×

System and method for risk detection reporting and infrastructure

  • US 9,177,279 B2
  • Filed: 08/19/2014
  • Issued: 11/03/2015
  • Est. Priority Date: 06/09/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system, comprising:

  • a processor;

    a memory coupled to the processor, wherein the memory containsdata regarding one or more supply chain elements stored in an electronic format in the memory, wherein a plurality of data relating to the one or more supply chain elements comprises a data instance, anda software program to be run by the processor that includes instructions that provide for the following;

    categorizing the one or more supply chain elements each according to one or more risk categories, wherein each of the one or more risk categories comprises an associated range of values and the supply chain elements comprise a derived value whose magnitude indicates at least one of a relative degree of risk and risk of a particular type,accessing the memory to identify a first data instance,weighing the first data instance against at least one of the one or more risk categories to arrive at a value for such data instance under the at least one of the one or more risk categories against which the first data instance is weighed, wherein the value for the data instance under the at least one of the one or more risk categories against which the data instance is weighed varies depending on a selected risk policy of a plurality of risk policies, wherein each of the plurality of risk policies is defined by a plurality of risk categories, wherein each of the plurality of risk categories is defined by a range of values, wherein each of the plurality of risk policies comprises one or more predetermined values or ranges of values for one or more of the risk categories,determining each of the predetermined values or ranges of values based on the value of a threat times the probability of the occurrence of a threat outcome, wherein the occurrence of the threat is analyzed using the processor based on a source, transparency, character, logic and trust of the data relating to the one or more supply chain elements;

    determining whether the first data instance is acceptable under a first risk policy, wherein acceptance is dependent on a combination of each value for such data instance under each of the one or more risk categories against which the first data instance is weighed as compared to the predetermined values or ranges of values of the selected risk policy.

View all claims
  • 15 Assignments
Timeline View
Assignment View
    ×
    ×