US 12,073,408 B2
Detecting unauthorized online applications using machine learning
Timothy Kramme, Parker, TX (US); Elizabeth Flowers, Bloomington, IL (US); Reena Batra, Alpharetta, GA (US); Miriam Valero, Bloomington, IL (US); Puneit Dua, Bloomington, IL (US); Shanna L. Phillips, Bloomington, IL (US); Russell Ruestman, Minonk, IL (US); and Bradley A. Craig, Normal, IL (US)
Assigned to State Farm Mutual Automobile Insurance Company, Bloomington, IL (US)
Filed by State Farm Mutual Automobile Insurance Company, Bloomington, IL (US)
Filed on Jul. 14, 2023, as Appl. No. 18/222,263.
Application 18/222,263 is a continuation of application No. 18/207,062, filed on Jun. 7, 2023.
Application 18/207,062 is a continuation of application No. 17/078,744, filed on Oct. 23, 2020, granted, now 11,687,937.
Application 17/078,744 is a continuation of application No. 15/465,827, filed on Mar. 22, 2017, granted, now 10,832,248, issued on Nov. 10, 2020.
Claims priority of provisional application 62/331,530, filed on May 4, 2016.
Claims priority of provisional application 62/318,423, filed on Apr. 5, 2016.
Claims priority of provisional application 62/313,196, filed on Mar. 25, 2016.
Prior Publication US 2023/0360051 A1, Nov. 9, 2023
Int. Cl. G06Q 20/40 (2012.01); G06N 5/046 (2023.01); G06N 20/00 (2019.01); G06Q 20/10 (2012.01); G06Q 20/20 (2012.01); G06Q 20/24 (2012.01); G06Q 20/32 (2012.01); G06Q 20/34 (2012.01); G06Q 30/018 (2023.01); G06Q 30/0207 (2023.01); G06Q 30/0241 (2023.01)
CPC G06Q 20/4016 (2013.01) [G06N 5/046 (2013.01); G06N 20/00 (2019.01); G06Q 20/102 (2013.01); G06Q 20/20 (2013.01); G06Q 20/24 (2013.01); G06Q 20/3224 (2013.01); G06Q 20/34 (2013.01); G06Q 20/401 (2013.01); G06Q 20/407 (2013.01); G06Q 20/409 (2013.01); G06Q 30/0185 (2013.01); G06Q 30/0225 (2013.01); G06Q 30/0248 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method for authorizing online applications, the method comprising:
receiving, by a machine learning (ML) rule generator including one or more processors, training data including:
(i) historical authorization determinations made in connection with a plurality of previous online applications, and
(ii) search history data associated with a plurality of computing devices;
training a ML program, by the ML rule generator, and based at least in part on the historical authorization determinations and the search history data, to determine a set of authorization rules for processing online applications;
receiving, from an applicant computing device, application data indicative of input entered in one or more fields of an online application, the application data including first identification information provided by an applicant;
retrieving, from a database, first search history data associated with at least one of the applicant data or the applicant computing device, the first search history data indicative of one or more search terms submitted to an Internet-based search engine;
determining, using the set of authorization rules, and based at least in part on the application data and the first search history data, that the received application data is indicative of an unauthorized online application;
updating, by the ML rule generator, the set of authorization rules based at least in part on determining that the received application data is indicative of an unauthorized online application; and
applying, by the processor, the updated set of set of authorization rules to additional application data and additional search term data.