EVALUATING, MONITORING, AND CONTROLLING FINANCIAL RISKS USING STABILITY SCORING OF INFORMATION RECEIVED FROM SOCIAL NETWORKS AND OTHER QUALIFIED ACCOUNTS
First Claim
1. A computer-implemented method for managing the financial risk of a risk-taking scenario associated with a subject of risk-taking implemented on a computer system programmed to perform the method comprising:
- receiving in the computer system, authorization to access a qualified account of a subject of risk-taking;
receiving in the computer system, data from the qualified account of the subject of risk-taking;
determining in the computer system, a stability score based on the received data, the stability score being an estimate of the financial risk in the risk-taking scenario; and
performing in the computer system, an action through the qualified account based on the stability score.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented method for managing the financial risk in a risk-taking scenario associated with a subject of risk-taking. The method includes receiving authorization to access at least one qualified account of a subject of risk-taking; receiving data from the qualified accounts of the subject of risk-taking; determining a stability score based on the received data, the stability score being an estimate of the financial risk in the risk-taking scenario; and performing an action through the qualified account based on the stability score.
139 Citations
20 Claims
-
1. A computer-implemented method for managing the financial risk of a risk-taking scenario associated with a subject of risk-taking implemented on a computer system programmed to perform the method comprising:
-
receiving in the computer system, authorization to access a qualified account of a subject of risk-taking; receiving in the computer system, data from the qualified account of the subject of risk-taking; determining in the computer system, a stability score based on the received data, the stability score being an estimate of the financial risk in the risk-taking scenario; and performing in the computer system, an action through the qualified account based on the stability score. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
- 15. The computer-implemented method of claim 15 wherein the information provider comprises one of a financial information provider, a legal information provider, a medical information provider, a news provider, a public records provider, a credit reporting agency and a crowdsourced-opinion provider.
-
18. A computer-implemented method for verifying user compliance with a user representation with a computer system programmed to perform the method comprising:
-
receiving with the computer system, a first plurality of social network data associated with a user and associated with a first social network, wherein the first plurality of social network data is associated with a first retrieval time; determining with the computer system, a second plurality of social network data associated with the user and associated with the first social network, wherein the second plurality of social network data is associated with a second retrieval time, wherein the first retrieval time is different from the second retrieval time; comparing with the computer system at least a portion of social network data from the first plurality of social network data to at least a portion of social network data from the second plurality of social network data to determine one or more differences, if any; determining with the computer system a stability indicator associated with the user in response to the one or more differences, if any; determining with the computer system whether the stability indicator exceeds a threshold stability indicator; and storing with the computer system an alert indicator when the stability indicator exceeds the threshold stability indicator. - View Dependent Claims (19, 20)
-
Specification