Systems and methods for improving a security profile of an entity based on peer security profiles
First Claim
1. A computer-implemented method comprising:
- receiving, for a particular entity, (i) a value for at least one feature of the entity and (ii) a number of security records for the entity, each security record being of a security risk type;
determining a population of peer entities based on the value of the at least one feature;
obtaining, for each peer entity, a number of security records;
adjusting the number of peer security records based on the number of entity security records;
comparing, for at least one security risk type, the received number of security records for the particular entity to the respective adjusted number of security records for each peer entity;
comparing a security profile of the particular entity to security profiles of the population of peer entities based on the comparison for the at least one security risk type; and
presenting the comparison of the security profiles in a user interface.
3 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method is provided for comparing the security profile of a particular entity to peer entities. The method can include receiving, for a particular entity, (i) a value for at least one feature and (ii) a number of security records of one or more security risk types. The method can include determining peer entities based on the value of the features; obtaining, for each peer entity, a number of security records; and adjusting the number of peer security records based on the number of entity security records. The method can further include comparing, for one or more security risk types, the received number of security records for the particular entity to the respective adjusted number of security records for each peer entity; and comparing a security profile of the particular entity to security profiles of the population of peer entities based on the comparison for the security risk types.
212 Citations
22 Claims
-
1. A computer-implemented method comprising:
-
receiving, for a particular entity, (i) a value for at least one feature of the entity and (ii) a number of security records for the entity, each security record being of a security risk type; determining a population of peer entities based on the value of the at least one feature; obtaining, for each peer entity, a number of security records; adjusting the number of peer security records based on the number of entity security records; comparing, for at least one security risk type, the received number of security records for the particular entity to the respective adjusted number of security records for each peer entity; comparing a security profile of the particular entity to security profiles of the population of peer entities based on the comparison for the at least one security risk type; and presenting the comparison of the security profiles in a user interface. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprising:
one or more computer systems programmed to perform operations comprising; receiving, for a particular entity, (i) a value for at least one feature of the entity and (ii) a number of security records for the entity, each security record being of a security risk type; determining a population of peer entities based on the value of the at least one feature; obtaining, for each peer entity, a number of security records; adjusting the number of peer security records based on the number of entity security records; comparing, for at least one security risk type, the received number of security records for the particular entity to the respective adjusted number of security records for each peer entity; comparing a security profile of the particular entity to security profiles of the population of peer entities based on the comparison for the at least one security risk type; and presenting the comparison of the security profiles in a user interface. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
Specification