Movatterモバイル変換


[0]ホーム

URL:


US20080133552A1 - Information Processor Arrangement - Google Patents

Information Processor Arrangement
Download PDF

Info

Publication number
US20080133552A1
US20080133552A1US11/575,955US57595505AUS2008133552A1US 20080133552 A1US20080133552 A1US 20080133552A1US 57595505 AUS57595505 AUS 57595505AUS 2008133552 A1US2008133552 A1US 2008133552A1
Authority
US
United States
Prior art keywords
cluster
links
information
clusters
gateway
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/575,955
Inventor
Richard Leary
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced Forensic Solutions Ltd
Original Assignee
Advanced Forensic Solutions Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced Forensic Solutions LtdfiledCriticalAdvanced Forensic Solutions Ltd
Assigned to ADVANCED FORENSIC SOLUTIONS LIMITEDreassignmentADVANCED FORENSIC SOLUTIONS LIMITEDASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: LEARY, RICHARD
Publication of US20080133552A1publicationCriticalpatent/US20080133552A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Irregular links and relationships in a data set may relate to fraudulent actions or identify deception or risk assessment or knowledge generation but may be identified by simple superficially unlinked actions. Thus, for example a claimant may claim through an address using one telephone number but contact the insurer for that claim using a different telephone number. By 10 pooling all the information received, including all. telephone numbers, unusual or irregular or fraudulent leads can be identified by establishing telephone numbers or other gateway cluster nodes for each dataset such that supposedly unrelated claims can be matched and therefore be more closely scrutinised. The information processor arrangement may create a cascade of clusters for an as presented data set which can be configured through cluster nodes to allow better identification of suspect activity or for better analysis profiling.

Description

Claims (44)

47. A method of structuring a dataset the method comprising the steps of:
(a) collecting a dataset in the form of information entities interlinked by reference links to each other; and the context in which each information entity is taken relative to the reference link or reference links,
(b) defining unexpected links to be identified by the method by reference to at least one information entity and a relevance model that defines expected reference links as direct links and indirect links between the information entities whereby unexpected links are all other reference links between the information entities,
(c) defining a plurality of gateway cluster nodes for the dataset, each cluster node being one of the information entities whereby each information entity is considered to determine its reference links with other Information entities, until each information entity is resolved through a link path to the gateway cluster node as a member of a cluster referenced by the gateway cluster node, each member comprising the link path in other form of a string or network of reference links to the gateway cluster node, and
(d) selection of a cluster by reference to the relevance model as including an unexpected link and determining whether the number population in the selected cluster respectively meet preset specific search criteria or repeating step (c) specifically upon the cluster with cluster nodes defined by information entities other than the gateway cluster node used to define the selected cluster until the preset specific search criteria are achieved.
67. An information arrangement structured to comprise
(a) a relational database defining types of information entities and having reference links between each other,
(b) means to define reference links as a relevance model comprising expected reference links between the information entities whereby unexpected links are all other reference links between information entities, each unexpected link thereby identifiable, and
(c) means to define a plurality of gateway cluster nodes comprising one of the information entities and means to determine link paths from each information entity to each gateway cluster node and a network of link paths defining members of a respective cluster referenced by the gateway cluster node, means to select clusters by reference to the relevance model as including an unexpected link and means to determine whether each selected cluster meets pre-set specific search criteria and means, if the selective cluster does not meet the pre-set search criteria, to analyse that selected cluster by definition of further gateway cluster nodes comprising an information entity other than the information entity to define the selected cluster and use of the means to determine link paths to the further gateway cluster nodes to provide sub clusters for comparison with the relevant model to define unexpected links until a sub cluster meets the pre-set search criteria.
US11/575,9552004-09-242005-09-26Information Processor ArrangementAbandonedUS20080133552A1 (en)

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
GB0421284AGB2418499A (en)2004-09-242004-09-24Information analysis arrangement
GB0421284.12004-09-24
PCT/GB2005/003730WO2006032927A2 (en)2004-09-242005-09-26Information processor arrangement

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
PCT/GB2005/003730A-371-Of-InternationalWO2006032927A2 (en)2004-09-242005-09-26Information processor arrangement

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US12/797,528ContinuationUS8224790B2 (en)2004-09-242010-06-10Information processor arrangement

Publications (1)

Publication NumberPublication Date
US20080133552A1true US20080133552A1 (en)2008-06-05

Family

ID=33397206

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US11/575,955AbandonedUS20080133552A1 (en)2004-09-242005-09-26Information Processor Arrangement
US12/797,528Expired - Fee RelatedUS8224790B2 (en)2004-09-242010-06-10Information processor arrangement

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US12/797,528Expired - Fee RelatedUS8224790B2 (en)2004-09-242010-06-10Information processor arrangement

Country Status (5)

CountryLink
US (2)US20080133552A1 (en)
EP (2)EP1800248A2 (en)
AU (1)AU2005286203B9 (en)
GB (1)GB2418499A (en)
WO (1)WO2006032927A2 (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8812542B1 (en)*2012-03-302014-08-19Emc CorporationOn-the-fly determining of alert relationships in a distributed system
US20160147875A1 (en)*2014-11-212016-05-26International Business Machines CorporationQuestion Pruning for Evaluating a Hypothetical Ontological Link
US9684649B2 (en)2012-08-212017-06-20Industrial Technology Research InstituteMethod and system for discovering suspicious account groups
US20170323283A1 (en)*2016-05-032017-11-09Paypal, Inc.System and method for splitting a card data structure
US9892362B2 (en)2014-11-182018-02-13International Business Machines CorporationIntelligence gathering and analysis using a question answering system
US10318870B2 (en)2014-11-192019-06-11International Business Machines CorporationGrading sources and managing evidence for intelligence analysis
US10606893B2 (en)2016-09-152020-03-31International Business Machines CorporationExpanding knowledge graphs based on candidate missing edges to optimize hypothesis set adjudication
US10901973B1 (en)*2016-04-292021-01-26EMC IP Holding Company LLCMethods and apparatus for a semantic multi-database data lake
US11204929B2 (en)2014-11-182021-12-21International Business Machines CorporationEvidence aggregation across heterogeneous links for intelligence gathering using a question answering system
US11223623B1 (en)*2016-06-302022-01-11EMC IP Holding Company LLCMethod, apparatus and non-transitory processor-readable storage medium for providing security in a computer network
US11244113B2 (en)2014-11-192022-02-08International Business Machines CorporationEvaluating evidential links based on corroboration for intelligence analysis
US11836211B2 (en)2014-11-212023-12-05International Business Machines CorporationGenerating additional lines of questioning based on evaluation of a hypothetical link between concept entities in evidential data
US12299689B1 (en)*2010-01-142025-05-13Www.Trustscience.Com Inc.Cluster of mobile devices performing parallel computation of network connectivity
US12339876B2 (en)2016-02-172025-06-24Www.Trustscience.Com Inc.Searching for entities based on trust score and geography
US12346979B2 (en)2015-03-202025-07-01Www.Trustscience.Com Inc.Calculating a trust score
US12373452B2 (en)2017-03-222025-07-29Www.Trustscience.Com Inc.Identity resolution in big, noisy, and/or unstructured data

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8983954B2 (en)*2012-04-102015-03-17Microsoft Technology Licensing, LlcFinding data in connected corpuses using examples
US10803133B2 (en)2013-04-292020-10-13Moogsoft Inc.System for decomposing events from managed infrastructures that includes a reference tool signalizer
US10700920B2 (en)2013-04-292020-06-30Moogsoft, Inc.System and methods for decomposing events from managed infrastructures that includes a floating point unit
US9535973B2 (en)2013-04-292017-01-03Moogsoft, Inc.Methods for decomposing events from managed infrastructures
US12047340B2 (en)2013-04-292024-07-23Dell Products L.P.System for managing an instructure with security
US11010220B2 (en)2013-04-292021-05-18Moogsoft, Inc.System and methods for decomposing events from managed infrastructures that includes a feedback signalizer functor
KR20160045825A (en)*2013-09-262016-04-27제이에프이 스틸 가부시키가이샤Alloy steel powder for powder metallurgy and method of producing iron-based sintered body
US11924018B2 (en)2015-01-272024-03-05Dell Products L.P.System for decomposing events and unstructured data
US10979304B2 (en)2015-01-272021-04-13Moogsoft Inc.Agent technology system with monitoring policy
US10425291B2 (en)2015-01-272019-09-24Moogsoft Inc.System for decomposing events from managed infrastructures with prediction of a networks topology
US11817993B2 (en)2015-01-272023-11-14Dell Products L.P.System for decomposing events and unstructured data
US10873508B2 (en)2015-01-272020-12-22Moogsoft Inc.Modularity and similarity graphics system with monitoring policy
US10552837B2 (en)2017-09-212020-02-04Microsoft Technology Licensing, LlcHierarchical profiling inputs and self-adaptive fraud detection system
CN111897673B (en)*2020-07-312022-10-21平安科技(深圳)有限公司Operation and maintenance fault root cause identification method and device, computer equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5966431A (en)*1995-04-191999-10-12Mci Communications CorporationSS7 gateway
US20020066034A1 (en)*2000-10-242002-05-30Schlossberg Barry J.Distributed network security deception system
US20060041508A1 (en)*2004-08-202006-02-23Pham Quang DMethod and system for tracking fraudulent activity
US20070287417A1 (en)*2004-02-172007-12-13Aviv AbramovichMobile Network Security System
US20070294271A1 (en)*2004-02-132007-12-20Memento Inc.Systems and methods for monitoring and detecting fraudulent uses of business applications
US7406159B2 (en)*2004-07-152008-07-29TekelecMethods, systems, and computer program products for automatically populating signaling-based access control database

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4551581B1 (en)*1983-07-121995-06-20Bell Telephone Labor IncMethod and apparatus for sending a data message to a selected station during a silent interval between ringing
JPH07500955A (en)*1991-11-081995-01-26イレクトラニク、デイタ、システィムズ、コーパレイシャン Device for detecting and preventing cloning of subscriber numbers in cellular mobile telephone systems
US5822741A (en)*1996-02-051998-10-13Lockheed Martin CorporationNeural network/conceptual clustering fraud detection architecture
US6516416B2 (en)*1997-06-112003-02-04Prism ResourcesSubscription access system for use with an untrusted network
US7120934B2 (en)*2000-03-302006-10-10Ishikawa Mark MSystem, method and apparatus for detecting, identifying and responding to fraudulent requests on a network
US7801828B2 (en)*2001-07-062010-09-21Candella George JMethod and system for detecting identity theft in non-personal and personal transactions
EP1561178A4 (en)*2002-11-152009-08-12Fair Isaac CorpFraud and abuse detection and entity profiling in hierarchical coded payment systems
US20050060287A1 (en)*2003-05-162005-03-17Hellman Ziv Z.System and method for automatic clustering, sub-clustering and cluster hierarchization of search results in cross-referenced databases using articulation nodes

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5966431A (en)*1995-04-191999-10-12Mci Communications CorporationSS7 gateway
US20020066034A1 (en)*2000-10-242002-05-30Schlossberg Barry J.Distributed network security deception system
US20070294271A1 (en)*2004-02-132007-12-20Memento Inc.Systems and methods for monitoring and detecting fraudulent uses of business applications
US20070287417A1 (en)*2004-02-172007-12-13Aviv AbramovichMobile Network Security System
US7406159B2 (en)*2004-07-152008-07-29TekelecMethods, systems, and computer program products for automatically populating signaling-based access control database
US20060041508A1 (en)*2004-08-202006-02-23Pham Quang DMethod and system for tracking fraudulent activity

Cited By (18)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US12299689B1 (en)*2010-01-142025-05-13Www.Trustscience.Com Inc.Cluster of mobile devices performing parallel computation of network connectivity
US8812542B1 (en)*2012-03-302014-08-19Emc CorporationOn-the-fly determining of alert relationships in a distributed system
US9684649B2 (en)2012-08-212017-06-20Industrial Technology Research InstituteMethod and system for discovering suspicious account groups
US9892362B2 (en)2014-11-182018-02-13International Business Machines CorporationIntelligence gathering and analysis using a question answering system
US11204929B2 (en)2014-11-182021-12-21International Business Machines CorporationEvidence aggregation across heterogeneous links for intelligence gathering using a question answering system
US10318870B2 (en)2014-11-192019-06-11International Business Machines CorporationGrading sources and managing evidence for intelligence analysis
US11238351B2 (en)2014-11-192022-02-01International Business Machines CorporationGrading sources and managing evidence for intelligence analysis
US11244113B2 (en)2014-11-192022-02-08International Business Machines CorporationEvaluating evidential links based on corroboration for intelligence analysis
US11836211B2 (en)2014-11-212023-12-05International Business Machines CorporationGenerating additional lines of questioning based on evaluation of a hypothetical link between concept entities in evidential data
US9727642B2 (en)*2014-11-212017-08-08International Business Machines CorporationQuestion pruning for evaluating a hypothetical ontological link
US20160147875A1 (en)*2014-11-212016-05-26International Business Machines CorporationQuestion Pruning for Evaluating a Hypothetical Ontological Link
US12346979B2 (en)2015-03-202025-07-01Www.Trustscience.Com Inc.Calculating a trust score
US12339876B2 (en)2016-02-172025-06-24Www.Trustscience.Com Inc.Searching for entities based on trust score and geography
US10901973B1 (en)*2016-04-292021-01-26EMC IP Holding Company LLCMethods and apparatus for a semantic multi-database data lake
US20170323283A1 (en)*2016-05-032017-11-09Paypal, Inc.System and method for splitting a card data structure
US11223623B1 (en)*2016-06-302022-01-11EMC IP Holding Company LLCMethod, apparatus and non-transitory processor-readable storage medium for providing security in a computer network
US10606893B2 (en)2016-09-152020-03-31International Business Machines CorporationExpanding knowledge graphs based on candidate missing edges to optimize hypothesis set adjudication
US12373452B2 (en)2017-03-222025-07-29Www.Trustscience.Com Inc.Identity resolution in big, noisy, and/or unstructured data

Also Published As

Publication numberPublication date
WO2006032927A2 (en)2006-03-30
EP2242000A2 (en)2010-10-20
GB0421284D0 (en)2004-10-27
WO2006032927A3 (en)2006-05-18
GB2418499A (en)2006-03-29
EP2242000A3 (en)2011-07-06
US20110010399A1 (en)2011-01-13
US8224790B2 (en)2012-07-17
EP1800248A2 (en)2007-06-27
AU2005286203B9 (en)2010-09-09
AU2005286203B2 (en)2010-08-19
AU2005286203A1 (en)2006-03-30

Similar Documents

PublicationPublication DateTitle
US8224790B2 (en)Information processor arrangement
Bao et al.It's compaslicated: The messy relationship between rai datasets and algorithmic fairness benchmarks
Hassani et al.A review of data mining applications in crime
HoltonIdentifying disgruntled employee systems fraud risk through text mining: A simple solution for a multi-billion dollar problem
AdebayoFairML: ToolBox for diagnosing bias in predictive modeling
Moses et al.Using big data for legal and law enforcement decisions: Testing the new tools
CustersData dilemmas in the information society: Introduction and overview
Kelley et al.Antidiscrimination laws, artificial intelligence, and gender bias: A case study in nonmortgage fintech lending
US20060085370A1 (en)System for identifying data relationships
US20140303993A1 (en)Systems and methods for identifying fraud in transactions committed by a cohort of fraudsters
Hay et al.Differentially private rank aggregation
Zaeem et al.Predicting and explaining identity risk, exposure and cost using the ecosystem of identity attributes
Barman et al.A complete literature review on financial fraud detection applying data mining techniques
NissanAn overview of data mining for combating crime
CN110533525A (en)For assessing the method and device of entity risk
Greitzer et al.Use of Expert Judgments to Inform Bayesian Models of Insider Threat Risk.
CN117993910A (en)Verification method and related device for abnormal transaction response strategy
Beheshti et al.Towards context-aware social behavioral analytics
Xu et al.Complex problem solving: identity matching based on social contextual information
Tundis et al.Experiencing the detection of radicalized criminals on facebook social network and data-related issues
CN118551194B (en)Event extraction-oriented large language model data enhancement method and device
Canhoto et al.General description of the process of behavioural profiling
BrugnoneA Methodology for Modeling Emergence in Complex Systems
Galitsky et al.Assessing plausibility of explanation and meta-explanation in inter-human conflicts
MohantyA computational approach to identify covertness and collusion in social networks

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:ADVANCED FORENSIC SOLUTIONS LIMITED, UNITED KINGDO

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LEARY, RICHARD;REEL/FRAME:019464/0105

Effective date:20070612

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp