/0815 , H04L2209/76
Abstract: Secret application and maintenance policy data is generated for different classes of data. The class of data to be protected is determined and the secret application and maintenance policy data for the determined class of the data to be protected is identified and obtained. Required secrets data representing one or more secrets to be applied to the data to be protected is obtained and then automatically scheduled for application to the data to be protected in accordance with the secret application and maintenance policy data for the determined class of the data to be protected. Maintenance of the one or more secrets is also automatically scheduled in accordance with the secret application and maintenance policy data for the determined class of the data to be protected.
-
公开(公告)号:US09891792B1
公开(公告)日:2018-02-13
申请号:US14927677
申请日:2015-10-30
Applicant: Intuit Inc.
Inventor: Yao H. Morin , Vi Joy Caro , Massimo Mascaro , Luis Felipe Cabrera , Amir Eftekhari , Nankun Huang , Damian O'Malley , Art Tawanghar
IPC: G06F3/0484 , G06F17/30 , H04L29/08
CPC classification number: G06F3/0484 , G06F17/30528 , G06F17/30598 , H04L67/22
Abstract: Biometric data is collected to obtain more detailed, connected, and reliable feedback data from users of an interactive software system that has a more empirical and objective basis. The biometric data is then used to create emotional pattern predictive model data representing emotional pattern predictive models associated with users of the interactive software system. The individual emotional pattern predictive models associated with multiple users of the interactive software system are then analyzed and processed to generate emotional pattern profile data for categories of users. These biometric data based predictive models are then used for targeted product diagnosis, targeted interventions, targeted marketing/upsell attempts, and grouping and analysis of feedback and user categories and feedback sources.
-
公开(公告)号:US20180007048A1
公开(公告)日:2018-01-04
申请号:US14069921
申请日:2013-11-01
Applicant: Intuit Inc.
Inventor: Brett Weaver , Sabu Kuruvila Philip , Troy Otillio , Jinglei Whitehouse , Oleg Gryb , Jeffrey M. Wolfe , Ankur Jain , M. Shannon Lietz , Luis Felipe Cabrera
CPC classification number: H04L63/10 , G06F21/10 , G06F21/6218 , H04L9/0838 , H04L63/0457 , H04L63/0815 , H04L2209/76
Abstract: Secret application and maintenance policy data is generated for different classes of data. The class of data to be protected is determined and the secret application and maintenance policy data for the determined class of the data to be protected is identified and obtained. Required secrets data representing one or more secrets to be applied to the data to be protected is obtained and then automatically scheduled for application to the data to be protected in accordance with the secret application and maintenance policy data for the determined class of the data to be protected. Maintenance of the one or more secrets is also automatically scheduled in accordance with the secret application and maintenance policy data for the determined class of the data to be protected.
-
公开(公告)号:US09742794B2
公开(公告)日:2017-08-22
申请号:US15086330
申请日:2016-03-31
Applicant: Intuit Inc.
Inventor: Luis Felipe Cabrera , M. Shannon Lietz , Javier Godinez
CPC classification number: H04L63/1433 , G06F21/577 , H04L63/1425
Abstract: A method and system for automating threat model generation and pattern identification for an application includes identifying components of an application, and receiving security information that identifies whether security measures were implemented within the application to secure the application against security threats. The method further receives an identification of external events, and receiving first patterns from one or more first virtual assets. A database is populated with the first patterns and the external events and then second patterns are received and compared to the first patterns. The method and system include distributing the identification of the one of the external events to the one or more second virtual assets, if the second patterns are similar to the first patterns, according to one embodiment.
-
公开(公告)号:US20170237756A1
公开(公告)日:2017-08-17
申请号:US15581835
申请日:2017-04-28
Applicant: Intuit Inc.
Inventor: M. Shannon Lietz , Luis Felipe Cabrera
IPC: H04L29/06
CPC classification number: G06F9/45558 , G06F21/50 , G06F21/55 , G06F2009/45591 , G06F2009/45595 , H04L41/0886 , H04L41/5025 , H04L41/5032 , H04L41/5096 , H04L63/14 , H04L63/1408 , H04L63/1416 , H04L63/1425 , H04L63/1433
Abstract: A trigger event monitoring system is provided in one or more virtual assets. One or more trigger parameters, including security threat patterns, are defined and trigger data is generated. The one or more trigger monitoring systems are used to monitor extrusion and intrusion capabilities and self-monitored trigger events that may harm or otherwise leave a virtual asset in a vulnerable state. In one embodiment, trigger events and monitoring of at least a portion of message traffic sent to, or sent from, the one or more virtual assets are initiated and/or performed to detect any message including one or more of the one or more of the trigger parameters. Any message meeting the one or more trigger parameters is identified as a potential security threat and is assigned a threat score, which is provided to the virtual asset. Various corrective actions may take place.
-
8.
公开(公告)号:US20160371178A1
公开(公告)日:2016-12-22
申请号:US15253226
申请日:2016-08-31
Applicant: Intuit Inc.
Inventor: Thomas Bishop , Javier Godinez , Capen Brinkley , Brett Weaver , M. Shannon Lietz , Luis Felipe Cabrera
IPC: G06F11/36
CPC classification number: G06F11/3688 , G06F11/3664 , G06F11/3684 , G06F11/3692
Abstract: An application is implemented in the production environment in which the application will be used. Fabricated user data associated with the application implemented in the production environment is then generated and provided to the application as implemented in the production environment. The fabricated user data is then processed by the application in the production environment to transform the fabricated user data into fabricated user results data. In one embodiment, the fabricated user results data is then analyzed to evaluate the production environment and/or operation of the application in the production environment.
-
公开(公告)号:US09501345B1
公开(公告)日:2016-11-22
申请号:US14139449
申请日:2013-12-23
Applicant: Intuit Inc.
Inventor: M. Shannon Lietz , Luis Felipe Cabrera
CPC classification number: G06F11/0784 , G06F11/0709 , G06F11/079 , G06F11/301 , G06F17/30 , G06F17/40
Abstract: Access to first log data from a first log data source and second log data from a second log data source is obtained. Trigger event log data is defined and the second log data from the second log data source is monitored to detect the defined trigger event log data in the second log data. If the defined trigger event log data is detected in the second log data from the second log data source, the detected trigger event log data in the second log data from the second log data source is correlated with the first log data from the first log data source, and/or at least part of the second log data from the second log data source is inserted into the first log data from the first log data source.
Abstract translation: 获得来自第一个日志数据源的第一个日志数据和来自第二个日志数据源的第二个日志数据。 定义触发事件日志数据,并监视来自第二个日志数据源的第二个日志数据,以检测第二个日志数据中定义的触发事件日志数据。 如果在来自第二日志数据源的第二日志数据中检测到定义的触发事件日志数据,则来自第二日志数据源的第二日志数据中检测到的触发事件日志数据与来自第一日志数据的第一日志数据相关 源和/或来自第二日志数据源的第二日志数据的至少一部分从第一日志数据源插入到第一日志数据中。
-
10.
公开(公告)号:US09473481B2
公开(公告)日:2016-10-18
申请号:US14448281
申请日:2014-07-31
Applicant: Intuit Inc.
Inventor: M. Shannon Lietz , Luis Felipe Cabrera
CPC classification number: H04L63/08 , G06F21/53 , G06F21/56 , H04L63/10 , H04L63/104 , H04L63/1408 , H04L63/1433 , H04L63/20
Abstract: A system and method provides a virtual perimeter by maintaining a data structure for identifying a first plurality of assets, according to one embodiment. The system and method provides services to a second of the first plurality of assets, at least partially based on identifiers for the first plurality of assets and at least partially based on a first role assigned to a first of the first plurality of assets, according to one embodiment. The system and method include admitting one of a second plurality of assets into the virtual perimeter if characteristics of the one of the second plurality of assets satisfy criteria for admission to the virtual perimeter, according to on embodiment.
Abstract translation: 根据一个实施例,系统和方法通过维护用于识别第一多个资产的数据结构来提供虚拟周界。 所述系统和方法至少部分地基于所述第一多个资产的标识符提供服务,并且至少部分地基于分配给所述第一多个资产中的第一个资产的第一角色,根据 一个实施例。 根据实施例,系统和方法包括将第二多个资产中的一个资产接纳到虚拟周边中,如果第二多个资产中的一个资产的特征满足准入虚拟周界的准则。
-
-
-
-
-
-
-
-
-