×

System and method for risk detection reporting and infrastructure

  • US 8,484,066 B2
  • Filed: 06/08/2004
  • Issued: 07/09/2013
  • Est. Priority Date: 06/09/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method, implemented using a processor and a memory, for monitoring and controlling risks associated with a supply chain, comprising:

  • accessing the memory to identify safety based risk elements within a supply chain infrastructure where the safety based risk elements include one or more of;

    external malicious threats, intrusion detection, safety of personnel, safety of infrastructure, safety of data systems, physical subversion of assets and physical subversion of delivery mechanisms;

    identifying linkages between said identified safety based risk elements and corresponding supply chain infrastructural elements;

    categorizing the identified safety based risk elements according to risk categories, wherein the risk categories each have an associated base value and the safety based risk elements have a derived value whose magnitude indicates at least one of a relative degree of risk and risk of a particular type, wherein an associated risk value of each of the risk categories corresponds to the likelihood of occurrence, magnitude, ability to mitigate, and resource availability;

    defining a set of risk policies according to said risk categories, wherein the set of risk policies define a risk threshold based on the infrastructure elements and the safety based risk elements of the supply chain at issue, wherein the risk threshold is determined based on the value of a threat times the probability of the occurrence of a threat outcome, and wherein the occurrence of the threat is analyzed using the processor based on a transparency, character, logic and trust of the data;

    receiving information indicating that one or more infrastructural elements is to be utilized in the supply chain and using the processor to evaluate said information against the set of risk policies to determine if the risk threshold is exceeded; and

    if the risk threshold is exceeded, modifying one or more of the risk policies.

View all claims
  • 18 Assignments
Timeline View
Assignment View
    ×
    ×