Patent classifications
G06Q10/0635
METHODS, APPARATUSES, AND SYSTEMS FOR FACILITATING MANAGEMENT AND/OR AUTOMATION OF DIRECT MAIL CAMPAIGNS AND OTHER BULK/HIGH VOLUME MAILINGS
Methods, apparatuses, and systems for facilitating and/or automating project specification, vendor/supplier selection, packaging/processing, and/or mailing for bulk or direct mail campaigns are described herein. Via computer-facilitated techniques, a project manager (or other authorized user) of a mail campaign electronically provides various project information (e.g., project type, design specifications and quantities of materials, mailing list(s), deadlines). Multiple authorized suppliers of services germane to direct mail campaigns (e.g., print shops, lettershops) electronically access the project information and in turn provide respective bids to perform at least some services required by the project. The methods, apparatuses, and systems may also generate logistical recommendations to the user for the bulk or direct mail campaign based on the processed data and on logistical information obtained from a variety of sources.
PRODUCT INSPECTION DEVICE, PRODUCT INSPECTION METHOD, AND COMPUTER PROGRAM
A product inspection device and method for correctly calculating consumer and producer risks irrespective of the type of distribution of products. A characteristic value representing a predetermined product characteristic is measured for each product as a product measurement value, and a standard deviation of measurement variations in measurement results is calculated as a measurement value standard deviation. The products are determined to be conforming based on whether the measured product measurement value falls within a range of a product standard. Consumer and producer risks are calculated based on the measurement variations. The calculated consumer and producer risks are respectively and successively added up and it is determined whether the number of products having undergone the adding have reached a predetermined number. If so, the added up consumer risk and producer risk are divided by the number of products to calculate a final consumer risk and a final producer risk.
Systems and Methods for Security and Risk Assessment and Testing of Applications
Provided herein are systems and methods for monitoring and assessing the security and risk presented by applications deployed in a complex computing environment. An exemplary application security system an application security server having a processing device in communication with one or more storage systems and includes a security testing system with a plurality of security test modules. The test modules include a first module associated with a first application associated with one or more application instances configured to receive and transmit over a network. The processing device calculates a security risk score for the first application based on information about the first application, determines a security priority level associated with first application, the security priority level of the first application being based on the security risk score for the first application, and associates the security priority level of the first application with the first application in a database of application security information.
Autonomous communication feature use and insurance pricing
Methods and systems for determining risk associated with operation of autonomous vehicles using autonomous communication are provided. According to certain aspects, autonomous operation features associated with a vehicle may be determined, including features associated with autonomous communication between vehicles or with infrastructure. This information may be used to determine risk levels for a plurality of features, which may be based upon test data regarding the features or actual loss data. Expected use levels and autonomous communication levels may further be determined and used with the risk levels to determine a total risk level associated with operation of the vehicle. The autonomous communication levels may indicate the types of communications, the levels of communication with other vehicles or infrastructure, or the frequency of autonomous communication. The total risk level may be used to determine or adjust aspects of an insurance policy associated with the vehicle.
Autonomous communication feature use and insurance pricing
Methods and systems for determining risk associated with operation of autonomous vehicles using autonomous communication are provided. According to certain aspects, autonomous operation features associated with a vehicle may be determined, including features associated with autonomous communication between vehicles or with infrastructure. This information may be used to determine risk levels for a plurality of features, which may be based upon test data regarding the features or actual loss data. Expected use levels and autonomous communication levels may further be determined and used with the risk levels to determine a total risk level associated with operation of the vehicle. The autonomous communication levels may indicate the types of communications, the levels of communication with other vehicles or infrastructure, or the frequency of autonomous communication. The total risk level may be used to determine or adjust aspects of an insurance policy associated with the vehicle.
Systems and methods for asynchronous API-driven external application services for a blockchain
Systems and methods for asynchronous API-driven external application services for blockchain are provided. The blockchain may store profile data that permits asynchronous communications and data sharing among a plurality of trusted users, and an application server layer may act as a gateway to a blockchain system to selectively provide limited access to external application services to operate upon the blockchain data.
IDENTIFYING NETWORK SECURITY RISKS
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying network security risks. One of the methods includes receiving organizational hierarchy data and receiving access privilege data for a network, generating an adjacency matrix that represents connections between individuals within the organizational hierarchy and various groups, and that represents connections between the individuals and various access privileges, selecting an analytic technique for analyzing the adjacency matrix, determining, for each individual, an individual score that represents a security risk associated with the individual's network account, and in response to determining that the individual score meets a threshold, applying security controls.
Systems and methods for determining mobile device status
Method and system for determining a status of a mobile device of a user are disclosed. For example, the method includes receiving first sensor data at a first time from an application installed on a mobile device of a user, determining a first location of the mobile device, immediately subsequent to receiving the first sensor data at the first time, receiving second sensor data at a second time from the application, the second time following the first time by a time interval, determining a second location of the mobile device, determining a distance between the first location and the second location, determining whether the distance corresponding to the time interval exceeds a predetermined threshold, and determining whether a trip log indicative of at least one trip during the time interval is received from the application.
Systems and methods for understanding identity and organizational access to applications within an enterprise environment
Methods and systems for understanding identity and organizational access to applications within an enterprise environment are provided. Exemplary methods include collecting data about relationships between applications and metadata associated with the applications in a computing environment of an enterprise, the metadata including information concerning a plurality of users accessing the applications; updating a graph database including nodes representing the applications of the computing environment of the enterprise and edges representing relationships between the applications; enriching the graph database by associating the nodes with metadata associated with the applications and associating user accounts with metadata associated with roles, organizations membership, privileges, and permissions; analyzing the graph database to identify a subset of nodes being accessed by a user of the plurality of users; and displaying, via a graphical user interface, a graphical representation of the subset of nodes and relationships between the nodes in the subset of the nodes.
Systems and methods for understanding identity and organizational access to applications within an enterprise environment
Methods and systems for understanding identity and organizational access to applications within an enterprise environment are provided. Exemplary methods include collecting data about relationships between applications and metadata associated with the applications in a computing environment of an enterprise, the metadata including information concerning a plurality of users accessing the applications; updating a graph database including nodes representing the applications of the computing environment of the enterprise and edges representing relationships between the applications; enriching the graph database by associating the nodes with metadata associated with the applications and associating user accounts with metadata associated with roles, organizations membership, privileges, and permissions; analyzing the graph database to identify a subset of nodes being accessed by a user of the plurality of users; and displaying, via a graphical user interface, a graphical representation of the subset of nodes and relationships between the nodes in the subset of the nodes.