WO2005086057A1 - Risk management system and method - Google Patents
Risk management system and method Download PDFInfo
- Publication number
- WO2005086057A1 WO2005086057A1 PCT/US2004/027323 US2004027323W WO2005086057A1 WO 2005086057 A1 WO2005086057 A1 WO 2005086057A1 US 2004027323 W US2004027323 W US 2004027323W WO 2005086057 A1 WO2005086057 A1 WO 2005086057A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- risk
- management system
- data
- loan
- interface
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/12—Accounting
Definitions
- the current invention relates to the field of risk management, specifically to a system for risk assessment, risk evaluation, identifying, analyzing, quantifying, reporting and prioritizing risk, and providing a means of working and understanding areas of risk associated with financial portfolios, financial instruments, financial institutions and the lending process.
- Risk management is a critical issue for financial survival of financial institutions such as banks. Due to the unpredictable nature of financial portfolios, risk must be assessed and managed in an efficient manner. In addition, due to recent legislation such as the Basel Capital Accord II, the Patriot Act, and the Sarbanes/Oxley Act, it is becoming more and more essential for financial institution managers to be able to meaningfully understand, manage and assess risk. Other financial and economic factors drive risk, including shareholders, regulators, FASB, SEC, ratings agencies, etc. Poor portfolio risk management continues to be one of the financial and banking industries largest problems. [0004] Financial institutions face a number of different risks that expose them to possible losses. These risks include operational risk, credit risk, market risk, liquidity risk, legal risk, insurance risk, etc., all of which are within the scope of the term "risk” as used herein.
- Operational risk comprises the risk of loss resulting for inadequate or failed internal processes, procedures, people and technology. Operational risk can be thought of as the risk resulting from an incident, for example, a brealcdown in transactional processing or compliance issues, due to systems or procedural failures, human errors, disasters or illegal activity.
- Credit risk arises from the potential that a borrower will fail to perform on an obligation; the risk that borrowers will be unable to meet their obligations to the lender. Credit risk can also be thought of as the measure of a borrower's ability to repay a loan as promised, or a person's or company's creditworthiness, as reported on a credit rating.
- Market risk is the likelihood that the value of a security will move concurrently with its overall market.
- Liquidity risk is the risk of loss arising from a lender failing to meet funding requirements at any given time.
- a loan accounting system, or other similar accounting system, utilized by a financial institution may have capabilities to provide information on loan service, such as balancing, past dues, new loans, maturity, margining of collateralized loans, and departmental concerns.
- the loan accounting system may comprise data that in conjunction with other systems provides a potential basis for the review of the financial institution's portfolios and related risk. Unfortunately, the valuable information that is gathered is not often used by financial institutions in a meaningful way to identify or manage risks.
- the risk management system comprises a computer program for risk assessment and risk evaluation, including, but not limited to, identifying, quantifying, analyzing, prioritizing, combining, reporting and managing the various types of risk associated with the services provided by a financial institution.
- the system generally comprises the combination of a loan policy, at least one risk data system, and an automated risk system having risk assessment and risk evaluation capabilities.
- a goal of the system is to assess, evaluate, communicate and manage risk in the lending process. Risk management is required at all times while a financial institution is servicing a financial client.
- a loan policy is provided in an embodiment of the invention, as a set defining of rules and/or parameters and/or guidelines set by a financial institution for processing financial instruments.
- Various risk data systems are provided in embodiments of the invention, comprising data that may impact risk associated with a financial portfolio, and that data is compared to the loan policy, to determine if there are any deviations from the loan policy. Any deviation is deemed a risk event.
- a risk system is provided in an embodiment of the invention for collecting risk event data, and assessing and evaluating such data.
- the risk system generally comprises a risk rule engine having access to a risk analysis file. The risk
- the risk management system in an embodiment of the invention is designed to collect, process, analyze, assess, evaluate, and report data from the various risk data systems for assessing risks relating to financial instruments and/or financial portfolios serviced by a financial institution.
- the risk management system in an embodiment of the invention is designed to process information on an ongoing basis as needed to provide risk assessment and risk evaluation.
- risk system in an embodiment of the invention has access to various risk data systems and files, for monitoring, analyzing, assessing, evaluating, calculating and communicating risk associated with any risk event.
- a risk rule engine is provided in an embodiment of the invention, comprising a means for gathering data associated with risks, performing risk assessment and/or risk evaluation.
- Various reporting functions are provided by the risk system, as well as a user interface for allowing user's to review the results of risk assessment.
- One consequence of the risk management system of the present invention is an ability to tie together appropriate data from various sources and to assess risk in a significant manner.
- a financial institution has the ability to analyze risk events, individually or collectively, to detennine the best manner of controlling and reporting risk. DETAILED DESCRIPTION OF THE DRAWINGS
- Fig. 1 is a block diagram of an embodiment of the risk management system of the present invention.
- Fig. 2 is a block diagram overview of the risk data systems, loan policy systems, and risk system according to an embodiment of the invention.
- Fig. ⁇ 3 is a block diagram of the risk data systems, the risk system, and the risk rule engine according to an embodiment of the invention.
- Fig. 4 is a flow chart showing how risk events can be recorded according to an embodiment of the invention.
- Fig. 5 is a flow chart showing how risk events can be recorded according to an embodiment of the invention.
- Fig. 6 is a block diagram of the risk data systems, system interfaces, and risk rule engine according to an embodiment of the invention.
- Fig. 7 is a block diagram of the risk analysis file and risk rule engine according to an embodiment of the invention.
- Fig. 8 is a block diagram of the action rule repository according to an embodiment of the invention.
- Fig. 9 is a block diagram of the exposure repository according to an embodiment of the invention.
- Fig. 10 is a block diagram of the risk data systems, system interfaces, event monitor, and risk rule engine according to an embodiment of the invention.
- Fig. 11 is a block diagram of the risk data systems, system interfaces, inquiry dispatcher, and risk rule engine according to an embodiment of the invention.
- Fig. 12 is a block diagram of the risk rule engine, risk workflow engine, notification engine, risk action joblist and risk workstation according to an embodiment of the invention.
- Fig. 13 is a schematic representation showing an illustrative operation according to an embodiment of the invention in assessing risk.
- Fig. 14 is a schematic representation showing an illustrative operation according to an embodiment of the invention in assessing risk.
- the risk management system is capable of assessing and allowing users to identify, monitor, analyze, evaluate, and manage each type of risk that may arise during a financial institution's servicing of user's financial portfolios.
- the risk management system is implemented as a computer program, comprising software application and data files.
- the computer program is stored on at least one computer that may comprise a processing unit or CPU, with a memory capacity for storing the information gathered by the system, which can be through various technical means as will be appreciated by those in the art.
- the computer program is accessible by users of the system through a user interface, such as a personal computer terminal having a CPU, keyboard, monitor and mouse, or thin client server comprising a terminal with a keyboard, monitor and mouse.
- client refers to any customer serviced by a financial institution.
- computer program comprises any computer software application or combination of computer software applications, comprising sets of coded instructions that enable a computer to perform desired sequences of operations, and data as required to support those operations. Data may be stored in files, databases, data stores, etc.
- the computer program can be in any computer language or computer code.
- data as used herein comprises any data, information, procedure, event, action or occurrence.
- the terms "financial institution,” “user,” or “lender” refer to any entity that deals in financial instruments during the course of its business and may utilize the risk management system.
- financial portfolio means any single or collection of financial instruments serviced by a financial institution for a client.
- a loan portfolio as used in the description of the invention is one example of a financial portfolio, but does not limit the scope of the invention.
- financial instrument as used herein comprises any legally enforceable agreement between two or more parties, expressing a contractual right or a right to the exchange of money or money-equivalents.
- Financial instruments include, but are not limited to, loans, mortgages, checks, drafts, notes and bonds.
- the term "real-time data feed” as used herein, means any accessible financial or credit industry transactions or data that can be accessed over a computer network as it actually occurs, or with negligible delays.
- the terms "risk assessment” or “risk analysis” as used herein are interchangeable and comprise the analyzing, monitoring, measuring, assessment, comparing, combining, management, tracking, identification, quantification, calculation, reporting, communication, prioritizing and/or evaluation of risk.
- the term "risk evaluation” as used herein generally comprises the process used to determine risk management priorities by comparing the level of risk against predetermined standards or rules or values, target risk levels or other criteria. Risk evaluation further comprises a comparison of the results of a risk assessment with risk assessment criteria and other data that may impact risk assessment.
- a "risk event” is any data, information, procedure, event, action or occurrence that has the potential to impact the risk to a financial institution or financial portfolio serviced by a financial institution.
- a risk event reflects the data, information, procedure, event, action or occurrence that deviates from the loan policy.
- the risk management system of the present invention is designed to track, monitor and analyze risk events, as well as to provide users with a means to review risk events, and take action in response to risk events.
- risk management comprises a general term describing the process of analyzing risk in aspects of management and operations, the development and execution of strategies or actions to reduce the exposure to such risks, the monitoring of such actions, and the reporting or communication of risk or
- Fig. 1 shows an overall schematic depiction of one embodiment of a risk management system according to the present invention.
- a loan policy is established by a financial institution comprising a set of rules, guidelines and/or parameters, refened to collectively herein as "loan policy rules," to be used when considering, accepting, processing, tracking and otherwise servicing a financial instrument.
- the loan policy may be implemented as a computer database or computer program, or combination thereof.
- the set of rules comprising the loan policy will dictate permissible actions that may be taken when a financial institution is determining whether to grant a loan to a potential loan customer.
- loan policy rules may be set to establish the loan policy: limits on loan officer permitted approval, such as dollar limits; limits on loans to particular industries, such as dollar limits; derivative limits; limits on loan lacking liquid collateral; limits on loans to country, by limiting geographic area or setting dollar limits; limits on loan to particular individuals; setting rules for acceptable credit ratings in order for loans to proceed; setting rules for loans requiring credit committee approvals; setting rules for certain loan being combined with an acceptable derivative or offsetting sale of the credit; rules regarding prepayment agreed structures documentation of legal perfection; rules regarding loans needing more than one authorization; rules regarding loans in origination; rules regarding when and how the Exception System (discussed below) should be accessed and reviewed during loan processing; customers, sales, decision making, approval, perfecting, booking, and data gathering.
- a Loan Policy System 12 comprises the loan policy, and houses the rules, guidelines and/or parameters.
- the Loan Policy System 12 may be a computer program, a database or combination of databases stored on at least one computer, or a combination thereof.
- the Loan Policy System 12 may be accessed by other components of the system as needed when processing a loan.
- the loan policy may also be built into the Loan Accounting System 18, the Origination System 16, or the Risk Rule Engine 42, as discussed in more detail below.
- the loan policy is a reference against which actions can be measured and evaluated.
- the Loan Policy System 12 comprises the loan policy that a financial institution believes are required in order to determine whether to grant a loan to a client or service a financial instrument for a client, for legal, regulatory and/or business reasons, as well as other rules or policies deemed necessary for properly processing a loan or other financial instrument.
- the loan policy may also be considered the rules, guidelines and/or parameters for acceptable actions that may be taken during the loan management process when managing a financial portfolio.
- included in the Loan Policy System 12 may be the set loan policy of the specific financial institution, the financial institution's strategic policy as determined by management, the credit policy of the financial institution, and various departments' operational policies within the financial institution. These different policies combine to create the loan policy.
- a loan policy is established by a user of the system, or established in conjunction with the input of a user.
- the loan policy provides one of the foundations for the risk management system to produce exceptions, or comparative data, in order to identify risks.
- examples of loan policy would be rules established by a financial institution that the aggregate amount of approved loans to borrowers in a certain industry must not exceed a suggested limit, compared to the aggregate base for all other loans.
- the risk initially occurs, and would be identified, when the aggregate amount in a specific industry rises above the established limit.
- collateral term credit rating There are many factors to be analyzed, such as collateral term credit rating, etc.
- Other examples would be where an individual loan officer has personal authority or monetary limits that may not to be exceeded, where loans to foreign countries may have certain monetary or regulatory limits, or where the government may have restrictions on a class of potential borrowers.
- a financial institution may have a limit on the size (monetary amount) of an acceptable loan. Accordingly, under the loan policy, the origination of the loan may be stopped or redirected if the loan is in excess of the loan policy limit during the loan.
- Fig. 2 is a block diagram of the Loan Policy System 12, in communication with the Risk Data Systems 14, and the Risk System 40. [0066] II. Risk Data Systems
- At least one of various Risk Data Systems 14 is provided or made available from which information may be extracted and processed as part of the risk management system of the invention.
- Data that may be pertinent to risk assessment or risk evaluation comes from many sources, internal and external to a financial institution.
- Internal data pertinent to risk assessment and risk evaluation may include, but is not limited to: information regarding financial portfolios serviced by the financial institution; information regarding financial instruments serviced by a financial institution; information gathered during origination; and, information from the loan accounting system.
- External sources of data pertinent to risk assessment and risk evaluation may include, but is not limited to: outside credit ratings; country risks; company risks, such as a particular company's collateral, employer, bonower; industry risks, such as a particular industry's collateral, employer, borrower; guarantor risk; occupant risk; interest rate data; weather data; global conflict data; payments; parties in credit derive; credit swaps; or covenants.
- the Risk Data Systems 14 are designed to capture at least
- the Risk Data Systems 14 may comprise data files, databases, computer programs, financial software systems, or external information services, as well as real-time data feeds that can be received through a computer network. These are discussed in detail below.
- Origination is generally a servicing and information intake step for managing and supporting a financial portfolio.
- Data pertaining to a financial portfolio such as a loan portfolio may be gathered in an Origination System 16 such as through an origination step controlled by or in conjunction with the loan policy.
- infonnation necessary for processing a financial portfolio is gathered.
- the information needed on a loan application may be gathered during the origination step. Numerous factors impact the loan decision, that is, whether a loan will be granted or refused by a financial institution. These factors differ according to the type of loan.
- the origination step may be designed to collect the information needed for processing each type of loan in an Origination System 16. It is also appreciated that information relating to a financial portfolio may be collected by a source outside a financial institution, and later transfened the financial institution. Such information may be stored in the Origination System 16, or another Risk Data System.
- information gathered in the Origination System 16 is automatically reviewed by the system.
- This automated origination review may occur prior to the loan approval, such as during an initial loan request, or the automated origination review may begin after approval but prior to entry of the information concerning the loan into a loan accounting system, or through one of the systems Inquiry Dispatchers 80, discussed below.
- the automated origination review allows the system to access the Loan Policy System 12, and compare the loan policy to the information gathered during origination.
- the loan policy may be built directly into the Origination System 16, such as in the form of a rules engine. During the origination step, the system may also access information from and communicate with a Loan Accounting System 18, as discussed in more detail below. It is contemplated that the Origination System 16 may be implemented as a computer program running on at least one computer.
- Origination System 16 or actions occurring during origination, or deviations, departures or variances from the set loan policy, are considered exceptions, and information relating to such exceptions to the set loan policy are recorded in the Exception System 20, which is discussed in greater detail below.
- An exception is triggered each time an action taken with respect to a particular loan deviates from the established loan policy. This occurs automatically within the risk management system utilizing a computer program designed to track such deviations. Exceptions may be triggered by individual risk events, or by risk events occurring in combination, providing for an ongoing automated evaluation of risk.
- the risk management system is further designed to handle departures from the loan policy having different magnitudes or levels of potential risk.
- an exception to the loan policy may be so severe, and such a major violation of loan policy, that the system is automatically designed to completely reject the loan, such as through the Transaction submission System 102, and stop a user of the system from processing the loan any further.
- the risk management system may reject certain actions attempted during origination. If the exception is not a major violation of the loan policy, the system may be set to allow the loan process to continue while noting the presence of an exception in the Exception System 20.
- the risk management system may have the capability to track all rejections and exceptions, as well the specific user initiating an action resulting in an exception.
- a Loan Accounting System 18 comprises a computerized automated lending solution for processing loans.
- a Loan Accounting System 18 may also comprise a computerized automated solution for processing a myriad of financial instruments.
- An example of such a system is described in detail in U.S. Published Patent Application US20020152155A1, "Method For Automated And Integrated Lending Process," the entire contents of which are fully incorporated herein by reference.
- An origination step or origination system may be integrated into the Loan Accounting System 18.
- the Loan Accounting System 18 may be considered, generally, a computer program designed for processing loans.
- risk events may occur at any stage during the process. Exceptions may be triggered when actions deviate from the loan policy.
- Example of the many potential exceptions that could occur while a financial instrument is processed by the Loan Accounting System 18 include, but are not limited to: a loan going past maturity; a loan over margin; the margining of collateral indicating insufficient collateral value; situations where additional administrative steps are
- loan policy where a loan is approved for a maturity longer than allowed by the loan policy; where a loan is awaiting lien perfection; where collateral for a loan is to be forwarded by a stock broker to the financial institution; where a loan has not yet been sold; where a credit derivative has not yet been received by a financial institution; where a borrower's credit rating is below the limit set in the loan policy; where a debt limit is exceeded in a covenant; where a loan is approved without going through all the required steps prior to approval; where the debt to equity ratio falls outside a covenant; where a borrower's credit rating has dropped; or, where the borrower's income level drops below a threshold set in a covenant. All of these are examples of exceptions are risk events that may be monitored by embodiments of the system.
- the Loan Accounting System 18 is in communication with the Loan
- the Loan Accounting System 18 may also be in communication with a Loan Accounting Interface 88 to facilitate communication with the Risk Rule Engine 42 of the Risk System 40 as described in more detail.
- Exception System 20 is implemented as a computer program according to an embodiment of the invention. Each exception is considered a risk event. Exceptions may be generated at any stage during a financial institution's servicing of a user's financial instruments or financial portfolio. The Exception System 20 is adapted to collect some or all of the exceptions that occur during the processing and life of a financial portfolio such as a loan portfolio. The Exception System 20 may be in communication with one or more of the other components of the risk management system, such as the Loan Accounting System 18, the Risk Data Systems 14, and the Risk System 40, as discussed in more detail below.
- Fig. 3 The communication between the Exception System 20 and the various Risk Data Systems 14, as well as the Risk System 40, is shown schematically in Fig. 3.
- Fig. 3 The communication between the Exception System 20 and the various Risk Data Systems 14, as well as the Risk System 40, is shown schematically in Fig. 3.
- a loan is approved, various exceptions can occur that are tracked by the system, and collected in the Exception System 20. Any number of risk events can trigger an exception, such as actions taking place during loan approval that deviate from the loan policy, or where requirements of the loan policy are waived or circumvented for particular transactions or customers.
- the types of exceptions that are contemplated may vary, and the ability to analyze and manage exceptions will be part of the Exception System 20 software structure.
- risk events that may result in exceptions, in addition to those noted in connection with the Loan Accounting System 18, include, but are not limited to: detected changes in real-time data feeds; covenants identified as unfulfilled; detected changes in client credit scores; or, global changes or world events that may impact financial investments or financial instruments.
- a computer program such as an Event Monitor 76 may be used to examine the data in the Exception System 20, or to set or reset the data in the Exception System 20. Exceptions can be tagged and collected in the Exception System 20 by the system automatically reviewing the data in the Origination System 16, the Loan Accounting System 18, or by comparing financial portfolio data to other Risk Data Systems or files accessed by the system.
- the system may be automated so that exceptions may be categorized and placed in subfolders or files. For example, a certain type of exception may be automatically placed in a certain file or folder within the Exception System 20 for later use by the Risk System 40.
- a certain type of exception may be automatically placed in a certain file or folder within the Exception System 20 for later use by the Risk System 40.
- the flow of data from any of the Risk Data Systems 14 to the Exception System 20 is shown as a flow chart in Fig. 4.
- An example of the flow of date from the Loan Accounting System 18 to the Exception System 20 is shown as a flow chart in Fig. 5.
- a derivative is a transaction or contract where the value derives from the value of an underlying asset such as stocks, bonds, mortgages, market indices, foreign currencies, etc.
- a derivative allows a party with exposure to transfer some or all of the risk to a second party.
- a Derivative System 22 processes the information comprising a financial institution's derivatives. The Derivative System 22 is in communication with and feeds information to the Risk System 40.
- the Derivative System 22 may be implemented as a computer program, or in an alternate embodiment, provided as a module in the Loan Accounting System.
- a derivative may be a financial instrument that has many variations, such as: credit swaps (insurance; one party takes the risk of repayment for a fee); interest swaps (fixed rate for a variable rate); or, cunency swaps (one party trades
- External rating can be defined as an assessment of a financial institution's creditworthiness.
- An External Rating System 24 processes information relating to a financial institution's external rating.
- the External Rating System 24 is implemented as a computer program in communication with and feeding infonnation to the Risk Rule Engine 42 according to an embodiment of the invention.
- a covenant is an agreement whereby a bonower promises delivery of certain things, or promises performance at a certain level, or vouches for the truth of certain facts as consideration for a loan.
- a covenant is an agreement between a financial institution and a client on details of lending agreement.
- the lender has stipulations the bonower agrees to, such as debt outstanding dividends paid, salaries to owners, movement of assets, real estate stipulations, e.g. owner occupied, rental rates, occupancy.
- a Covenant System 26 according is implemented as a computer program that processes the collection of promises relating to a particular loan, financial instrument or transaction, according to an embodiment of the invention.
- Financial institution may aggregate and process the information regarding a user's usage of payment or deposit information in an Account Analysis
- Such infonnation may comprise: the balance history by day; the wire activity; overdraft information; coin activity; number of deposits; number checks; float; and, other related information.
- the Account Analysis System 114 may be
- a financial institution may determine if a portion is recoverable. There may be a portion recoverable through collateral, guarantees, offset of balances, real estate or any secured attachable, account receivables and other financial assets.
- System 116 may be implemented as a computer program that processes information related to such recoveries, according to an embodiment of the invention.
- the amount at risk may be influenced by the balance that will be anticipated to be recoverable.
- a Trust System 32 may be provided as a computer program for processing infonnation regarding any trusts or trust portfolios maintained for clients, according to an embodiment of the invention.
- a Deposit System 34 may be provided as a computer program for processing deposit activities relating to client accounts, according to an embodiment of the invention.
- Services System 36 may comprise a computer program or database provided by a third party provider of credit information that may be accessed by the Risk System 40, according to an embodiment of the invention.
- Information may be provided to the risk management system of the present inventions by third party systems comprising real-time finance or baking- related data via a Real-Time Data System 120, which may be implemented as a computer program for processing real-time data provided by third parties, according to an embodiment of the invention.
- This real-time information may be provided by subscription service, or may be accessed over the internet World Wide Web.
- Realtime data processes by the Real-Time Data System 120 may take the form of industry reports, global events information, worldwide financial stock market information, etc.
- the Risk System 40 is in communication with each of the above-listed
- Risk Data Systems 14 may derive data from one or each of the above-listed files in order to perform risk assessment or risk evaluation. It is appreciated that other files may be added by a user of the risk management system comprising information that may impact risk assessment. As new risk data system arise, or as new financial services become available, these may be integrated into the system. [0108] II. Risk System
- the term "Risk System” is used to describe the collection of computer programs, including files, databases, data stores, and/or modules, or any combination thereof, working independently or in combination, and designed to perform risk assessment and risk evaluation.
- the Risk System 40 may be implemented as a computer program having various application and data files for storing information on at least one computer having a memory capacity, according to an embodiment of the invention.
- A. Risk Rule Engine 42
- the Risk System 40 comprises a Risk Rule Engine 42.
- Risk Assessment and risk evaluation rules by responding to risk events, requests, and/or scheduled analysis, and executing rules, which may include routines and/or actions, relevant to the various Risk Data Systems 14. Execution of these rules may require access to content in the Risk Analysis File 44 and all infonnation of the system available through the System Interfaces 82, discussed in detail below. Results of the processes of the Risk Rule Engine 42 may be returned to the source data file or Risk Data System 14, generated as an action communicated to a user via the Risk Workflow Engine 104, or utilized for updating the Risk Analysis File 44.
- the Risk Rule Engine 42 comprises a computer program operating on at least one computer.
- the Risk Rule Engine 42 is in communication with the other components of the system.
- the Risk Rule Engine 42 dynamically receives and processes information regarding risk events from other system components.
- the Risk Rule Engine 42 is fed by the various Risk Data Systems having information impacting financial risks, as shown in Figs. 1 and 3, and discussed further below.
- the Risk Rule Engine 42 provides a user with the ability to have information collected and included in a Risk Analysis File 44.
- the Risk Rule Engine 42 is designed to provide an assessment of risk events, which may include by way of example and not by way of limitation: any and all exceptions; employment practices;
- the Risk Rule Engine 42 may have rules within the structure of the computer program to automatically process or otherwise manage the data relating to various risk events.
- the computer program of the Risk Rule Engine 42 may have automatic rules so that if a bonower' s credit rating changes, the Risk Rule Engine 42 may automatically sends a notification to a user via the Risk Workflow Engine to a user.
- the computer program of the Risk Rule Engine 42 may have automatic rules so that if a financial instrument is downgraded, a report is automatically generated. If a combination of particular risks occurs, the Risk Rule Engine 42 may have automatic rules for notifications of that combination.
- a user of the risk management system can select from many factors that the user wants analyzed by the Risk Rule Engine 42, or can set for any automatic analysis and reporting.
- the Risk Rule Engine 42 is designed to access information concerning many variables that are important in determining risk for a financial institution. For example, deposit balances, regulatory requirements, and outside credit ratings, are all examples of important information considered by the Risk Rule Engine 42 when analyzing risk, and are datum points to be considered for defining risk events and determining compliance with the loan policy.
- the Risk Rule Engine 42 is adapted, in one aspect, to collect data from the Risk Data Systems 14, and analyze the data using formulas based upon risk management principles to assist a user of the system in managing risk. For example, during the analysis of the data collected from the Exception System 20, the Risk Rule Engine 42 is equipped to determine the quantification, prioritization, working structure, and potential presentation of risk events.
- Information may be gathered by the Risk System 40 and Risk Rule
- Predetermined rules may be built into the software of the Risk Rules Engine 42.
- the software may be designed with routines to automatically search the Risk Data Systems 14 for information relevant to risk assessment.
- the software may be further designed with routines that are initiated automatically upon the occunence of a risk event, or may be initiated manually by a user of the system.
- the rules contained in the Risk Rule Engine 42 will be extensive and may be constantly evolving.
- the Risk Rule Engine 42 may further comprise an intelligent computer program that will indicate where further risk review is needed. Because risk assessment and risk evaluation comprise a combination of known issues and new or unknown events, the development of rules within the software of the Risk Rule Engine 42 will be a dynamic and fluid process.
- the Risk Rule Engine 42 may be designed with rules for analyzing risk-related data based upon various categories. For example, a particular industry may be identified. The Risk Rule Engine 42 will be designed to analyze the risk involved with a particular industry by considering such factors as: exposure; exposure with credit rating; exposure with maturity; exposure with derivative position; exposure with priority exceptions; or any combination thereof. Measuring these factors will provide a measure of financial portfolio exposure. [0120] The Risk Rule Engine 42 may be designed with rules for measuring a
- the Risk System 40 further comprises a Risk Analysis File 44 in communication with the Risk Rule Engine 42, as shown in Fig. 7.
- the Risk Analysis File 44 is adapted to provide storage of data, rules, calculations, parameters, exposures, and unresolved actions associated with identification, analysis and management of risk by the Risk Rule Engine 42. This may comprise, but is not limited to, any or all of the following components, as well as other components that may be uniquely added by a user or at the request of a user: [0123] 1. Risk Calculator Repository
- a Risk Calculator Repository 46 stores rules, routines and/or formulas for mathematically calculating, quantifying or attempting to predict potential risk. There are many known calculations in the financial and lending industry, and those in the art will be familiar with the formulas that can be used to calculate risk. Formulas may be applied to data collected by routines set to process risk events, user requests, or scheduled analysis. Examples of risk-related formulas are: PD, Probability of Default, EL, Expected Loss, LGD, Loss Given Default, etc. Other formulas used by the risk rules engine and in the Event Filters may be stored in this repository as well. For example, the Risk Calculator Repository 46 may store rules and/or formulas for calculating credit risk according to established ratings definitions.
- Probability of Default measures the risk that a bonower will be unable or unwilling to repay its debt in full or on time.
- the risk of default is derived by analyzing the bonower's ability to repay a loan in accordance with the loan terms.
- Loss Given Default is the financial loss a financial institution may sustain if a bonower cannot or will not repay its debt.
- Expected Loss is the product of PD x LGD.
- Exposure at Default is the amount that may be lost if a bonower defaults.
- Another formula may be set within the Risk Calculator Repository 46 to determine "credit loss per exposure", which is calculated as EAD x LGD X PD. Each of these formulas may be stored in the Risk Calculator Repository 46 for use in calculating risk. In addition, users of the system can develop and enter their own formulas within the Risk Calculator Repository for assessing risk.
- the Risk Calculator Repository 46 may comprise any number of risk formulas, depending on the needs of a financial institution. Other examples of risk formulas for calculating potential risk, included, but are not limited to: PD rating at and prior to default; PD risk factor data prior to default; actual default rates by rating grade; LGD rating at default by exposure; maturity by exposure; portfolio CRM and rating migration; LGD risk factor data prior to default; cash collections; collateral; portfolio CRM received; actual exposure at default; and, EAD rating at exposure by default.
- Rule Engine 42 is able to analyze the data gathered by the Risk System 40, and provide useful information to a user for assessing risk. In this manner, the Risk Rule Engine 42 is capable of researching and reporting (via a User interface) the various types of risk, establish quantification, change parameters, model, manage the variables and in general establish an understanding of the risk profile of the lending process and portfolio. By accessing and analyzing data from the various components of the system, a user is given a tremendous amount of flexibility in assessing and managing risk. [0128] 2. Analysis Rule Repository
- An Analysis Rule Repository 48 is provided for storing rules that control the access and collection of data to support the analysis of a specific event, request, or scheduled analysis, and apply the appropriate risk calculators for the source and/or content being evaluated. If a risk is identified, the Analysis Rule
- Repository 48 will apply rules which dispatch action rules, described below.
- An Action Rule Repository 50 stores rules that determine the action required as a result of a risk event identified during the evaluation of an analysis rule.
- Such actions may include one or more of the following, as shown in Fig. 7:
- Users may be notified of risk by the risk management system through the Notification Engine 108 via e-mail, pager, fax, or other methods as required.
- Joblist 110 which generates an action on the user's Joblist, which must be addressed or routed to the appropriate person responsible for resolving, mitigating, or analyzing the risk.
- Repository 62 which is used in future evaluations of risk. Examples of such submissions are: recording of securities pledged as collateral in a "New Loan" event,
- the Scheduled Analysis Repository 58 stores a list of automated requests that are to be performed periodically by the system, based on events that take place, or based upon a prescheduled time. Entries in the Scheduled Analysis
- Repository 58 trigger the running of analysis rules based on a scheduled analysis, or based upon the occunence of an event criteria specified by a user.
- a Risk Policy Repository 58 stores parameters and rules that define a financial institution's specified and individualized policies for managing risk. Such parameters and rules may be, by way of example, approval and rejection of loans, establishing lending limits based on lender, loan product type, pledged collateral, industry classification, and portfolio composition, assignment of parameters associated with risk calculators, acceptable debt to equity ratios, risk matrixes that involve multiple variables, as well as other parameters that are used in assigning risk or making policy decisions.
- An Exposure Repository 72 as shown in Fig. 9, is provided for storing all information required to assess risk that is not available elsewhere in the system.
- the information stored in the Exposure Repository 72 may comprise:
- An Exception Repository 72 stores policy exceptions submitted to the system, and permits access to exceptions as required in evaluating an analysis rule.
- exceptions include, but are not limited to, any risk event, loans that are approved at variance with policy, loan that are conditionally approved, or any exception to the loan policy or an operating procedure that must be recorded or tracked.
- a Covenant Repository 74 stores all agreements, promises, or criteria upon which the conditional approval of a loan, relationship, or contract is established.
- the Covenant Repository 74 maintains requirements and/or criteria that enable the
- Covenant Repository 74 provides access to covenant information as required by the execution of analysis rules, and generates exception events that trigger risk evaluation for expired covenants that are not fulfilled.
- an Event Monitor 76 may be provided as a component of the Risk System 40.
- the Event Monitor 76 monitors data from the Risk Data Systems 14 regarding risk events or other data external to or internal to a financial institution. Examples of internal events include: changes to covenant status (fulfilled, expired, etc); selected new exceptions registered in the exception system; changes in collateral pledges in the loan system, etc. Examples of external data include financial news reports from third parties.
- the Event Monitor 76 submits the information regarding any risk event to the Risk Rule Engine 42 for evaluation by a rule or designated action relevant to the submitted event.
- the Event Monitor 76 may also have a periodic review function.
- the periodic review function will monitor the Risk Data Systems 14, or any other data sources that a user wishes the Risk System 40 to access, on a scheduled basis.
- An additional Event Filter 78 may be further provided for receiving data regarding selected risk events identified by accessing real-time data.
- the Event Filter 78 is in communication with the Risk Rule Engine 42, as well as the Risk Data Systems 14, either directly, or through System Interfaces 82. Real-time data is
- the Event Filter 78 submits only selected event information to the Risk Rule Engine 42 for evaluation by a rule relevant to the event.
- An Inquiry Dispatcher 80 may be provided as an interface computer software component having rules for dispatching inquiries to Risk Data Systems 14 through one or more of the System Interfaces 82 described below.
- the Inquiry may be provided as an interface computer software component having rules for dispatching inquiries to Risk Data Systems 14 through one or more of the System Interfaces 82 described below.
- Dispatcher 80 may be responsible for converting and/or mapping automated risk event requests to a form recognizable by a particular interface, and for interpreting the response.
- the Risk Rule Engine 42 may invoke the Inquiry Dispatcher 80 to collect or extract data as required during execution of rules associated with an event or a request.
- the Inquiry Dispatcher 80 may also be designed to direct some of the automatic processes of the Risk System 40, such as periodically reviewing the
- the Risk System 40 may comprise System Interfaces 82 for processing, accessing, managing and or routing infonnation from the various Risk
- the Risk System 40 requests and may respond to information from multiple sources, both internal and external to a financial institution. Information may be received in response to a risk event, a message initiated by another source, requests initiated by a user, or by the automated resources and functions of the risk management system. The risk management system responds to this information as dictated by the rules stored in the Risk Analysis File
- the System Interfaces 82 may be implemented as computer programs that that are run in various ways. For example, the System Interfaces 82 may be programmed for batch runs, where one of the System Interfaces 82 automatically performs a set task at a set time. The System Interfaces 82 may be programmed to access and manage real-time information provided by data feeds.
- the System Interfaces 82 may be implemented as computer programs that that are run in various ways. For example, the System Interfaces 82 may be programmed for batch runs, where one of the System Interfaces 82 automatically performs a set task at a set time. The System Interfaces 82 may be programmed to access and manage real-time information provided by data feeds.
- the System Interfaces 82 may be implemented as computer programs that are run in various ways. For example, the System Interfaces 82 may be programmed for batch runs, where one of the System Interfaces 82 automatically performs a set task at a set time. The System Interfaces 82 may be programmed to access and manage real-time information provided by data feeds.
- Interfaces 82 may further be programmed to inquire into the Risk Data Systems or other data sources to obtain a "snapshot" of the risk as it exists as a particular time.
- the System Interfaces 82 may include, but are not limited to:
- a Covenants Interface 84 provides access to the Covenants System by receiving risk events related to scheduled covenants and compliance status.
- An Exception Interface 86 provides access to the Exception System 20 by receiving selected exceptions as they are logged into the Exception System 20, and responds to inquiries from the Inquiry Dispatcher 80 or Risk Rule Engine 42 for exception information.
- a Loan Accounting Interface 88 provides access to the loan
- the Loan Accounting Interface 88 permits updated transactions to maintain risk-related criteria for performance-based pricing of loans.
- An Origination Interface 90 provides access to the Origination System
- a Trust Interface 92 provides access to the organization's trust account information as required for executing analysis rules.
- a Derivative Interface 94 provides access to a financial institution's
- Derivative System as required for executing risk assessment and risk evaluation rales.
- a Deposit Interface 96 provides access to a financial institution's deposit file by responding to inquiries for deposit, account balance, and transaction history information.
- a Live Datafeed Channel Interface 98 provides access to real-time content generated by Risk Data Systems 14 that deliver a data stream for ongoing transactions. Examples include spot prices and trades in equities, cunencies, futures, commodities, derivatives, indexes, and other services from which an ongoing transactional stream of data is provided.
- a Third Party Interface 100 provides access to external sources of data that can respond to inquiries for information. Examples include credit information
- the Risk System 40 may be designed using any or all of the interfaces provided herein.
- System Interfaces 82 may be implemented for each available Risk Data System 14, or for selected Risk Data Systems 82.
- the Risk System 40 may directly access information from the Risk Data Systems 14, without the use of interfaces.
- a Transaction submission Module 102 may be provided, for composing and submitting transactions in a form acceptable to the Loan Accounting System 18 for posting changes to loan terms that are affected by a risk component or event. For example, it may be necessary to post a change to the Loan Accounting System 18 regarding transactions to maintain risk-related criteria for performance- based pricing of loans.
- the Risk Rule Engine 42 will automatically prepare such changes for use in the Loan Accounting System 18, and these will be executed by the Transaction submission Module.
- a Risk Workflow Engine 104 is provided in communication with the Risk Rule Engine 42 for generating notification messages and reports, and initiating or maintaining workflow requests that are routable to system users responsible for actionable items identified by the Risk Rule Engine 42.
- the Risk Workflow Engine 104 provides services through the Notification Engine 108 and Risk Action Joblist 110 described herein. [0192] 1. Notification Engine
- the Notification Engine 42 further comprises a Notification Engine 108.
- the Notification Engine 108 provides a means for dispatching notification messages to users as a result of required actions automatically determined by the Risk Rule Engine 42.
- the Notification Engine 108 sends notification messages automatically to users based on parameters set in the Risk Rule Engine 42.
- Methods of notification through the Notification Engine 108 include, but are not limited to, email, pager, fax, text messages, etc. In this manner, a user is kept apprised of potential risk as identified by the system. [0194] 2. Risk Action Joblist
- the Risk Rule Engine 42 further comprises a means for users to keep track of and assign risk-related tasks.
- the Risk Rule Engine 42 further comprises a Risk Action Joblist 110.
- the Risk Action Joblist 110 provides access, through the Risk Workstation 112, to a list of ongoing or in-process actions assigned to a particular user of the system, or to be monitored by a user. For events identified by the risk management system as risk-related events, entries are added to a joblist file of each responsible user. The items in the joblist file are reported to the user via the Risk Action Joblist 110 function or the Risk Workstation 112. The user responds to these actions and reports status to the Risk Action Joblist 110 or routes the action to another user for resolution.
- Notification Engine 108 are designed to interpret real-time data provided by real-time data feeds.
- the Risk Workflow Engine 104, Risk Action Joblist 110 and Notification Engine 108 provide means to invoke user actions based upon risk events.
- the workflows created by these components of the risk management system provide users with lists of actions that need to be taken, or may be taken, based upon risk events.
- a Joblist will comprise actions items, providing a log for users.
- the Risk Workflow Engine 104, Risk Action Joblist 110 and Notification Engine 108 may be used to delegate actions that need to be taken by a user. These actions may be
- the Risk Rule Engine 42 communicates with users through at least one user interface presented on a user's computer desktop.
- the user interface is implemented as a Risk Workstation 112 comprising a user interface, such as a graphical user interface or GUI, which is a set of commands or menus through which a user communicates with a computer program via a personal computer.
- Communication is initiated by a user (i.e., by requesting information from the system, or changes to risk parameters), and by the risk system (by automatically providing notifications and canying out assigned actions). Users initiate inquiries through the Risk Workstation 112 to access risk management information, change parameters that affect risk evaluation, and respond to notifications and requested actions involving the risk management system.
- the Risk Workflow Engine can be used to generate necessary forms and documents, such as documents needed to comply with, for example, Basel legislation.
- This documentation generation function can be automated by a user of the system to create selected reports.
- a user accesses the risk assessment, and may view the information regarding the operational risk as a table, chart, pie chart, bar graph, etc., or other graphical or textual representation.
- the user may have the system present information regarding the severity of such a risk as compared to financial institutional factors.
- the Risk Workstation 112 may be further designed to provide reports and documentation, whether written or electronically, for users. The documentation process may be automated, so that certain documents are automatically generated by the system based upon a financial institution's particular needs, or preselected settings.
- the system of the present invention is capable of providing real-time assessment of risk to a user.
- a user is able to immediately capture and appreciate a level of risk associated with loans being serviced by a user as those risks occur.
- a goal of the risk management system of the present invention is to provide an ongoing system for monitoring the financial health of a financial institution as it relates to potential risks, and to provide tools for taking action to mitigate risk.
- the risk management system of the present invention may be grouped into components for detection of risk, analysis of risk, and control (or mitigating) of risk.
- the various Risk Data Systems, Systems Interfaces, Event Monitor and Event Filter act to detect risk.
- the Risk Rule Engine and Risk Analysis File act to analyze risk.
- the Risk Workflow Engine, Risk Action Joblist, and Notification Engine act to control risk.
- the risk management system of the present invention collects data that has otherwise been reviewed in an ad hoc manner, and provides a way to utilize that data to meaningfully assess and manage risk.
- the risk management system can analyze individual exceptions, as well as combinations of exceptions. For example, a combination of risks events may occur such as a financial portfolio having overdue payments, over margin collateral, and principal exceeding approved line. These can be analyzed in combination using the Risk System 40.
- the system is designed to process, among other types, operational, credit and strategic risks that result in exceptions. Operational risk exceptions could be minor exceptions that require such actions as sending a letter, or the conection of a portion of data. When considered individually, the true nature of exceptions may not be apparent.
- the Risk Workstation 112 of the system provides users the ability to select, such as by any acceptable means such as checking boxes or otherwise making selections from a file menu provided on a computer screen, various risk events to be analyzed.
- the Risk Workstation 112 may also have menus for various actions that may be executed at the user's request. By selecting combinations of risk events and system actions, risk may be analyzed in many ways.
- the Exception System 20 detects a deviation from the loan policy, and records the exception as a risk event.
- the Risk System 40 retrieves the data regarding the risk event from the Exception System 20.
- the Risk System 40 may retrieve the data regarding the risk event via the Event Monitor 76, or the Exception Interface 86, or the Inquiry Dispatcher 80.
- the Risk Rule Engine 42 may also be adapted to directly retrieve the data regarding the risk event from the Exception System 20.
- the Risk System 40 via the Risk Rule Engine 42, retrieves the risk analysis rule relevant to the risk event from the Risk Analysis File 44. According the risk analysis rule of this example, the Risk Rule Engine 42 directs the Loan Accounting Interface 88 to retrieve data regarding a particular client's loan from the Loan Accounting System 18.
- the loan Accounting Interface 88 forwards the requested data to the Risk Rule Engine 42 for risk assessment.
- the Risk Rule Engine 42 assesses the risk event against the client's loan policy data using any appropriate rules or data in the Risk Analysis File 44. Results of the risk assessment are forwarded to the Risk Workflow Engine 104.
- the Risk Workflow Engine 104 notifies a user of the risk assessment via the Notification Engine 108.
- the Risk Workflow Engine 104 may also update the Risk Action Joblist 110, assigning a task to a particular user related to the risk event and assessment of the risk event.
- a user accesses the results of the risk assessment via a Risk Workstation 112.
- Another example of the risk management system of the present invention at work would be the evaluation of ongoing risk related to a client's deposit information.
- the Risk Rule Engine 42 processes rules accessed from the Scheduled Analysis Repository 58 of the Risk Analysis File 44.
- the Risk Rule Engine 42 additionally processes, at a preselected time, a rule and/or routine relating to analyze deposits, for example a deposit analysis rule, that is scheduled on a nightly basis.
- the Risk Rule Engine 42 requests data relating to deposits from the Deposit Interface 96.
- the Deposit Interface 96 requests and receives information regarding deposits from the Deposit System 34.
- the Deposit Interface 96 forwards requested deposit data to the Risk Rule Engine 42.
- the Risk Rule Engine 42 accesses loan policy information for risk assessment as required by the deposit analysis rule.
- the Risk Rule Engine 42 evaluates deposit balances and deposit activity as compared to loan policy.
- the Risk Rule Engine 42 updates the Exposure Repository 62 with data regarding the deposit conditions. Any risk events detected during the processing of the deposit analysis rule are forwarded to the Results of the risk assessment are forwarded to the Risk Workflow Engine 104.
- the Risk Workflow Engine 104 notifies a user of the risk assessment via the Notification Engine 108.
- the Risk Workflow Engine 104 may also update the Risk Action Joblist 110, assigning a task to a particular user related to the risk event and assessment of the risk event.
- a user accesses the results of the risk assessment via a Risk Workstation 112.
- a credit alert may occur if a customer is requesting a loan while the customer's cunent loans have repayment issues, deposit balance deficiencies, significant third party rating changes, international domiciles, or similar issues.
- the loan policy is set to contain a rule that a credit alert triggers an exception. Once a credit alert occurs, the credit alert is noted to the Exception System 20.
- the Risk Rule Engine 42 accesses the information- stored in the Exception System 20 regarding the credit alert via the Exception Interface 86. In addition, the Event Monitor may automatically obtain information regarding the credit alert.
- the Risk Rule Engine 42 analyzes the credit alert based upon criteria set in the Risk Analysis File 44. The results of the analysis are forwarded to the Risk Workflow Engine 104 for eventual access by a user
- the Risk Rule Engine 42 may send a message
- the ability to anticipate or report on possible fraud efforts is another important aspect of the system.
- Another illustrative example of how the system can assess and manage risk would be the assessment of operational risks, such as documents not being available during origination, or inconect data entry, or an attempt to input new loan data as a loan approaches maturity. Any of these occurrences would be considered a deviation from the loan policy.
- the system channels any such operational risks to the Exception System 20, for access by the Risk Rule Engine 42 via the Exception Interface.
- the Risk Rule Engine 42 accesses the infonnation from the Exception System 20 regarding the operational risk.
- the Risk Rule Engine 42 may access and apply a formula from the Risk Calculator Repository of the Risk Analysis File 44 designed to calculate the magnitude or operational risk based upon the exception identified by the system.
- Credit risk and strategic risk may be identified and analyzed by the system by reviewing for one or more of many types of risk factors, such as country balances, increasing exposure to various balance positions, loan balance to deposit, loan balance to covenant, and deposit balance or credit rating. Formulas may be set in the Risk Calculator Repository to quantify such risks.
- Credit risk exceptions also come in many types, from limits, to legal filings, to covenants and the like. Strategic risk exceptions could be exceptions that identify deviations in areas, countries, industries, or loan products to name a few examples. Risks may also be considered in several categories, for what might be a strategic risk could be considered a credit risk as well. Operational risks can easily be thought to be credit risks. In an embodiment of the invention, operational risks are managed separate from the credit risk.
- the Risk Workstation 112 allows a user access to a vast amount of risk-related data.
- a group of predetermined screens and reports may be provided that may be tailored to the needs of a particular user.
- the reporting and presentation of information can have various formats, including, but not limited to, reports, charts, graphs, comparisons, etc. Different areas of a financial institution will have a desire to view the risks in a particular fashion.
- the Risk Workstation 112 is extremely flexible, and is equipped with analysis and display options to provide assurance of further detailed understanding.
- the Risk Workstation 112 is equipped to display many types of views and necessary steps according to the financial institution's determination.
- Optional reports may include a required action timetable, a summary by department or type, an automatic refenal to other individuals, or other options.
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2004316721A AU2004316721A1 (en) | 2004-02-23 | 2004-08-20 | Risk management system and method |
JP2006554080A JP2007523426A (en) | 2004-02-23 | 2004-08-20 | Risk management system and risk management method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/785,364 US20040267660A1 (en) | 2003-02-21 | 2004-02-23 | Risk management system |
US10/785,364 | 2004-02-23 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005086057A1 true WO2005086057A1 (en) | 2005-09-15 |
Family
ID=34919690
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2004/027323 WO2005086057A1 (en) | 2004-02-23 | 2004-08-20 | Risk management system and method |
Country Status (5)
Country | Link |
---|---|
US (1) | US20040267660A1 (en) |
JP (1) | JP2007523426A (en) |
CN (1) | CN1926569A (en) |
AU (1) | AU2004316721A1 (en) |
WO (1) | WO2005086057A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009531750A (en) * | 2006-03-28 | 2009-09-03 | アリババ グループ ホールディング リミテッド | Method and system for risk monitoring in online business |
Families Citing this family (120)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8571969B1 (en) | 2001-11-01 | 2013-10-29 | Marc Michael Groz | System, method and program product for contingent commitments |
WO2005017802A2 (en) * | 2003-08-15 | 2005-02-24 | Providus Software Solutions, Inc. | Risk mitigation and management |
US20050267835A1 (en) * | 2003-12-31 | 2005-12-01 | Scott Condron | System and method for evaluating exposure across a group of investment portfolios by category |
US7860880B2 (en) * | 2004-03-01 | 2010-12-28 | Peckar & Abramson, A Professional Corporation | System, method and process for managing problems and risks associated with a construction project using project-specific software and project notice forms relative to the construction contract |
US7574387B2 (en) * | 2004-03-04 | 2009-08-11 | Accenture Global Services Gmbh | Capital allocation and risk management |
US8131635B2 (en) * | 2004-04-20 | 2012-03-06 | Bank Of America Corporation | Method and system to manage a credit portfolio and to trigger credit actions |
US20060047561A1 (en) * | 2004-08-27 | 2006-03-02 | Ubs Ag | Systems and methods for providing operational risk management and control |
US7904306B2 (en) | 2004-09-01 | 2011-03-08 | Search America, Inc. | Method and apparatus for assessing credit for healthcare patients |
US20060059084A1 (en) * | 2004-09-16 | 2006-03-16 | Tucker Scott A | Method, system and computer program for on-demand short term loan processing |
US20060074928A1 (en) * | 2004-09-28 | 2006-04-06 | Microsoft Corporation | Selection based container listing |
US20060106690A1 (en) * | 2004-10-29 | 2006-05-18 | American International Group, Inc. | Lender evaluation system |
US7496964B2 (en) * | 2004-11-23 | 2009-02-24 | Bank Of America Corporation | Method and system for automated risk management of rule-based security |
US8499300B2 (en) * | 2004-12-20 | 2013-07-30 | Bank Of America Corporation | System and method for task management of rule based tasks |
US7783542B2 (en) | 2004-12-21 | 2010-08-24 | Weather Risk Solutions, Llc | Financial activity with graphical user interface based on natural peril events |
US7783544B2 (en) | 2004-12-21 | 2010-08-24 | Weather Risk Solutions, Llc | Financial activity concerning tropical weather events |
US7584134B2 (en) | 2004-12-21 | 2009-09-01 | Weather Risk Solutions, Llc | Graphical user interface for financial activity concerning tropical weather events |
US7584133B2 (en) | 2004-12-21 | 2009-09-01 | Weather Risk Solutions Llc | Financial activity based on tropical weather events |
US7783543B2 (en) | 2004-12-21 | 2010-08-24 | Weather Risk Solutions, Llc | Financial activity based on natural peril events |
US8266042B2 (en) | 2004-12-21 | 2012-09-11 | Weather Risk Solutions, Llc | Financial activity based on natural peril events |
US7693766B2 (en) | 2004-12-21 | 2010-04-06 | Weather Risk Solutions Llc | Financial activity based on natural events |
US8782087B2 (en) | 2005-03-18 | 2014-07-15 | Beyondcore, Inc. | Analyzing large data sets to find deviation patterns |
US7720822B1 (en) * | 2005-03-18 | 2010-05-18 | Beyondcore, Inc. | Quality management in a data-processing environment |
US10127130B2 (en) | 2005-03-18 | 2018-11-13 | Salesforce.Com | Identifying contributors that explain differences between a data set and a subset of the data set |
US8131636B1 (en) * | 2005-05-05 | 2012-03-06 | Ensenta Corporation | System and method for performing financial transactions on a network |
US7797230B1 (en) * | 2005-06-02 | 2010-09-14 | The Pnc Financial Services Group, Inc. | Systems and methods for credit management risk rating and approval |
US7774402B2 (en) * | 2005-06-29 | 2010-08-10 | Visa U.S.A. | Adaptive gateway for switching transactions and data on unreliable networks using context-based rules |
US7860767B1 (en) * | 2005-09-30 | 2010-12-28 | Morgan Stanley | Systems and methods for financing multiple asset classes of collateral |
JP2007114819A (en) * | 2005-10-18 | 2007-05-10 | Hitachi Ltd | Business evaluation system |
US20070130191A1 (en) * | 2005-11-18 | 2007-06-07 | Promontory Compliance Solutions, Llc | Method and system for analyzing effectiveness of compliance function |
US8280805B1 (en) | 2006-01-10 | 2012-10-02 | Sas Institute Inc. | Computer-implemented risk evaluation systems and methods |
US20070203759A1 (en) * | 2006-02-27 | 2007-08-30 | Guy Carpenter & Company | Portfolio management system with gradient display features |
US7711636B2 (en) | 2006-03-10 | 2010-05-04 | Experian Information Solutions, Inc. | Systems and methods for analyzing data |
US7912773B1 (en) * | 2006-03-24 | 2011-03-22 | Sas Institute Inc. | Computer-implemented data storage systems and methods for use with predictive model systems |
US7849003B2 (en) * | 2006-04-28 | 2010-12-07 | Efunds Corporation | Methods and systems for opening and funding a financial account online |
US8379830B1 (en) | 2006-05-22 | 2013-02-19 | Convergys Customer Management Delaware Llc | System and method for automated customer service with contingent live interaction |
US20080015977A1 (en) * | 2006-06-14 | 2008-01-17 | Curry Edith L | Methods of deterring fraud and other improper behaviors within an organization |
US8285636B2 (en) * | 2006-06-14 | 2012-10-09 | Curry Edith L | Methods of monitoring behavior/activity of an individual associated with an organization |
US11887175B2 (en) | 2006-08-31 | 2024-01-30 | Cpl Assets, Llc | Automatically determining a personalized set of programs or products including an interactive graphical user interface |
US8799148B2 (en) | 2006-08-31 | 2014-08-05 | Rohan K. K. Chandran | Systems and methods of ranking a plurality of credit card offers |
US8935380B2 (en) * | 2006-09-22 | 2015-01-13 | Oracle America, Inc. | Automated product knowledge catalog |
US8265965B2 (en) * | 2006-09-29 | 2012-09-11 | Chicago Mercantile Exchange, Inc. | Derivative products |
US8266026B2 (en) | 2006-09-29 | 2012-09-11 | Chicago Mercantile Exchange, Inc. | Derivative products |
US8036979B1 (en) | 2006-10-05 | 2011-10-11 | Experian Information Solutions, Inc. | System and method for generating a finance attribute from tradeline data |
US20080086342A1 (en) * | 2006-10-09 | 2008-04-10 | Curry Edith L | Methods of assessing fraud risk, and deterring, detecting, and mitigating fraud, within an organization |
US7899741B2 (en) | 2007-03-28 | 2011-03-01 | Bank Of America Corporation | Loss impact tracking system and method |
US20080294540A1 (en) | 2007-05-25 | 2008-11-27 | Celka Christopher J | System and method for automated detection of never-pay data sets |
US8126803B2 (en) * | 2007-07-09 | 2012-02-28 | Bank Of America Corporation | Automated float pricing for geographically distributed deposits and accounts |
US20090024539A1 (en) * | 2007-07-16 | 2009-01-22 | Decker Christopher L | Method and system for assessing credit risk in a loan portfolio |
US8050988B2 (en) * | 2007-10-24 | 2011-11-01 | Thomson Reuters Global Resources | Method and system of generating audit procedures and forms |
US8036980B2 (en) | 2007-10-24 | 2011-10-11 | Thomson Reuters Global Resources | Method and system of generating audit procedures and forms |
US20090018885A1 (en) * | 2007-11-21 | 2009-01-15 | Parales Joseph D | Risk management and compliance system and related methods |
US8504452B2 (en) * | 2008-01-18 | 2013-08-06 | Thomson Reuters Global Resources | Method and system for auditing internal controls |
US20100010926A1 (en) * | 2008-05-02 | 2010-01-14 | Eckert Neil D | System, method and instrument for managing margin requirements |
US8521631B2 (en) * | 2008-05-29 | 2013-08-27 | Sas Institute Inc. | Computer-implemented systems and methods for loan evaluation using a credit assessment framework |
JP2009301236A (en) * | 2008-06-11 | 2009-12-24 | Nomura Research Institute Ltd | Mediation device for credit information organization |
US8626645B1 (en) * | 2008-07-01 | 2014-01-07 | Mortagage Grader, Inc. | System and method for assessing mortgage broker and lender compliance |
US7991689B1 (en) | 2008-07-23 | 2011-08-02 | Experian Information Solutions, Inc. | Systems and methods for detecting bust out fraud using credit data |
US9256904B1 (en) | 2008-08-14 | 2016-02-09 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US8126857B2 (en) * | 2008-09-12 | 2012-02-28 | Melissa Data Corp. | Proactive information monitoring systems and methods |
US8412593B1 (en) | 2008-10-07 | 2013-04-02 | LowerMyBills.com, Inc. | Credit card matching |
US20100100468A1 (en) * | 2008-10-20 | 2010-04-22 | Spector Omri | System and method for multi layer rule processing background |
US8452841B2 (en) * | 2008-12-16 | 2013-05-28 | Bank Of America Corporation | Text chat for at-risk customers |
US8452681B2 (en) * | 2009-02-13 | 2013-05-28 | Thomson Financial, LLC | System and method for improved rating and modeling of asset backed securities |
CA2681251A1 (en) * | 2009-09-30 | 2011-03-30 | Royal Bank Of Canada | System and method for monitoring securities compliance for related entities |
US8700522B2 (en) * | 2009-10-30 | 2014-04-15 | Accenture Global Services Limited | Loan portfolio management tool |
US20110238566A1 (en) * | 2010-02-16 | 2011-09-29 | Digital Risk, Llc | System and methods for determining and reporting risk associated with financial instruments |
US9652802B1 (en) | 2010-03-24 | 2017-05-16 | Consumerinfo.Com, Inc. | Indirect monitoring and reporting of a user's credit data |
SG186910A1 (en) | 2010-07-09 | 2013-02-28 | Visa Int Service Ass | Gateway abstraction layer |
US8930262B1 (en) | 2010-11-02 | 2015-01-06 | Experian Technology Ltd. | Systems and methods of assisted strategy design |
US9147042B1 (en) | 2010-11-22 | 2015-09-29 | Experian Information Solutions, Inc. | Systems and methods for data verification |
US9558519B1 (en) | 2011-04-29 | 2017-01-31 | Consumerinfo.Com, Inc. | Exposing reporting cycle information |
EP2710545A4 (en) * | 2011-05-18 | 2014-12-31 | Credibility Corp | System and methods for producing a credit feedback loop |
JP6399280B2 (en) * | 2011-07-29 | 2018-10-03 | 日本電気株式会社 | Collation / search system, collation / search server, image feature extraction device, collation / search method and program |
US20130138554A1 (en) * | 2011-11-30 | 2013-05-30 | Rawllin International Inc. | Dynamic risk assessment and credit standards generation |
US10796232B2 (en) | 2011-12-04 | 2020-10-06 | Salesforce.Com, Inc. | Explaining differences between predicted outcomes and actual outcomes of a process |
US10802687B2 (en) | 2011-12-04 | 2020-10-13 | Salesforce.Com, Inc. | Displaying differences between different data sets of a process |
US8478688B1 (en) * | 2011-12-19 | 2013-07-02 | Emc Corporation | Rapid transaction processing |
US10255598B1 (en) | 2012-12-06 | 2019-04-09 | Consumerinfo.Com, Inc. | Credit card account data extraction |
US9697263B1 (en) | 2013-03-04 | 2017-07-04 | Experian Information Solutions, Inc. | Consumer data request fulfillment system |
WO2015153290A1 (en) * | 2014-04-01 | 2015-10-08 | Risk Management Solutions, Inc. | Computer system for catastrophic event management |
CN103886501B (en) * | 2014-04-08 | 2017-04-26 | 苏州大学 | Post-loan risk early warning system based on semantic sentiment analysis |
US9922324B2 (en) | 2014-05-21 | 2018-03-20 | Square, Inc. | Verified purchasing by email |
US10776809B1 (en) | 2014-09-11 | 2020-09-15 | Square, Inc. | Use of payment card rewards points for an electronic cash transfer |
US10169816B2 (en) * | 2015-01-06 | 2019-01-01 | Morgan Stanley Services Group Inc. | Trading anomaly kill switch |
US11042863B1 (en) | 2015-03-20 | 2021-06-22 | Square, Inc. | Grouping payments and payment requests |
CN104866957A (en) * | 2015-05-11 | 2015-08-26 | 国家电网公司 | Monitoring system of finance business data |
US10275320B2 (en) * | 2015-06-26 | 2019-04-30 | Commvault Systems, Inc. | Incrementally accumulating in-process performance data and hierarchical reporting thereof for a data stream in a secondary copy operation |
TWI578262B (en) * | 2015-08-07 | 2017-04-11 | 緯創資通股份有限公司 | Risk assessment system and data processing method |
CN105335890B (en) * | 2015-08-11 | 2019-08-23 | 济宁融拓电子科技有限公司 | A kind of communication system |
EP3136330A1 (en) * | 2015-08-28 | 2017-03-01 | Mastercard International Incorporated | Assessing credit risk |
US10467615B1 (en) | 2015-09-30 | 2019-11-05 | Square, Inc. | Friction-less purchasing technology |
US10348816B2 (en) | 2015-10-14 | 2019-07-09 | Adp, Llc | Dynamic proxy server |
US10757154B1 (en) | 2015-11-24 | 2020-08-25 | Experian Information Solutions, Inc. | Real-time event-based notification system |
US10762559B2 (en) * | 2016-04-15 | 2020-09-01 | Adp, Llc | Management of payroll lending within an enterprise system |
US10679167B1 (en) * | 2016-10-14 | 2020-06-09 | Wells Fargo Bank, N.A. | Policy exception risk determination engine with visual awareness guide |
TWI674544B (en) * | 2016-12-29 | 2019-10-11 | 第一商業銀行股份有限公司 | Intelligent product marketing method and system |
BR112019015920A8 (en) | 2017-01-31 | 2020-04-28 | Experian Inf Solutions Inc | massive heterogeneous data ingestion and user resolution |
CN108460681B (en) | 2017-02-20 | 2020-07-03 | 阿里巴巴集团控股有限公司 | Risk management and control method and device |
US10735183B1 (en) | 2017-06-30 | 2020-08-04 | Experian Information Solutions, Inc. | Symmetric encryption for private smart contracts among multiple parties in a private peer-to-peer network |
CN109409892A (en) * | 2017-08-15 | 2019-03-01 | 凡普互金有限公司 | Methods of risk assessment and system |
CN107993144A (en) * | 2017-11-30 | 2018-05-04 | 平安科技(深圳)有限公司 | Customer risk grade determines method, apparatus, equipment and readable storage medium storing program for executing |
CN108416506B (en) * | 2018-02-07 | 2022-08-02 | 平安科技(深圳)有限公司 | Client risk level management method, server and computer readable storage medium |
TWI674507B (en) * | 2018-03-21 | 2019-10-11 | 合作金庫商業銀行股份有限公司 | Sudden disaster immediate inspection system |
CN108537673A (en) * | 2018-04-16 | 2018-09-14 | 新疆润物网络有限公司 | One kind is based on import documents availability of data chain financing assessment system and method |
US20190370894A1 (en) * | 2018-06-01 | 2019-12-05 | Aon Global Operations Ltd. (Singapore Branch) | Systems, Methods, and Platform for Catastrophic Loss Estimation |
CN109242151A (en) * | 2018-08-15 | 2019-01-18 | 蜜小蜂智慧(北京)科技有限公司 | A kind of method and device of determining blacklist |
CN109214683A (en) * | 2018-09-06 | 2019-01-15 | 平安科技(深圳)有限公司 | A kind of Application of risk decision method and device |
CN109377003A (en) * | 2018-09-21 | 2019-02-22 | 泰康保险集团股份有限公司 | Risk control method and device, computer readable storage medium, electronic equipment |
CN109523124A (en) * | 2018-10-15 | 2019-03-26 | 平安科技(深圳)有限公司 | Asset data processing method, device, computer equipment and storage medium |
CN109636565A (en) * | 2018-10-16 | 2019-04-16 | 深圳壹账通智能科技有限公司 | Processing method, device, equipment and the computer readable storage medium of risk data |
CN110059939A (en) * | 2018-12-13 | 2019-07-26 | 成都亚信网络安全产业技术研究院有限公司 | A kind of risk checking method and device |
WO2020146667A1 (en) | 2019-01-11 | 2020-07-16 | Experian Information Solutions, Inc. | Systems and methods for secure data aggregation and computation |
KR102052106B1 (en) * | 2019-03-18 | 2019-12-04 | 이승태 | Financial risk management system |
US20210004899A1 (en) * | 2019-07-01 | 2021-01-07 | Andy Zuttah | Methods and Systems for Processing Commercial Loan Requests based on Certain Sources of Repayment |
CN110691084A (en) * | 2019-09-27 | 2020-01-14 | 武汉极意网络科技有限公司 | Adaptation method and device of wind control rule engine |
US20210201400A1 (en) * | 2019-12-27 | 2021-07-01 | Lendingclub Corporation | Intelligent servicing |
CN112348664B (en) * | 2020-10-28 | 2024-04-16 | 富邦华一银行有限公司 | Credit credit management system supporting automatic early warning |
CN112598519A (en) * | 2020-12-28 | 2021-04-02 | 深圳市佑荣信息科技有限公司 | System and method for accounts receivable pledge transfer registered property based on NLP technology |
CN113256408A (en) * | 2021-07-06 | 2021-08-13 | 中证信用云科技(深圳)股份有限公司 | Risk control method and system based on consumption finance and computer equipment |
US11823191B1 (en) | 2022-08-29 | 2023-11-21 | Block, Inc. | Integration for performing actions without additional authorization requests |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6208973B1 (en) * | 1998-02-27 | 2001-03-27 | Onehealthbank.Com | Point of service third party financial management vehicle for the healthcare industry |
US20020194120A1 (en) * | 2001-05-11 | 2002-12-19 | Russell Jeffrey J. | Consultative decision engine method and system for financial transactions |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6430545B1 (en) * | 1998-03-05 | 2002-08-06 | American Management Systems, Inc. | Use of online analytical processing (OLAP) in a rules based decision management system |
US6898574B1 (en) * | 1998-11-09 | 2005-05-24 | John Francis Regan | Lender and insurer transaction processing system and method |
JP4610732B2 (en) * | 2000-12-27 | 2011-01-12 | 株式会社三井住友銀行 | Loan management system and method |
US8140415B2 (en) * | 2001-03-20 | 2012-03-20 | Goldman Sachs & Co. | Automated global risk management |
AU2002329741A1 (en) * | 2001-08-13 | 2003-03-03 | Gresham Financial Services, Inc. | Loan securitization pool having pre-defined requirements |
JP4183408B2 (en) * | 2001-09-28 | 2008-11-19 | 富士通株式会社 | Securities selection support method, asset management solicitation method, securities selection support program, asset management solicitation program, and securities selection support device |
-
2004
- 2004-02-23 US US10/785,364 patent/US20040267660A1/en not_active Abandoned
- 2004-08-20 CN CNA2004800420411A patent/CN1926569A/en active Pending
- 2004-08-20 WO PCT/US2004/027323 patent/WO2005086057A1/en active Application Filing
- 2004-08-20 AU AU2004316721A patent/AU2004316721A1/en not_active Abandoned
- 2004-08-20 JP JP2006554080A patent/JP2007523426A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6208973B1 (en) * | 1998-02-27 | 2001-03-27 | Onehealthbank.Com | Point of service third party financial management vehicle for the healthcare industry |
US20020194120A1 (en) * | 2001-05-11 | 2002-12-19 | Russell Jeffrey J. | Consultative decision engine method and system for financial transactions |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009531750A (en) * | 2006-03-28 | 2009-09-03 | アリババ グループ ホールディング リミテッド | Method and system for risk monitoring in online business |
US10839328B2 (en) | 2006-03-28 | 2020-11-17 | Advanced New Technologies Co., Ltd. | Method and system for risk monitoring in online business |
Also Published As
Publication number | Publication date |
---|---|
AU2004316721A1 (en) | 2005-09-15 |
US20040267660A1 (en) | 2004-12-30 |
JP2007523426A (en) | 2007-08-16 |
CN1926569A (en) | 2007-03-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20040267660A1 (en) | Risk management system | |
AU2011200605B2 (en) | Methods and systems for managing risk managment information | |
US8706615B2 (en) | Systems and methods for evaluating the ability of borrowers to repay loans | |
US20070198401A1 (en) | System and method for automatic evaluation of credit requests | |
Siekkinen | Board characteristics and the value relevance of fair values | |
US20090006267A1 (en) | Systems and methods for compliance screening and account management in the financial services industry | |
US7996293B2 (en) | Methods and systems for monitoring, analyzing and reporting information in association with collateralized financial instruments | |
US20050080701A1 (en) | Methods and systems for managing risk management information | |
US20120023007A1 (en) | System and method for consolidation of commercial and professional underwriting | |
JP2003016261A (en) | Total financing managing system, credit scoring deciding system and credit guarantee managing system | |
US7822680B1 (en) | System and method for managing data pertaining to a plurality of financial assets for multifamily and housing developments | |
JP4246658B2 (en) | Loan management system | |
Odonkor | An assessment of credit risk management practices of Adansi Rural Bank Limited | |
Kamande | The Effect of Electronic Banking on the Financial Performance of Commercial Banks in Kenya | |
US20090070169A1 (en) | Value added business monitoring and reporting systems and methods | |
KR20090001917A (en) | System and method for early warning on credit customer and program recording medium | |
KR20090086370A (en) | System for processing credit customer grading | |
KR20090001940A (en) | System and method for preliminarily selecting insolvent credit transaction company and program recording medium | |
Dunia | Asset Quality and the Financial Performance of Commercial Banks in DRC | |
Ayertey Odonkor | An Assessment of Credit Risk Management Practices of Adansi Rural Bank Limited | |
KR102135457B1 (en) | Apparatus for supporting invest banking | |
Omwancha | The Effect of Non-funded Income on the Risk of Commercial Banks in Kenya | |
Nguyen | Credit risk control for loan products in commercial banks. Case: BIDV | |
IBANGA et al. | Assessment of Risk Management and Credit Administration in Access Bank, Ikot Ekpene Local Government Area | |
Okezie et al. | Compliance Costs and Financial Performance of Deposit Money Banks in Nigeria |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2006554080 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200480042041.1 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004316721 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1118/MUMNP/2006 Country of ref document: IN |
|
ENP | Entry into the national phase |
Ref document number: 2004316721 Country of ref document: AU Date of ref document: 20040820 Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 2004316721 Country of ref document: AU |
|
122 | Ep: pct application non-entry in european phase |