Researchers Submit Patent Utility, “Threat Administration System with Web of Issues”, for Approval (USPTO 20220415176): Patent Utility – InsuranceNewsNet

0
1


As a complement to the background info on this patent utility, NewsRx correspondents additionally obtained the inventors’ abstract info for this patent utility: “Points of this disclosure overcome issues and limitations of the prior artwork by offering methods and strategies for threat administration that features a protocol-agnostic knowledge aggregator of sensor knowledge throughout a various set of sensor-enabled merchandise throughout many producers throughout the web of issues (IoT) for autonomous entities.

“Varied approaches to threat administration are introduced. In accordance with elements of this disclosure, a threat administration system might embrace a plurality of web of issues (IoT)-capable sensors linked to an IoT system, a plurality of autonomous entity sensors linked to the chance administration system, and an IoT built-in logic engine linked to the IoT system that features a processor that gives a protocol-agnostic knowledge aggregator of the information from the plurality of IoT-capable sensors linked to the IoT system. The plurality of IoT-capable sensors could also be configured to report knowledge from a plurality of sensor-enabled units throughout the IoT system. The plurality of autonomous entity sensors could also be configured to report knowledge from a plurality of autonomous entity units. The autonomous entity units might embrace a number of of the next: a number of autonomous automobiles and a number of drones. The processor and a reminiscence unit storing computer-executable directions, which when executed by the processor, trigger the processor to: obtain and mixture knowledge from the plurality of IoT-capable sensors from the plurality of sensor-enabled units; obtain and mixture knowledge from the plurality of autonomous entity sensors from the autonomous entity units; course of and analyze in real-time the information from the plurality of IoT-capable sensors and the autonomous entity sensors; establish novel patterns and pre-defined knowledge patterns within the knowledge from the plurality of IoT-capable sensors and the autonomous entity sensors; decide {that a} threat is going on or imminent primarily based on the novel patterns and pre-defined knowledge patterns from the plurality of IoT-capable sensors and the autonomous entity sensors; ship real-time notifications to a set of subscribers of the chance administration system concerning the threat that’s occurring or imminent; and supply inter-device communications to supply real-time warnings between a number of of the plurality of sensor-enabled units and the autonomous entity units.

“In accordance with different elements of this disclosure, a number of non-transitory laptop readable media storing laptop readable directions that, when executed, trigger an equipment to: (a) obtain and mixture knowledge, by an web of issues (IoT) built-in logic engine linked to an IoT system, from a plurality of IoT-capable sensors from a plurality of sensor-enabled units, the plurality of IoT-capable sensors linked to the IoT system and configured to report knowledge from the plurality of sensor-enabled units throughout the IoT system, whereby the IoT system features a processor that gives a protocol-agnostic knowledge aggregator of the information from the plurality of IoT-capable sensors linked to the IoT system; (b) obtain and mixture knowledge, by the IoT built-in logic engine, from a plurality of autonomous entity sensors from a number of autonomous entity units, the plurality of autonomous entity sensors linked to the IoT built-in logic engine and configured to report knowledge from the plurality of autonomous entity units, whereby the autonomous entity units embrace a number of of the next: a number of autonomous automobiles and a number of drones; © course of and analyze in real-time the information, by the IoT built-in logic engine, from the plurality of IoT-capable sensors and the autonomous entity sensors; (d) establish novel patterns and pre-defined knowledge patterns within the knowledge, by the IoT built-in logic engine, from the plurality of IoT-capable sensors and the autonomous entity sensors; (e) decide, by the IoT built-in logic engine, {that a} threat is going on or imminent primarily based on the novel patterns and pre-defined knowledge patterns from the plurality of IoT-capable sensors and the autonomous entity sensors; (f) ship real-time notifications, by the IoT built-in logic engine, to a set of subscribers concerning the threat that’s occurring or imminent; and (g) present inter-device communications, by the IoT built-in logic engine, to supply real-time warnings between the plurality of IoT-capable sensors and the autonomous entity sensors.

“In accordance with one other facet of this disclosure, a threat administration system might embrace a plurality of web of issues (IoT)-capable sensors linked to an IoT system, a plurality of autonomous entity sensors linked to the chance administration system, and an IoT built-in logic engine linked to the IoT system that features a processor that gives a protocol-agnostic knowledge aggregator of the information from the plurality of IoT-capable sensors linked to the IoT system. The plurality of IoT-capable sensors could also be configured to report knowledge from a plurality of sensor-enabled units throughout the IoT system. The plurality of autonomous entity sensors could also be configured to report knowledge from a plurality of autonomous entity units. The autonomous entity units might embrace a number of of the next: a number of autonomous automobiles and a number of drones. The processor and a reminiscence unit storing computer-executable directions, which when executed by the processor, might trigger the processor to: obtain and mixture knowledge from the plurality of IoT-capable sensors from the plurality of sensor-enabled units; obtain and mixture knowledge from the plurality of autonomous entity sensors from the autonomous entity units; course of and analyze in real-time the information from the plurality of IoT-capable sensors and the autonomous entity sensors; establish novel patterns and pre-defined knowledge patterns within the knowledge from the plurality of IoT-capable sensors and the autonomous entity sensors; decide {that a} threat is going on or imminent primarily based on the novel patterns and pre-defined knowledge patterns from the plurality of IoT-capable sensors and the autonomous entity sensors; make the most of a scoring algorithm for valuing new knowledge from the plurality of IoT-capable sensors and the plurality of autonomous entity sensors; decide a possible impression to the chance primarily based on the brand new knowledge and the scoring algorithm; ship real-time notifications to a set of subscribers of the chance administration system concerning the threat that’s occurring or imminent; and supply inter-device communications to supply real-time warnings between a number of of the plurality of sensor-enabled units and the autonomous entity units, whereby the real-time warnings embrace info from close by sensor-enabled units primarily based upon location, pace, route, and mapping, and additional whereby the real-time warnings consists of a number of of the next: inter-device proximity alerts, inter-device collision course alerts, inter-device harmful circumstances alerts.

“The small print of those and different embodiments of this disclosure are set forth within the accompanying drawings and outline beneath. Different options and benefits of elements of this disclosure might be obvious from the outline and drawings.

“The reader is suggested that the hooked up drawings aren’t essentially drawn to scale.

“It will likely be obvious to 1 expert within the artwork after evaluate of everything disclosed that the steps illustrated within the figures listed above could also be carried out in aside from the recited order, and that a number of steps illustrated in these figures could also be non-compulsory.”

The claims provided by the inventors are:

“1.-20. (canceled)

“21. A threat administration system, the system comprising: a plurality of web of issues (IoT)-capable sensors linked to an IoT system, the plurality of IoT-capable sensors configured to report knowledge from a plurality of sensor-enabled units throughout the IoT system; a plurality of autonomous entity sensors linked to the chance administration system, the plurality of autonomous entity sensors configured to report knowledge related to a plurality of autonomous entity units, whereby the autonomous entity units embrace a number of of the next: a number of autonomous automobiles and a number of drones; an IoT built-in logic engine linked to the IoT system that features a protocol-agnostic knowledge aggregator of the information from the plurality of IoT-capable sensors linked to the IoT system; and the IoT built-in logic engine configured to: obtain and mixture knowledge from the plurality of IoT-capable sensors; obtain and mixture knowledge from the plurality of autonomous entity sensors; repeatedly course of and analyze the information from the plurality of IoT-capable sensors and the autonomous entity sensors; establish novel patterns and pre-defined knowledge patterns within the knowledge from the plurality of IoT-capable sensors and the autonomous entity sensors; and consider threat primarily based on the novel patterns and pre-defined knowledge patterns from the plurality of IoT-capable sensors and the autonomous entity sensors.

“22. The danger administration system of declare 21, whereby the plurality of sensor-enabled units consists of a number of sensors and infrastructure or a number of good houses and good buildings.

“23. The danger administration system of declare 21, whereby the IoT built-in logic engine makes use of synthetic intelligence algorithms to course of and analyze the information from the plurality of IoT-capable sensors.

“24. The danger administration system of declare 21, additional together with the computer-executable instruction of utilizing a scoring algorithm for valuing new knowledge patterns from the plurality of IoT-capable sensors.

“25. The danger administration system of declare 24, additional together with the computer-executable instruction to find out a possible impression to the chance primarily based on the brand new knowledge patterns and the scoring algorithm.

“26. The danger administration system of declare 25, additional together with the computer-executable instruction so as to add the brand new knowledge sample to a library of identified knowledge patterns.

“27. The danger administration system of declare 21, additional together with the computer-executable instruction to: filter every threat that’s occurring or imminent per pursuits of a given subscriber in keeping with a threat evaluation profile for the given subscriber; and ship notifications to a set of subscribers of the chance administration system concerning the threat that’s occurring or imminent primarily based on the filtering.

“28. The danger administration system of declare 21, additional together with the computer-executable instruction to ship notifications to a set of subscribers of the chance administration system concerning the threat that’s occurring or imminent, whereby the set of subscribers consists of a number of of the next: authorities businesses, retail entities, residence homeowners, and insurance coverage corporations.

“29. The danger administration system of declare 21, additional together with the computer-executable instruction to supply inter-device communications to supply warnings between a number of of the plurality of sensor-enabled units and the autonomous entity units, whereby the warnings embrace info from close by sensor-enabled units primarily based upon location, pace, route, and mapping.

“30. The danger administration system of declare 21, present inter-device communications to supply warnings between a number of of the plurality of sensor-enabled units and the autonomous entity units, whereby the warnings embrace a number of of the next: inter-device proximity alerts, inter-device collision course alerts, and inter-device harmful circumstances alerts.

“31. A number of non-transitory laptop readable media storing laptop readable directions that, when executed, trigger an equipment to: (a) obtain and mixture knowledge, by an web of issues (IoT) built-in logic engine linked to an IoT system, from a plurality of IoT-capable sensors from a plurality of sensor-enabled units, the plurality of IoT-capable sensors linked to the IoT system and configured to report knowledge from the plurality of sensor-enabled units throughout the IoT system, whereby aggregation of the information from the plurality of IoT-capable sensors linked to the IoT system is protocol-agnostic; (b) obtain and mixture knowledge, by the IoT built-in logic engine, from a plurality of autonomous entity sensors from a number of autonomous entity units, the plurality of autonomous entity sensors linked to the IoT built-in logic engine and configured to report knowledge from the a number of autonomous entity units, whereby the autonomous entity units embrace a number of of the next: a number of autonomous automobiles and a number of drones; © course of and analyze the information, by the IoT built-in logic engine, from the plurality of IoT-capable sensors and the autonomous entity sensors; (d) establish novel patterns and pre-defined knowledge patterns within the knowledge, by the IoT built-in logic engine, from the plurality of IoT-capable sensors and the autonomous entity sensors; and (e) decide, by the IoT built-in logic engine, {that a} threat is going on or imminent primarily based on the recognized novel patterns and pre-defined knowledge patterns.

“32. The a number of non-transitory laptop readable media storing laptop readable directions of declare 31, whereby the plurality of sensor-enabled units consists of a number of sensors and infrastructure or a number of good houses and good buildings.

“33. The a number of non-transitory laptop readable media storing laptop readable directions of declare 31, additional together with the instruction that, when executed, trigger the equipment to: (f) ship notifications, by the IoT built-in logic engine, to a set of subscribers concerning the threat that’s occurring or imminent; and (g) develop a threat evaluation profile of dangers as to what a given subscriber could be most keen on.

“34. The a number of non-transitory laptop readable media storing laptop readable directions of declare 31, additional together with the instruction that, when executed, trigger the equipment to ship notifications, by the IoT built-in logic engine, to a set of subscribers concerning the threat that’s occurring or imminent; whereby the set of subscribers consists of a number of of the next: authorities businesses, retail entities, residence homeowners, and insurance coverage corporations.

“35. The a number of non-transitory laptop readable media storing laptop readable directions of declare 31, additional together with the instruction that, when executed, trigger the equipment to: (f) ship notifications, by the IoT built-in logic engine, to a set of subscribers concerning the threat that’s occurring or imminent; and (g) present inter-device communications, by the IoT built-in logic engine, to supply warnings between the plurality of IoT-capable sensors and the autonomous entity sensors, whereby the warnings embrace info from close by sensor-enabled units primarily based upon location, pace, route, and mapping.

“36. The a number of non-transitory laptop readable media storing laptop readable directions of declare 31, additional together with the instruction that, when executed, trigger the equipment to: (f) ship notifications, by the IoT built-in logic engine, to a set of subscribers concerning the threat that’s occurring or imminent; and (g) present inter-device communications, by the IoT built-in logic engine, to supply warnings between the plurality of IoT-capable sensors and the autonomous entity sensors, whereby the warnings embrace a number of of the next: inter-device proximity alerts, inter-device collision course alerts, and inter-device harmful circumstances alerts.

“37. A threat administration system, the system comprising: a plurality of web of issues (IoT)-capable sensors linked to an IoT system, the plurality of IoT-capable sensors configured to report knowledge from a plurality of sensor-enabled units throughout the IoT system; a plurality of autonomous entity sensors linked to the chance administration system, the plurality of autonomous entity sensors configured to report knowledge from a plurality of autonomous entity units, whereby the autonomous entity units embrace a number of of the next: a number of autonomous automobiles and a number of drones; an IoT built-in logic engine linked to the IoT system that features a processor that gives a protocol-agnostic knowledge aggregator of the information from the plurality of IoT-capable sensors linked to the IoT system; and the processor and a non-transitory reminiscence unit storing computer-executable directions, which when executed by the processor, trigger the processor to: obtain and mixture knowledge from the plurality of IoT-capable sensors from the plurality of sensor-enabled units; obtain and mixture knowledge from the plurality of autonomous entity sensors from the autonomous entity units; course of and analyze the information from the plurality of IoT-capable sensors and the autonomous entity sensors; establish novel patterns and pre-defined knowledge patterns within the knowledge from the plurality of IoT-capable sensors and the autonomous entity sensors; decide {that a} threat is going on or imminent primarily based on the novel patterns and pre-defined knowledge patterns from the plurality of IoT-capable sensors and the autonomous entity sensors; make the most of a scoring algorithm for valuing new knowledge from the plurality of IoT-capable sensors and the plurality of autonomous entity sensors; decide a possible impression to the chance primarily based on the brand new knowledge and the scoring algorithm; and ship notifications to a set of subscribers of the chance administration system concerning the threat that’s occurring or imminent.”

There are extra claims. Please go to full patent to learn additional.

For extra info on this patent utility, see: Dahlman, Jeraldine; Farooqui, Sohail; Zurlo, Enriqueta. Threat Administration System with Web of Issues. U.S. Patent Utility Quantity 20220415176, filed July 12, 2022 and posted December 29, 2022. Patent URL (for desktop use solely): https://ppubs.uspto.gov/pubwebapp/exterior.html?q=(20220415176)&db=US-PGPUB&sort=ids

(Our experiences ship fact-based information of analysis and discoveries from world wide.)





Supply hyperlink

LEAVE A REPLY

Please enter your comment!
Please enter your name here