Patents Assigned to RISK
-
Patent number: 9043359Abstract: Certain implementations of the disclosed technology include systems and methods for linking entities in an internal database by utilizing co-convergence and clustering. The method may include clustering database records into a first set of clusters having corresponding first cluster identifications (IDs). The clustering may be based at least in part on determining similarity among corresponding field values. The method may include associating mutually matching database records, by performing at least one matching iteration for each of the database records. The method may include determining similarity among corresponding field values of the database records, re-clustering at least a portion of the database records into a second set of clusters, the re-clustering based at least in part on the associating mutually matching database records and on the determining similarity among corresponding field values of the database records.Type: GrantFiled: September 17, 2013Date of Patent: May 26, 2015Assignee: LEXISNEXIS RISK SOLUTIONS FL INC.Inventor: David Alan Bayliss
-
Patent number: 9037606Abstract: Certain implementations of the disclosed technology include systems and methods for internal co-convergence using clustering when there is hierarchy in the data structure. A method is included for clustering hierarchical database records into a first set of clusters having corresponding first cluster identifications (IDs), each hierarchical database record including one or more field values, the clustering based at least in part on determining similarity among corresponding field values of the hierarchical database records. The method includes receiving parent-child hierarchical relationship information for the hierarchical database records, re-clustering at least a portion of the hierarchical database records into a second set of clusters having corresponding second cluster IDs, the re-clustering based at least in part on the received parent-child hierarchical relationship information, and outputting hierarchical database record information, based at least in part on the re-clustering.Type: GrantFiled: September 17, 2013Date of Patent: May 19, 2015Assignee: LEXISNEXIS RISK SOLUTIONS FL INC.Inventor: David Alan Bayliss
-
Patent number: 9031979Abstract: Certain implementations of the disclosed technology include systems and methods for external linking based on hierarchal level weightings. The method may include associating external query data having one or more query field values with a record in a linked hierarchical database. The linked hierarchical database may include a plurality of records, each record having a record identifier and representing an entity in a hierarchy, each record associated with a hierarchy level, each record including one or more fields, each field configured to contain a field value. The associating may include receiving the external query data, wherein the external query data includes one or more search values; and identifying, from the plurality of records in the linked hierarchical database, one or more matched fields having field values that at least partially match the one or more search values.Type: GrantFiled: September 17, 2013Date of Patent: May 12, 2015Assignee: LexisNexis Risk Solutions FL Inc.Inventors: Charles Edward Morton, David Alan Bayliss
-
Publication number: 20150127415Abstract: Some implementations can include a computerized method, system or computer readable media for generating a manufacturing defect risk assessment model. The method can include obtaining training data for a plurality of loans, the training data can include loan information and a forensic audit finding and deficiency code associated with each loan. The method can also include cleaning the training data to obtain data associated with a time of origination for each loan, and enriching the training data for each loan by adding additional data. The method can further include grouping deficiency codes into one or more classes of defects, in which each class includes one or more related defect codes. The method can also include selecting one or more variables for the manufacturing risk assessment model and assigning a coefficient to each selected variable.Type: ApplicationFiled: June 4, 2014Publication date: May 7, 2015Applicant: Digital Risk Analytics, LLCInventors: Thomas Showalter, Stephen Thompson
-
Publication number: 20150127416Abstract: Some implementations can include a computerized method, system or computer readable media for multi-dimensional risk assessment. The method can include obtaining loan application data and preprocessing the loan application data including limit checking values and augmenting the loan application data with information from external sources. The method can further include selecting scoring values corresponding to key scoring variables and scoring the application by processing the scoring values in a multi-dimensional risk assessment system including an operational risk model.Type: ApplicationFiled: June 4, 2014Publication date: May 7, 2015Applicant: Digital Risk Analytics, LLCInventors: Thomas Showalter, Stephen Thompson
-
Patent number: 9020971Abstract: Certain implementations may include systems and methods for populating entity fields based on hierarchy partial resolution. According to an example implementation, a method is provided that may include identifying one or more first matching records in a hierarchical database, where matching records include one or more fields having an associated first matching field value that at least partially matches a received portion of a first query term. The method may include outputting, for display, one or more first matching field values of the one or more first matching records and receiving a second indication input signifying a selection of one of the one or more first matching field values.Type: GrantFiled: September 17, 2013Date of Patent: April 28, 2015Assignee: LexisNexis Risk Solutions FL Inc.Inventors: David Alan Bayliss, Edin Muharemagic
-
Patent number: 9015171Abstract: Exemplary systems and methods for linking entity references to entities and identifying associations between entities are presented. In particular, a method for delinking one or more entity references linked to a same entity is provided, where the one or more entity references have at least one common data field. The method comprises the steps of evaluating at least one actual measurement of the entity based at least in part on one or more field values of the one or more entity references, determining a difference between the at least one actual measurement and at least one predefined measurement associated with the entity and delinking the one or more entity references based at least in part on a comparison of the difference and a defined threshold.Type: GrantFiled: December 14, 2009Date of Patent: April 21, 2015Assignee: Lexisnexis Risk Management Inc.Inventor: David Bayliss
-
Patent number: 8984643Abstract: Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.Type: GrantFiled: February 14, 2014Date of Patent: March 17, 2015Assignee: Risk I/O, Inc.Inventors: Michael Krisher, Edward T. Bellis, Jeffrey Heuer
-
Patent number: 8966639Abstract: Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.Type: GrantFiled: February 14, 2014Date of Patent: February 24, 2015Assignee: Risk I/O, Inc.Inventors: Michael Roytman, Edward T. Bellis, Jeffrey Heuer
-
Patent number: 8949449Abstract: Controlling fragment load on shared links, including a large number of fractional-storage CDN servers storing erasure-coded fragments encoded with a redundancy factor greater than one from contents, and a large number of assembling devices configured to obtain the fragments from sub-sets of the servers. At least some of the servers share their Internet communication link with other Internet traffic, and the fragment traffic via the shared link is determined by the number of sub-sets in which the servers accessed via the shared link participate. Wherein the maximum number of sub-sets in which the servers accessed via the shared link are allowed to participate is approximately a decreasing function of the throughput of the other Internet traffic via the shared link.Type: GrantFiled: October 15, 2009Date of Patent: February 3, 2015Assignee: Aster Risk Management LLCInventors: Gal Zuckerman, Gil Thieberger
-
Patent number: 8938549Abstract: Reduction of peak-to-average traffic ratio in distributed streaming systems, including a large number of fractional-storage CDN servers accessed via the Internet, and storing erasure-coded fragments encoded with a redundancy factor greater than one from streaming contents, and a very large number of assembling devices obtaining the fragments from the servers in order to reconstruct the streaming contents. The assembling devices are spread over different time zones spanning at least three hours and balance the bandwidth load between the servers.Type: GrantFiled: October 15, 2009Date of Patent: January 20, 2015Assignee: Aster Risk Management LLCInventors: Gal Zuckerman, Gil Thieberger
-
Patent number: 8928495Abstract: Certain example embodiments of the disclosed technology may include systems and methods for telematics monitoring. An example method is provided that includes receiving, at a mobile computing device, and from a Vehicle Identification Unit (VIU), identification (ID) data representing a first vehicle. The method further includes receiving, by the mobile computing device, sensor data from one or more sensors associated with the mobile computing device. Certain embodiments may further include receiving, at an Operational Measurement Unit (OMU), an operation indication associated with the first vehicle. The OMU may include an operational measurement component configured to advance an operational count in response to receiving the operation indication. Certain example embodiments may include transmitting telematics data by the mobile computing device. In certain embodiments, the telematics data may include least a portion of one or more of the ID data, the sensor data, and/or the operational count data.Type: GrantFiled: June 4, 2013Date of Patent: January 6, 2015Assignee: LexisNexis Risk Solutions Inc.Inventors: Ash Hassib, Charles Kaminski, Aaron G Pierce
-
Patent number: 8903870Abstract: A system for managing risk in employee travel may track a location of users of the travel risk management system during travel. Travel itinerary information for a user may be input into the travel risk management system, including user identification information, travel date information and geographic location information for travel destinations. During the travel period, the system may communicate with a portable computing device to determine the user's actual location, and update the stored travel itinerary information if the user's actual location is different than the user's expected location. The system may transmit a location request message to the user's portable computing device, or a mobile application may cause the portable computing device to transmit the user's location without prompting.Type: GrantFiled: December 23, 2011Date of Patent: December 2, 2014Assignee: Aon Global Risk Research LimitedInventors: Douglas R. Turk, Christopher Holt, Justin Priestley, Ian Nunn
-
Patent number: 8874774Abstract: Fault tolerance in a distributed streaming system including fractional-storage CDN servers storing erasure-coded fragments encoded with a redundancy factor greater than one from segments of streaming contents. Each server delivers fragments, at a certain fragment delivery throughput, to multiple assembling devices using a fragment pull protocol, wherein a reduction in the fragment delivery throughput of one of the servers triggers a process in which at least some of the other servers approximately immediately increase their fragment delivery throughput as a reaction to the fragment pull protocol, to compensate for the reduced throughput.Type: GrantFiled: October 15, 2009Date of Patent: October 28, 2014Assignee: Aster Risk Management LLCInventors: Gal Zuckerman, Gil Thieberger
-
Patent number: 8874775Abstract: Load-balancing a distributed system by replacing overloaded servers, including the steps of retrieving, by an assembling device using a fragment pull protocol, erasure-coded fragments associated with segments, from a set of fractional-storage servers. Occasionally, while retrieving the fragments, identifying at least one server from the set that is loaded to a degree requiring replacement, and replacing, using the fragment pull protocol, the identified server with a substitute server that is not loaded to the degree requiring replacement. Wherein the substitute server and the remaining servers of the set are capable of delivering enough erasure-coded fragments in the course of reconstructing the segments.Type: GrantFiled: October 15, 2009Date of Patent: October 28, 2014Assignee: Aster Risk Management LLCInventors: Gal Zuckerman, Gil Thieberger
-
Patent number: 8849684Abstract: A coverage management system is described herein that enables an insurance agent and an insured party to engage in a streamlined insurance procurement process. The coverage management system facilitates generation of interactive insurance-related documents, provides mechanisms to interact with the documents, and optimizes agent-insured interaction via the insurance-related documents.Type: GrantFiled: January 7, 2014Date of Patent: September 30, 2014Assignee: Risk Management Technologies, LLCInventors: Philip A. Kilpatrick, Thomas D. Hura, Daniel A. Luketic
-
Publication number: 20140278708Abstract: A risk exposure model is developed for network or moveable assets not specific to a single, fixed address or location. An asset map using a plurality of geographic representation points is used to identify the physical locations of the asset portions (or possible physical locations in the case of a moveable asset). Baseline geographic, geologic, political, and demographic data is similarly represented using geographic representation points. Meta-data associated with each geographic representation point is used to identify details related to the asset or baseline feature at that geographic location. Risk exposure values are then calculated using the geographic representation points specific to the asset portions that are subject to risks associated with the location of the asset portion.Type: ApplicationFiled: November 4, 2013Publication date: September 18, 2014Applicant: Risk Management Solutions, Inc.Inventors: Jordan Byk, Christopher Sams, David Carttar, Monalisa Samal, Surender Kumar
-
Publication number: 20140278306Abstract: A system stochastically models events related to potential perils (e.g., hurricanes, terrorist attacks) using a weighted period event table. Both rare and likely events are captured in modeling with minimal computational overhead, allowing appropriate allocation of resources. Applications include disaster response, municipal planning, financial risk modeling and allocation.Type: ApplicationFiled: March 13, 2013Publication date: September 18, 2014Applicant: RISK MANAGEMENT SOLUTIONS, INC.Inventors: Shahram Taghavi, Nirmal Jayaram
-
Patent number: 8832295Abstract: A system including a plurality of fractional-storage servers and a plurality of peer-to-peer devices. Substantially each of the servers and peer-to-peer devices stores less than a minimum amount of erasure-coded fragments needed to decode segments of streaming content. The system delivers at least the minimum amount of erasure-coded fragments needed to decode the segments of streaming content, from any group of the servers, or group of the servers plus peer-to-peer devices, that together store at least the minimum amount of erasure-coded fragments needed to decode the segments of streaming content. Optionally, the system supplements streaming capabilities of the servers during peak traffic periods by sending erasure-coded fragments stored on the peer-to-peer devices during the peak traffic periods.Type: GrantFiled: November 10, 2010Date of Patent: September 9, 2014Assignee: Aster Risk Management LLCInventors: Gal Zuckerman, Gil Thieberger
-
Patent number: 8832292Abstract: Source-selection based Internet backbone traffic shaping, including the steps of assessing a large number of network paths through which erasure-coded fragments usually flow when transmitted from a large number of relevant fractional-storage CDN servers to an assembling device; accessing preferences for fragment delivery via many of the paths; and selecting the servers whose assessed paths fit well the preferences for fragment delivery to the assembling device. Wherein the servers are accessed via the Internet, not all servers are connected to the Internet via the same networks, and the erasure-coded fragments are encoded with a redundancy factor greater than one from contents.Type: GrantFiled: October 15, 2009Date of Patent: September 9, 2014Assignee: Aster Risk Management LLCInventors: Gal Zuckerman, Gil Thieberger