Patent Issued for Data processing and scanning systems for assessing vendor risk (USPTO 11550897): OneTrust LLC - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Meet our Editorial Staff
    • Advertise
    • Contact
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
January 27, 2023 Newswires
Share
Share
Post
Email

Patent Issued for Data processing and scanning systems for assessing vendor risk (USPTO 11550897): OneTrust LLC

Insurance Daily News

2023 JAN 27 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- According to news reporting originating from Alexandria, Virginia, by NewsRx journalists, a patent by the inventors Brannon, Jonathan Blake (Smyrna, GA, US), filed on February 11, 2022, was published online on January 10, 2023.

The assignee for this patent, patent number 11550897, is OneTrust LLC (Atlanta, Georgia, United States).

Reporters obtained the following quote from the background information supplied by the inventors: “Over the past years, privacy and security policies, and related operations have become increasingly important. Breaches in security, leading to the unauthorized access of personal data (which may include sensitive personal data) have become more frequent among companies and other organizations of all sizes. Such personal data may include, but is not limited to, personally identifiable information (PII), which may be information that directly (or indirectly) identifies an individual or entity. Examples of PII include names, addresses, dates of birth, social security numbers, and biometric identifiers such as a person’s fingerprints or picture. Other personal data may include, for example, customers’ Internet browsing habits, purchase history, or even their preferences (e.g., likes and dislikes, as provided or obtained through social media).

“Many organizations that obtain, use, and transfer personal data, including sensitive personal data, have begun to address these privacy and security issues. To manage personal data, many companies have attempted to implement operational policies and processes that comply with legal requirements, such as Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA) or the U.S.’s Health Insurance Portability and Accountability Act (HIPPA) protecting a patient’s medical information. Many regulators recommend conducting privacy impact assessments, or data protection risk assessments along with data inventory mapping. For example, the GDPR requires data protection impact assessments. Additionally, the United Kingdom ICO’s office provides guidance around privacy impact assessments. The OPC in Canada recommends certain personal information inventory practices, and the Singapore PDPA specifically mentions personal data inventory mapping.

“Many organizations have also begun to track the compliance of their vendors with privacy laws, regulations, and/or standards. This can be expensive and time consuming using traditional methods. Accordingly, there is a need for improved systems and methods for efficiently tracking the compliance of vendors with privacy laws, regulations, and/or standards, and for assessing the risk associated with doing business with a particular vendor.”

In addition to obtaining background information on this patent, NewsRx editors also obtained the inventors’ summary information for this patent: “A method, according to various aspects, comprises: (1) scanning, by computing hardware, a webpage associated with a vendor; (2) identifying, by the computing hardware, vendor attributes associated with the vendor based on the scanned webpage, wherein the vendor attributes comprise verification data originating from a third-party entity and verifying that the vendor has implemented, with respect to a vendor system, a procedure required by the third-party entity; (3) accessing, by the computing hardware, a public database of third-party verifications to determine whether the vendor has obtained the verification data from the third-party entity; (4) receiving, by the computing hardware a completed template from a centralized repository of completed templates, the completed template comprising question/answer pairings regarding the vendor; (5) receiving, from a user by the computing hardware, a weighting factor that is to be applied to a particular question/answer pairing of the plurality question/answer pairings in the completed template to calculate a vendor risk rating for the vendor; (6) calculating, by the computing hardware, the vendor risk rating based on the vendor attributes, the weighting factor, and content of the particular question/answer pairing; and (7) causing, by the computing hardware, an automated action to be taken based on the vendor risk rating.

“In some aspects, the vendor attributes comprise a certification that the vendor holds. In various aspects, scanning the webpage comprises identifying an image that makes up part of the webpage and that is associated with the verification data. In particular aspects, the method comprises monitoring, by the computing hardware, the webpage for an update; responsive to identifying the update, identifying, by the computing hardware, updated vendor attributes for the vendor attributes; and calculating, by the computing hardware, an updated vendor risk rating based on the updated vendor attributes. In a particular aspect, the automated action comprises generating, by the computing hardware, a graphical user interface comprising an indication of the vendor risk rating, and transmitting, by the computing hardware, an instruction to a third-party computing device to present the graphical user interface on the third-party computing device. In a particular aspect, the automated action comprises generating, by the computing hardware, an electronic communication comprising an indication of the vendor risk rating, and transmitting, by the computing hardware, the electronic communication to a third-party computing device. In other aspects, the automated action comprises transferring the vendor risk rating to a current or potential customer of the vendor for use in assessing a risk of doing business with the vendor.

“A system, in accordance with some aspects, comprises a non-transitory computer-readable medium storing instructions, and a processing device communicatively coupled to the non-transitory computer-readable medium. In various aspects, the processing device is configured to execute the instructions and thereby perform operations comprising: (1) scanning a webpage associated with a vendor; (2) identifying vendor attributes associated with the vendor based on the scanned webpage, wherein the vendor attributes comprise verification data originating from a third-party entity and verifying that the vendor has implemented, with respect to a vendor system, a procedure required by the third-party entity; (3) accessing a public database of third-party verifications to determine whether the vendor has obtained the verification data from the third-party entity; (4) receiving a completed template from a centralized repository of completed templates, the completed template comprising question/answer pairings regarding the vendor; (5) receiving, from a user, a weighting factor that is to be applied to a particular question/answer pairing of the plurality question/answer pairings in the completed template to calculate a vendor risk rating for the vendor; (6) calculating the vendor risk rating based on the vendor attributes, the weighting factor, and content of the particular question/answer pairing; and (7) causing an automated action to be taken based on the vendor risk rating.

“In some aspects, the vendor attributes comprise a certification that the vendor holds. In other aspects, scanning the webpage comprises identifying an image that makes up part of the webpage and that is associated with the verification data. In various aspects, the operations further comprise: (1) monitoring the webpage for an update; (2) responsive to identifying the update, identifying updated vendor attributes for the vendor attributes; and (3) calculating an updated vendor risk rating based on the updated vendor attributes. In some aspects, the automated action comprises generating a graphical user interface comprising an indication of the vendor risk rating, and transmitting an instruction to a third-party computing device to present the graphical user interface on the third-party computing device. In other aspects, the automated action comprises generating an electronic communication comprising an indication of the vendor risk rating, and transmitting the electronic communication to a third-party computing device. In still other aspects, the automated action comprises transferring the vendor risk rating to a current or potential customer of the vendor for use in assessing a risk of doing business with the vendor.

“A non-transitory computer-readable medium, according to some aspects, has program code that is stored thereon, the program code executable by one or more processing devices for performing operations comprising: (1) scanning a webpage associated with a vendor; (2) identifying vendor attributes associated with the vendor based on the scanned webpage, wherein the vendor attributes comprise verification data originating from a third-party entity and verifying that the vendor has implemented, with respect to a vendor system, a procedure required by the third-party entity; (3) accessing a public database of third-party verifications to determine whether the vendor has obtained the verification data from the third-party entity; (4) receiving a completed template from a centralized repository of completed templates, the completed template comprising question/answer pairings regarding the vendor; (5) receiving, from a user, a weighting factor that is to be applied to a particular question/answer pairing of the plurality question/answer pairings in the completed template to calculate a vendor risk rating for the vendor; (6) calculating the vendor risk rating based on the vendor attributes, the weighting factor, and content of the particular question/answer pairing; and (7) causing an automated action to be taken based on the vendor risk rating.”

The claims supplied by the inventors are:

“1. A method comprising: scanning, by computing hardware, a webpage associated with a vendor; identifying, by the computing hardware, vendor attributes associated with the vendor based on the scanned webpage, wherein the vendor attributes comprise verification data originating from a third-party entity and verifying that the vendor has implemented, with respect to a vendor system, a procedure required by the third-party entity; accessing, by the computing hardware, a public database of third-party verifications to determine whether the vendor has obtained the verification data from the third-party entity; calculating, by the computing hardware, a vendor risk rating based on the vendor attributes; generating, by the computing hardware, a graphical user interface comprising a menu for managing a computerized workflow related to the vendor, the menu comprising a navigation element and a display element, wherein: the navigation element is configured for initiating a responsive action based on the vendor risk rating, and the display element is configured for presenting the vendor risk rating; transmitting, by the computing hardware, an instruction to a user computing device to present the graphical user interface on the user computing device; detecting, by the computing hardware, selection of the navigation element; and responsive to detecting the selection of the navigation element, initiating, by the computing hardware, the responsive action, wherein the responsive action comprises at least one of: (i) generating a second graphical user interface comprising an indication of the vendor risk rating and transmitting a second instruction to a third-party computing device to present the second graphical user interface on the third-party computing device, (ii) generating an electronic communication comprising an indication of the vendor risk rating and transmitting the electronic communication to the third-party computing device, or (iii) transferring the vendor risk rating to a current or potential customer of the vendor for use in assessing a risk of doing business with the vendor.

“2. The method of claim 1, wherein the vendor attributes comprise a certification that the vendor holds.

“3. The method of claim 1, wherein scanning the webpage comprises identifying an image that makes up part of the webpage and that is associated with the verification data.

“4. The method of claim 1 further comprising: monitoring, by the computing hardware, the webpage for an update; responsive to identifying the update, identifying, by the computing hardware, updated vendor attributes for the vendor attributes; and calculating, by the computing hardware, an updated vendor risk rating based on the updated vendor attributes.

“5. A system comprising: a non-transitory computer-readable medium storing instructions; and a processing device communicatively coupled to the non-transitory computer-readable medium, wherein, the processing device is configured to execute the instructions and thereby perform operations comprising: scanning a webpage associated with a vendor; identifying vendor attributes associated with the vendor based on the scanned webpage, wherein the vendor attributes comprise verification data originating from a third-party entity and verifying that the vendor has implemented, with respect to a vendor system, a procedure required by the third-party entity; accessing a public database of third-party verifications to determine whether the vendor has obtained the verification data from the third-party entity; calculating the vendor risk rating based on the vendor attributes; and generating a graphical user interface comprising a menu for managing a computerized workflow related to the vendor, the menu comprising a navigation element and a display element, wherein: the navigation element is configured for initiating a responsive action based on the vendor risk rating, and the display element is configured for presenting the vendor risk rating; transmitting an instruction to a user computing device to present the graphical user interface on the user computing device; detecting selection of the navigation element; and responsive to detecting the selection of the navigation element, initiating the responsive action, wherein the responsive action comprises at least one of: (i) generating a second graphical user interface comprising an indication of the vendor risk rating and transmitting a second instruction to a third-party computing device to present the second graphical user interface on the third-party computing device, (ii) generating an electronic communication comprising an indication of the vendor risk rating and transmitting the electronic communication to the third-party computing device, or (iii) transferring the vendor risk rating to a current or potential customer of the vendor for use in assessing a risk of doing business with the vendor.

“6. The system of claim 5, wherein the vendor attributes comprise a certification that the vendor holds.

“7. The system of claim 5, wherein scanning the webpage comprises identifying an image that makes up part of the webpage and that is associated with the verification data.

“8. The system of claim 5, wherein the operations further comprise: monitoring the webpage for an update; responsive to identifying the update, identifying updated vendor attributes for the vendor attributes; and calculating an updated vendor risk rating based on the updated vendor attributes.

“9. A non-transitory computer-readable medium having program code that is stored thereon, the program code executable by one or more processing devices for performing operations comprising: scanning a webpage associated with a vendor; identifying vendor attributes associated with the vendor based on the scanned webpage, wherein the vendor attributes comprise verification data originating from a third-party entity and verifying that the vendor has implemented, with respect to a vendor system, a procedure required by the third-party entity; accessing a public database of third-party verifications to determine whether the vendor has obtained the verification data from the third-party entity; calculating the vendor risk rating based on the vendor attributes; and generating a graphical user interface comprising a menu for managing a computerized workflow related to the vendor, the menu comprising a navigation element, wherein the navigation element is configured for initiating a responsive action based on the vendor risk rating, and transmitting an instruction to a user computing device to present the graphical user interface on the user computing device; detecting selection of the navigation element; and responsive to detecting the selection of the navigation element, initiating the responsive action, wherein the responsive action comprises at least one of: (i) generating a second graphical user interface comprising an indication of the vendor risk rating and transmitting a second instruction to a third-party computing device to present the second graphical user interface on the third-party computing device, (ii) generating an electronic communication comprising an indication of the vendor risk rating and transmitting the electronic communication to the third-party computing device, or (iii) transferring the vendor risk rating to a current or potential customer of the vendor for use in assessing a risk of doing business with the vendor.

“10. The non-transitory computer-readable medium of claim 9, wherein the vendor attributes comprise a certification that the vendor holds.

“11. The non-transitory computer-readable medium of claim 9, wherein scanning the webpage comprises identifying an image that makes up part of the webpage and that is associated with the verification data.

“12. The non-transitory computer-readable medium of claim 9, wherein the operations further comprise: monitoring the webpage for an update; responsive to identifying the update, identifying updated vendor attributes for the vendor attributes; and calculating an updated vendor risk rating based on the updated vendor attributes.”

For more information, see this patent: Brannon, Jonathan Blake. Data processing and scanning systems for assessing vendor risk. U.S. Patent Number 11550897, filed February 11, 2022, and published online on January 10, 2023. Patent URL (for desktop use only): https://ppubs.uspto.gov/pubwebapp/external.html?q=(11550897)&db=USPAT&type=ids

(Our reports deliver fact-based news of research and discoveries from around the world.)

Older

Patent Issued for System, method, and program product for generating and providing simulated user absorption information (USPTO 11551803): Aimcast IP LLC

Newer

CT Supreme Court rules against medical practices that tried to recoup pandemic business losses from property insurers [Hartford Courant]

Advisor News

  • Younger investors turn to ‘finfluencers’
  • Using digital retirement modeling to strengthen client understanding
  • Fear of outliving money at a record high
  • Cognitive decline is a growing threat to financial security
  • Two lessons career changers wish they knew before starting the CFP journey
More Advisor News

Annuity News

  • FACC and DOL enter stipulation to dismiss 2020 guidance lawsuit
  • Zinnia’s Zahara policy admin system adds FIA chassis to product library
  • The Standard and Ignite Partners Announce Launch of Thrive Plus Fixed Indexed Annuity
  • CareScout Joins Ensight™ Intelligent Quote LTC & Life Marketplace
  • Axonic Insurance Annuities, Built for Banks, Broker-Dealers and RIAs, Now Available through WealthVest.
More Annuity News

Health/Employee Benefits News

  • Researchers at Northwestern University Feinberg School of Medicine Report Findings in Cataract Surgery (Evaluating Metrics Assessing Surgical Success in Patients Undergoing Cataract Surgery): Surgery – Cataract Surgery
  • Studies Conducted at University of Florida on Managed Care Recently Reported [Risk of Fetal Exposure to Teratogenic Medications: Development of Evidence for the Teratogenic Risk Impact and Mitigation (TRIM) Tool]: Managed Care
  • 5 ways to navigate health care costs and coverage with confidence
  • UnitedHealthcare’s mission control targets customer woes to build its brand
  • NC State Health Plan expects to spend $1 billion more than planned. Here’s why
More Health/Employee Benefits News

Life Insurance News

  • Iowa widow claims premium-financed IUL plan jeopardized family farm
  • Redefining life insurance for a new era of trust and protection
  • Agam Capital and 1823 Partners Announce Strategic Partnership to Provide Life Insurers with an End-to-End Value Chain Solution
  • AM Best Revises Outlooks to Positive for Western & Southern Financial Group, Inc. and Its Subsidiaries
  • Principal Financial Group Announces First Quarter 2026 Results
More Life Insurance News

- Presented By -

Top Read Stories

More Top Read Stories >

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Protectors Vegas Arrives Nov 9th - 11th
1,000+ attendees. 150+ speakers. Join the largest event in life & annuities this November.

A FIA Cap That Stays Locked
CapLock™ from Oceanview locks the cap at issue for 5 or 7 years. No resets. Just clarity.

Aim higher with Ascend annuities
Fixed, fixed-indexed, registered index-linked and advisory annuities to help you go above and beyond

Unlock the Future of Index-Linked Solutions
Join industry leaders shaping next-gen index strategies, distribution, and innovation.

Leveraging Underwriting Innovations
See how Pacific Life’s approach to life insurance underwriting can give you a competitive edge.

Bring a Real FIA Case. Leave Ready to Close.
A practical working session for agents who want a clearer, repeatable sales process.

Press Releases

  • RFP #T01325
  • RFP #T01325
  • RFP #T01825
  • RFP #T01825
  • RFP #T01525
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Meet our Editorial Staff
  • Advertise
  • Contact
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet