-
公开(公告)号:US20130325674A1
公开(公告)日:2013-12-05
申请号:US13486593
申请日:2012-06-01
申请人: Naveen G. Yeri , Bibhudatta Jena , Arya Kumar Vedabrata , Chandrashekar Katuri , Timothy J. Bendel , David Joa , Vikas Mishra , Thayer S. Allison, JR. , Deepak Verma , Yanghong Shao , Parul Bajaj
发明人: Naveen G. Yeri , Bibhudatta Jena , Arya Kumar Vedabrata , Chandrashekar Katuri , Timothy J. Bendel , David Joa , Vikas Mishra , Thayer S. Allison, JR. , Deepak Verma , Yanghong Shao , Parul Bajaj
IPC分类号: G06Q40/02
CPC分类号: G06Q40/02
摘要: Systems and methods for monitoring trigger data quality are provided herein. The systems and methods detect and report whether the current trigger counts are normal or flawed in real time. The systems and methods monitor the triggers to determine the accuracy, completeness, domain of values, and format of the trigger data. In the system and methods, account data associated with the one or more accounts is received and stored in a storage device; the account data is segregated into one or more periods of time; triggers associated with the one or more periods of time are identified based on transactions that occur during the one or more periods of time; a total transaction count for each of the triggers is calculated; and control limits are determined based on the transaction count for each of the triggers.
摘要翻译: 本文提供了监控触发数据质量的系统和方法。 系统和方法检测并报告当前触发计数是否正常或实时有缺陷。 系统和方法监视触发器以确定触发数据的准确性,完整性,值域和格式。 在系统和方法中,与一个或多个帐户相关联的帐户数据被接收并存储在存储设备中; 帐户数据被分隔成一个或多个时间段; 基于在一个或多个时间段期间发生的交易来识别与一个或多个时间段相关联的触发; 计算每个触发器的总事务计数; 并且基于每个触发器的事务计数来确定控制限制。
-
公开(公告)号:US08805730B2
公开(公告)日:2014-08-12
申请号:US13486593
申请日:2012-06-01
申请人: Naveen G. Yeri , Bibhudatta Jena , Arya Kumar Vedabrata , Chandrashekar Katuri , Timothy J. Bendel , David Joa , Vikas Mishra , Thayer S. Allison, Jr. , Deepak Verma , Yanghong Shao , Parul Bajaj
发明人: Naveen G. Yeri , Bibhudatta Jena , Arya Kumar Vedabrata , Chandrashekar Katuri , Timothy J. Bendel , David Joa , Vikas Mishra , Thayer S. Allison, Jr. , Deepak Verma , Yanghong Shao , Parul Bajaj
IPC分类号: G07F19/00
CPC分类号: G06Q40/02
摘要: Systems and methods for monitoring trigger data quality are provided herein. The systems and methods detect and report whether the current trigger counts are normal or flawed in real time. The systems and methods monitor the triggers to determine the accuracy, completeness, domain of values, and format of the trigger data. In the system and methods, account data associated with the one or more accounts is received and stored in a storage device; the account data is segregated into one or more periods of time; triggers associated with the one or more periods of time are identified based on transactions that occur during the one or more periods of time; a total transaction count for each of the triggers is calculated; and control limits are determined based on the transaction count for each of the triggers.
摘要翻译: 本文提供了监控触发数据质量的系统和方法。 系统和方法检测并报告当前触发计数是否正常或实时有缺陷。 系统和方法监视触发器以确定触发数据的准确性,完整性,值域和格式。 在系统和方法中,与一个或多个帐户相关联的帐户数据被接收并存储在存储设备中; 帐户数据被分隔成一个或多个时间段; 基于在一个或多个时间段期间发生的交易来识别与一个或多个时间段相关联的触发; 计算每个触发器的总事务计数; 并且基于每个触发器的事务计数来确定控制限制。
-
公开(公告)号:US20120203590A1
公开(公告)日:2012-08-09
申请号:US13020884
申请日:2011-02-04
申请人: Subhajit Deb , William Tyler Thornhill , Matthew L. Weber , Chandrashekar Katuri , Krishna Reddy Mandala
发明人: Subhajit Deb , William Tyler Thornhill , Matthew L. Weber , Chandrashekar Katuri , Krishna Reddy Mandala
IPC分类号: G06Q10/00
CPC分类号: G06Q10/04 , G06Q10/0635
摘要: A computer system assesses the overall risk for different technologies for an organization. Technologies may be evaluated by obtaining severity levels and environmental risk scores for the vulnerabilities associated with the technologies. Each severity level measures a possible risk level of a corresponding vulnerability, while each environmental risk score is based on the organization's environment. Technology risk scores are then determined from the severity levels and the environmental risk scores. Each technology may then be categorized from a statistical distribution of the technology risk scores. An indexed risk score for each technology may also be determined based on time trending variables. Inputs may be a number of vulnerabilities, blended advisory/severity scores, and a standard deviation of the blended advisory/severity scores, and the results then provide behavior forecasting of the technologies. Further evaluation of the technologies may be performed to determine a risk versus reward model for the different technologies.
摘要翻译: 计算机系统评估组织的不同技术的总体风险。 可以通过获取与技术相关的漏洞的严重性级别和环境风险评分来评估技术。 每个严重性级别衡量相应漏洞的可能风险级别,而每个环境风险评分均基于组织的环境。 然后从严重程度和环境风险评分中确定技术风险评分。 然后可以从技术风险分数的统计分布中分类每种技术。 每个技术的索引风险分数也可以基于时间趋势变量来确定。 输入可能是一些漏洞,混合咨询/严重性评分以及混合咨询/严重程度评分的标准偏差,然后结果提供了技术的行为预测。 可以进行技术的进一步评估,以确定不同技术的风险与回报模型。
-
-