Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

4819 results about "Risk assessment" patented technology

Broadly speaking, a risk assessment is the combined effort of...

System and method for predicting consumer credit risk using income risk based credit score

InactiveUS20110078073A1Accurate assessmentImprove acquisitionFinanceIncome lossProspective evaluation
Systems and methods are described for scoring consumers' credit risk by determining consumers' income risk and future ability to pay. Methods are provided for measuring consumers' income risk by analyzing consumers' income loss risk, income reduction risk, probability of continuance of income, and economy's impact on consumers' income. In one embodiment, a method is provided to evaluate an individual's creditworthiness using income risk based credit score thereby providing creditors, lenders, marketers, and companies with deeper, new insights into consumer's credit risk and repayment potential. By predicting consumers' income risk and the associated creditworthiness the present invention increases the accuracy and reliability of consumers' credit risk assessments, results in more predictive and precise consumer credit scoring, and offers a new method of rendering a forward-looking appraisal of an individual's ability to repay a debt or the ability to pay for products and services.
Owner:SCORELOGIX

Security Compliance Methodology and Tool

An apparatus is provided for evaluating risk to an organization. The apparatus includes a plurality of governmental rules directed to protecting shareholders, a plurality of security domains of the organization wherein each security domain is associated with a different asset of the organization and a request for an information risk assessment within at least one of the plurality of security domains of the organization formed under the plurality of governmental rules from a set of initializing inputs. The apparatus further includes a information risk assessment plan formed from the request for the information risk assessment, a set of information assessment templates and test cases formed from the information risk assessment plan, a set of information risk assessment tests conducted on the IT system using the assessment templates and test cases, a set of test results generated by the risk assessment tests, one or more security control gaps identified by the assessment responses and one or more gap remediation plans formed from the identified security gaps.
Owner:DENOVO ANDREW +1

System and methods for automated detection, reasoning and recommendations for resilient cyber systems

A method for securing an IT (information technology) system using a set of methods for knowledge extraction, event detection, risk estimation and explanation for ranking cyber-alerts which includes a method to explain the relationship (or an attack pathway) from an entity (user or host) and an event context to another entity (a high-value resource) and an event context (attack or service failure).
Owner:BATTELLE MEMORIAL INST

Method and system for evaluating network safety situation

The invention relates to a method for evaluating the security situation of a network and a system thereof. The system has a two-surface three-level framework and is provided with a public service surface and a service management surface for executing uniform coordinated management on each functional module of the system; according to a service logic processing flow, the system is divided into three levels: an acquisition level, an analysis level and an exhibition level for completing four evaluating operations of assets, frangibility, threat and security situation; the invention is based on the characteristic of service operation in the network, combines the prior risk evaluation method, the prior flow and the prior security detection tool and provides a set of a novel dynamic real-time evaluation method. The system can analyze the assets and service of the network and the risk of the whole network and carries out the evaluation of the security situation. The system can provide the security state of the whole network in macroscopy, can deepen to specific service and assets and know the specific security problem, thereby effectively helping network security personnel to analyze the root of the security problem and assisting to provide a security solution proposal and implement a defense measure.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Network-based trading system and method

A network based trading system and method are provided which combine economies-of-scale enjoyed by institutional investors and mutual funds with direct ownership of securities to permit individual investors to participate in the bond market in a cost effective manner. Through team investing, institutional economies-of-scale are created for individuals by allowing groupings of individuals to buy and sell bonds as a “team,” thereby executing one cost-efficient trade in the institutional market rather than many smaller trades in the inefficient retail market. Also, through customer-to-customer (C2C) trading, customers are allowed to negotiate a trade directly with one another as an alternative to selling in the inter-dealer market. The system and method also incorporate an automatic risk assessment and trade approval routine for evaluating a proposed trade of a financial instrument which was received from a customer in an electronic form.
Owner:KIOBA PROCESSING LLC

System and method for determining an objective driver score

The present invention is directed to a business method in the field of automobile insurance, more specifically, a system and method of determining an objective driver score that may be used universally by independent insurers to evaluate the risk of insuring a driver by employing certain risk assessment factors concerning the driver's personal history which are each analyzed to derive weighted scores. Each driver is provided with a portable pin with an electronic key unique to the driver that is encoded for selective activation of a monitoring unit in a vehicle such that solely the activities of the driver being assessed is recorded and communicated to an evaluation center. Once activated, the monitoring unit records and generates the driver's risk assessment record based on the driver's operation of a vehicle equipped with the monitoring unit, as well as other variable parameters concerning operation of the vehicle. Said driver's risk assessment record is analyzed to derive a weighted driver risk assessment score that is aggregated with the individual weighted scores derived from the risk assessment factors to generate an objective driver score.
Owner:F3M3
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products