Systems, methods, apparatus, and schema for storing, managing and retrieving information
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06Q-010/00
G06Q-010/06
출원번호
US-0941265
(2004-09-15)
등록번호
US-8762191
(2014-06-24)
발명자
/ 주소
Lawrence, David
Nitze, Peter
MacDonald, Alasdair
출원인 / 주소
Goldman, Sachs & Co.
대리인 / 주소
Perkins Coie LLP
인용정보
피인용 횟수 :
2인용 특허 :
259
초록▼
An amount of risk associated with a transaction may be determined by transforming collected information into a searchable database where the collected information may be assessed for relevancy and redundancy, parsed into categories of relevancy based on at least one risk, stored in a database, and o
An amount of risk associated with a transaction may be determined by transforming collected information into a searchable database where the collected information may be assessed for relevancy and redundancy, parsed into categories of relevancy based on at least one risk, stored in a database, and outputted into a graphical user interface. Information may also be collected from a plurality of sources, translated into at least one standardized format, parsed into a plurality of portions, assessed based on a risk-relevancy metric, tagged based on the risk-relevancy metric, filtered based on redundancy, stored within the data structure, and outputted into a data storage structure to a graphical user interface. Unstructured information may be obtained from a large variety of sources, which may allow users to make decisions—regarding, for example, transactions, relationships, or the like—from a risk perspective.
대표청구항▼
1. A processor implemented method for identifying risk, comprising: receiving information associated with at least one risk for identifying at least one predetermined indicator of risk-relevant information, wherein based on the identifying, the received information is processed to redact redundant i
1. A processor implemented method for identifying risk, comprising: receiving information associated with at least one risk for identifying at least one predetermined indicator of risk-relevant information, wherein based on the identifying, the received information is processed to redact redundant information;analyzing, by a processor, the received information to determine relevancy of the information with regard to the at least one risk;tagging, by the processor, the information with at least one risk-relevancy tag based on the determination of the relevancy of the information with regard to the at least one risk;processing the tagged information to remove redundant information and information not deemed to be relevant to the at least one risk, thereby creating the risk-relevant information;parsing, by the processor, the risk-relevant information into a plurality of portions categorized by the at least one risk-relevancy tag;determining, by the processor, a risk-relevancy metric of each of the plurality of portions, wherein the at least one risk-relevancy tag identifies the risk-relevancy metric associated with a relevant portion of the information with respect to the at least one risk, the risk-relevancy metric indicating a likelihood that the relevant portion of the information is relevant to the at least one risk;storing the risk-relevant information in a data storage structure, wherein the data storage structure includes a plurality of areas that are interrelated to facilitate the identification of the at least one risk; andoutputting the risk-relevant information stored in the data storage structure to a risk identification graphical user interface. 2. The method of claim 1, wherein the each of the plurality of portions is associated with the at least one of the tags. 3. The method of claim 2, wherein each of the plurality of portions is stored in at least one of the plurality of areas. 4. The method of claim 1, wherein the received information is associated with a device that determines the relevancy of the information with regard to the at least one risk. 5. The method of claim 1, wherein the information is received from a device that determines a redundancy of the information. 6. The method of claim 1, wherein the information is received from a device that collects the information from a plurality of sources. 7. The method of claim 1, wherein the information is received from a device that causes insertion of the information into the data storage structure. 8. The method of claim 1, wherein the plurality of areas include: an area for storing information associated with an individual;an area for storing information associated with an event;an area for storing information associated with an item; andan area for storing information associated with an organization. 9. The method of claim 8, wherein the plurality of areas further include: an area for storing information associated with an address. 10. The method of claim 8, wherein the individual includes an individual that is a party involved in a transaction. 11. The method of claim 10, wherein the transaction includes a financial transaction. 12. The method of claim 8, wherein the event includes at least one event associated with the at least one risk. 13. The method of claim 1, wherein the data storage structure further includes the risk-relevant information that is further parsed into: at least one unique key that defines an association between at least one of (i) an individual and an event, (ii) an individual and an item, (iii) an individual and an organization, (iv) an event and an item, (v) an event and an organization (vi) an item and an organization, (vii) a first individual and a second individual, (viii) a first event and a second event, (ix) a first item and a second item, and (x) a first organization and a second organization. 14. The method of claim 1, wherein the data storage structure further includes the risk-relevant information that is further parsed into: at least one unique key that defines an association between at least one of (i) an event and an address, (iii) an item and an address, and (v) a first address and a second address. 15. The method of claim 1, wherein the data storage structure further includes the risk-relevant information that is further parsed into: at least one unique key that defines an association between at least one of (i) an individual and an address, and (iv) an organization and an address, wherein the address is related to the at least one risk. 16. The method of claim 1, wherein the at least one risk includes at least one of a financial risk, a risk to reputation, a regulatory risk, or a legal risk. 17. A risk identifying processor-implemented method, comprising: collecting, by a processor, information from a plurality of information sources;translating, via the processor, the collected information into at least one standardized format;parsing, via the processor, the information into a plurality of portions;determining, via the processor, a risk-relevancy metric of each of the plurality of portions, the risk-relevancy metric of each of the plurality of portions indicating a likelihood that a respective portion of the plurality of portions of the information is relevant to at least one risk;analyzing, via the processor, the parsed information to determine risk relevancy of the parsed information for determining a risk-relevancy tag;tagging, via the processor, at least one portion of the information as risk-relevant based on the determined risk-relevancy metric;filtering, via the processor, the tagged at least one portion of the information to remove information not deemed to be risk-relevant;filtering, via the processor, a redundancy of the tagged at least one portion of the information;storing, via the processor, the filtered tagged at least one portion of the information in a data storage structure; andoutputting, via the processor, the information stored in the data storage structure to a risk identification graphical user interface. 18. A risk identifying apparatus, comprising: a memory;a processor disposed in communication with said memory, and configured to issue a plurality of processing instructions stored in the memory, wherein the processor issues instructions to: receive information associated with at least one risk for identifying at least one predetermined indicator of risk-relevant information;analyze the received information to determine relevancy of the information with regard to the at least one risk and tagging the information with at least one risk-relevancy tag based on a determination of the relevancy of the information with regard to the at least one risk;process the tagged information to remove redundant information and information not deemed to be relevant to the at least one risk, thereby creating the risk-relevant information;parse the risk-relevant information into a plurality of portions categorized by the at least one risk-relevancy tag;determine a risk-relevancy metric of each of the plurality of portions, wherein the at least one risk-relevancy tag identifies the risk-relevancy metric associated with a relevant portion of the information with respect to the at least one risk, the risk-relevancy metric indicating a likelihood that the relevant portion of the information is relevant to the at least one risk;store the risk-relevant information In a data storage structure, wherein the data storage structure includes a plurality of areas that are interrelated to facilitate the identification of the at least one risk; andoutput the risk-relevant information stored in the data storage structure to a risk identification graphical user interface. 19. The apparatus of claim 18, wherein the information is received from a device that determines a relevancy of the information. 20. The apparatus of claim 18, wherein the information is received from a device that determines a redundancy of the information. 21. The apparatus of claim 18, wherein the information is received from a device that collects the information from a plurality of sources. 22. The apparatus of claim 18, wherein the information is received from a device that causes insertion of the information into the data storage structure. 23. A risk identifying apparatus, comprising: a memory;a processor disposed in communication with said memory, and configured to issue a plurality of processing instructions stored in the memory, wherein the processor issues instructions to: collect information from a plurality of information sources;translate the collected information into at least one standardized format;parse the information into a plurality of portions;determine a risk-relevancy metric of each of the plurality of portions, the risk-relevancy metric of each of the plurality of portions indicating a likelihood that a respective portion of the plurality of portions of the information is relevant to at least one risk;analyze the information to determine risk relevancy of the parsed information for determining a risk-relevancy tag;tag at least one portion of the information as risk-relevant based on the determined risk-relevancy metric;filter the tagged at least one portion of the information to remove information not deemed to be risk-relevant;filter a redundancy of the tagged at least one portion of the information;store the filtered tagged at least one portion of the information in a data storage structure; andoutput the information stored in the data storage structure to a risk identification graphical user interface. 24. The method of claim 1, further comprising computing an overall risk-relevancy metric for the information. 25. The method of claim 24, wherein computing the overall risk-relevancy metric for the information includes averaging the risk-relevancy metrics for the plurality of portions. 26. The method of claim 17, further comprising computing an overall risk-relevancy metric for the information. 27. The method of claim 26, wherein computing the overall risk-relevancy metric for the information includes averaging the risk-relevancy metrics for the plurality of portions. 28. The apparatus of claim 18, wherein the processor further issues instructions to compute an overall risk relevancy for the information. 29. The apparatus of claim 28, wherein computing the overall risk relevancy for the information includes averaging the risk-relevancy metrics for the plurality of portions. 30. The apparatus of claim 23, wherein the processor further issues instructions to compute an overall risk relevancy for the information. 31. The method of claim 30, wherein computing the overall risk relevancy for the information includes averaging the risk-relevancy metrics for the plurality of portions.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (259)
Wookey,Michael J., Access control over dynamic intellectual capital content.
Cane, David A.; Freidin, Jonathan F.; Runkel, Troy; Speare, Philip A.; Vaitzblit, Lev; Babich, Wayne; Filatov, Leonid; Council, Chad, Administration of a differential backup system in a client-server environment.
Tengel Cary G. ; Farin Thomas A. ; Kowal Michael L. ; Mataya L. Darryl, Apparatus and method for automatically matching a best available loan to a potential borrower via global telecommunicati.
Drummond Jay Paul ; Blackson Dale ; Cichon Bob A. ; Ess Joseph C. ; Moales Mark A. ; Weis David W. ; Smith Mark D. ; Church James, Automated banking machine apparatus and system.
Edward Horowitz ; Mark Ambrose ; Michael Fetta ; Steve Hakim ; Michael Kaufman ; David Robinson, Automated system and method for customized and personalized presentation of products and services of a financial institution.
Peairs Mark ; Hull Jonathan J. ; Cullen John ; Suzuki Kiyoshi,JPX, Automatic archiving of documents during their transfer between a peripheral device and a processing device.
Wolfberg Larry (Honolulu HI) Wolfberg Brent A. (Los Angeles CA) Rhoads Jan E. (Virginia Beach VA), Business transaction and investment growth monitoring data processing system.
Nair Parameswaran B. (Acworth GA) Evans John C. (Atlanta GA) Price James F. (Alpharetta GA) Choudhuri Kumar S. (Kennesaw GA) Stills James T. (Atlanta GA) Goulding Victor V. (Lawrenceville GA), Card validation method using multiple cord data regions.
Lyons Richard J. (West Hempstead NY) Nolan Kevin F. (Middle Village NY) Chu Wah C. (Fairfield CT), Computer system for financial analyses and reporting.
Highbloom Lawrence (Wynnewood PA), Computer system for monitoring the status of individual items of personal property which serve as collateral for securin.
Stein Lee H. ; Stefferud Einar A. ; Borenstein Nathaniel S. ; Rose Marshall T., Computerized system for facilitating transactions between parties on the internet using e-mail.
Boushy John M. ; Rowe Bruce C. ; Sevigny Jayme D., Customer worth differentiation by selective activation of physical instrumentalities within the casino.
Gill Gwyneth (Montreal NY CAX) Ryan John P. (Northville NY) Singer David (Thornhill CAX) Diamand Nicholas T. L. (Toronto CAX) Bernatchez Alexandre J. (Mississauga CAX) Lai John (Agincourt CAX) Le Gra, Data processing methods and apparatus for managing vehicle financing.
Luk, Ho Ming; Coates, Pamela E.; Deo, Arati S.; Downs, Sean M.; Friesen, Benjamin A.; Nies, Craig A.; Pathria, Anu K., Detection of insurance premium fraud or abuse using a predictive software system.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
Akel William S. (5460 White Oak Ave. ; A-336 Encino CA 91316) Schilling Paul K. (5460 White Oak Ave. ; A-336 Encino CA 91316) Solberg Eric L. (5460 White Oak Ave. ; A-336 Encino CA 91316), Distributed on-line money access card transaction processing system.
Moore Allan R. (Herndon VA) Poulos Lori J. (McLean VA) DeFazio Lynn G. (Manassas VA), Event driven management information system with rule-based applications structure stored in a relational database.
Fields, Duane Kimbell; Hassinger, Sebastian; Hurley, II, William Walter, Filter definition for distribution mechanism for filtering, formatting and reuse of web based content.
Jones Christopher L. ; Sharpe William F. ; Scott Jason S. ; Watson John G. ; Maggioncalda Jeff N. ; Bekaert Geert ; Grenadier Steven R. ; Park Ronald T., Financial advisory system.
Campbell Joseph J. (Allentown PA) Berdy Stephen G. (Allentown PA) Bucchin Raymond R. (Kempton PA) Clouse Larry R. (Macurgie PA) Gottardy Charles A. (Quakertown PA), Financial data processing system and method.
Gopinathan Krishna M. ; Biafore Louis S. ; Ferguson William M. ; Lazarus Michael A. ; Pathria Anu K. ; Jost Allen, Fraud detection using predictive modeling.
Zucknovich Stephen M. ; Leisy Jacques ; Kitain Eduard ; Urazov Yuri ; Baird George ; Blazek Paul ; Prohorov Dmitry ; Kolfman Michael ; Yackubovich Alex, Information delivery system and method including restriction processing.
Knight, Nigel; Baker, Richard; Metherell, Mel; Chittick, Ian; Parkin, Richard; Leong, Sang; Green, Les; Anders, Marc A., International banking system and method.
Jones Robert M. (Houston TX) Goetz Charles F. (Marietta GA) Steele Larry L. (Tucker GA), Method and apparatus for automatically determining the approval status of a potential borrower.
Ranalli Douglas J. ; Sosnowski Thomas P. ; Huebner Robert, Method and apparatus for automatically sending and receiving modifiable action reports via e-mail.
Hillier Stephen William,CAX ; Dilkie Ramon Jonathan Lee,CAX ; Rosenquist Gerrard Eric,CAX, Method and apparatus for centralizing processing of key and certificate life cycle management.
Bowen James D. (Aurora CO) Henry Allyson J. (Highlnds CO) Meier Mark J. (Carrollton TX) Postlethwait Linda S. (Englewood CO) Schrimp Steven W. (Denver CO), Method and apparatus for controlling and monitoring group travel related services.
Lewis,Michael; King,Frank; Arnold,Thomas; Wright,William; Pettit,John, Method and apparatus for evaluating fraud risk in an electronic commerce transaction.
Fujiyama, Tatsuya; Kayashima, Makoto; Nagai, Yasuhiko; Tsunoda, Mitsuhiro; Yamada, Tomoaki, Method and apparatus for evaluating security and method and apparatus for supporting the making of security countermeasure.
Christiansen James ; Fatnani Sangita ; Kolhatkar Jayashree Santosh ; Srinivasan Krishnakumar, Method and apparatus for generating segmentation scorecards for evaluating credit risk of bank card applicants.
Fletcher Bruce Alan ; Bhat Sandeep ; Didner Ira ; Freundlich Yehudah ; Kolodziejski Richard ; Schoder Joseph ; Ronen Yagil, Method and system for commercial credit analysis.
Meyer, Carl; Hoeber, Anthony N.; Kay, Erik A.; Bartlett, Stephen W., Method and system for delivering redeeming dynamically and adaptively characterized promotional incentives on a computer network.
Jones Wendell Davis ; Aud Stephen J. ; Hudepohl John P. ; Flournory Martin L. ; Snipes William B. ; Schutz Eric C., Method and system for dynamic risk assessment of software systems.
Potter Neil D. ; Chomut Bohdan ; Jacobs David M. ; Rayner Peter E. ; Anasson Cynthia M. ; Friedman Elizabeth J.,GB3, Method and system for performing automated financial transactions involving foreign currencies.
Krachman, Albert, Method and system for providing electronic discovery on computer databases and archives using artificial intelligence to recover legally relevant data.
Greco N. J. ; White E. M. ; Fine S. G. ; Haught G. R. ; Pihl E. M. ; Bullock G. ; Batman James M. ; Gillespie W. ; Roland D. ; Babij K., Method for accessing and evaluating information for processing an application for insurance.
Beattie, Douglas D.; Creighton, Jr., Neal Lewis; Bailey, Christopher T. M.; Remy, David L.; Hamandi, Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
Beattie,Douglas D.; Creighton, Jr.,Neal Lewis; Bailey,Christopher T. M.; Remy,David L.; Hamandi,Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
Beattie,Douglas; Creighton, Jr.,Neal; Bailey,Christopher; Remy,David; Hamandi,Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
Herman P. Taub, Methods, systems and apparatuses for matching individuals with behavioral requirements and for managing providers of services to evaluate or increase individuals' behavioral capabilities.
Blume, Matthias; Lazarus, Michael A.; Peranich, Larry S.; Vernhes, Frederique; Caid, William R.; Dunning, Ted E.; Russell, Gerald R.; Sitze, Kevin L., Predictive modeling of consumer financial behavior using supervised segmentation and nearest-neighbor matching.
Hawkins, Charles S.; Hill, Joseph; McLaughlin, Christine E.; Morris, Pamela A., Promoting compliance by financial institutions with due diligence requirements.
Weinstock Robert M ; Smidts Carol S ; Mosleh Ali ; Chang Yung-Hsien ; Swaminathan Sankaran ; Groen Francisco J ; Tan Zhibin, Quantitative risk assessment system (QRAS).
Randle William ; Ercole Richard ; Geer Terry L. ; James David L. ; Fredelake Jodie M. ; Roman Dennis ; Fontana Fabio ; Bartlett Rick ; Rosenberg Ruth ; Murphy Robert W. ; Tran Tuong T. ; Lampru Paul, Real time bank-centric universal payment system.
Filepp Robert (Springfield NJ) Gordon Michael L. (Dobbs Ferry NY) Bidwell Alexander W. (New York NY) Young Francis C. (Pearl River NY) Wolf Allan M. (Ridgefield CT) Meo Sam (New York NY) Tiemann Duan, Reception system for an interactive computer network and method of operation.
Bradford, Teresa Ann; Friedberg, Paul Ronald; Gosselin, Lawrence Warner; Leahy, Lisa Brucoli; Medina, David; Paraszczak, Jurij R.; Soendergaard Jensen, Frederik, Risk and compliance framework.
Gopinathan Krishna M. ; Jost Allen ; Biafore Louis S. ; Ferguson William M. ; Lazarus Michael A. ; Pathria Anu K., Risk determination and management using predictive modeling and transaction profiles for individual transacting entities.
Musmanno Thomas E. (Brooklyn NY) Bilbao Carlos F. (Brooklyn NY), Securities brokerage-cash management system obviating float costs by anticipatory liquidation of short term assets.
Musmanno Thomas E. (Brooklyn NY) Marrone Joseph A. (Copiague NY) Carey Laura (New York NY), Securities brokerage-cash management system with short term investment proceeds allotted among multiple accounts.
Rowan, Michael J.; Bailey, Christopher T. M.; Chen, Kefeng; Creighton, Neal, Security systems and services to provide identity and uniform resource identifier verification.
Cooper Leon N. (Providence RI) Elbaum Charles (Providence RI) Reilly Douglas L. (Providence RI), Self organizing general pattern class separator and identifier.
Mandler, Maria M.; McLaughlin, Ann P.; Battenfelder, Robert R.; Rouen, James E.; Orbach, Levi Y.; Benson, Carol; Engber, Marjorie; Nevens, James E.; Krajewski, William Joseph; Baldwin Moody, Carol A., System and method a risk based purchase of goods.
Mandler Maria M. ; McLaughlin Ann P. ; Battenfelder Robert R. ; Rouen James E. ; Orbach Levi Y. ; Benson Carol ; Engber Marjorie ; Nevens James E. ; Krajewski William Joseph ; Moody Carol A. Baldwin , System and method for a risk-based purchase of goods.
Zeanah James ; Abbott Charles ; Boyd Nik ; Cohen Albert ; Cook James ; Grandcolas Michael ; Lan Sikhun ; Lindsley Bonnie ; Markarian Grigor ; Moss Leslie, System and method for delivering financial services.
Friedlander, Robert R.; Hennessy, Richard A.; Kraemer, James R., System and method for deriving a hierarchical event based database having action triggers based on inferred probabilities.
Friedlander, Robert R.; Hennessy, Richard A.; Kraemer, James R., System and method for deriving a hierarchical event based database optimized for analysis of criminal and security information.
Hillmer, James M.; Jones, Richard A.; Gessner, Colleen M.; Johnston, Connie S.; Lewis, Jr., Kelly R.; Deshpande, Sanjay H., System and method for detecting fraudulent transactions.
Boesch Brian Paul ; Crocker Stephen David ; Eastlake ; III Donald Eggleston ; Hart ; Jr. Alden Sherburne ; Jackson Andrew ; Lindenberg Robert A. ; Paredes Denise Marie, System and method for multi-currency transactions.
Owens, Jennifer B.; Firestone, Jacob; Hawthorne, Edward T.; Valasquez, Joseph L; Hadd, David; Yee, Bradley A., System and method for operational risk assessment and control.
Kraay, Thomas A.; Brisbin, Charles E.; Carlson, Ralph, System and method for the identification of latent relationships amongst data elements in large databases.
King Douglas L. (6604 Covehollow Rd. Oklahoma City OK 73123) Barclay Alasdair G. (The Boathouse ; 6 Shaw Wood Rd. Pembroke BMX HM01 ) Wellman Rockie C. (727 Cedardale Oklahoma City OK 73127), System and method of risk transfer and risk diversification including means to assure with assurance of timely payment a.
Walker Darcy ; Sussman Lawrence J. ; Mayr Mona ; Dean ; Jr. Charles G. ; Seib Dennis ; Musci Richard ; Marino Glenn, System and method to performing on-line credit reviews and approvals.
Zoffel George S. (Kirkland WA) St. Laurent Nichola A. (Encinitas CA) Murdock Robb (Encinitas CA), System for generating and transmitting credit reports.
Gressel, Carmi David; Milstein, David; Sander, Avi; Hadad, Isaac; Granot, Ran, System for safe collection of payment including electronic payment receipt generators having electronic purses.
Nguyen Trong ; Subramanian Mahadevan P. ; Haller Daniel R., System, method and article of manufacture for a gateway system architecture with system administration information accessible from a browser.
Umair Khan ; Rizsan Tufail ; Christine Odero, System, method, and article of manufacture for delivering information to a user through programmable network bookmarks.
Bishop,Fred; Barrett,Michael R.; Armes,David; Wojciechowski,Lee A.; Madhineni,Madhukar; Krishnan,Vilayanur Parameswaran; McKay,Joshua B.; Gebb,Lucas, Systems and methods for facilitating commercial transactions between parties residing at remote locations.
Lawton, Alison; Carle, Rachel; Mehta, Monica; Durham, Mary; Granfield, Richard J.; Kiely, James Earl; Puig, David J., Systems and methods for managing regulatory information.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.