US 11,756,277 B1
Network platform impersonation mitigation systems and methods
Yair Horesh, Tel Aviv (IL)
Assigned to INTUIT INC., Mountain View, CA (US)
Filed by INTUIT INC., Mountain View, CA (US)
Filed on Feb. 23, 2023, as Appl. No. 18/173,658.
Int. Cl. G06T 19/00 (2011.01); G06F 3/01 (2006.01); G06T 15/04 (2011.01)
CPC G06T 19/006 (2013.01) [G06F 3/011 (2013.01); G06T 15/04 (2013.01); G06T 19/00 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
receiving, by a processor, a first training data set comprising data with images and avatars selected to match one another and a second training data set comprising data with greater distances between images and avatars than distances of the first training data set;
training, by the processor, a machine learning (ML) process using the first training data set and the second training data set as training inputs; and
deploying, by the processor, the ML process within a computing environment, the deploying comprising evaluating an avatar representing a user using the ML process and, based on an outcome of the ML process, configuring at least one option for action by the user.