Mountain View, CA, United States
Mountain View, CA, United States

Intuit Inc. is an American software company that develops financial and tax preparation software and related services for small businesses, accountants and individuals. It is incorporated in Delaware and headquartered in Mountain View, California. Wikipedia.


Time filter

Source Type

External events are correlated with patterns of characteristics in virtual assets. Upon detection of a pattern in a different asset that matches a pattern corresponding to an event, that detection is treated as a trigger event, with resulting responsive action(s) and other process operations. Security threats are managed in a similar manner, with first security threats being added to a collection of security threats. When a virtual asset detects a change in operating characteristics, a request is provided for the collection of current security threats, and the collection of security threats is provided responsive to the request.


Patent
Intuit | Date: 2016-02-08

A computer-implemented method of acquiring tax data for use in tax preparation application includes acquiring an image of at least one document containing tax data therein with an imaging device. A computer extracts one or more features from the acquired image of the at least one document and compares the extracted one or more features to a database containing a plurality of different tax forms. The database may include a textual database and/or geometric database. The computer identifies a tax form corresponding to the at least one document from the plurality of different tax forms based at least in part on a confidence level associated with the comparison of the extracted one or more features to the database. At least a portion of the tax data from the acquired image is transferred into corresponding fields of the tax preparation application.


A method, system (100), and computer program product for automatically selecting target consumers (102x, 102y) and delivering business-initiated messages (151a) to the selected target consumers (102x, 102y), as well as automatically selecting target businesses (101a, 101b) and delivering consumer-initiated messages (151b) to the selected target businesses (101a, 101b). In particular, financial management applications used by the businesses (101) and consumers (102) are employed in targeting and delivering the business-initiated messages (151a) and consumer-initiated messages (151b).


An analysis trigger monitoring system is provided in one or more virtual assets. One or more analysis trigger parameters, including security threat patterns, are defined and analysis trigger data is generated. The one or more analysis trigger monitoring systems are used to monitor at least a portion of the message traffic sent to, or sent from, the one or more virtual assets to detect any message including one or more of the one or more analysis trigger parameters. Any detected message is identified as a potential security threat and is assigned a threat score, which is provided to the virtual asset. A copy of at least a portion of any detected message including one or more of the one or more analysis trigger parameters is then transferred to one or more analysis systems for further analysis using a second communication channel.


Patent
Intuit | Date: 2016-05-27

An encryption proxy is instantiated in a first computing environment and includes encryption proxy authentication data for identifying itself to a secrets distribution management system in a second computing environment as a trusted virtual asset to receive and cache encryption key data in a secure encryption key cache outside the second computing environment. The encryption proxy requests one or more encryption keys to be cached and is then provided encryption key data representing the requested encryption keys in the encryption key cache. The encryption proxy then receives application request data from a second virtual asset instantiated in the first computing environment requesting one or more encryption keys be applied to second virtual asset data. The encryption proxy then obtains the required encryption keys from the secure secrets cache and coordinates the application of the encryption keys to the second virtual asset data.


Patent
Intuit | Date: 2016-01-25

During an information-extraction technique, visual suitability indicators may be displayed to a user of the electronic device to assist the user in acquiring an image of a document that is suitable for subsequent extraction of textual information. For example, an imaging application executed by the electronic device may display, in a window associated with the imaging application, a visual suitability indicator of a tilt orientation of the electronic device relative to a plane of the document. When the tilt orientation falls within a predefined range, the electronic device may modify the visual suitability indicators to provide visual feedback to the user. Then, the electronic device may acquire the image of the document using an imaging device, which is integrated into the electronic device. Next, the electronic device may extract the textual information from the image of the document using optical character recognition.


An application is implemented in the production environment in which the application will be used. Fabricated user data associated with the application implemented in the production environment is then generated and provided to the application as implemented in the production environment. The fabricated user data is then processed by the application in the production environment to transform the fabricated user data into fabricated user results data. In one embodiment, the fabricated user results data is then analyzed to evaluate the production environment and/or operation of the application in the production environment.


Reference architecture pattern role data representing reference architecture pattern roles to be associated with entities taking part in the development, and/or deployment, and/or operation of an application is generated. Reference architecture pattern tier data representing reference architecture pattern tiers used to create, and/or deploy, and/or operate an application using the reference architecture pattern is generated. For each reference architecture pattern role at least one access and/or operational permission is associated with each reference architecture pattern tier. An entity is assigned one of the reference architecture pattern roles and for each reference architecture pattern tier, the entity is automatically provided the at least one access and/or operational permission associated with the reference architecture pattern role assigned to the entity. When a computing task is requested, permissions associated with the computing task are adjusted based on a risk level associated with performance of the requested computing task.


A service provider computing environment includes a service provider computing device, which receives tenant secrets policies from tenants. The tenants are tenants of multi-tenant assets of a service provider. One or more data security zones in which the multi-tenant assets are located are identified. A service provider secrets policy includes data security jurisdiction zone secrets policy data for the one or more data security jurisdiction zones. The data security jurisdiction zone secrets policy data is analyzed to determine allowed secrets data with respect to each of the identified data security jurisdiction zones. The service provider computing environment determines of the tenant secrets policies satisfy the requirements of the service provider secrets policy. If the tenant secrets policies satisfy the requirements of the service provider secrets policy, the service provider computing environment allows the tenant secrets policies to be applied to tenant data or information in the multi-tenant assets.


Patent
Intuit | Date: 2016-02-29

Check fraud protection method in which customer is automatically enrolled in check fraud protection service without separately subscribing to the service. In the event of fraudulent activity, customer requests compensation from financial institution and retains the exclusive right of recovery from financial institution. If customer is not fully compensated by financial institution, the difference is paid to customer by service provider or an insurer thereof, and new checks for a new checking account are provided to customer free of charge. A custody indicator may also be used to determine chain of custody data that can be used to track the source of fraudulent activity if the fraud was perpetrated by someone involved in the check printing or delivery process, and for this purpose, a check order or individual checks may have respective indicators such as sequential serial numbers.

Loading Intuit collaborators
Loading Intuit collaborators