Data processing: financial – business practice – management – or co – Automated electrical financial or business practice or... – Insurance
Reexamination Certificate
2008-01-29
2008-01-29
Gilligan, C. Luke (Department: 3626)
Data processing: financial, business practice, management, or co
Automated electrical financial or business practice or...
Insurance
C709S217000
Reexamination Certificate
active
10229620
ABSTRACT:
After an insurance application is made from a user, an insurance provider examines the application and makes an insurance contract. The insurance provider sends a transaction monitoring program (BTM) to the user, and the user installs this. Transaction data which the user communicates with a transaction party are monitored by the BTM and recorded in a transaction record. If the user incurs loss or damage, the user sends the transaction record to the insurance provider, and the insurance provider then analyzes this to verify the cause of the loss and pays insurance money.
REFERENCES:
patent: 5189700 (1993-02-01), Blandford
patent: 5884274 (1999-03-01), Walker et al.
patent: 6122633 (2000-09-01), Leymann et al.
patent: 6421687 (2002-07-01), Klostermann
patent: 6922720 (2005-07-01), Cianciarulo et al.
patent: 2001/0034621 (2001-10-01), Kirsh et al.
patent: 2002/0026335 (2002-02-01), Honda
patent: 2003/0040942 (2003-02-01), Hooten
patent: 2000-207453 (2000-07-01), None
patent: PUPA 2000-261483 (2000-09-01), None
patent: PUPA 2001-160092 (2001-06-01), None
patent: PUPA 2001-202428 (2001-07-01), None
patent: PUPA 2002-279185 (2002-09-01), None
Schneier, Insurance and the Computer Industry, Mar. 2001, Communications of the ACM, vol. 44 No. 3, 114-115.
Majuca, The evolution of cyberinsurance, ACM Computing Research Repository (CoRR), tech. report cs.CR/0601020, Jan. 2006.
Greenberg, AIG unveils e-commerce insurance plans, Jan. 18, 2000, E-Commerce Times, <http://www.ecommercetimes.com/story/2259.html>.
Conley, Outwitting cybercriminals, Jul. 2000, Risk Management v47n7 pp. 18-26.
Radcliff, Got cyber insurance?, Aug. 21, 2000, Computerworld, <http://www.computerworld.com/printthis/2000/0,4814,48721,00.html>.
Flynn, Insuring against hackers comes with a catch, Jun. 15, 1998, The New York Times, <http://www.nytimes.com/library/tech/98/06/biztech/articles/15briefs.html>.
Poletti, First-ever insurance against hackers, Jun. 14, 1998, Reuters.
Moukheiber, Got a hacker policy?, Nov. 16, 1998, Forbes, <http://www.mywire.com/pubs/Forbes/1998/11/16/1012876/print>.
Lai, Endorsements, licensing, and insurance for distributed system services, Mar. 1995, MIT Workshop on Internet Economics, <http://www.press.umich.edu/jep/works/LaiEndorse.html>.
Raz, Software risk management and insurance, 2001, Position paper for EDSER-3 at the 23rd ICSE-2001.
Davis, Cigna offers anti-hacker insurance, Oct. 5, 1998, TechWeb, <http://www.techweb.com/wire/story/TWB19981005S0010>.
Gilligan C. Luke
International Business Machines - Corporation
Nguyen Tran N
Schiesser William E.
Schmeiser Olsen & Watts
LandOfFree
Insurance method, insurance system, transaction monitoring... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Insurance method, insurance system, transaction monitoring..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Insurance method, insurance system, transaction monitoring... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3926172