US20140249865A1 - Claims analytics engine - Google Patents
Claims analytics engine Download PDFInfo
- Publication number
- US20140249865A1 US20140249865A1 US14/280,065 US201414280065A US2014249865A1 US 20140249865 A1 US20140249865 A1 US 20140249865A1 US 201414280065 A US201414280065 A US 201414280065A US 2014249865 A1 US2014249865 A1 US 2014249865A1
- Authority
- US
- United States
- Prior art keywords
- erroneous
- features
- computer
- predictive model
- training
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G06N99/005—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
Definitions
- Embodiments according to the present invention pertain to an analytical tool that can be utilized in, for example, the healthcare industry but can also be applied outside the healthcare industry.
- the analytical tool is used to address problems with reworking claims, such as but not limited to payment issues (e.g., overpayment or underpayment of claims).
- the analytical tool is intended to identify claims that have a high probability of being problematic so that those claims can be proactively reconciled, thus avoiding or reducing the cost and effort of reworking erroneous claims.
- the analytical tool is generally characterized as predictive, learning, and real-time system of models.
- information is collected from a number of disparate sources and transformed into a useful format.
- the information can include relatively unstructured text and semantic data collected from a variety of sources, as well as structured (e.g., numerical, statistical) data read from standardized claim forms.
- the information is analyzed using methods such as segmentation, classification, etc., to create predictive models that have the capability to continuously learn—that is, the models can be continually improved as new information is collected and as more claims are evaluated.
- claims known to have resulted in a payment error can be analyzed using the inventive analytical tool, and attributes of those claims can be compared against those of other claims to identify additional claims that may also result in a payment error.
- Those additional claims can be identified to an auditor (automated or human), so that any errors in the claims can be corrected before payment; if payment has been made, then errors can be proactively rectified. Feedback from the auditor is incorporated into the analytical tool, in this manner refining the accuracy of the tool for application to subsequent claims.
- FIG. 1 is e block diagram of an example of a computer system upon which embodiments of the present invention can be implemented.
- FIG. 2 is an embodiment of a training process that can be implemented by an analytical tool according to the invention.
- FIG. 3 is an embodiment of deployment process that can be implemented by an analytical tool according to the invention.
- FIG. 4 is a block diagram showing an embodiment of a computer-implemented analytical tool according to the invention.
- FIGS. 5 and 6 are flowcharts showing steps in computer-implemented methods for processing claims according to embodiments of the present invention.
- Embodiments described herein may be discussed in the general context of computer-executable instructions residing on some form of computer-usable medium, such as program modules, executed by one or more computers or other devices.
- program modules include routines, programs, objects, components, data structures, etc., that perform particular tasks or implement particular abstract data types.
- the functionality of the program modules may be combined or distributed as desired in various embodiments.
- FIG. 1 shows a block diagram of an example of a computer system 100 upon which the embodiments described herein may be implemented.
- the system 100 includes at least one processing unit 102 and memory 104 . This most basic configuration is illustrated in FIG. 1 by dashed line 106 .
- the system 100 may also have additional features/functionality.
- the system 100 may also include additional storage (removable and/or non-removable) including, but not limited to, magnetic or optical disks or tape. Such additional storage is illustrated in FIG. 1 by removable storage 108 and non-removable storage 120 .
- the system 100 may also contain communications connection(s) 122 that allow the device to communicate with other devices.
- the system 100 includes at least some form of computer-usable media.
- Computer-usable media can be any available media that can be accessed by the system 100 .
- Computer-usable media may comprise computer storage media and communication media.
- Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data.
- Computer storage media includes, but is not limited to, random access memory (RAM), read only memory (ROM), electrically erasable programmable ROM (EEPROM), flash memory or other memory technology, compact disk ROM (CD-ROM), digital versatile disks (DVDs) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to store the desired information and that can be accessed by the system 100 . Any such computer storage media may be part of the system 100 .
- the memory 104 , removable storage 108 and non-removable storage 20 are all examples of computer storage media.
- Communication media can embody computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
- modulated data signal means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
- communication media includes wired media such as a wired network or direct-wired connection, and wireless media such a acoustic, radio frequency (RF), infrared and other wireless media. Combinations of any of the above can also be included within the cope of computer-readable media.
- the communications connection(s) 122 is/are an example of communication media.
- the system 100 may also have input device(s) 124 such as keyboard, mouse, pen, voice input device, touch input device, etc.
- Output device(s) 126 such as a display, speakers, printer, etc., may also be included.
- the system 100 may operate in a networked environment using logical connections to one or more remote computers. When used in a networking environment, the system 100 can be connected to the network through the communication connection(s) 122 .
- the memory 104 includes computer-readable instructions, data structures, program modules and the like associated with an analytics engine 150 .
- the analytics engine 150 may instead reside in any one of the computer storage media used by the system 100 , or may be distributed over some combination of the computer storage media, or may be distributed over some combination of networked computers.
- the analytics engine 150 is generally characterized as a predictive, learning, and real-time system of models.
- the analytics engine (or analytical tool) 150 can be utilized in, for example, the healthcare industry, including but not limited to health insurance claim payers, hospitals, and physician groups.
- embodiments according to the invention are not limited to healthcare applications.
- embodiments of the invention can be utilized in businesses, industries, and the like that utilize claims and other types of records, files, and forms (other than claim forms) on a regular basis.
- embodiments according to the invention can be used to evaluate claims, records, files, and the like that are used for workman's compensation, property insurance, and casualty insurance, for example.
- the analytics engine 150 can be used to identify claims that have a high probability of being problematic so that those claims can be proactively reconciled, thus avoiding or at least reducing the cost and effort of reworking erroneous claims.
- claims known to include an error, or to have resulted in an error can be analyzed using the analytics engine 150 , and attributes of those claims can be compared against other claims to identify any other claims that may be associated with the same is type of error.
- claims known to have resulted in a payment error can be analyzed using the analytics engine 150 , and attributes of those claims can be used as the basis for identifying any other claims that may also result in a payment error.
- Claims identified as potentially being problematic can be submitted to an auditor (human or automated), so that any errors can be corrected before handling of the claim is completed (e.g., before payment). If the claim has been settled or finalized (e.g., payment has been made), then errors can be proactively rectified. Feedback from the auditor is incorporated into the analytics engine 150 , in this manner refining the accuracy of the tool for subsequent application to other claims.
- the analytics engine 150 can be utilized in a training process (see FIG. 2 ) and/or in a deployment process (see FIG. 3 ).
- FIG. 2 shows an embodiment of a training process 200 that can be implemented using the analytics engine 150 according to the present invention.
- Process 200 can be implemented as computer-readable instructions stored in a computer usable medium.
- the analytics engine 150 accesses a claims database 202 .
- the claims database 202 can include paid and/or unpaid claims, claims that have been audited, claims that have not yet been audited, claims that have been finalized/settled, and claims that are pending. In the training process, consideration of claims that have been audited can be important because the lessons learned from those claims can be incorporated into the prediction models 214 that are discussed below.
- the claims are, in general, stored in a standardized, computer-usable (computer-readable) format, such as a format based on Health Care Financing Administration (HCFA) Form 1500 or Uniform Billing (UB) Form 92.
- HCFA Health Care Financing Administration
- UB Uniform Billing
- the information in the claims database 202 may be referred to herein as “first historical information.”
- the analytics engine 150 can also access information such as unstructured text data 204 and external data 206 .
- unstructured text data 204 and external data 206 encompass information not included in the claims database 202 .
- an objective of the training process 200 is to develop models that can be used to predict whether or not a claim contains accurate information—in general, a purpose of the analytics engine 150 is to identify potentially problematic claims and intercept those claims before payment (as noted above, the tool can also be used to identify potentially problematic claims after payment).
- a prediction can be made by correlating information in a claim to information that is known to be correct and/or information that is known to be incorrect weighted by other types of information found to be interesting by virtue of that information's value as an error predictor or marker.
- unstructured text data 204 and external data 206 constitute those “other types of information,” and as such they include a wide variety of different types of information.
- Unstructured text data 204 and external data 206 can be based on, for example, dispute information, provider call information, recovery information, and audit result information.
- Unstructured text data 204 may further include information such as, but not limited to, doctor's notes, auditor's notes, notes from customer service calls, etc.
- External data 206 in general, includes other information that is not included in the claims and is not already included in the unstructured text data 204 .
- External data 206 may include information such as, but not limited to, Web-based information or information from other sources that are up-to-date—for example, information that a certain area of a country or the world is experiencing a flu outbreak may be included in the external data.
- External data 206 may also include information from various public or private databases that may be freely available or may be sold commercially.
- Unstructured text data 204 and the external data 206 may be collectively referred to herein as “second historical information.”
- a “feature,” generally speaking, is a named parameter or variable; a value for the feature is obtained from or derived from the aforementioned data sources on a per-claim basis (although a feature may have the same value for a group of claims).
- Features may be based on the type of entries included in the data sources —for example, the patient's age, the doctor's name, a contract number, an insurance code, a monetary amount, and an address can be read directly from the data sources.
- Features may also be derived from the types of information included in the data sources—for example, the number of days between the time when a medical procedure was performed and the time when the claim is submitted, the number of days between claim receipt and data processing, the procedure code that had the highest billed amount in a claim, the amount paid for a particular procedure minus the average amount paid for that procedure over the past six months and then divided by the standard deviation for the amount paid for that procedure over the same six months, or the cost of a particular type of medication averaged over a group of doctors or over a particular geographical region over a period of time, may be considered useful features that can be determined using the information included in the data sources.
- the transformed data 208 include values for the chosen features.
- the transformed data 208 may include the claims themselves (paid and unpaid, audited and not audited, settled and pending), actual data that is parsed from the aforementioned data sources, and derived data that is determined by manipulating, translating, or mining the actual data.
- a variety of analytical techniques can be used, individually and jointly, to generate the transformed data 208 . These techniques include, but are not limited to, machine learning techniques.
- Machine learning techniques include text mining, data mining, neural networks, and natural language processing.
- Examples of machine learning techniques include, but are not limited to, linear perception, support vector machines, decision trees, and Naive Bayes. These techniques can each be used to more quickly evaluate unstructured data; identify and delineate interesting segmentations, groupings and patterns in the data; and facilitate further human understanding and interpretation of large sets of data.
- Machine learning techniques can rely on advanced statistical methods like linear and non-linear regression techniques, as well as non-statistical methods like decision trees, segmentation, classification, and neural networks.
- the unstructured data 204 and external data 206 can be searched to find data that matches or satisfactorily matches a specified text string, for example.
- the portion of the process 200 described to this point constitutes aspects of an ETL (extract, transform, load) process. Accordingly, disparate data in a variety of different formats from a variety of different sources can be transformed into a useful and relatively standardized format.
- ETL extract, transform, load
- the transformed data 208 is separated into training data 210 and validation data 212 .
- the training data 210 can be used to develop the models 214 .
- the models 214 are essentially qualification or regression models that implement machine learning techniques to evaluate the transformed data 208 in order to calculate a probability, and perhaps an associated confidence level that a claim contains an error. Once developed, the models 214 can be validated using the validation data 212 .
- the training data 210 is used to develop correlations between the features included in the transformed data 208 and the likelihood that a particular claim is either correct or incorrect.
- Embodiments according to the invention can be used to detect various types of errors, not just errors associated with payment/reimbursement. For example, an error in one or more of the claim attributes can be identified—e.g., an error in a contract number, procedure code, etc., specified in the claim, as well as any monetary amount included in the claim may be detected and identified.
- the claim may be classified as incorrect only if a monetary amount included in the claim is incorrect, or if some other claim attribute that affects proper reimbursement is incorrect, or if some claim attribute that is an accurate predictor of a potential reimbursement error has a certain value or is itself erroneous.
- the venous types of errors that are identified can be filtered in order to focus on a particular type of error (e.g., payment/reimbursement errors).
- Each feature included in the training data 210 can be appropriately considered and assessed using the various analytical techniques mentioned above, until one or more models 214 are produced.
- the models 214 use the value associated with a particular feature, or values associated with a particular combination of features, to calculate probability that a particular claim is problematic (e.g., the claim may contain an error, or may contain information that results in an error).
- the models 214 can also be used to calculate a confidence level associated with the calculated probability.
- Process 300 can be implemented as computer-readable instructions stored in a computer-usable medium.
- the analytics engine 150 accesses a claims database 302 .
- the type of content in the claims database 302 is similar to that of the claims database 202 ( FIG. 2 ), but the claims in the deployment process 300 are different from, or in addition to, the claims used in the training process 200 .
- the claims database 302 can include claims that have been paid as well as claims that have not yet been paid.
- the claims database 302 can include claims that have been processed/finalized, and claims that have not yet been processed or that are undergoing processing.
- the analytics engine 150 can be used to evaluate any instantiated claim.
- the analytics engine 150 can also access information such as unstructured text data 304 and external data 306 of FIG. 3 .
- the unstructured text data 304 and external data 306 are, in general, similar to the respective elements described above in conjunction with FIG. 2 with regard to the type of content, but the unstructured text data 304 and external data 306 used in the deployment process 300 may be different from, or in addition to, the information used in the training process 200 .
- the data from the data sources 302 , 304 , and 306 of FIG. 3 is transformed into transformed data 308 based on the features identified during the training process 200 of FIG. 2 .
- the transformed data 308 may include the claims themselves, actual data parsed from the FIG. 3 data sources, and derived data determined by manipulating, translating, or mining the actual data.
- relatively large and diverse sets of data are accommodated and managed.
- the models 214 are applied to the corresponding transformed data 308 to calculate a probability that the claim is incorrect (or, conversely, is correct).
- each evaluated claim is scored.
- a single score may be assigned to the claim as a whole, or there may be multiple scores associated with the claim. In the latter case, for example, one or more attributes of a claim may be individually scored.
- the claim's score can be compared to a conditional value such as a specified threshold value; if the score satisfies the conditional value (e.g., exceeds the threshold), then the claim can be forwarded to an auditor 312 for further evaluation (e.g., audit).
- the audit can be implemented in an automated fashion (e.g., in software) by adhering to pre-established auditing rules. Alternatively, a human auditor can perform the audit.
- models 214 there can be many different types of models 214 .
- the models 214 may be based on neural networks, regression logic (e.g., based on linear regression, logistic regression, polynomial regression, and/or kernel regression), and decision trees.
- regression logic e.g., based on linear regression, logistic regression, polynomial regression, and/or kernel regression
- decision trees One or more of the models 214 may be used to assess a claim.
- the models themselves may weight the various claim attributes to calculate a result, and the results from each model may also be weighted.
- a potentially problematic claim can be reviewed and decision made as to whether the claim is in fact erroneous.
- Feedback from the auditor 312 can be incorporate into the modes 214 in order to refine the accuracy of those models. For example, if the claim is indeed erroneous, then the auditor's feedback can be used to reinforce the accuracy of the models 214 ; if the claim is in fact not problematic (although predicted to be) then the auditor's feedback can be used to refine the models 214 so that erroneous predictions are less likely to occur during evaluations of subsequent claims.
- the training process 200 can be repeated using feedback from the auditor 312 to refine (update) the existing models 214 or to develop (create) new, additional models.
- the analytics engine 150 can be continually updated—as new results are generated from the deployment process 300 , the training process 200 can be repeated to update the models 214 . In this manner, the audit process helps teach the analytics engine 150 by reinforcing correct decisions and identifying incorrect ones.
- the analytics engine 150 can also be updated because of temporal changes. For example, payer practices or procedures may change for some reason—for example, the terms of a contract may change—and the analytics engine 150 can be updated accordingly. Furthermore, as experience is gained through the deployment process 300 , new claim attributes or features of interest may be identified and added to the models 214 , and new models may be developed.
- the analytics engine 150 in addition to generating a score for a claim of interest, the analytics engine 150 also generates comments or explanations that accompany the claim and are specific to that claim.
- the comments may take a variety of forms such as those described below.
- a human auditor is presented with an outline (electronic, displayed) version of the claim form, with potentially problematic items in the claim highlighted in some manner.
- potential errors in the claims can be presented in a different color, or have a different background color, relative to other items in the claim.
- the degree of coloration can be varied to reflect the degree of probability of a potential error. For example, items that are more likely to be incorrect can be displayed using a darker or brighter color relative to items less likely to be incorrect.
- the analytics engine 150 indicates that a monetary amount in the claim is possibly in error, then in addition to highlighting that amount, the attribute(s) of the claim that triggered the identification of that error can also be highlighted to varying degrees.
- the auditor is provided with a text-based explanation of why a claim, or an attribute of the claim, may be incorrect.
- a set of standard comments is generated; these standard comments may each be associated with a respective numerical code or key that in turn is associated with an appropriate text-based explanation.
- These standard comments provide a plain language explanation of the potential problem with or error in a claim. Once an error is identified, the set of standard comments can be automatically reviewed to determine which comment, if any, is probably the most appropriate, and the selected comment can be provided to the auditor along with the potentially problematic claim.
- the auditor can also audit the appropriateness of the selected comment and provide feedback to the analytics engine 150 in that regard.
- the feedback about the comment can be used to refine the part of the analytics engine 150 that selects comments so that, in subsequent claim evaluations, the appropriate comment is more accurately selected.
- the additional information provided to the auditor is not necessarily limited to an explanation highlighting one or more attributes of the claim.
- An explanation can also be associated with information (e.g., a feature or features) derived from those attributes.
- An explanation can also be associated with the claim in general, in order to broadly characterize the claim; for example, the explanation may label a claim as an underpayment or overpayment.
- auditors can be presented with information that helps them identify the reason(s) why a claim was flagged and what aspect(s) of the claim should probably be the focus of the audit.
- Such information can be about the claim, about an attribute of the claim, or about a feature derived from an attribute of the claim.
- the auditors instead of providing all potentially problematic claims to the auditors, only certain claims are forwarded. More specifically, only those claims deemed to be more important, or the most important, may be provided to auditors. Different criteria can be applied to identify which claims are the most important. In one implementation, those claims that would result in the most improvement to the analytics engine 150 are deemed to be the most important claims. For example, those claims that would result in the greatest improvement in prediction accuracy would be deemed the most important. The most important claims can be, for example, those claims that represent a large number of identical or similar claims, or the claims that have the potential for confusing the analytics engine because the probability that they are erroneous is very close to the threshold value mentioned above.
- Claims that may result in the greatest cost savings, either directly or indirectly, if correctly identified as problematic may also be considered important. For example, substantial cost savings may result if erroneous claims that are more likely to result in a phone call to a service center are intercepted and corrected before payment is mailed—by reducing the number of such claims, perhaps the size of the call center can be reduced to reduce costs.
- a measure of the improvement in the accuracy of the analytics engine 150 is quantified.
- the effect on the analytics engine 150 can be simulated in the background (e.g., by executing the training process 200 in parallel with the deployment process 300 ), with the simulation based on an assumption that the claim at issue has been properly characterized as correct/incorrect.
- Claims that have the largest impact on system accuracy are forwarded to the auditors.
- a measure of improvement can be calculated per claim; in such an implementation, only those claims whose measure is greater than a threshold value are forwarded to auditors.
- an auditor can request additional claims that are similar to that claim.
- a similar claim may include attributes that are, at least to some degree, identical to the properly predicted claim. If, for example, a particular attribute or feature of a properly predicted, problematic claim is identified as a source of error, then an auditor can request other claims that have the same value for that attribute or feature. An auditor can alternatively request, for example, other claims that received the same or similar scores as the processed claim.
- attributes of a claim can be individually scored; accordingly, an auditor can request other claims with an attribute or attributes that received the same or similar scores as the attribute(s) in the processed claim.
- additional information e.g., a standard explanation, perhaps text-based or identified by a numerical code
- an auditor can request other claims associated with the same or similar additional information as that associated with the processed claim.
- an auditor can use one or more attributes of any claim of interest, and/or the results associated with a processed claim, to define search criteria that can be used to identify and select other claims that may be of interest to the auditor. Even more generally, any information associated with any claim of interest can be used to search for, identify, and select another claim from the claims database 202 or 302 .
- FIG. 4 is a block diagram showing elements of an embodiment of an analytics engine 150 according to the present invention.
- the analytics engine 150 is implemented as computer-readable components residing on a computer-usable medium.
- the analytics engine 150 includes a data extraction module 404 and one or more predictive models 214 .
- the data extraction module 404 can access the transformed data 308 and extract information associated with each claim being evaluated.
- Claims selected for evaluation may be paid or unpaid, audited or not audited, pending or settled; in general, any instance of a claim, regardless of the claim's status, can be evaluated. Claims can be selected for evaluation in a variety of ways. In one implementation, all claims are evaluated. In other implementations, only selected claims are evaluated. In the latter implementations, claims can be selected at random, or they can be selected in response to queries, rules, or other specified selection (search) criteria. For example, once a claim has been identified as being potentially problematic, or after such a claim has been audited and confirmed as being problematic, parameters based on that claim can be defined to execute a search of the transformed data 308 (or of the claims database 302 ) in order to identify other claims that may be similarly problematic. Examples of other mechanisms for selecting claims for processing have been mentioned above. Claims selected as a result of such a search may bypass the models 214 , proceeding directly to an audit stage (e.g., auditor 312 ).
- an audit stage e.g., auditor 3
- the models 214 can be used to predict whether a claim is correct or incorrect. For example the models 214 can predict whether a monetary value specified in each claim is correct. Furthermore, the models 214 can flag a claim for an audit if the claim is predicted to be incorrect, generate comments associated with each claim, and highlight aspects of a claim that may be of particular interest to an auditor, as previously described herein.
- the analytics engine 150 also includes a data transformation module 402 that can be used in the training process 200 to access the data sources 202 , 204 , and 206 and generate the transformed data 208 , and that can be used in the deployment process 300 to access the data sources 302 , 304 , and 308 and generate the transformed data 308 , as previously described herein.
- the data transformation module 402 can use, for example, machine learning techniques.
- the analytics engine 150 also includes an auditor 312 that can automatically audit flagged claims using pre-established auditing rules.
- the auditor 312 is used to identity flagged claims that may be more important than other claims, as previously mentioned herein. That is, the auditor 312 can, in effect, filter flagged claims so that only selected claims are forwarded to a human auditor. Results from the auditor 312 , or from the audit process in general, can be used to identify other claims for evaluation. Results from the auditor 312 , or from the audit process in general, are also fed back into the training process 200 to update the models 214 as previously described herein.
- the analytics engine 150 can provide other functionality in addition to that just described.
- the analytics engine 150 can incorporate functionality that permits tracking of the status of unpaid claims or paid claims that need to be recovered or adjusted.
- the analytics engine 150 can incorporate functionality that allows patients and providers to be automatically contacted once an erroneous claim is identified—in other works, the analytics engine can generate and perhaps send standardized form letters.
- the analytics engine 150 can provide management and financial reporting functionality.
- information regarding the type and frequency of errors can be recorded by the analytics engine 150 so that such information can be subsequently used to perform root cause analyses or to spot emerging trends,
- FIGS. 5 and 6 are flowcharts showing embodiments of computer-implemented methods for processing claims. Although specific steps are disclosed in the flowcharts, such steps are examples only. That is, various other steps or variations of the steps recited in the flowcharts can be performed. The steps in the flowcharts may be performed in an order different than presented. Furthermore, the features of the various embodiments described by the flowcharts can be used alone or in combination with each other. In one embodiment, the flowcharts are implemented as computer-readable instructions stored in a computer-usable medium.
- first historical information associated with a set of claims is accessed.
- the first historical information includes attributes of the claims and information derived from the claim attributes. Specifically, during a training process, the first historical information includes information in the claims database 202 of FIG. 2 .
- second historical information is accessed.
- the second historical information includes information in addition to the aforementioned first historical information. Specifically, during the training process, the second historical information includes the unstructured text data 204 and the external data 206 of FIG. 2 .
- the first and second historical information can be combined to develop models 214 that are useful for predicting whether a claim is correct.
- the attributes of the claim are evaluated using the models 214 ( FIG. 3 ) to determine a probability that the claim is erroneous. For example, a score is calculated for the claim being evaluated.
- the claim is flagged for further evaluation (e.g., an audit) to determine whether the claim is indeed erroneous.
- additional information e.g., a comment or explanation
- the additional information is used to highlight in some fashion an attribute or attributes of the claim that likely triggered the audit.
- the additional information may be, for example, a text-based comment or non-textual visual cue (e.g., a different color or brightness may be used to highlight an attribute).
- a measure of improvement to the model 214 is determined prior to the audit.
- the audit may only be performed if the measure satisfies a threshold value. In other words, an effort can be made to identify important claims, where importance may be defined in any number of ways, with only the more important claims being audited.
- embodiments according to the present invention provide an automated system/tool that allows seamless integration of claims data and other data sets including unstructured text/semantic data from a variety of sources, including Web-based sources and databases. Using that information, an automated analysis of claims can be performed to identify problems before the claim is settled, or to reconcile errors identified after the claim is settled. Moreover, the system/tool can continually learn from the results of the claims analysis. In the long run, less rework will be needed, thereby reducing costs. Also, as accuracy increases, consumer (patient and provider) satisfaction will increase. Error may be unintentional or intentional (e.g., fraudulent)—by systematically improving the capability to accurately identify errors, fraudulent claims can be more readily identified.
- aspects of the present invention can be applied to insurance claims in other industries.
- aspects of the invention can be applied to records, files, and other types of forms (other than claim forms) that may be utilized on a regular basis in various types of industries.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Data Mining & Analysis (AREA)
- Human Resources & Organizations (AREA)
- Software Systems (AREA)
- Technology Law (AREA)
- Development Economics (AREA)
- Quality & Reliability (AREA)
- Evolutionary Computation (AREA)
- Operations Research (AREA)
- Mathematical Physics (AREA)
- Tourism & Hospitality (AREA)
- Medical Informatics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Artificial Intelligence (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Medical Treatment And Welfare Office Work (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Methods and systems for processing claims (e.g., healthcare insurance claims) are described. For example, prior to payment of an unpaid claim, a prediction is made as to whether or not an attribute specified in the claim is correct. Depending on the prediction results, the claim can be flagged for an audit. Feedback from the audit can be used to update the prediction models in order to refine the accuracy of those models.
Description
- Processes used by healthcare claims payers are manually intensive and inconsistently executed, and are subject to error, fraud, and abuse. As a result healthcare administrators have difficulty identifying and preventing claim payment errors. Currently, about 30 percent of the expense of administering claims is associated with back end operators and support, particularly activities associated with “reworking” claims. That is, a great deal of expense is associated with auditing claims to identify payment errors, handling provider and patient complaints when underpayments are made, and contacting providers and patients to recover overpayments. These costs are ultimately borne by customers (both providers and patients), and errors in processing claims can also result in increasing customer dissatisfaction.
- Embodiments according to the present invention pertain to an analytical tool that can be utilized in, for example, the healthcare industry but can also be applied outside the healthcare industry. Using healthcare as an example, the analytical tool is used to address problems with reworking claims, such as but not limited to payment issues (e.g., overpayment or underpayment of claims). Importantly, the analytical tool is intended to identify claims that have a high probability of being problematic so that those claims can be proactively reconciled, thus avoiding or reducing the cost and effort of reworking erroneous claims.
- The analytical tool is generally characterized as predictive, learning, and real-time system of models. To develop the tool, information is collected from a number of disparate sources and transformed into a useful format. The information can include relatively unstructured text and semantic data collected from a variety of sources, as well as structured (e.g., numerical, statistical) data read from standardized claim forms. The information is analyzed using methods such as segmentation, classification, etc., to create predictive models that have the capability to continuously learn—that is, the models can be continually improved as new information is collected and as more claims are evaluated.
- In practice, as an example, claims known to have resulted in a payment error can be analyzed using the inventive analytical tool, and attributes of those claims can be compared against those of other claims to identify additional claims that may also result in a payment error. Those additional claims can be identified to an auditor (automated or human), so that any errors in the claims can be corrected before payment; if payment has been made, then errors can be proactively rectified. Feedback from the auditor is incorporated into the analytical tool, in this manner refining the accuracy of the tool for application to subsequent claims.
- By automatically detecting claims that may require rework (correction or adjustment) in advance, customer relations can be improved, and administrative efforts and costs can be reduced.
- These and other objects and advantages of the present invention will be recognized by one skilled in the art after having read the following detailed description, which are illustrated in the various drawing figures.
- The accompanying drawings, with are incorporated in and form a part of this specification, illustrate embodiments of the invention and, together with the description serve to explain the principles of the invention. Like numbers denote like elements throughout the drawings and specification.
-
FIG. 1 is e block diagram of an example of a computer system upon which embodiments of the present invention can be implemented. -
FIG. 2 is an embodiment of a training process that can be implemented by an analytical tool according to the invention. -
FIG. 3 is an embodiment of deployment process that can be implemented by an analytical tool according to the invention. -
FIG. 4 is a block diagram showing an embodiment of a computer-implemented analytical tool according to the invention. -
FIGS. 5 and 6 are flowcharts showing steps in computer-implemented methods for processing claims according to embodiments of the present invention. - In the following detailed description of embodiments according to the present invention, numerous specific details are set forth in order to provide a thorough understanding of those embodiments. However, it will be recognized by one skilled in the art that the present invention may be practiced without these specific details or with equivalents thereof. In other instances, well-known methods, procedures, components, and circuits have not been described in detail as not to unnecessarily obscure aspects of the present invention.
- Some portions of the detailed descriptions which follow are presented in terms of procedures, logic blocks, processing and other symbolic representations of operations on data bits within a computer memory. These descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. In the present application, a procedure, logic block, process, or the like, is conceived to be a self-consistent sequence of steps or instructions leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, although not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated in a computer system.
- It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussions, it is appreciated that throughout the present application, discussions utilizing the terms such as “accessing,” “combining,” “incorporating,” “identifying,” “extracting,” “predicting,” “deriving,” “flagging,” “evaluating,” “updating,” “comparing,” “applying,” “quantifying,” “associating” “selecting” or the like, may refer to the actions and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
- Embodiments described herein may be discussed in the general context of computer-executable instructions residing on some form of computer-usable medium, such as program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, etc., that perform particular tasks or implement particular abstract data types. The functionality of the program modules may be combined or distributed as desired in various embodiments.
-
FIG. 1 shows a block diagram of an example of acomputer system 100 upon which the embodiments described herein may be implemented. In its most basic configuration, thesystem 100 includes at least oneprocessing unit 102 andmemory 104. This most basic configuration is illustrated inFIG. 1 by dashedline 106. Thesystem 100 may also have additional features/functionality. For example, thesystem 100 may also include additional storage (removable and/or non-removable) including, but not limited to, magnetic or optical disks or tape. Such additional storage is illustrated inFIG. 1 by removable storage 108 andnon-removable storage 120. Thesystem 100 may also contain communications connection(s) 122 that allow the device to communicate with other devices. - Generally speaking, the
system 100 includes at least some form of computer-usable media. Computer-usable media can be any available media that can be accessed by thesystem 100. By way of example, and not limitation, computer-usable media may comprise computer storage media and communication media. - Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, random access memory (RAM), read only memory (ROM), electrically erasable programmable ROM (EEPROM), flash memory or other memory technology, compact disk ROM (CD-ROM), digital versatile disks (DVDs) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to store the desired information and that can be accessed by the
system 100. Any such computer storage media may be part of thesystem 100. Thememory 104, removable storage 108 and non-removable storage 20 are all examples of computer storage media. - Communication media can embody computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such a acoustic, radio frequency (RF), infrared and other wireless media. Combinations of any of the above can also be included within the cope of computer-readable media. The communications connection(s) 122 is/are an example of communication media.
- The
system 100 may also have input device(s) 124 such as keyboard, mouse, pen, voice input device, touch input device, etc. Output device(s) 126 such as a display, speakers, printer, etc., may also be included. - The
system 100 may operate in a networked environment using logical connections to one or more remote computers. When used in a networking environment, thesystem 100 can be connected to the network through the communication connection(s) 122. - In the example of
FIG. 1 , thememory 104 includes computer-readable instructions, data structures, program modules and the like associated with ananalytics engine 150. However, theanalytics engine 150 may instead reside in any one of the computer storage media used by thesystem 100, or may be distributed over some combination of the computer storage media, or may be distributed over some combination of networked computers. - The
analytics engine 150 is generally characterized as a predictive, learning, and real-time system of models. In overview, the analytics engine (or analytical tool) 150 can be utilized in, for example, the healthcare industry, including but not limited to health insurance claim payers, hospitals, and physician groups. However, embodiments according to the invention are not limited to healthcare applications. Generally speaking, embodiments of the invention can be utilized in businesses, industries, and the like that utilize claims and other types of records, files, and forms (other than claim forms) on a regular basis. In addition to healthcare, embodiments according to the invention can be used to evaluate claims, records, files, and the like that are used for workman's compensation, property insurance, and casualty insurance, for example. - When processing claims, for example, the
analytics engine 150 can be used to identify claims that have a high probability of being problematic so that those claims can be proactively reconciled, thus avoiding or at least reducing the cost and effort of reworking erroneous claims. In practice, claims known to include an error, or to have resulted in an error, can be analyzed using theanalytics engine 150, and attributes of those claims can be compared against other claims to identify any other claims that may be associated with the same is type of error. As an example, claims known to have resulted in a payment error can be analyzed using theanalytics engine 150, and attributes of those claims can be used as the basis for identifying any other claims that may also result in a payment error. Claims identified as potentially being problematic can be submitted to an auditor (human or automated), so that any errors can be corrected before handling of the claim is completed (e.g., before payment). If the claim has been settled or finalized (e.g., payment has been made), then errors can be proactively rectified. Feedback from the auditor is incorporated into theanalytics engine 150, in this manner refining the accuracy of the tool for subsequent application to other claims. - Elements and functionalities associated with the
analytics engine 150 are presented in detail below. Theanalytics engine 150 can be utilized in a training process (seeFIG. 2 ) and/or in a deployment process (seeFIG. 3 ). -
FIG. 2 shows an embodiment of atraining process 200 that can be implemented using theanalytics engine 150 according to the present invention.Process 200 can be implemented as computer-readable instructions stored in a computer usable medium. - In the
FIG. 2 embodiment, theanalytics engine 150 accesses aclaims database 202. Theclaims database 202 can include paid and/or unpaid claims, claims that have been audited, claims that have not yet been audited, claims that have been finalized/settled, and claims that are pending. In the training process, consideration of claims that have been audited can be important because the lessons learned from those claims can be incorporated into theprediction models 214 that are discussed below. - In a healthcare implementation, the claims are, in general, stored in a standardized, computer-usable (computer-readable) format, such as a format based on Health Care Financing Administration (HCFA) Form 1500 or Uniform Billing (UB) Form 92. The information in the
claims database 202 may be referred to herein as “first historical information.” - The
analytics engine 150 can also access information such as unstructured text data 204 andexternal data 206. Generally speaking, unstructured text data 204 andexternal data 206 encompass information not included in theclaims database 202. As will be seen from the discussion below, an objective of thetraining process 200 is to develop models that can be used to predict whether or not a claim contains accurate information—in general, a purpose of theanalytics engine 150 is to identify potentially problematic claims and intercept those claims before payment (as noted above, the tool can also be used to identify potentially problematic claims after payment). A prediction can be made by correlating information in a claim to information that is known to be correct and/or information that is known to be incorrect weighted by other types of information found to be interesting by virtue of that information's value as an error predictor or marker. In general, unstructured text data 204 andexternal data 206 constitute those “other types of information,” and as such they include a wide variety of different types of information. - Unstructured text data 204 and
external data 206 can be based on, for example, dispute information, provider call information, recovery information, and audit result information. Unstructured text data 204 may further include information such as, but not limited to, doctor's notes, auditor's notes, notes from customer service calls, etc.External data 206, in general, includes other information that is not included in the claims and is not already included in the unstructured text data 204.External data 206 may include information such as, but not limited to, Web-based information or information from other sources that are up-to-date—for example, information that a certain area of a country or the world is experiencing a flu outbreak may be included in the external data.External data 206 may also include information from various public or private databases that may be freely available or may be sold commercially. - The types of information included in the unstructured text data 204 and the
external data 206, as well as the information itself, may be dynamic. For example, information about the aforementioned flu outbreak may be considered relevant for a period of time but may become less and less relevant, and this may be weighted less or discarded. Unstructured text data 204 andexternal data 206, as well as any other information not included in theclaims database 202 or not derived from the information in the claims database, may be collectively referred to herein as “second historical information.” - The information in the data sources—the
claims database 202, the unstructured text data 204, and theexternal data 206—is used as the basis for identifying features that are expected to be useful in identifying problematic claims. A “feature,” generally speaking, is a named parameter or variable; a value for the feature is obtained from or derived from the aforementioned data sources on a per-claim basis (although a feature may have the same value for a group of claims). - Features may be based on the type of entries included in the data sources —for example, the patient's age, the doctor's name, a contract number, an insurance code, a monetary amount, and an address can be read directly from the data sources. Features may also be derived from the types of information included in the data sources—for example, the number of days between the time when a medical procedure was performed and the time when the claim is submitted, the number of days between claim receipt and data processing, the procedure code that had the highest billed amount in a claim, the amount paid for a particular procedure minus the average amount paid for that procedure over the past six months and then divided by the standard deviation for the amount paid for that procedure over the same six months, or the cost of a particular type of medication averaged over a group of doctors or over a particular geographical region over a period of time, may be considered useful features that can be determined using the information included in the data sources.
- The transformed
data 208 include values for the chosen features. The transformeddata 208 may include the claims themselves (paid and unpaid, audited and not audited, settled and pending), actual data that is parsed from the aforementioned data sources, and derived data that is determined by manipulating, translating, or mining the actual data. - A variety of analytical techniques can be used, individually and jointly, to generate the transformed
data 208. These techniques include, but are not limited to, machine learning techniques. - Machine learning techniques include text mining, data mining, neural networks, and natural language processing. Examples of machine learning techniques include, but are not limited to, linear perception, support vector machines, decision trees, and Naive Bayes. These techniques can each be used to more quickly evaluate unstructured data; identify and delineate interesting segmentations, groupings and patterns in the data; and facilitate further human understanding and interpretation of large sets of data. Machine learning techniques can rely on advanced statistical methods like linear and non-linear regression techniques, as well as non-statistical methods like decision trees, segmentation, classification, and neural networks. Using machine learning techniques, the unstructured data 204 and
external data 206 can be searched to find data that matches or satisfactorily matches a specified text string, for example. - Essentially, the portion of the
process 200 described to this point constitutes aspects of an ETL (extract, transform, load) process. Accordingly, disparate data in a variety of different formats from a variety of different sources can be transformed into a useful and relatively standardized format. - In the example of
FIG. 2 , the transformeddata 208 is separated intotraining data 210 andvalidation data 212. Thetraining data 210 can be used to develop themodels 214. Themodels 214 are essentially qualification or regression models that implement machine learning techniques to evaluate the transformeddata 208 in order to calculate a probability, and perhaps an associated confidence level that a claim contains an error. Once developed, themodels 214 can be validated using thevalidation data 212. - More specifically, the
training data 210 is used to develop correlations between the features included in the transformeddata 208 and the likelihood that a particular claim is either correct or incorrect. Embodiments according to the invention can be used to detect various types of errors, not just errors associated with payment/reimbursement. For example, an error in one or more of the claim attributes can be identified—e.g., an error in a contract number, procedure code, etc., specified in the claim, as well as any monetary amount included in the claim may be detected and identified. - However, it may be that only a certain characteristic of the claim is of interest. For example, desired goal is accurate reimbursement of money owed to a provider or patient, then the claim may be classified as incorrect only if a monetary amount included in the claim is incorrect, or if some other claim attribute that affects proper reimbursement is incorrect, or if some claim attribute that is an accurate predictor of a potential reimbursement error has a certain value or is itself erroneous. Thus, in one implementation, the venous types of errors that are identified can be filtered in order to focus on a particular type of error (e.g., payment/reimbursement errors).
- Each feature included in the
training data 210 can be appropriately considered and assessed using the various analytical techniques mentioned above, until one ormore models 214 are produced. In practice, many different models are produced. Themodels 214 use the value associated with a particular feature, or values associated with a particular combination of features, to calculate probability that a particular claim is problematic (e.g., the claim may contain an error, or may contain information that results in an error). Themodels 214 can also be used to calculate a confidence level associated with the calculated probability. Once thetraining data 210 can be satisfactorily predicted using themodels 214—that is, once problematic claims can be identified to a satisfactory level of confidence—then thevalidation data 212 can be used to independently test and verify the accuracy of the models. Model development is an iterative process between training and validation that proceeds until thevalidation data 212 is satisfactorily predicted. - With reference now to
FIG. 3 , an embodiment of adeployment process 300 that can be implemented using theanalytics engine 150 according to the present invention is shown.Process 300 can be implemented as computer-readable instructions stored in a computer-usable medium. - In the
FIG. 3 embodiment, theanalytics engine 150 accesses aclaims database 302. The type of content in theclaims database 302 is similar to that of the claims database 202 (FIG. 2 ), but the claims in thedeployment process 300 are different from, or in addition to, the claims used in thetraining process 200. - In a healthcare claims payer example, the
claims database 302 can include claims that have been paid as well as claims that have not yet been paid. In general, theclaims database 302 can include claims that have been processed/finalized, and claims that have not yet been processed or that are undergoing processing. More generally, theanalytics engine 150 can be used to evaluate any instantiated claim. - The
analytics engine 150 can also access information such asunstructured text data 304 andexternal data 306 ofFIG. 3 . Theunstructured text data 304 andexternal data 306 are, in general, similar to the respective elements described above in conjunction withFIG. 2 with regard to the type of content, but theunstructured text data 304 andexternal data 306 used in thedeployment process 300 may be different from, or in addition to, the information used in thetraining process 200. - The data from the
data sources FIG. 3 is transformed into transformeddata 308 based on the features identified during thetraining process 200 ofFIG. 2 . In other words, the transformeddata 308 may include the claims themselves, actual data parsed from theFIG. 3 data sources, and derived data determined by manipulating, translating, or mining the actual data. Thus, generally speaking, relatively large and diverse sets of data (diverse in terms of both content and source) are accommodated and managed. - Continuing with reference to
FIG. 3 , for each claim selected from theclaims database 302, themodels 214 are applied to the corresponding transformeddata 308 to calculate a probability that the claim is incorrect (or, conversely, is correct). In essence, each evaluated claim is scored. A single score may be assigned to the claim as a whole, or there may be multiple scores associated with the claim. In the latter case, for example, one or more attributes of a claim may be individually scored. In one embodiment, the claim's score can be compared to a conditional value such as a specified threshold value; if the score satisfies the conditional value (e.g., exceeds the threshold), then the claim can be forwarded to anauditor 312 for further evaluation (e.g., audit). The audit can be implemented in an automated fashion (e.g., in software) by adhering to pre-established auditing rules. Alternatively, a human auditor can perform the audit. - As mentioned previously herein, there can be many different types of
models 214. For example, themodels 214 may be based on neural networks, regression logic (e.g., based on linear regression, logistic regression, polynomial regression, and/or kernel regression), and decision trees. One or more of themodels 214 may be used to assess a claim. The models themselves may weight the various claim attributes to calculate a result, and the results from each model may also be weighted. - In the audit, a potentially problematic claim can be reviewed and decision made as to whether the claim is in fact erroneous. Feedback from the
auditor 312 can be incorporate into themodes 214 in order to refine the accuracy of those models. For example, if the claim is indeed erroneous, then the auditor's feedback can be used to reinforce the accuracy of themodels 214; if the claim is in fact not problematic (although predicted to be) then the auditor's feedback can be used to refine themodels 214 so that erroneous predictions are less likely to occur during evaluations of subsequent claims. As shown inFIG. 3 , thetraining process 200 can be repeated using feedback from theauditor 312 to refine (update) the existingmodels 214 or to develop (create) new, additional models. Generally speaking, theanalytics engine 150 can be continually updated—as new results are generated from thedeployment process 300, thetraining process 200 can be repeated to update themodels 214. In this manner, the audit process helps teach theanalytics engine 150 by reinforcing correct decisions and identifying incorrect ones. - The
analytics engine 150 can also be updated because of temporal changes. For example, payer practices or procedures may change for some reason—for example, the terms of a contract may change—and theanalytics engine 150 can be updated accordingly. Furthermore, as experience is gained through thedeployment process 300, new claim attributes or features of interest may be identified and added to themodels 214, and new models may be developed. - In one embodiment, in addition to generating a score for a claim of interest, the
analytics engine 150 also generates comments or explanations that accompany the claim and are specific to that claim. The comments may take a variety of forms such as those described below. - In one implementation, a human auditor is presented with an outline (electronic, displayed) version of the claim form, with potentially problematic items in the claim highlighted in some manner. For example, potential errors in the claims can be presented in a different color, or have a different background color, relative to other items in the claim. The degree of coloration can be varied to reflect the degree of probability of a potential error. For example, items that are more likely to be incorrect can be displayed using a darker or brighter color relative to items less likely to be incorrect. For example, if the
analytics engine 150 indicates that a monetary amount in the claim is possibly in error, then in addition to highlighting that amount, the attribute(s) of the claim that triggered the identification of that error can also be highlighted to varying degrees. - In another implementation, the auditor is provided with a text-based explanation of why a claim, or an attribute of the claim, may be incorrect. As the number of claims evaluated by the
analytics engine 150 increases, recurring problems/errors can be identified and uniformly described. In other words, in one embodiment, a set of standard comments is generated; these standard comments may each be associated with a respective numerical code or key that in turn is associated with an appropriate text-based explanation. These standard comments provide a plain language explanation of the potential problem with or error in a claim. Once an error is identified, the set of standard comments can be automatically reviewed to determine which comment, if any, is probably the most appropriate, and the selected comment can be provided to the auditor along with the potentially problematic claim. While auditing the claim, the auditor can also audit the appropriateness of the selected comment and provide feedback to theanalytics engine 150 in that regard. The feedback about the comment can be used to refine the part of theanalytics engine 150 that selects comments so that, in subsequent claim evaluations, the appropriate comment is more accurately selected. - The additional information provided to the auditor is not necessarily limited to an explanation highlighting one or more attributes of the claim. An explanation can also be associated with information (e.g., a feature or features) derived from those attributes. An explanation can also be associated with the claim in general, in order to broadly characterize the claim; for example, the explanation may label a claim as an underpayment or overpayment.
- Thus, generally speaking, auditors can be presented with information that helps them identify the reason(s) why a claim was flagged and what aspect(s) of the claim should probably be the focus of the audit. Such information can be about the claim, about an attribute of the claim, or about a feature derived from an attribute of the claim.
- In one embodiment, instead of providing all potentially problematic claims to the auditors, only certain claims are forwarded. More specifically, only those claims deemed to be more important, or the most important, may be provided to auditors. Different criteria can be applied to identify which claims are the most important. In one implementation, those claims that would result in the most improvement to the
analytics engine 150 are deemed to be the most important claims. For example, those claims that would result in the greatest improvement in prediction accuracy would be deemed the most important. The most important claims can be, for example, those claims that represent a large number of identical or similar claims, or the claims that have the potential for confusing the analytics engine because the probability that they are erroneous is very close to the threshold value mentioned above. Claims that may result in the greatest cost savings, either directly or indirectly, if correctly identified as problematic may also be considered important. For example, substantial cost savings may result if erroneous claims that are more likely to result in a phone call to a service center are intercepted and corrected before payment is mailed—by reducing the number of such claims, perhaps the size of the call center can be reduced to reduce costs. - In one embodiment, to identify the most important problematic claims, a measure of the improvement in the accuracy of the
analytics engine 150, assuming those claims were correctly predicted, is quantified. For example, for a potentially problematic claim identified as such, the effect on theanalytics engine 150 can be simulated in the background (e.g., by executing thetraining process 200 in parallel with the deployment process 300), with the simulation based on an assumption that the claim at issue has been properly characterized as correct/incorrect. Claims that have the largest impact on system accuracy are forwarded to the auditors. For example, as mentioned above, a measure of improvement can be calculated per claim; in such an implementation, only those claims whose measure is greater than a threshold value are forwarded to auditors. - In another embodiment, once a properly predicted claim—that is, a claim that is properly predicted as being correct or, perhaps of greater interest, a claim that is properly predicted as being problematic—is identified, an auditor can request additional claims that are similar to that claim. A similar claim may include attributes that are, at least to some degree, identical to the properly predicted claim. If, for example, a particular attribute or feature of a properly predicted, problematic claim is identified as a source of error, then an auditor can request other claims that have the same value for that attribute or feature. An auditor can alternatively request, for example, other claims that received the same or similar scores as the processed claim. As noted previously herein, attributes of a claim can be individually scored; accordingly, an auditor can request other claims with an attribute or attributes that received the same or similar scores as the attribute(s) in the processed claim. Also, as noted previously herein, additional information (e.g., a standard explanation, perhaps text-based or identified by a numerical code) can be associated with a processed claim; accordingly, an auditor can request other claims associated with the same or similar additional information as that associated with the processed claim. In general, an auditor can use one or more attributes of any claim of interest, and/or the results associated with a processed claim, to define search criteria that can be used to identify and select other claims that may be of interest to the auditor. Even more generally, any information associated with any claim of interest can be used to search for, identify, and select another claim from the
claims database -
FIG. 4 is a block diagram showing elements of an embodiment of ananalytics engine 150 according to the present invention. In one embodiment, theanalytics engine 150 is implemented as computer-readable components residing on a computer-usable medium. - In the example of
FIG. 4 , theanalytics engine 150 includes adata extraction module 404 and one or morepredictive models 214. Thedata extraction module 404 can access the transformeddata 308 and extract information associated with each claim being evaluated. - Claims selected for evaluation may be paid or unpaid, audited or not audited, pending or settled; in general, any instance of a claim, regardless of the claim's status, can be evaluated. Claims can be selected for evaluation in a variety of ways. In one implementation, all claims are evaluated. In other implementations, only selected claims are evaluated. In the latter implementations, claims can be selected at random, or they can be selected in response to queries, rules, or other specified selection (search) criteria. For example, once a claim has been identified as being potentially problematic, or after such a claim has been audited and confirmed as being problematic, parameters based on that claim can be defined to execute a search of the transformed data 308 (or of the claims database 302) in order to identify other claims that may be similarly problematic. Examples of other mechanisms for selecting claims for processing have been mentioned above. Claims selected as a result of such a search may bypass the
models 214, proceeding directly to an audit stage (e.g., auditor 312). - As described above, the
models 214 can be used to predict whether a claim is correct or incorrect. For example themodels 214 can predict whether a monetary value specified in each claim is correct. Furthermore, themodels 214 can flag a claim for an audit if the claim is predicted to be incorrect, generate comments associated with each claim, and highlight aspects of a claim that may be of particular interest to an auditor, as previously described herein. - In one embodiment, the
analytics engine 150 also includes adata transformation module 402 that can be used in thetraining process 200 to access thedata sources data 208, and that can be used in thedeployment process 300 to access thedata sources data 308, as previously described herein. Thedata transformation module 402 can use, for example, machine learning techniques. - As previously described herein, auditing may be performed by a human. However, in one embodiment, the
analytics engine 150 also includes anauditor 312 that can automatically audit flagged claims using pre-established auditing rules. In one such embodiment, theauditor 312 is used to identity flagged claims that may be more important than other claims, as previously mentioned herein. That is, theauditor 312 can, in effect, filter flagged claims so that only selected claims are forwarded to a human auditor. Results from theauditor 312, or from the audit process in general, can be used to identify other claims for evaluation. Results from theauditor 312, or from the audit process in general, are also fed back into thetraining process 200 to update themodels 214 as previously described herein. - The
analytics engine 150 can provide other functionality in addition to that just described. For example, theanalytics engine 150 can incorporate functionality that permits tracking of the status of unpaid claims or paid claims that need to be recovered or adjusted. For example, theanalytics engine 150 can incorporate functionality that allows patients and providers to be automatically contacted once an erroneous claim is identified—in other works, the analytics engine can generate and perhaps send standardized form letters. Also, for example, theanalytics engine 150 can provide management and financial reporting functionality. - Furthermore, information regarding the type and frequency of errors can be recorded by the
analytics engine 150 so that such information can be subsequently used to perform root cause analyses or to spot emerging trends, -
FIGS. 5 and 6 are flowcharts showing embodiments of computer-implemented methods for processing claims. Although specific steps are disclosed in the flowcharts, such steps are examples only. That is, various other steps or variations of the steps recited in the flowcharts can be performed. The steps in the flowcharts may be performed in an order different than presented. Furthermore, the features of the various embodiments described by the flowcharts can be used alone or in combination with each other. In one embodiment, the flowcharts are implemented as computer-readable instructions stored in a computer-usable medium. - With reference first to
FIG. 5 , inblock 502, first historical information associated with a set of claims is accessed. The first historical information includes attributes of the claims and information derived from the claim attributes. Specifically, during a training process, the first historical information includes information in theclaims database 202 ofFIG. 2 . - In
block 504, second historical information is accessed. The second historical information includes information in addition to the aforementioned first historical information. Specifically, during the training process, the second historical information includes the unstructured text data 204 and theexternal data 206 ofFIG. 2 . - In
block 506, using a training process 200 (FIG. 2 ) such as that described above, the first and second historical information can be combined to developmodels 214 that are useful for predicting whether a claim is correct. - In
block 508, feedback from an audit of the claim is incorporated into themodels 214. - With reference now to
FIG. 6 , inblock 602, attributes of a claim are accessed. - In
block 604, the attributes of the claim are evaluated using the models 214 (FIG. 3 ) to determine a probability that the claim is erroneous. For example, a score is calculated for the claim being evaluated. - In
block 606, if the probability (score) satisfies a threshold, then the claim is flagged for further evaluation (e.g., an audit) to determine whether the claim is indeed erroneous. - In
block 608, in one embodiment, if the claim is flagged for an audit, then additional information (e.g., a comment or explanation) is associated with the claim, to facilitate the audit. The additional information, generally speaking, is used to highlight in some fashion an attribute or attributes of the claim that likely triggered the audit. The additional information may be, for example, a text-based comment or non-textual visual cue (e.g., a different color or brightness may be used to highlight an attribute). - In
block 610, in one embodiment, if the claim is flagged for an audit, then a measure of improvement to themodel 214 is determined prior to the audit. The audit may only be performed if the measure satisfies a threshold value. In other words, an effort can be made to identify important claims, where importance may be defined in any number of ways, with only the more important claims being audited. - In summary, embodiments according to the present invention provide an automated system/tool that allows seamless integration of claims data and other data sets including unstructured text/semantic data from a variety of sources, including Web-based sources and databases. Using that information, an automated analysis of claims can be performed to identify problems before the claim is settled, or to reconcile errors identified after the claim is settled. Moreover, the system/tool can continually learn from the results of the claims analysis. In the long run, less rework will be needed, thereby reducing costs. Also, as accuracy increases, consumer (patient and provider) satisfaction will increase. Error may be unintentional or intentional (e.g., fraudulent)—by systematically improving the capability to accurately identify errors, fraudulent claims can be more readily identified.
- Although described in the context of insurance claims in the healthcare industry, embodiments according to the present invention are not limited. For example, aspects of the present invention can be applied to insurance claims in other industries. Also, aspects of the invention can be applied to records, files, and other types of forms (other than claim forms) that may be utilized on a regular basis in various types of industries.
- The foregoing descriptions of specific embodiments according to the present invention have been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise forms disclosed, and many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and its practical application, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims appended hereto and their equivalents.
Claims (20)
1. A computer-implemented method comprising:
generating training data for training a predictive model to identify claims as likely erroneous or as not likely erroneous, the training data including, for each of a plurality of claims, (i) one or more intrinsic features that are derived from the claim itself, and (ii) a label indicating whether the claim is erroneous or not, the training data further including one or more extrinsic features that are not derived from the plurality of claims;
training the predictive model using the one or more intrinsic features, the one or more extrinsic features, and the labels included in the training data;
after training the predictive model, receiving a particular claim;
generating (i) one or more intrinsic features for the particular claim and (ii) one or more extrinsic features associated with the particular claim;
providing, to the predictive model, (i) the one or more intrinsic features for the particular claim and (ii) the one or more extrinsic features associated with the particular claim; and
obtaining, from the predictive model, an indication of whether the particular claim is likely erroneous or is not likely erroneous based on providing (i) the one or more intrinsic features for the particular claim and (ii) the one or more extrinsic features for the particular claim to the predictive model.
2. The computer-implemented method of claim 1 , further comprising submitting the particular claim to an audit process in response to obtaining an indication that the particular claim is likely erroneous.
3. The computer-implemented method of claim 2 , further comprising:
receiving feedback associated with the particular claim from the audit process; and
updating the predictive model based on the received feedback.
4. The computer-implemented method of claim 2 , wherein submitting the particular claim to the audit process includes providing a description of why the particular claim is likely erroneous.
5. The computer-implemented method of claim 4 , wherein the description includes one or more potential errors in the particular claim.
6. The computer-implemented method of claim 1 , wherein the indication of whether the particular claim is likely erroneous or is not likely erroneous includes a probability score that indicates a probability that the claim is erroneous.
7. The computer-implemented method of claim 1 , wherein the training data for training the predictive model is generated from historical claim information.
8. The computer-implemented method of claim 1 , wherein each of the one or more extrinsic features included in the training data is associated with at least one claim from the plurality of claims.
9. The computer-implemented method of claim 1 , wherein each of the one or more extrinsic features included in the training data is associated with a patient included in at least one claim from the plurality of claims.
10. A non-transitory, computer-readable medium storing instructions operable when executed to cause at least one processor to perform operations comprising:
generating training data for training a predictive model to identify claims as likely erroneous or as not likely erroneous, the training data including, for each of a plurality of claims, (i) one or more intrinsic features that are derived from the claim itself, and (ii) a label indicating whether the claim is erroneous or not, the training data further including one or more extrinsic features that are not derived from the plurality of claims;
training the predictive model using the one or more intrinsic features, the one or more extrinsic features, and the labels included in the training data;
after training the predictive model, receiving a particular claim;
generating (i) one or more intrinsic features for the particular claim and (ii) one or more extrinsic features associated with the particular claim;
providing, to the predictive model, (i) the one or more intrinsic features for the particular claim and (ii) the one or more extrinsic features associated with the particular claim; and
obtaining, from the predictive model, an indication of whether the particular claim is likely erroneous or is not likely erroneous based on providing (i) the one or more intrinsic features for the particular claim and (ii) the one or more extrinsic features for the particular claim to the predictive model.
11. The computer-readable medium of claim 10 , the operations further comprising submitting the particular claim to an audit process in response to obtaining an indication that he particular claim is likely erroneous.
12. The computer-readable medium of claim 11 , the operations further comprising:
receiving feedback associated with the particular claim from the audit process; and
updating the predictive model based on the received feedback.
13. The computer-readable medium of claim 11 , wherein submitting the particular claim to the audit process includes providing a description of why the particular claim is likely erroneous.
14. The computer-readable medium of claim 13 , wherein the description includes one or more potential errors in the particular claim.
15. The computer-readable medium of claim 10 , wherein the indication of whether the particular claim is likely erroneous or is not likely erroneous includes a probability score that indicates a probability that the claim is erroneous.
16. The computer-readable medium of claim 10 , wherein the training data for training the predictive model is generated from historical claim information.
17. The computer-readable medium of claim 10 , wherein each of the one or more extrinsic features included in the training data is associated with at least one claim from the plurality of claims.
18. The computer-readable medium of claim 10 , wherein each of the one or more extrinsic features included in the training data is associated with a patient included in at least one claim from the plurality of claims.
19. A system comprising:
memory for storing data; and
one or more processors operable to perform operations comprising:
generating training data for training a predictive model to identify claims as likely erroneous or as not likely erroneous, the training data including, for each of a plurality of claims, (i) one or more intrinsic features that are derived from the claim itself, and (ii) a label indicating whether the claim is erroneous or not, the training data further including one or more extrinsic features that are not derived from the plurality of claims;
training the predictive model using the one or more intrinsic features, the one or more extrinsic features, and the labels included in the training data;
after training the predictive model, receiving a particular claim;
generating (i) one or more intrinsic features for the particular claim and (ii) one or more extrinsic features associated with the particular claim;
providing, to the predictive model, (i) the one or more intrinsic features for the particular claim and (ii) the one or more extrinsic features associated with the particular claim; and
obtaining, from the predictive model, an indication of whether the particular claim is likely erroneous or is not likely erroneous based on providing (i) the one or more intrinsic features for the particular claim and (ii) the one or more extrinsic features for the particular claim to the predictive model.
20. The system of claim 19 , the operations further comprising submitting the particular claim to an audit process in response to obtaining an indication that the particular claim is likely erroneous.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/280,065 US20140249865A1 (en) | 2009-08-25 | 2014-05-16 | Claims analytics engine |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/547,110 US8762180B2 (en) | 2009-08-25 | 2009-08-25 | Claims analytics engine |
US14/280,065 US20140249865A1 (en) | 2009-08-25 | 2014-05-16 | Claims analytics engine |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/547,110 Continuation US8762180B2 (en) | 2009-08-25 | 2009-08-25 | Claims analytics engine |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140249865A1 true US20140249865A1 (en) | 2014-09-04 |
Family
ID=42827395
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/547,110 Active 2030-02-18 US8762180B2 (en) | 2009-08-25 | 2009-08-25 | Claims analytics engine |
US14/280,065 Abandoned US20140249865A1 (en) | 2009-08-25 | 2014-05-16 | Claims analytics engine |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/547,110 Active 2030-02-18 US8762180B2 (en) | 2009-08-25 | 2009-08-25 | Claims analytics engine |
Country Status (7)
Country | Link |
---|---|
US (2) | US8762180B2 (en) |
EP (1) | EP2290608A1 (en) |
JP (1) | JP5586373B2 (en) |
CN (1) | CN101996385A (en) |
AU (1) | AU2010212343B2 (en) |
CA (1) | CA2712849A1 (en) |
MX (1) | MX2010009152A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210406246A1 (en) * | 2020-06-24 | 2021-12-30 | David Mueller | Management of diverse data analytics frameworks in computing systems |
US20220188770A1 (en) * | 2020-12-15 | 2022-06-16 | International Business Machines Corporation | Dynamically customizing a workflow separate from domain logic |
US11538112B1 (en) * | 2018-06-15 | 2022-12-27 | DocVocate, Inc. | Machine learning systems and methods for processing data for healthcare applications |
US20230013443A1 (en) * | 2021-07-19 | 2023-01-19 | Chevron U.S.A. Inc. | Systems and processes for reconciling field costs |
US11915197B2 (en) | 2011-03-31 | 2024-02-27 | Assurant, Inc. | Systems and methods for programmatically weighting disparate inputs to optimize a predictive model |
Families Citing this family (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8315888B2 (en) * | 2010-02-12 | 2012-11-20 | Assets Quest, Inc. | Method and system for estimating unpaid claims |
US20110246262A1 (en) * | 2010-04-02 | 2011-10-06 | QMedtrix Systems, Inc. | Method of classifying a bill |
US10002391B1 (en) * | 2010-10-11 | 2018-06-19 | Pionetechs, Inc. | Method for detecting and preventing fraudulent healthcare claims |
US9026551B2 (en) * | 2013-06-25 | 2015-05-05 | Hartford Fire Insurance Company | System and method for evaluating text to support multiple insurance applications |
US9626432B2 (en) * | 2013-09-09 | 2017-04-18 | International Business Machines Corporation | Defect record classification |
JP2017505474A (en) * | 2013-12-17 | 2017-02-16 | アティジオ・コーポレイションAtigeo Corporation | Method and system for estimating values derived from a large data set based on values calculated from a smaller data set |
US10217170B2 (en) * | 2014-09-05 | 2019-02-26 | Hartford Fire Insurance Company | System for claim load balancing |
US10204703B2 (en) | 2014-11-10 | 2019-02-12 | Accenture Global Services Limited | Medical coding management system using an intelligent coding, reporting, and analytics-focused tool |
EP3018602A3 (en) * | 2014-11-10 | 2016-07-20 | Accenture Global Services Limited | Medical coding management system using an intelligent coding, reporting, and analytics-focused tool |
US20160342750A1 (en) * | 2015-05-18 | 2016-11-24 | PokitDok, Inc. | Dynamic topological system and method for efficient claims processing |
US10942929B2 (en) | 2015-10-30 | 2021-03-09 | Hartford Fire Insurance Company | Universal repository for holding repeatedly accessible information |
US10628456B2 (en) | 2015-10-30 | 2020-04-21 | Hartford Fire Insurance Company | Universal analytical data mart and data structure for same |
US11244401B2 (en) | 2015-10-30 | 2022-02-08 | Hartford Fire Insurance Company | Outlier system for grouping of characteristics |
JP6593231B2 (en) * | 2016-03-14 | 2019-10-23 | 富士通株式会社 | Receipt computation file creation program, receipt computation file creation device, and receipt computation file creation method |
CN106022912A (en) * | 2016-05-30 | 2016-10-12 | 深圳市华傲数据技术有限公司 | Evaluation model updating method and evaluation model updating system |
CN106022892A (en) * | 2016-05-30 | 2016-10-12 | 深圳市华傲数据技术有限公司 | Credit scoring model update method and credit scoring model update system |
CN107871283A (en) * | 2016-09-26 | 2018-04-03 | 平安科技(深圳)有限公司 | The processing method and processing device of settlement of insurance claim |
CN108230158B (en) * | 2016-12-15 | 2021-12-03 | 平安科技(深圳)有限公司 | Claims settlement testing method and device |
CN107766929B (en) * | 2017-05-05 | 2019-05-24 | 平安科技(深圳)有限公司 | Model analysis method and device |
US10497250B1 (en) * | 2017-09-27 | 2019-12-03 | State Farm Mutual Automobile Insurance Company | Real property monitoring systems and methods for detecting damage and other conditions |
US20190095999A1 (en) * | 2017-09-28 | 2019-03-28 | Accenture Global Solutions Limited | Cognitive agent assistant |
KR101974521B1 (en) * | 2017-11-29 | 2019-05-07 | (주)위세아이텍 | Device and method for insurance unfair claim detection based on artificial intelligence |
US10769570B2 (en) * | 2017-12-27 | 2020-09-08 | Accenture Global Solutions Limited | Artificial intelligence based risk and knowledge management |
US11586955B2 (en) * | 2018-02-02 | 2023-02-21 | Accenture Global Solutions Limited | Ontology and rule based adjudication |
US20190279306A1 (en) * | 2018-03-09 | 2019-09-12 | Cognizant Technology Solutions India Pvt. Ltd. | System and method for auditing insurance claims |
JP7198001B2 (en) * | 2018-06-06 | 2022-12-28 | 株式会社日立製作所 | Judgment device, judgment method |
US11270156B2 (en) | 2018-06-28 | 2022-03-08 | Optum Services (Ireland) Limited | Machine learning for dynamically updating a user interface |
US11636455B2 (en) * | 2018-07-12 | 2023-04-25 | Inbox Health Corp. | Intelligent patient billing communication platform for health services |
CN110858214B (en) * | 2018-08-22 | 2022-07-05 | 北京国双科技有限公司 | Recommendation model training and further auditing program recommendation method, device and equipment |
US20200111054A1 (en) * | 2018-10-03 | 2020-04-09 | International Business Machines Corporation | Automated claims auditing |
US20210351993A1 (en) * | 2018-10-05 | 2021-11-11 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and apparatus for analytics function discovery |
CN109829150B (en) * | 2018-11-27 | 2023-11-14 | 创新先进技术有限公司 | Insurance claim text processing method and apparatus |
CN109636632A (en) * | 2018-12-13 | 2019-04-16 | 平安医疗健康管理股份有限公司 | Settlement of insurance claim method, apparatus, equipment and storage medium based on machine learning |
JP6743116B2 (en) * | 2018-12-25 | 2020-08-19 | みずほ情報総研株式会社 | Examination support system, examination support method and examination support program |
US10977738B2 (en) * | 2018-12-27 | 2021-04-13 | Futurity Group, Inc. | Systems, methods, and platforms for automated quality management and identification of errors, omissions and/or deviations in coordinating services and/or payments responsive to requests for coverage under a policy |
CN109919780B (en) * | 2019-01-23 | 2024-07-09 | 平安科技(深圳)有限公司 | Method, device, equipment and storage medium for settling claims and resisting fraud based on graph computing technology |
JP2020129295A (en) * | 2019-02-08 | 2020-08-27 | 富士通株式会社 | Information processing program, information processing device, and information processing method |
US11568397B2 (en) | 2019-04-24 | 2023-01-31 | Cerner Innovation, Inc. | Providing a financial/clinical data interchange |
JP7268148B2 (en) * | 2019-05-30 | 2023-05-02 | 富士フイルム富山化学株式会社 | Medical information registration support device, operating method of medical information registration support device, and program |
US11315196B1 (en) * | 2019-12-03 | 2022-04-26 | Data-Core Systems, Inc. | Synthesized invalid insurance claims for training an artificial intelligence / machine learning model |
US11461361B2 (en) | 2019-12-31 | 2022-10-04 | Cerner Innovation, Inc. | Rapid hyperledger onboarding platform |
US11449359B2 (en) | 2020-06-12 | 2022-09-20 | Optum Services (Ireland) Limited | Prioritized data object processing under processing time constraints |
CN114926184A (en) * | 2021-02-02 | 2022-08-19 | 华晨宝马汽车有限公司 | Method, system and apparatus for optimizing claims cost recovery process |
US20230063220A1 (en) * | 2021-08-30 | 2023-03-02 | EnableComp, LLC | Systems and Methods for Predicting Missing Data Values |
US20240281886A1 (en) * | 2023-02-16 | 2024-08-22 | Forensic Claims Solutions, LLC | Inferring and/or predicting relationship rules |
CN117541171A (en) * | 2023-10-23 | 2024-02-09 | 河北智汇邢网络科技有限公司 | Information processing method and system based on block chain |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8521546B2 (en) * | 1998-09-25 | 2013-08-27 | Health Hero Network | Dynamic modeling and scoring risk assessment |
US7813944B1 (en) | 1999-08-12 | 2010-10-12 | Fair Isaac Corporation | Detection of insurance premium fraud or abuse using a predictive software system |
US7813937B1 (en) * | 2002-02-15 | 2010-10-12 | Fair Isaac Corporation | Consistency modeling of healthcare claims to detect fraud and abuse |
JP4072103B2 (en) * | 2003-07-15 | 2008-04-09 | 株式会社日立製作所 | Examination support method for medical remuneration statement, examination support device for medical remuneration statement, and program for examination support device for medical remuneration statement |
US20050108063A1 (en) * | 2003-11-05 | 2005-05-19 | Madill Robert P.Jr. | Systems and methods for assessing the potential for fraud in business transactions |
JP3940126B2 (en) | 2004-02-24 | 2007-07-04 | みずほ情報総研株式会社 | Audit management method and audit management program |
JP2004355633A (en) * | 2004-05-28 | 2004-12-16 | Hitachi Ltd | Device, method, and program for reading information of medical bill, and device, method, and program for supporting examination of medical bill |
US20060129427A1 (en) * | 2004-11-16 | 2006-06-15 | Health Dialog Services Corporation | Systems and methods for predicting healthcare related risk events |
JP5050504B2 (en) | 2006-11-28 | 2012-10-17 | 株式会社日立製作所 | Receipt extraction method and receipt inspection support system using reexamination results |
US20100145734A1 (en) | 2007-11-28 | 2010-06-10 | Manuel Becerra | Automated claims processing system |
WO2009111287A2 (en) * | 2008-02-29 | 2009-09-11 | Crowe Paradis Holding Company | Methods ans systems for automated, predictive modeling of the outcome of benefits claims |
-
2009
- 2009-08-25 US US12/547,110 patent/US8762180B2/en active Active
-
2010
- 2010-08-10 JP JP2010179764A patent/JP5586373B2/en active Active
- 2010-08-10 CA CA2712849A patent/CA2712849A1/en not_active Abandoned
- 2010-08-12 EP EP10008444A patent/EP2290608A1/en not_active Ceased
- 2010-08-13 AU AU2010212343A patent/AU2010212343B2/en active Active
- 2010-08-19 MX MX2010009152A patent/MX2010009152A/en unknown
- 2010-08-20 CN CN2010102606465A patent/CN101996385A/en active Pending
-
2014
- 2014-05-16 US US14/280,065 patent/US20140249865A1/en not_active Abandoned
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11915197B2 (en) | 2011-03-31 | 2024-02-27 | Assurant, Inc. | Systems and methods for programmatically weighting disparate inputs to optimize a predictive model |
US11538112B1 (en) * | 2018-06-15 | 2022-12-27 | DocVocate, Inc. | Machine learning systems and methods for processing data for healthcare applications |
US20210406246A1 (en) * | 2020-06-24 | 2021-12-30 | David Mueller | Management of diverse data analytics frameworks in computing systems |
US20220188770A1 (en) * | 2020-12-15 | 2022-06-16 | International Business Machines Corporation | Dynamically customizing a workflow separate from domain logic |
US11663552B2 (en) * | 2020-12-15 | 2023-05-30 | International Business Machines Corporation | Dynamically customizing a workflow separate from domain logic |
US20230013443A1 (en) * | 2021-07-19 | 2023-01-19 | Chevron U.S.A. Inc. | Systems and processes for reconciling field costs |
Also Published As
Publication number | Publication date |
---|---|
JP5586373B2 (en) | 2014-09-10 |
EP2290608A1 (en) | 2011-03-02 |
AU2010212343A1 (en) | 2011-03-17 |
AU2010212343B2 (en) | 2012-04-12 |
US8762180B2 (en) | 2014-06-24 |
US20110054925A1 (en) | 2011-03-03 |
MX2010009152A (en) | 2011-03-11 |
JP2011048822A (en) | 2011-03-10 |
CN101996385A (en) | 2011-03-30 |
CA2712849A1 (en) | 2011-02-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8762180B2 (en) | Claims analytics engine | |
AU2019278845B2 (en) | Post-filtering of named entities with machine learning | |
US8983867B2 (en) | Multi-dimensional credibility scoring | |
US8612261B1 (en) | Automated learning for medical data processing system | |
US20160267396A1 (en) | System and Method for Using Machine Learning to Generate a Model from Audited Data | |
US20130054259A1 (en) | Rule-based Prediction of Medical Claims' Payments | |
US11250513B2 (en) | Computer implemented system for generating assurance related planning process and documents for an entity and method thereof | |
CN109784707A (en) | Rating business credit method, apparatus, computer equipment and storage medium | |
US8782087B2 (en) | Analyzing large data sets to find deviation patterns | |
US20150154698A1 (en) | Hybridization of Personal and Business Credit and Credibility | |
US20230195715A1 (en) | Systems and methods for detection and correction of anomalies priority | |
US20220374401A1 (en) | Determining domain and matching algorithms for data systems | |
CN111210321B (en) | Risk early warning method and system based on contract management | |
Zak et al. | Development and evaluation of a continuous-time Markov chain model for detecting and handling data currency declines | |
Saripalli et al. | Assessment of healthcare claims rejection risk using machine learning | |
US20230237589A1 (en) | Model output calibration | |
CN114840668A (en) | Network text auditing method, electronic equipment and storage medium | |
CN113849618A (en) | Strategy determination method and device based on knowledge graph, electronic equipment and medium | |
US20230063220A1 (en) | Systems and Methods for Predicting Missing Data Values | |
US12039596B1 (en) | Automated rule-based electronic transaction data analysis | |
US20240346398A1 (en) | Artificial Intelligence Systems and Methods | |
CN117474662A (en) | Money laundering risk assessment method, money laundering risk assessment device, electronic equipment and storage medium | |
CN118211832A (en) | Financial tax data risk monitoring method, system, electronic equipment and storage medium | |
CN117194932A (en) | Entity evaluation method and device, computer readable medium and electronic equipment | |
TWM649336U (en) | Carbon emission calculation device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ACCENTURE GLOBAL SERVICES GMBH, SWITZERLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GHANI, RAYID;WALLACE, LEANA;IRISH, MICHAEL S.;AND OTHERS;SIGNING DATES FROM 20090814 TO 20090825;REEL/FRAME:033504/0442 Owner name: ACCENTURE GLOBAL SERVICES LIMITED, IRELAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ACCENTURE GLOBAL SERVICES GMBH;REEL/FRAME:033505/0013 Effective date: 20100901 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |