G06Q10/0635

Methods and systems for managing third-party data risk

Some embodiments of the present disclosure disclose methods and systems for assessing the data risk management capabilities of data processors that receive second-party data as part of an engagement to provide support services. In some embodiments, the transfer of the second-party data to the data processors can be monitored to identify file transfers including unauthorized personally identifiable information (PII) attributes. In some embodiments, the database of the data processor may be scanned to locate any residual second-party data that should be removed after the data processor's engagement to provide the support services have expired.

Pre-data breach monitoring

A method for providing pre-data breach monitoring provides information to businesses that is useful to predict portions of the company data that may not be secured well enough and other risks associated with data breaches, such as employees that may not be trustworthy.

Computer-based systems configured to detect fraudulent activities related to card-transacting devices and methods of use thereof
11568349 · 2023-01-31 ·

Systems and methods of detecting fraudulent activity including skimmers adapted to compromise transacting devices such as automated teller machines (ATMs) are disclosed. In one embodiment, an exemplary computer-implemented method may comprise determining that a subject device has a risk level higher than a risk threshold, providing a push notification to a mobile device proximal to the subject device, executing a software application executed by the mobile device for gathering information and transmitting feedback regarding the subject device, and providing an incentive, upon receipt of the feedback, to, for example, an account or device associated with an individual involved with the feedback or interaction with the device.

UTILITIES INFRATRUCTURE SELECTION
20230021337 · 2023-01-26 ·

A method of defining a deployment specification for one or more infrastructure components as part of a transmission network for a utility service in a defined geographic region includes receiving a deployment specification for each of a plurality of deployment options, each received specification including a location and type of one or more infrastructure components for deployment in the region, each type of infrastructure component having associated infrastructure characteristics, and each location having associated location characteristics. The method further includes receiving environmental characteristics for the region; executing a classifier, for each deployment specification, based on one or more of the infrastructure characteristics, the location characteristics, and the environmental characteristics to forecast a measure of susceptibility of infrastructure deployed in accordance with the specification to one or more operational impediments of the infrastructure in use; and selecting a deployment specification based on the forecast susceptibilities.

ANALYSIS DEVICE AND ANALYSIS METHOD
20230237406 · 2023-07-27 · ·

Provided is an analysis device including a processor and a storage device. The storage device holds behavior history information indicating a period in which each of a first terminal device and a second terminal device has stayed in a predetermined area of a space and a predetermined remaining period. The processor identifies, as a period of a direct contact, a period in which the first terminal device and the second terminal device have simultaneously stayed in the predetermined area, and, identifies, as a period of an indirect contact, a period which is included in a period from an end point of the period in which the first terminal device has stayed in the predetermined area until the predetermined remaining period elapses, and in which the second terminal device has stayed in the predetermined area.

ANALYSIS DEVICE AND ANALYSIS METHOD
20230237406 · 2023-07-27 · ·

Provided is an analysis device including a processor and a storage device. The storage device holds behavior history information indicating a period in which each of a first terminal device and a second terminal device has stayed in a predetermined area of a space and a predetermined remaining period. The processor identifies, as a period of a direct contact, a period in which the first terminal device and the second terminal device have simultaneously stayed in the predetermined area, and, identifies, as a period of an indirect contact, a period which is included in a period from an end point of the period in which the first terminal device has stayed in the predetermined area until the predetermined remaining period elapses, and in which the second terminal device has stayed in the predetermined area.

SYSTEM AND METHOD FOR DETERMINING AN INTERIM LIFE SAFETY MEASURE (ILSM) FOR ONE OR MORE SMOKE COMPARTMENTS IN A FACILITY
20230237607 · 2023-07-27 ·

A system and method for determining an interim life safety measure (ILSM) for one or more smoke compartments in the facility is disclosed. The system analyzes potential risk factors associated with individuals in one or more smoke compartments of facility, based on type of smoke compartments. Further, the system classifies assets associated with smoke compartments into risk levels, based on asset classes and/or location environment associated assets comprising risk levels. Additionally, system assigns risk assessment scores to inspection points corresponding to classified assets. Furthermore, the system determines ILSMs. The ILSM is health and safety measure to protect individuals at facility. Additionally, system creates maintenance work orders and/or corrective work orders, based on determined ILSMs. Further, system outputs, to user device, notifications corresponding to status of created maintenance work orders and/or corrective work orders. The notifications inform user to provide instructions for creating order and inform user to monitor status.

SYSTEM AND METHOD FOR DETERMINING AN INTERIM LIFE SAFETY MEASURE (ILSM) FOR ONE OR MORE SMOKE COMPARTMENTS IN A FACILITY
20230237607 · 2023-07-27 ·

A system and method for determining an interim life safety measure (ILSM) for one or more smoke compartments in the facility is disclosed. The system analyzes potential risk factors associated with individuals in one or more smoke compartments of facility, based on type of smoke compartments. Further, the system classifies assets associated with smoke compartments into risk levels, based on asset classes and/or location environment associated assets comprising risk levels. Additionally, system assigns risk assessment scores to inspection points corresponding to classified assets. Furthermore, the system determines ILSMs. The ILSM is health and safety measure to protect individuals at facility. Additionally, system creates maintenance work orders and/or corrective work orders, based on determined ILSMs. Further, system outputs, to user device, notifications corresponding to status of created maintenance work orders and/or corrective work orders. The notifications inform user to provide instructions for creating order and inform user to monitor status.

System for automated description and categorization

A back-end application computer server may receive a request along with a descriptive term. A look-up process may be performed based on the descriptive term (and hidden terms) may establish a set of potential pre-determined descriptions. The user may select one of the potential descriptions, and a user identifier may be associated with the request. A series of dynamic information exchanges may then help assign a category to the user identifier. A partial set of initial request details may be received from a third-party device and the user may adjust and/or add details to create a complete set. A potential value may then be calculated for the request. An indication of the potential value may be transmitted to the user, and information about the user identifier may be transmitted to a user response terminal to facilitate communication between the user response terminal and the user.

System for automated description and categorization

A back-end application computer server may receive a request along with a descriptive term. A look-up process may be performed based on the descriptive term (and hidden terms) may establish a set of potential pre-determined descriptions. The user may select one of the potential descriptions, and a user identifier may be associated with the request. A series of dynamic information exchanges may then help assign a category to the user identifier. A partial set of initial request details may be received from a third-party device and the user may adjust and/or add details to create a complete set. A potential value may then be calculated for the request. An indication of the potential value may be transmitted to the user, and information about the user identifier may be transmitted to a user response terminal to facilitate communication between the user response terminal and the user.