Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

215 results about "Risk threshold" patented technology

The risk threshold is defined as a project management tool to measure the degree of uncertainty and the level of impact which a stakeholder or organization may have interest. As the name implies, it sets a certain value that the stakeholder or organization will accept a certain risk or not.

Automated Trading Exchange System Having Integrated Quote Risk Monitoring and Integrated Quote Modification Services

<heading lvl="0">Abstract</heading> An automated trading exchange having integrated quote risk monitoring and quote modification services. An apparatus is implemented using at least one computer, having memory, and a processor. The computer is configured to receive orders and quotes, wherein specified ones of the quotes are contained in a quote group, and have associated trading parameters such as a risk threshold. Not all received quotes are required to have trading parameters as described herein. Preferably, the quote group contains all the quotes, or a subset of quotes, belonging to an individual market-maker for a given class of options contracts, or possibly the quotes of two or more market-makers that have identified themselves as belonging to a group for the purposes of risk monitoring and quote modification. The computer typically generates a trade by matching the received orders and quotes to previously received orders and quotes, and otherwise stores each of the received orders and quotes if a trade is not generated. The computer then determines whether a quote within the quote group has been filled as a result of the generated trade, and if so, determines a risk level and an aggregate risk level associated with said trade. The computer then compares the aggregate risk level with the market-maker's risk threshold, and if the threshold is exceeded, automatically modifies at least one of the remaining quotes in the quote group. The computer may also automatically regenerate quotes that have been filled.
Owner:CBOE EXCHANGE INC

Automated trading exchange system having integrated quote risk monitoring and integrated quote modification services

An automated trading exchange having integrated quote risk monitoring and quote modification services. An apparatus is implemented using at least one computer, having memory, and a processor. The computer is configured to receive orders and quotes, wherein specified ones of the quotes are contained in a quote group, and have associated trading parameters such as a risk threshold. Not all received quotes are required to have trading parameters as described herein. Preferably, the quote group contains all the quotes, or a subset of quotes, belonging to an individual market-maker for a given class of options contracts, or possibly the quotes of two or more market-makers that have identified themselves as belonging to a group for the purposes of risk monitoring and quote modification. The computer typically generates a trade by matching the received orders and quotes to previously received orders and quotes, and otherwise stores each of the received orders and quotes if a trade is not generated. The computer then determines whether a quote within the quote group has been filled as a result of the generated trade, and if so, determines a risk level and an aggregate risk level associated with said trade. The computer then compares the aggregate risk level with the market-maker's risk threshold, and if the threshold is exceeded, automatically modifies at least one of the remaining quotes in the quote group. The computer may also automatically regenerate quotes that have been filled.
Owner:CBOE EXCHANGE INC

Methods and apparatus for computer network security using intrusion detection and prevention

A method for providing security to a computer network by selectively blocking network transmissions from selected IP addresses comprising the steps of: establishing a risk threshold whereby transmissions from IP addresses exceeding said risk threshold are selectively blocked; receiving a network transmission having an originating IP address and payload; analyzing the payload of said transmission and assigning a current risk rating to said IP address on the basis of said analysis; comparing the originating IP address of said transmission to a database of known IP addresses, each of said said previous cumulative assigned risk rating being based on at least one previous transmission from a known IP address; known IP addresses having a previous cumulative assigned risk rating, assigning a new cumulative risk rating to said originating IP address, said new cumulative risk rating being the sum of said current risk rating and said previous cumulative assigned risk rating for said originating IP address, with the proviso that where said originating IP address is not contained in said database of known IP addresses, the new cumulative risk rating will equal the current risk rating; logging the new cumulative risk rating for said originating IP address in said database of known IP addresses, with the proviso that where the originating IP address of said transmission is not contained in said database of known IP addresses, a new record is created for the originating IP address and said new cumulative risk rating in said database of known IP addresses; comparing said new cumulative risk rating to said risk threshold; and automatically blocking said transmission if said new cumulative risk rating exceeds said risk threshold.
Owner:DIGITAL SECURITY NETWORK

Abnormal login identification method and system, storage medium and electronic equipment

ActiveCN108092975AEnsure safetyAccurate and effective identification and defenseTransmissionThird partyIp address
The invention provides an abnormal login identification method and system, a storage medium and electronic equipment. The method includes the following steps: receiving and extracting characteristic attributes carried in a real-time login request; judging whether an account of the real-time login request tries to log in to multiple third-party websites within a preset time and fails more than a preset number of times, and if yes, identifying the login as an abnormal login; traversing a blacklist library according to the extracted characteristic attributes, and assigning a first risk value based on a traversal result; assigning a second risk value according to the matching degree between an IP address of the real-time login request and a common IP attribution of a UID of the real-time loginrequest; comparing the number of login failures and the number of preset times of each characteristic attribute within the preset time, and assigning a third risk value according to a comparison result; and performing weighted calculation on the first, second and third risk values to obtain a risk reference value of the real-time login request, and identifying the login as the abnormal login whenthe risk reference value exceeds a risk threshold. According to the scheme of the invention, by combining the external anti-scanning identification and the internal multidimensional identification, abnormal login behaviors can be intercepted to a maximum extent.
Owner:SHANGHAI CTRIP COMMERCE CO LTD

Difference self-healing control method based on device failure probability and power grid operation risks

The invention discloses a difference self-healing control method based on device failure probability and power grid operation risks. The difference self-healing control method includes the steps: 1 acquiring operation data and weather data, and calculating comprehensive failure probability corresponding to power distribution network devices; 2 determining risk threshold values; 3 judging whether the comprehensive failure probability exceeds the risk threshold values corresponding to the power distribution network devices or not, optimizing power grid operation modes based on first multi-objective functions if the comprehensive failure probability exceeds the risk threshold values corresponding to the power distribution network devices, optimizing the power grid operation modes based on second multi-objective functions if not, and setting priorities of the power grid operation modes; 4 forecasting loads of power grids next moment based on a multi-classification regression tree algorithm, and calculating comprehensive stoppage probability and comprehensive risk probability of devices in the next moment; 5 determining whether optimization measures are executed or not. According to the method, the device failure probability and the power grid operation risks are fully considered, economical and reliable operation of the power grids is achieved by difference self-healing control without rejecting loads as far as possible.
Owner:NORTHEASTERN UNIV

OFDM channel estimating method based on wavelet unbiased risk threshold value noise elimination

The invention discloses an OFDM channel estimation method for de-noising which is based on wavelet unbiased risk threshold value, which relates to the technical field of communication, the purpose of the invention is that the problem that an LS method is easy to be influenced by noise under the condition without channel information is effectively solved. The realizing process of the method comprises first, obtaining channel frequency response which contains noise according to the LS channel estimation method which is on the basis of an OFDM system which is based on pilot frequency, second, doing inverse discrete Fourier transform for the channel frequency response which is obtained and to get channel time-domain impulse response which contains noise, third, de-noising the channel time-domain impulse response the method for de-noising which is based on wavelet unbiased risk threshold value, and getting channel time-domain impulse response after de-noising, fourth, doing inverse discrete Fourier transform for the channel time-domain impulse response after de-noising, and getting frequency domain response of channel, and compensating the received signals by the channel time-domain impulse response after de-noising. The method can be used in OFDM channel estimation techniques under various multi-path channels.
Owner:XIDIAN UNIV

Washing machine control method and device, washing machine

The invention discloses a washing machine control method and device, and a washing machine. The control method includes the following steps: acquiring texture information and color information of clothes to be washed; acquiring a fading risk value of the clothes to be washed according to the texture information and the color information of the clothes to be washed; determining a color-crossing risk value of the clothes to be washed according to the fading color risk value and the color information of the clothes to be washed; determining if the color-crossing risk value is greater than or equal to a preset color-crossing risk threshold or not; and controlling the washing machine to send an alarm prompt if the color-crossing risk value is greater than the preset color-crossing risk threshold. The control method can determine the color-crossing risk value of the clothes to be washed by processing the texture information and the color information of clothes to be washed, can determine if the clothes to be washed in the washing machine has a dyeing risk or not according to the color-crossing risk value of the clothes to be washed, can greatly lower the dyeing risk of the clothes to be washed, and can improve the user experience.
Owner:WUXI LITTLE SWAN ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products