$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for credit scoring using an identity network connectivity 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06Q-040/00
출원번호 US-0107672 (2008-04-22)
등록번호 US-8386377 (2013-02-26)
발명자 / 주소
  • Xiong, Shanji
  • Xie, Jianjun
  • Lin, Yinghua
  • Wu, Guowei
  • Lu, Quan
  • Coggeshall, Stephen
출원인 / 주소
  • ID Analytics, Inc.
인용정보 피인용 횟수 : 73  인용 특허 : 21

초록

A technique is provided for determining credit ratings without the need for traditional credit bureau data. In at least one embodiment of the invention, a method comprises the steps of providing a network of linked identity records, each identity record comprising identity related information; recei

대표청구항

1. A method for generating a credit rating for an entity comprising the steps of: providing a network of linked identity records, each identity record comprising identity related information;receiving an identity record comprising identity related information;linking the received identity record wit

이 특허에 인용된 특허 (21)

  1. Robert W. Means ; Richard Calmbach, Cortronic neural networks with distributed processing.
  2. Titan Hari, Fast explanations of scored observations.
  3. Gopinathan Krishna M. ; Biafore Louis S. ; Ferguson William M. ; Lazarus Michael A. ; Pathria Anu K. ; Jost Allen, Fraud detection using predictive modeling.
  4. Field Simon,GBX ; Barson Paul Colin,GBX ; Hamer Peter,GBX ; Hobson Phillip William,GBX ; Twitchen Kevin John,GBX, Generic processing capability.
  5. Majoor,Johannes W. F., Mechanism and method for continuous operation of a rule server.
  6. Culhane, Patrick G., Method and apparatus for scoring the likelihood of a desired performance result.
  7. Strothmann, Russell L.; Potter, Gary J.; Brezina, Stanislav, Methods and apparatus for predicting airline seat availability.
  8. Bi Fujun,CNX ; Li Ran ; Bliss Shaun ; Nojoomi Reza ; Yan Hong, Multi-element confidence matching system and the method therefor.
  9. Michael A. Lazarus ; A. U. Mattias Blume ; Kenneth B. Brown ; William R. Caid ; Ted E. Dunning ; Larry S. Peranich ; Gerald R. Russell ; Kevin L. Sitze, Predictive modeling of consumer financial behavior.
  10. Borthwick, Andrew E., Probabilistic record linkage model derived from training data.
  11. Jost Allen (San Diego CA) Nelson Jennifer (San Diego CA) Gopinathan Krishna (San Diego CA) Smith Craig (Seattle WA), Real estate appraisal using predictive modeling.
  12. Caid William R. ; Hecht-Neilsen Robert, Representation and retrieval of images using context vectors derived from image information elements.
  13. Gopinathan Krishna M. ; Jost Allen ; Biafore Louis S. ; Ferguson William M. ; Lazarus Michael A. ; Pathria Anu K., Risk determination and management using predictive modeling and transaction profiles for individual transacting entities.
  14. Melchione Anthony R. ; Martinez Rafael ; Seifert Eric ; Hirsch Martin, Sales and marketing support system using a customer information database.
  15. Lawyer, Justin; Barclay, Alex; Englund, Dirk; Holmes, Robert; Pathria, Dimpy; Roach, Tim; Zoldi, Scott, Self-learning real-time prioritization of telecommunication fraud control actions.
  16. French,Jennifer; Wilder,Jone, System and method for authentication of network users.
  17. Tetro Donald ; Lipton Edward ; Sackheim Andrew, System and method for enhanced fraud detection in automated electronic credit card processing.
  18. Ellard Scott, System and method for indexing information about entities from different information sources.
  19. Anderson Douglas D. ; Urban Michael J. ; Deterding Eric L. ; Urban Richard H., System for detecting counterfeit financial card fraud.
  20. Sirosh Joseph, Unsupervised identification of nonlinear data cluster in multidimensional data.
  21. Caid William Robert ; Carleton Joel Lawrence, Visualization of information using graphical representations of context vector based relationships and attributes.

이 특허를 인용한 특허 (73)

  1. Patel, Rakesh; Nicholl, Mara; Harju, Lindsey, Access control system for implementing access restrictions of regulated database records while identifying and providing indicators of regulated database records matching validation criteria.
  2. Patel, Rakesh; Nicholl, Mara; Harju, Lindsey Greenwell, Access control system for implementing access restrictions of regulated database records while identifying and providing indicators of regulated database records matching validation criteria.
  3. Hu, Hua; Torrez, Luz M., Automatic generation of code for attributes.
  4. Lisuk, David; Holtzen, Steven, Classification system with methodology for efficient verification.
  5. Nidamanuri, Srinivasarao; Hurt, Daryl, Co-processing electronic signals for redundancy.
  6. Sundaresan, Neelakantan; Lee, Hendrick, Collaborative content evaluation.
  7. Coden, Anni R.; Houck, Keith C.; Lin, Ching-Yung; Lin, Wanyi; Malkin, Peter K.; Pan, Shimei; Park, Youngja; Weisz, Justin D., Composite propensity profile detector.
  8. Elliot, Mark; Chang, Allen, Computer-implemented systems and methods for comparing and associating objects.
  9. Xing, Yichen, Computer-implemented systems and methods for data management and visualization.
  10. Xing, Yichen, Computer-implemented systems and methods for data management and visualization.
  11. Girulat, Jr., Rollin M., Consumer data request fulfillment system.
  12. Ducott, III, Richard Allen; Brainard, Katherine; Garrod, John Kenneth; Carrino, John Antonio, Cross-ACL multi-master replication.
  13. Ducott, Richard Allen; Garrod, John Kenneth; Carrino, John Antonio; Brainard, Katherine, Cross-ontology multi-master replication.
  14. Skiff, David; Cai, Allen; Lee, Benjamin; Yu, Christopher; Kraytem, Hind; Ma, Jason; Scolnick, Myles; Benabdallah, Tarik; Shen, Zhixian, Data analysis system to facilitate investigative process.
  15. Bell, Kolt; Barnhardt, David; Bearley, Amijo; Dominguez, Robert J; Kerman, David; Van Vliet, Daniel, Improper financial activity detection tool.
  16. Cervelli, Dan; GoGwilt, Cai; Prochnow, Bobby, Interactive data object map.
  17. Elliot, Mark; Duffield, Benjamin; Borochoff, Adam, Interactive user interface for dynamic data analysis exploration and query processing.
  18. Elliot, Mark; Duffield, Benjamin; Borochoff, Adam, Interactive user interface for dynamic data analysis exploration and query processing.
  19. Wilson, Matthew Julius; Alexander, Tom; Cervelli, Daniel; Fountain, Trevor; Spencer-Harper, Quentin; Horbatt, Daniel; Visa, Guillem Palou; Scott, Dylan; Sontag, Trevor; Verdieck, Kevin; Ryan, Alexander; Lee, Brian; Shepherd, Charles; Nguyen, Emily, Interactive user interfaces for location-based data analysis.
  20. Kapczynski, Mark Joseph, Keeping up with the joneses.
  21. Kapczynski, Mark Joseph, Keeping up with the joneses.
  22. Saperstein, Craig; Schwartz, Eric; Cho, Hongjai, Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces.
  23. Grimes, Mikal; Williams, David K.; Balling, Jr., James, Method and system for determination of data completeness for analytic data calculations.
  24. Elliot, Mark, Method and system for generating a parser and parsing complex data.
  25. Elliot, Mark, Method and system for generating a parser and parsing complex data.
  26. Chang, Allen; Sills, Matthew; Brainard, Katherine; Boroujerdi, Rastan; Nepomnyashchiy, Ilya, Methods and systems for analyzing entity performance.
  27. Hickman, Andrew John; Tsang, Alan; Tao, Yaqi; Pan, Shengjun, Micro-geographic aggregation system.
  28. Thoren, Paul; Gazzard, Benjamin; Meiklejohn, David; Ng, Kevin; Fedderly, Matthew; Brett-Bowen, Rhys, Multi-user access controls in electronic simultaneously editable document editor.
  29. Neil, Joshua Charles; Kent, Alexander; Hash, Jr., Curtis Lee, Non-harmful insertion of data mimicking computer network attacks.
  30. Neil, Joshua; Kent, Alexander; Hash, Jr., Curtis; Fisk, Michael; Brugh, Alexander; Storlie, Curtis; Uphoff, Benjamin, Non-harmful insertion of data mimicking computer network attacks.
  31. Neil, Joshua Charles; Fisk, Michael Edward; Brugh, Alexander William; Hash, Curtis Lee; Storlie, Curtis Byron; Uphoff, Benjamin; Kent, Alexander, Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness.
  32. Neil, Joshua Charles; Fisk, Michael Edward; Brugh, Alexander William; Hash, Jr., Curtis Lee; Storlie, Curtis Byron; Uphoff, Benjamin; Kent, Alexander, Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness.
  33. Neil, Joshua Charles; Fisk, Michael Edward; Brugh, Alexander William; Hash, Jr., Curtis Lee; Storlie, Curtis Byron; Uphoff, Benjamin; Kent, Alexander, Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness.
  34. Beard, Mitchell; Shen, Kai; Hu, Roger; Shah, Sachi; Danka, Miklos; Pliuskys, Laurynas; Pearson, Thomas, Quantifying, tracking, and anticipating risk at a manufacturing facility, taking deviation type and staffing conditions into account.
  35. Erenrich, Daniel, Resolving similar entities from a transaction database.
  36. Cervelli, Daniel; Tobin, David; Kara, Feridun Arda; Sontag, Trevor; Skiff, David; Carrino, John; Chang, Allen; Garrod, John; Yu, Agatha, Schematic and database linking system.
  37. Smith, Donna Meryl, Server architecture for electronic data quality processing.
  38. Chamberlain, Simon; Giles, Harley; Lientz, Andrew, Service for associating network users with profiles.
  39. Aymeloglu, Andrew; Miyake, Nicholas; Burr, Brandon; Cicerone, Derek; Simler, Kevin; Tan, Garry, Sharing objects that rely on local resources with outside servers.
  40. Erenrich, Daniel; Tessier-Lavigne, Christian, System and method for associating related records to common entities across multiple lists.
  41. Erenrich, Daniel; Tessier-Lavigne, Christian, System and method for associating related records to common entities across multiple lists.
  42. Celka, Christopher J.; Rojas, Cristian R., System and method for automated detection of never-pay data sets.
  43. Torrez, Luz M.; Kornegay, Adam Thomas, System and method for generating a finance attribute from tradeline data.
  44. Torrez, Luz M.; Kornegay, Adam Thomas, System and method for generating a finance attribute from tradeline data.
  45. Chakerian, John; Fink, Robert; Schafer, Mark; Thompson, James; Sum, Marvin; Cai, Allen, System and method for news events detection and visualization.
  46. Chakerian, John; Fink, Robert; Schafer, Mark; Thompson, James; Sum, Marvin; Cai, Allen, System and method for news events detection and visualization.
  47. Courbage, Magali; Rodenbusch, Richard; Morani, Jean-Dominique, System and method for providing an aggregation tool.
  48. Hwang, Deborah; Lidor, Daniel; Rhyne, William, System to catalogue tracking data.
  49. Erenrich, Daniel; Mukherjee, Anirvan; Dwyer, William, Systems and methods for analyzing performance of an entity.
  50. Knudson, Eric; Gerhardt, Matthew; Elder, Andrew; Rosofsky, Eli, Systems and methods for annotating and linking electronic documents.
  51. Manning, Lawrence; Mehta, Rahul; Erenrich, Daniel; Visa, Guillem Palou; Hu, Roger; Falco, Xavier; Gilmore, Rowan; Bingham, Eli; Prestinario, Jason; Huang, Yifei; Fernandez, Daniel; Elser, Jeremy; Sader, Clayton; Agarwal, Rahul; Elkherj, Matthew; Latourette, Nicholas; Zamoshchin, Aleksandr, Systems and methods for automatic clustering and canonical designation of related data in various data structures.
  52. Kromwijk, Sander; Turki, Haithem; Cohen, Stephen; Xu, Yixun; Kara, Feridun Arda, Systems and methods for constraint driven database searching.
  53. Chang, Albert Chia-Shu; Jones, Gregory Dean; Matthies, Carolyn Paige Soltes, Systems and methods for data verification.
  54. Haller, Eric; Hirn, Mark; Dichiara, Christer, Systems and methods for data verification.
  55. Haller, Eric; Hirn, Mark; Dichiara, Christer, Systems and methods for data verification.
  56. Rosswog, James; Gerhardt, Matthew; Raboin, Eric; Erenrich, Daniel; Bogomolov, Arseny; Bills, Cooper; Anderson, Eric; Grossman, Jack; Simons, Kevin; Levan, Matthew; Klein, Nathaniel; Beiermeister, Ryan; O'Brien, Tim, Systems and methods for identifying and categorizing electronic documents through machine learning.
  57. Straub, Scott M.; Gwinn, Samantha; Loizzo, Cindy; Song, Alex Woo; Thorogood, Marlene; Nevin, Cheri Gay; Piner, Eric, Systems and methods for improving computation efficiency in the detection of fraud indicators for loans with multiple applicants.
  58. Kesin, Max; Wadhar, Hem, Systems and methods for key phrase characterization of documents.
  59. Kesin, Max; Wadhar, Hem, Systems and methods for key phrase characterization of documents.
  60. Balducci, Michael; Manvydas, Thomas C.; Kohl, Nadya; Koelfgen, Paul, Systems and methods for processing consumer information for targeted marketing applications.
  61. DeSoto, Laura J.; Pearson, Michele M.; Adkinson, Kristi Ann; Achanta, Venkat R.; Peng, Felicia, Systems and methods for providing a direct marketing campaign planning environment.
  62. DeSoto, Laura J.; Pearson, Michele M.; Adkinson, Kristi Ann; Achanta, Venkat R.; Peng, Felicia, Systems and methods for providing a direct marketing campaign planning environment.
  63. McMillan, Helen; Skurtovich, John Lawrence; Kress, Anita; Sumida, Timothy; McVey, Michael Charles, Systems and methods for providing an integrated identifier.
  64. Stack, Brian; Lientz, Andrew; Chamberlain, Simon; Abdous, Yacine; Kahn, Ray, Systems and methods for providing anonymized user profile data.
  65. Stack, Brian; Lientz, Andrew; Chamberlain, Simon; Abdous, Yacine; Kahn, Ray, Systems and methods for providing anonymized user profile data.
  66. Doyle, John McKinstry; Beard, Mitch; Brahms, Christopher; Huber, Tristan; Kapitanova, Krasimira; Kwon, Ohsuk; Richbourg, Christopher; Stoeckel, Michael; Robinson, Seth, Systems and methods for structuring data from unstructured electronic data files.
  67. Kelley, Sean; Scott, Dylan; Sood, Ayush; Verdieck, Kevin; Baker, Izaak; Ball, Eliot; Bush, Zachary; Cai, Allen; Chen, Jerry; Dahiya, Aditya; Deutsch, Daniel; Fernandez, Calvin; Hong, Jonathan; Hu, Jiaji; Kuan, Audrey; Lemanowicz, Lucas; Minor, Clark; Miyake, Nicholas; Nazario, Michael; Ngo, Brian; Proniushkin, Mikhail; Rajgarhia, Siddharth; Rodgers, Christopher; Teramoto, Kayo; Tobin, David; Wang, Grace; Wong, Wilson; Xu, Holly; Zhang, Xiaohan, Systems for collecting, aggregating, and storing data, generating interactive user interfaces for analyzing data, and generating alerts based upon collected data.
  68. Cervelli, Daniel; Skiff, David; Tobin, David; Cai, Allen, Time-series analysis system.
  69. Moreland, Andrew; Carrino, John, Transforming instructions for collaborative updates.
  70. Shan, Honghao; Carpenter, Mason L.; Bonin, Gregor; Xiong, Shanji; DiChiara, Christer, User behavior segmentation using latent topic detection.
  71. Taheri, Alexander; Antihi, Alexandru; Sprague, Arion; Grabham, Benjamin; Lee, Benjamin; Omont, Gregoire; Inoue, Jim; Yang, Michael; Scolnick, Myles; Lucotte, Pierre; Rowe, Ryan; Benabdallah, Tarik; Powell, Thomas, User interface for managing defects.
  72. Neil, Joshua Charles, Using new edges for anomaly detection in computer networks.
  73. Neil, Joshua Charles, Using new edges for anomaly detection in computer networks.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로