Patent Application Titled “Method And System For Assessing Risk Within A Network” Published Online (USPTO 20220311796): Axion Partners LLC - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Advertise
    • Contact
    • Editorial Staff
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
October 19, 2022 Newswires
Share
Share
Tweet
Email

Patent Application Titled “Method And System For Assessing Risk Within A Network” Published Online (USPTO 20220311796): Axion Partners LLC

Insurance Daily News

2022 OCT 19 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- According to news reporting originating from Washington, D.C., by NewsRx journalists, a patent application by the inventors DOYLE, Jonathan (Arlington, VA, US); JACKMAN, Damon (Silver Spring, MD, US), filed on March 24, 2022, was made available online on September 29, 2022.

The assignee for this patent application is Axion Partners LLC (Arlington, Virginia, United States).

Reporters obtained the following quote from the background information supplied by the inventors: “Determination of appropriate risk to assign to a computer network is tricky. With regard to the cybersecurity insurance space, the following problems exist because risk is hard to determine. Traditionally, insurers use massive amounts of historical claims data to assess risk. Such data does not exist for cybersecurity claims. Insurers, instead, rely on that applicants self-disclose to do such risk evaluations. Further, insurers have very little ability to ensure that policyholders effectively protect their networks, which results in an increased risk of breach. Insurers are not able to provide risk reduction or minimization of losses. The amount of data an attack causes is largely determined by how long it takes to respond, and insurers do not know what is happening in real time, nor data to confirm that an exclusion applies.

“The inability to assign or evaluate risk results in much confusion in the area of cybersecurity insurance. The area of cybersecurity insurance is growing. Cybersecurity insurance premiums currently are about $5,000,000,000 and growing about 25% annually. Businesses often buy insurance because they are required to do so as a part of a contract with a customer that wants to mitigate risk from third parties. Direct cost to businesses for breaches are significant. Regulated companies and those that handle personal information also want to mitigate risk. Moreover, businesses should accurately and adequately know where potential threats exist and how to reduce the risk of a cybersecurity breach or attack.”

In addition to obtaining background information on this patent application, NewsRx editors also obtained the inventors’ summary information for this patent application: “One aspect of the present disclosure relates to a system configured for assessing risk within a network having a specified configuration, wherein the network includes hardware components and software components. The system may include one or more hardware processors configured by machine-readable instructions. The processor(s) may be configured to identify a plurality of attack techniques to target the hardware components and the software components of the network. The processor(s) may be configured to perform a first set of technical assessments from inside within the network. Each technical assessment may evaluate at least one of the attack techniques as the technique internally applies to the specified configuration of the network. The processor(s) may be configured to perform a second set of technical assessments from outside the network. Each technical assessment may evaluate at least one of the attack techniques as the technique externally applies to the specified configuration of the network. The processor(s) may be configured to determine a plurality of risk evaluations. Each risk evaluation may evaluate a defined risk to the specified configuration of the network using a corresponding technical assessment. The processor(s) may be configured to determine a plurality of risk component scores. Each risk component scores may correspond to a component within the network using at least one risk evaluation of the plurality of risk evaluations. The processor(s) may be configured to determine an overall risk score using at least two risk component scores. Each of the risk component scores may be weighted according to the corresponding component.

“Another aspect of the present disclosure relates to a method for assessing risk within a network having a specified configuration, wherein the network includes hardware components and software components. The method may include identifying a plurality of attack techniques to target the hardware components and the software components of the network. The method may include performing a first set of technical assessments from inside within the network. Each technical assessment may evaluate at least one of the attack techniques as the technique internally applies to the specified configuration of the network. The method may include performing a second set of technical assessments from outside the network. Each technical assessment may evaluate at least one of the attack techniques as the technique externally applies to the specified configuration of the network. The method may include determining a plurality of risk evaluations. Each risk evaluation may evaluate a defined risk to the specified configuration of the network using a corresponding technical assessment. The method may include determining a plurality of risk component scores. Each risk component scores may correspond to a component within the network using at least one risk evaluation of the plurality of risk evaluations. The method may include determining an overall risk score using at least two risk component scores. Each of the risk component scores may be weighted according to the corresponding component.

“Yet another aspect of the present disclosure relates to a non-transient computer-readable storage medium having instructions embodied thereon, the instructions being executable by one or more processors to perform a method for assessing risk within a network having a specified configuration, wherein the network includes hardware components and software components. The method may include identifying a plurality of attack techniques to target the hardware components and the software components of the network. The method may include performing a first set of technical assessments from inside within the network. Each technical assessment may evaluate at least one of the attack techniques as the technique internally applies to the specified configuration of the network. The method may include performing a second set of technical assessments from outside the network. Each technical assessment may evaluate at least one of the attack techniques as the technique externally applies to the specified configuration of the network. The method may include determining a plurality of risk evaluations. Each risk evaluation may evaluate a defined risk to the specified configuration of the network using a corresponding technical assessment. The method may include determining a plurality of risk component scores. Each risk component scores may correspond to a component within the network using at least one risk evaluation of the plurality of risk evaluations. The method may include determining an overall risk score using at least two risk component scores. Each of the risk component scores may be weighted according to the corresponding component.

“These and other features, and characteristics of the present technology, as well as the methods of operation and functions of the related elements of structure and the combination of parts and economies of manufacture, will become more apparent upon consideration of the following description and the appended claims with reference to the accompanying drawings, all of which form a part of this specification, wherein like reference numerals designate corresponding parts in the various figures. It is to be expressly understood, however, that the drawings are for the purpose of illustration and description only and are not intended as a definition of the limits of the invention. As used in the specification and in the claims, the singular form of ‘a’, ‘an’, and ‘the’ include plural referents unless the context clearly dictates otherwise.”

The claims supplied by the inventors are:

“1. A system configured for assessing risk within a network having a specified configuration, wherein the network includes hardware components and software components, the system comprising: one or more hardware processors configured by machine-readable instructions to: identify a plurality of attack techniques to target the hardware components and the software components of the network; perform a first set of technical assessments from inside within the network, wherein each technical assessment evaluates at least one of the attack techniques as the technique internally applies to the specified configuration of the network; perform a second set of technical assessments from outside the network, wherein each technical assessment evaluates at least one of the attack techniques as the technique externally applies to the specified configuration of the network; determine a plurality of risk evaluations, wherein each risk evaluation evaluates a defined risk to the specified configuration of the network using a corresponding technical assessment; determine a plurality of risk component scores, wherein each risk component scores corresponds to a component within the network using at least one risk evaluation of the plurality of risk evaluations; and determine an overall risk score using at least two risk component scores, wherein each of the risk component scores is weighted according to the corresponding component.

“2. The system of claim 1, wherein the one or more hardware processors are further configured by machine-readable instructions to associate a known vulnerability within the specified configuration of the network with the attack technique.

“3. The system of claim 2, wherein the known vulnerability can be exploited from inside or outside the network.

“4. The system of claim 1, wherein the one or more hardware processors are further configured by machine-readable instructions to generate live data when performing the first or the second set of technical assessments, wherein the live data corresponds to the attack technique under evaluation.

“5. The system of claim 4, wherein the one or more hardware processors are further configured by machine-readable instructions to evaluate a vulnerability of the at least one attack technique inside the network to generate the live data for the first set of technical assessments.

“6. The system of claim 4, wherein the one or more hardware processors are further configured by machine-readable instructions to evaluate a vulnerability the at least one attack technique outside the network to generate the live data for the second set of technical assessments.

“7. The system of claim 1, wherein the each risk evaluation measures a risk of attack using the at least one attack technique evaluated by the technical assessment.

“8. The system of claim 7, wherein the risk corresponds to the risk of the at least one attack technique being successful against the specified configuration of the network.

“9. The system of claim 1, wherein the overall risk score corresponds to a total cyber security risk to the network.

“10. A method for assessing risk within a network having a specified configuration, wherein the network includes hardware components and software components, the method comprising: identifying a plurality of attack techniques to target the hardware components and the software components of the network; performing a first set of technical assessments from inside within the network, wherein each technical assessment evaluates at least one of the attack techniques as the technique internally applies to the specified configuration of the network; performing a second set of technical assessments from outside the network, wherein each technical assessment evaluates at least one of the attack techniques as the technique externally applies to the specified configuration of the network; determining a plurality of risk evaluations, wherein each risk evaluation evaluates a defined risk to the specified configuration of the network using a corresponding technical assessment; determining a plurality of risk component scores, wherein each risk component scores corresponds to a component within the network using at least one risk evaluation of the plurality of risk evaluations; and determining an overall risk score using at least two risk component scores, wherein each of the risk component scores is weighted according to the corresponding component.

“11. The method of claim 10, further comprising associating a known vulnerability within the specified configuration of the network with the attack technique.

“12. The method of claim 11, wherein the known vulnerability can be exploited from inside or outside the network.

“13. The method of claim 10, further comprising generating live data when performing the first or the second set of technical assessments, wherein the live data corresponds to the attack technique under evaluation.

“14. The method of claim 13, further comprising evaluating a vulnerability of the at least one attack technique inside the network to generate the live data for the first set of technical assessments.

“15. The method of claim 13, further comprising evaluating a vulnerability the at least one attack technique outside the network to generate the live data for the second set of technical assessments.

“16. The method of claim 10, wherein the each risk evaluation measures a risk of attack using the at least one attack technique evaluated by the technical assessment.

“17. The method of claim 16, wherein the risk corresponds to the risk of the at least one attack technique being successful against the specified configuration of the network.

“18. The method of claim 10, wherein the overall risk score corresponds to a total cyber security risk to the network.

“19. A non-transient computer-readable storage medium having instructions embodied thereon, the instructions being executable by one or more processors to perform a method for assessing risk within a network having a specified configuration, wherein the network includes hardware components and software components, the method comprising: identifying a plurality of attack techniques to target the hardware components and the software components of the network; performing a first set of technical assessments from inside within the network, wherein each technical assessment evaluates at least one of the attack techniques as the technique internally applies to the specified configuration of the network; performing a second set of technical assessments from outside the network, wherein each technical assessment evaluates at least one of the attack techniques as the technique externally applies to the specified configuration of the network; determining a plurality of risk evaluations, wherein each risk evaluation evaluates a defined risk to the specified configuration of the network using a corresponding technical assessment; determining a plurality of risk component scores, wherein each risk component scores corresponds to a component within the network using at least one risk evaluation of the plurality of risk evaluations; and determining an overall risk score using at least two risk component scores, wherein each of the risk component scores is weighted according to the corresponding component.

“20. The computer-readable storage medium of claim 19, wherein the method further comprises associating a known vulnerability within the specified configuration of the network with the attack technique.”

For more information, see this patent application: DOYLE, Jonathan; JACKMAN, Damon. Method And System For Assessing Risk Within A Network. Filed March 24, 2022 and posted September 29, 2022. Patent URL: https://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220220311796%22.PGNR.&OS=DN/20220311796&RS=DN/20220311796

(Our reports deliver fact-based news of research and discoveries from around the world.)

Older

Sanofi-Aventis Deutschland GmbH Reports Findings in Vaccination (Prevalence of chronic conditions and influenza vaccination coverage rates in Germany: Results of a health insurance claims data analysis): Public Health – Vaccination

Newer

Researchers Submit Patent Application, “Personalized Health System, Method And Device Having A Physical Activity Function”, for Approval (USPTO 20220310228): Patent Application

Advisor News

  • 2026 may bring higher volatility, slower GDP growth, experts say
  • Why affluent clients underuse advisor services and how to close the gap
  • America’s ‘confidence recession’ in retirement
  • Most Americans surveyed cut or stopped retirement savings due to the current economy
  • Why you should discuss insurance with HNW clients
More Advisor News

Annuity News

  • Guaranty Income Life Marks 100th Anniversary
  • Delaware Life Insurance Company Launches Industry’s First Fixed Indexed Annuity with Bitcoin Exposure
  • Suitability standards for life and annuities: Not as uniform as they appear
  • What will 2026 bring to the life/annuity markets?
  • Life and annuity sales to continue ‘pretty remarkable growth’ in 2026
More Annuity News

Health/Employee Benefits News

  • Hawaii lawmakers start looking into HMSA-HPH alliance plan
  • EDITORIAL: More scrutiny for HMSA-HPH health care tie-up
  • US vaccine guideline changes challenge clinical practice, insurance coverage
  • DIFS AND MDHHS REMIND MICHIGANDERS: HEALTH INSURANCE FOR NO COST CHILDHOOD VACCINES WILL CONTINUE FOLLOWING CDC SCHEDULE CHANGES
  • Illinois Medicaid program faces looming funding crisis due to federal changes
More Health/Employee Benefits News

Life Insurance News

  • Guaranty Income Life Marks 100th Anniversary
  • Delaware Life Insurance Company Launches Industry’s First Fixed Indexed Annuity with Bitcoin Exposure
  • Suitability standards for life and annuities: Not as uniform as they appear
  • Looking at Medigap supplements
  • What will 2026 bring to the life/annuity markets?
Sponsor
More Life Insurance News

- Presented By -

Top Read Stories

More Top Read Stories >

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Elevate Your Practice with Pacific Life
Taking your business to the next level is easier when you have experienced support.

ICMG 2026: 3 Days to Transform Your Business
Speed Networking, deal-making, and insights that spark real growth — all in Miami.

Your trusted annuity partner.
Knighthead Life provides dependable annuities that help your clients retire with confidence.

8.25% Cap Guaranteed for the Full Term
Guaranteed cap rate for 5 & 7 years—no annual resets. Explore Oceanview CapLock FIA.

Press Releases

  • ePIC Services Company and WebPrez Announce Exclusive Strategic Relationship; Carter Wilcoxson Appointed President of WebPrez
  • Agent Review Announces Major AI & AIO Platform Enhancements for Consumer Trust and Agent Discovery
  • Prosperity Life Group® Names Industry Veteran Mark Williams VP, National Accounts
  • Salt Financial Announces Collaboration with FTSE Russell on Risk-Managed Index Solutions
  • RFP #T02425
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Advertise
  • Contact
  • Editorial Staff
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet