SAP SE
ANOMALY AND FRAUD DETECTION USING DUPLICATE EVENT DETECTOR
Last updated:
Abstract:
The present disclosure involves systems, software, and computer implemented methods for transaction auditing. One example method includes receiving an image of a receipt associated with an expense on an expense report. Tokens are extracted from the receipt using one or more machine learning extraction models. A compound key is generated using a subset of the tokens. The subset includes a transaction time associated with the receipt. A determination is made as to whether the compound key matches an existing compound key in a database of historical receipts. In response to determining that the compound key does not match an existing compound key, the receipt is identified as a non-duplicate receipt and an entry that includes the compound key is added to the database. In response to determining that the compound key matches an existing compound key, the receipt is identified as a duplicate receipt.
Utility
20 Sep 2019
7 Jan 2021