Data processing: structural design – modeling – simulation – and em – Modeling by mathematical expression
Reexamination Certificate
2007-06-12
2007-06-12
Phan, Thai (Department: 2128)
Data processing: structural design, modeling, simulation, and em
Modeling by mathematical expression
C703S006000, C705S018000
Reexamination Certificate
active
09453509
ABSTRACT:
An integrated risk management tool includes a persistent object database to store information about actors (individuals and/or groups), physical surroundings, historical events and other information. The risk management tool also includes a decision support system that uses data objects from the database and advanced decision theory techniques, such as Bayesian Networks, to infer the relative risk of an undesirable event. As part of the relative risk calculation, the tool uses a simulation and gaming environment in which artificially intelligent actors interact with the environment to determine susceptibility to the undesired event. Preferred embodiments of the tool also include an open “plug-in” architecture that allows the tool to interface with existing consequence calculators. The tool also provides facilities for presenting data in a user-friendly manner as well as report generation facilities.
REFERENCES:
patent: 5020411 (1991-06-01), Rowan
patent: 5153366 (1992-10-01), Lucas
patent: 5440498 (1995-08-01), Timm
patent: 5850352 (1998-12-01), Moezzi et al.
patent: 6088804 (2000-07-01), Hill et al.
patent: 6254394 (2001-07-01), Draper et al.
patent: 6408404 (2002-06-01), Ladwig
patent: 6442694 (2002-08-01), Bergman et al.
patent: 6507353 (2003-01-01), Huard et al.
patent: 6807537 (2004-10-01), Thiesson et al.
patent: 6823068 (2004-11-01), Samid
patent: 2005/0172155 (2005-08-01), Sheymov
patent: 2005/0183072 (2005-08-01), Horning et al.
patent: WO 99/23443 (1999-05-01), None
Nguyen, “Target Mission Estimation”, IEEE Third International Conference on Knowledge-Based Intelligent Information Engine Systems, pp. 66-69 (Aug. 1999).
Allen et al, “Modeling Requirements for Simulating the Effects of Extreme Acts of Terrorism: A White Paper”, Sandia National Laboratories, Abstract (Oct. 1998).
Ojha et al, “Quantifying Operational Risk Using Bayesian Networks and Monte Carlo Simulations”, Proceedings of the Second International Conference on Information Fusion, Abstract (Jul. 1999).
Verton, “Marine Unit Buys Attack-Modeling Software”, Federal Computer Week, p. 39 (Oct. 18, 1999).
Fitzgerald, “Anti-Terrorism Software Models Real Effects of Biological Weapons”, Security, pp. 9-10 (Jul. 1999).
Santoso et al, “Nuclear Plant Fault Diagnosis Using Probabilistic Reasoning”, IEEE 1999 Power Engineering Society Summer Meeting, pp. 714-719 (Jul. 1999).
Bakert et al, “Force Aggregation via Bayesian Nodal Analysis”, IEEE 1998 Information Technology Conference, pp. 6-9 (Sep. 1998).
Ogunyemi et al, “Probabilistically Predicting Penetrating Injury for Decision Support”, IEEE 1998 Symposium on Computer-Based Medical Systems, pp. 44-49 (Jun. 1998).
Geiger et al, “Probabilistic Relevance Relations”, IEEE Transactions on Systems, Man, and Cybernetics—Part A: Systems and Humans, vol. 28 No. 1, pp. 17-25 (Jan. 1998).
Goldszmidt et al, “Plan Simulation Using Bayesian Networks”, IEEE Proceedings of the 11th Conference on Artificial Intelligence to Applications, pp. 155-161 (Feb. 1995).
McMichael, “BARTIN: Minimizing Bayes Risk and Incorporating Priors Using Supervised Learning Networks”, IEE Proceedings F—Radar and Signal Processing, vol. 139 Issue 6, pp. 413-419 (Dec. 1992).
Anonymous, “Science and Technology: Serious Games”, Economist, pp. 81-82 (Jul. 8, 2000).
Rosen et al, “Influencing Global Situations: A Collaborative Approach”, Air Chronicles, 1996 (paper available at: http://www.inet.saic.com/docs/—docs—/conops.pdf).
Doyle et al, “Strategic Directions in Artificial Intelligence”, ACM Computing Surveys, vol. 28 No. 4, pp. 653-670 (Dec. 1996).
Castillo et al, “Modeling Probabilistic Networks of Discrete and Continuous Variables”, Journal of Multivariate Analysis, vol. 64 Issue 1, pp. 48-65 (Jan. 1998).
Baker et al, “Access Features—Bomb Blast”, Mar. 1998 (web page available at: http://www.ncsa.uiuc.edu/News/Access/Stories/BombBlast/indexBB.htm).
Baker et al, “Visualization of Damaged Structures”, Mar. 1998 (web page available at: http://archive.ncsa.uiuc.edu/Vis/Publications/damage.html).
Fleming, “Assessing Organizational Vulnerability to Acts of Terrorism”, S.A.M. Advanced Management Journal, vol. 63 Issue 4, pp. 27-32 (1998).
Jablonowski, “When in Doubt, Simulate”, Risk Management, vol. 45 Issue 11, pp. 44-49 (Nov. 1998).
Swiatek et al, SAIC Science and Technology Trends II: Crisis Prediction Disaster Management, pp. 1-13 (Jun. 1999)(paper available at: http://www.saic.com/products/simulation/cats/VUPQPV4R.pdf).
Anonymous, “SAVI: Systematic Analysis of Vulnerability to Intrusion”, vol. 1, SAND89-0926, Sandia National Laboratories Dec. 1989 (publication available from www.ntis.gov).
Veatch et al, “An Airport Vulnerability Assessment Methodology”, IEEE 33rd Annual 1999 International Carnahan Conference o Security Technology, pp. 134-151 (Oct. 1999).
Spencer, “Vulnerability Assessment”, Corrections Today, vol. 60 Issue 4, pp. 88-92 (Jul. 1998).
Lazarick, “Airport Vulnerability Assessment—An Analytical Approach,” IEEE 32nd Annual International Carnahan Conference on Security Technology, pp. 40-46 (Oct. 1998).
Anonymous, “General Airport Assessment Plan,” Science Applications International Corporation, Contract No. DTFA03-97-C-00036 (Nov. 1997)(“SAIC”).
Anonymous, The Air Force Antiterrorism/Force Protection (AT/FP) Program Standards, Air Force Instruction 31-210 (Aug. 1999).
Anonymous, “Installation Force Protection Guide,” United States Air Force (1997).
Anonymous, “Combating Terrorism: Threat and Risk Assessments Can help Prioritize and Target Program Investments,” General Accounting Office, Report NSIAD-98-74 (Apr. 1998).
Anonymous, “Hazard Analysis of Commercial Space Transportation,” Federal Aviation Administration, Executive Summary and pp. 9-1 through 9-27 (Oct. 1995).
Department of Defense, DoD Instruction 2000.16, “DoD Combating Terrorism Program Standard”, Jun. 14, 2001 (believed to be a successor to document dated Jul. 21, 1997).
Department of Defense, DoD 0-2000.12-H, “Protection of DoD Personnel and Activities Against Acts of Terrorism and Political Turbulence” Feb. 1993.
Joint Chiefs of Staff, Joint Publication No. 3-07.2Joint Tactics, Techniques, and Procedures for Antiterrorism, Mar. 17, 1998, pp. II-1-II-12, IV-1-V-10, and VII-1-VII-10.
Biswas, et al., “Applications of Quantitative Modeling to Knowledge-Based Risk Assessment Studies,” ACM 0-89791-320-5/89/0006/0092, ACM 1989.
Meyer, et al., “The Strategic Use of Expert Systems for Risk Management in the Insurance Industry,” ACM 089791-416-3, ACM 1990.
Johnson, et al., “Blast Vulnerability of Building Structures and the Public from Terrorist Attack,” Proceedings of 1994 International Carnahan Conference on Security Technology, IEEE 1994.
Doyle, et al., “Stategic Direction in Artificial Intelligence,” ACM Computing Surveys, vol. 28, No. 4, Dec. 1996.
“Tools Against Terrorism and Other Disasters,” Press Release, Sandia National Laboratories, Jul. 2001.
International Search Report.
Beverina Anthony
Ware Bryan
Digital Sandbox
DLA Piper (US) LLP
Phan Thai
LandOfFree
Method and apparatus for risk management does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for risk management, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for risk management will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3807815