Link analysis mapping program risk management
First Claim
1. A computer-implemented method for managing risk through link analysis mapping, the method comprising:
- receiving into a memory of a computer system information descriptive of two or more persons;
generating in the computer system links associating two or more persons based upon the information received;
receiving into the memory the computer system an identifier identifying a person; and
generating in the computer system a link associating the identified person with one or more other persons.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for managing risk by indicating links between one or more persons or entities which can include a process that gathers information about individuals and organizations into a computerized system where it can be analyzed to associate one or more individuals or organizations with links to other individuals or organizations. A user can designate a person or entity and the system will provide an indication of linkages associated with the designated person. Some embodiments can include a user specifying a particular type of link or limit links to a specified degree of separation between the designated person and any other person or entity.
-
Citations
15 Claims
-
1. A computer-implemented method for managing risk through link analysis mapping, the method comprising:
-
receiving into a memory of a computer system information descriptive of two or more persons;
generating in the computer system links associating two or more persons based upon the information received;
receiving into the memory the computer system an identifier identifying a person; and
generating in the computer system a link associating the identified person with one or more other persons. - View Dependent Claims (2, 3, 4)
-
-
5. A computerized system for managing risk through link analysis mapping, the system comprising:
-
a computer server accessible with a system access device via a communications network; and
executable software stored on the server and executable on demand, the software operative with the server to cause the server to;
receive information descriptive of two or more persons;
generate links associating two or more persons based upon the information received;
receive an identifier identifying a person; and
generate a link associating the identified person with one or more other persons. - View Dependent Claims (6, 7, 8, 9)
-
-
10. Computer executable program code residing on a computer-readable medium, the program code operable with a processor on a computer system for causing the computer system to:
-
receive information into a memory of the computer system descriptive of two or more persons;
generate in the computer system links associating two or more persons based upon the information received;
receive into the computer system an identifier identifying a person; and
generate a link associating the identified person with one or more other persons. - View Dependent Claims (11, 12)
-
-
13. A method of interacting with a network access device so as to manage risk, the method comprising the steps of:
-
transmitting from the network access device a description of a person;
transmitting from the network access device an indication of a degree of separation for which links to the person are desired;
receiving at the network access device an indication of links to one or more other persons; and
receiving at the network access device a description of each link. - View Dependent Claims (14)
-
-
15. A computer data signal embodied in a digital data stream comprising data relating to managing risk, wherein the computer data signal is generated by a method comprising the steps of:
-
receiving information descriptive of two or more persons;
generating links associating two or more persons based upon the information received;
receiving an identifier identifying a person; and
generating a link associating the identified person with one or more other persons.
-
Specification