Abstract: A system for secure communications using resonate cryptography includes a resonator that has a random number generator (RNG). The RNG can be at least one of a true random number generator, pseudo-random number generator, and any non-repeating sequence of numbers having a characteristic of a random number stream, and generating a first stream of random numbers. A transmitter, electrically coupled to the random number generator, is also included to transmit the generated first stream of random numbers.
Abstract: Certain embodiments of the disclosed technology include systems and methods for increasing efficiency in the detection of identity-based fraud indicators associated with a loan application. A method is provided that includes receiving applicant data associated with a loan application having a plurality of applicants. The application data includes at least a name, a social security number, and a street address for each of the plurality of applicants. The method includes querying one or more databases with the applicant data; receiving a plurality of independent information in response to the querying; determining a validity indication of the applicant data; creating disambiguated applicant records; determining relationships among the disambiguated applicant records; scoring at least one parameter of the applicant data; determining one or more indicators of fraud based on the scoring; and outputting, for display, one or more indicators of fraud.
Type:
Grant
Filed:
November 18, 2015
Date of Patent:
August 7, 2018
Assignee:
LexisNexis Risk Solutions FL Inc.
Inventors:
Scott M. Straub, Samantha Gwinn, Cindy Loizzo, Alex Woo Song, Marlene Thorogood, Cheri Gay Nevin, Eric Piner
Abstract: A method includes training multiline insurance agents on having a conversation with the insured for discovering the insured's financial situation and risks by creating a visual diagram of the insured's financial situation and risks. The diagram includes the insured's name at the center of the visual diagram including an income box of the insured's household income. A family box is drawn from the income box with a family tree of the insured's family thereunder. An assets box is drawn from the income box with an asset listing of the insured's listing thereunder. A listing of risks is drawn at the bottom of the visual diagram. A box is drawn around the insured's name, the income box, the family box with the family tree, and the assets box with the asset listing, where the bottom of the box provides a boundary between the listing of risks and the family box and assets box.
Abstract: A software tool may analyze the constantly evolving and increasing velocity of enterprise risk, aggregates organizational risk, creates risk profiles at each level of the organization, and provides a central risk management hub that uses novel risk management algorithms to aggregate and provide risk management information to users. In order to quantitatively determine risk, calculations may be performed in a hierarchical manner. A risk category may include an inherent risk component and a quality of risk management component. Ratings for a given risk category may be derived from a sum of weighted rankings of each risk component thereof. Ratings for each risk component may be derived from its risk attributes.
Type:
Application
Filed:
June 15, 2017
Publication date:
December 21, 2017
Applicant:
Strategic Risk Associates
Inventors:
Michael Glotz, Albert Knotts, Rob Mitchell, Stephen Lane
Abstract: Certain implementations of the disclosed technology include systems and methods for internal co-convergence using clustering when there is hierarchy in the data structure. A method is included for clustering hierarchical database records into a first set of clusters having corresponding first cluster identifications (IDs), each hierarchical database record including one or more field values, the clustering based at least in part on determining similarity among corresponding field values of the hierarchical database records. The method includes receiving parent-child hierarchical relationship information for the hierarchical database records, re-clustering at least a portion of the hierarchical database records into a second set of clusters having corresponding second cluster IDs, the re-clustering based at least in part on the received parent-child hierarchical relationship information, and outputting hierarchical database record information, based at least in part on the re-clustering.
Abstract: Certain implementations of the disclosed technology include systems and methods for external linking based on hierarchal level weightings. The method may include associating external query data having one or more query field values with a record in a linked hierarchical database. The linked hierarchical database may include a plurality of records, each record having a record identifier and representing an entity in a hierarchy, each record associated with a hierarchy level, each record including one or more fields, each field configured to contain a field value. The associating may include receiving the external query data, wherein the external query data includes one or more search values; and identifying, from the plurality of records in the linked hierarchical database, one or more matched fields having field values that at least partially match the one or more search values.
Type:
Grant
Filed:
July 1, 2016
Date of Patent:
December 5, 2017
Assignee:
LEXISNEXIS RISK SOLUTIONS FL INC.
Inventors:
Charles Edwards Morton, David Alan Bayliss
Abstract: Systems and methods for matching subscribers with subscription providers include gathering, via a network from one or more remote computing systems, claims data, performance data, and service data regarding a number of providers; determining, by processing circuitry of a computing device based on the claims data, the performance data, and the service data, one or more provider metrics for each provider of the number of providers; calculating, by the processing circuitry based on the one or more provider metrics, one or more relationships between a number of subscribers and each provider of the plurality of providers; and ranking, by the processing circuitry, the number of providers based at least on part on the one or more relationships.
Type:
Grant
Filed:
December 21, 2015
Date of Patent:
October 10, 2017
Assignee:
Aon Global Risk Research Limited
Inventors:
Gregory Wingate-Whyte, Stephen P. McGill, Stephen W. Cross
Abstract: Systems and methods for matching subscribers with subscription providers include gathering, via a network from one or more remote computing systems, claims data, performance data, and service data regarding a number of providers; determining, by processing circuitry of a computing device based on the claims data, the performance data, and the service data, one or more provider metrics for each provider of the number of providers; calculating, by the processing circuitry based on the one or more provider metrics, one or more relationships between a number of subscribers and each provider of the plurality of providers; and ranking, by the processing circuitry, the number of providers based at least on part on the one or more relationships.
Type:
Application
Filed:
December 21, 2015
Publication date:
June 1, 2017
Applicant:
AON GLOBAL RISK RESEARCH LIMITED
Inventors:
Gregory Wingate-Whyte, Stephen P. McGill, Stephen W. Cross
Abstract: A system for secure communications using resonate cryptography includes a resonator that has a random number generator (RNG). The RNG can be at least one of a true random number generator, pseudo-random number generator, and any non-repeating sequence of numbers having a characteristic of a random number stream, and generating a first stream of random numbers. A transmitter, electrically coupled to the random number generator, is also included to transmit the generated first stream of random numbers.
Abstract: Certain implementations of the disclosed technology may include systems and methods for multi-stage identity authentication. A method is provided that includes receiving a set of identity information associated with a subject and querying one or more public or private databases with at least a portion of the set of identity information. The method includes receiving independent information responsive to the querying. The method includes determining zero or more first indicators of fraud risk and producing one or more identity proofing queries derived from the independent information. Based at least in part on a comparison of the one or more proofing queries and a query response, the method includes determining zero or more second indicators of fraud risk and evaluating a fraud score. Responsive to evaluating the fraud score, the method includes initiating one or more of authentication enrollment and multi-factor authentication of the subject.
Abstract: Disclosed is a system for, and method of, recycling field value weights as computed for database linking purposes. Such field value weights may be used for a search operation. In some embodiments, such weights may be used for a search operation prior to their values stabilizing during an iterative linking operation.
Abstract: A system for secure communications using resonate cryptography includes a resonator that has a random number generator (RNG). The RNG can be at least one of a true random number generator, pseudo-random number generator, and any non-repeating sequence of numbers having a characteristic of a random number stream, and generating a first stream of random numbers. A transmitter, electrically coupled to the random number generator, is also included to transmit the generated first stream of random numbers.
Abstract: Certain implementations of the disclosed technology include systems and methods for determining a reachability score of a phone number. A method includes receiving personally identifiable information associated with the subject; querying one or more public or private databases with the personally identifiable information; receiving, in response to the querying, phone number information related to the personally identifiable information; extracting, from the phone number information, one or more phone numbers associated with the subject; determining, with one or more computer processors, based at least in part on the one or more phone numbers, a phone type corresponding to the respective one or more phone numbers; determining, with the one or more computer processors, a reachability score for at least one of the one or more phone numbers, wherein the reachability score is based, at least in part, on the phone type; and outputting an indication of the reachability score.
Abstract: A system stochastically models events related to potential perils (e.g., hurricanes, terrorist attacks) using a weighted period event table. Both rare and likely events are captured in modeling with minimal computational overhead, allowing appropriate allocation of resources. Applications include disaster response, municipal planning, financial risk modeling and allocation.
Abstract: This invention uses non-parametric statistical measures and probability mathematical techniques to calculate deviations of variable values, on both the high and low side of a data distribution, from the midpoint of the data distribution. It transforms the data values and then combines all of the individual variable values into a single scalar value that is a “good-ness” score. This “good-ness” behavior score model characterizes “normal” or typical behavior, rather than predicting fraudulent, abusive, or “bad”, behavior. The “good” score is a measure of how likely it is that the subject's behavior characteristics are from a population representing a “good” or “normal” provider, claim, beneficiary or healthcare merchant behavior. The “good” score can replace or compliment a score model that predicts “bad” behavior in order to reduce false positive rates. The optimal risk management prevention program should include both a “good” behavior score model and a “bad” behavior score model.
Type:
Application
Filed:
October 11, 2016
Publication date:
February 2, 2017
Applicant:
Risk Management Solutions LLC
Inventors:
Allen Jost, Rudolph John Freese, Walter Allan Klindworth
Abstract: Disclosed is a system for, and method of, determining whether records and entity representations should be delinked. The system and method need no human interaction in order to calculate parameters and utilizing formulas used for the delinking decisions.