Claims
- 1. A method of providing standardized transmission of data comprising:
formatting an electronic request from one or more user by translating data contained in the request into an object recognizable by one or more platform of one or more non-affiliated user; and automatically building one or more connection for one or more platform used by the user to communicate with the platform of the non-affiliated user.
- 2. The method of claim 1 wherein the user transmits the request from a channel device and said formatting preserving a communication infrastructure of the device.
- 3. The method of claim 2 wherein the device accesses business functionality with a message protocol native to the device.
- 4. The method of claim 1 wherein the formatting is performed by an adapter.
- 5. The method of claim 4 wherein the adapter generates a session.
- 6. The method of claim 5 wherein the adapter generates a map of the session.
- 7. The method of claim 5 wherein the adapter generates and assigns a unique identifier to at least one request and or response.
- 8. The method of claim 7 wherein the adapter logs the identifiers.
- 9. The method of claim 5 wherein the adapter creates one or more unique session object, said object facilitating switching from one or more than one application based on the request.
- 10. The method of claim 9 wherein the adapter processes the request using a single sign-on from the user.
- 11. The method of claim 9 wherein the adapter creates one or more file selected from the group consisting of a log, a journal, and an error report based on the object.
- 12. The method of claim 9 wherein no user has access to the object of another user.
- 13. The method of claim 9 wherein the adapter associates the object with one or more than one device, user, activity, request, response, internal system, external system, internal module, and external module.
- 14. The method of claim 9 wherein the object is used by a second application.
- 15. The method of claim 9 wherein the adapter uses the object to proxy the session to a second system.
- 16. The method of claim 9 wherein the adapter uses the object to determine an internal security application.
- 17. The method of claim 9 wherein the object contains contextual data.
- 18. The method of claim 17 wherein the contextual data is associated with channel interaction, internal processing, and one or more than one external system of record.
- 19. The method of claim 18 wherein the contextual data is one or more that one of a channel device ID, a session key, a service provider ID, and authentication information.
- 20. The method of claim 17 wherein the contextual data is maintained in one or more than one internal security application, external security application and credential storage facility.
- 21. The method of claim 17 wherein the contextual data is maintained for a time equal to the duration of the session.
- 22. The method of claim 9 wherein the adapter links one or more request and or response to create a log of one or more than dialog of one or more user and or non-affiliated user.
- 23. The method of claim 9 wherein a user generates a connection ID if an external system does not generate one, the adapter using said connection ID to proxy the session to one or more second user.
- 24. The method of claim 23 wherein the adapter uses the connection ID to create a log of one or more than one interface point for a specific dialog.
- 25. The method of claim 9 wherein the adapter uses the object to validate one or more than one subsequent interaction with a device associated with the user or an interface point.
- 26. The method of claim 25 wherein the validation determines one or more than one level of authorization.
- 27. The method of claim 9 wherein the adapter codes an authorization path in the object.
- 28. The method of claim 25 or claim 27 wherein the adapter manages authorization for one or more than one user, device, request, interface, and response.
- 29. The method of claim 9 wherein the adapter caches the object.
- 30. The method of claim 9 wherein the adapter stores one or more object in a central location to support fail over.
- 31. The method of claim 29 or claim 30 wherein the cache or store comprises information concerning role and or one or more rule associated with the session.
- 32. The method of claim 9 wherein the adapter links one or more session to manage the dialog of the session in real time and or off line.
- 33. The method of claim 32 wherein the adapter creates a file of the linked interactions.
- 34. The method of claim 33 wherein the file is a report and or a security file.
- 35. The method of claim 5 wherein the adapter uses a model driven architecture to interface to an existing point to point architecture.
- 36. The method of claim 35 wherein the architecture comprises a platform-independent model and one or more platform-specific model and interface definition set, each describing how the base model is implemented.
- 37. The method of claim 35 wherein functionality and behavior are modeled one time.
- 38. The method of claim 35 wherein interoperability with a future service is automatic.
- 39. The method of claim 1 wherein data is translated into an XML format.
- 40. The method of claim 1 wherein the transmission includes one or more mechanism selected from the group consisting of authorization, authentication, secure communication, and non-repudiation.
- 41. The method of claim 1 wherein the transmission is between a trusted connection and an untrusted connection.
- 42. The method of claim 41 wherein a first user is a web bank and a second user is a demand deposit account (DDA) system.
- 43. The method of claim 41 wherein an internal security application for a credential is present and no session is generated.
- 44. The method of claim 41 wherein a first user is an ATM and the second user is a DDA.
- 45. The method of claim 41 wherein an internal security application for a credential is present and a session is generated.
- 46. The method of claim 1 wherein the transmission is between an untrusted connection and a second untrusted system.
- 47. The method of claim 46 wherein a first user is a teller and a second user is a DDA.
- 48. The method of claim 46 wherein an external security application for a credential is present and no session is generated.
- 49. The method of claim 46 wherein an external security application for a credential is present and a session is generated.
- 50. The method of claim 1 wherein the adapter generates code for the creation of a translator object from meta data.
- 51. The method of claim 1 wherein output from a Graphic User Interface (GUI) mapping tool generates one or more translator.
- 52. The method of claim 1 wherein translation occurs between and among 1) a request being made, 2) a device the request is being made from, 3) an owner of the device making the request, 4) an agent device, service provider or infrastructure making the request, 5) a credential and or a security element presented, and 6) the service provider and or owner of the system or systems containing the information of record for the request.
- 53. The method of claim 1 wherein non-repudiation is established by integrating and or aggregating one or more external security application into a single service providing authentication and or authorization.
- 54. The method of claim 9 wherein the adapter interacts with one or more internal security system and or external security system to access one or more security management application.
- 55. The method of claim 54 wherein the security management application is one or more than one of a Resource Access Control Facility (RacF), an Access Control Facility (ACF2), a Public Key Infrastructure (PKI), and a Lightweight Directory Access Protocol (LDAP).
- 56. The method of claim 54 wherein the security management application is one or more than one of a biometrics, a digital certificate, a PKI, an LDAP, and a smart card.
- 57. A method of providing standardized transmission of data using a single sign-on from a user comprising:
formatting an electronic request by translating data contained in the request, said request transmitted from one or more user; preserving a communication infrastructure of the user, producing an object recognizable by one or more platform of one or more non-affiliated user; automatically building one or more connection for one or more platform used by the user to communicate with the platform of the non-affiliated user; transmitting at least one of one or more request and one or more response; generating a session; creating a map of the session; generating at least one unique identifier for each request and response; logging the identifiers; generating one or more unique session object, said object associated with the user non-accessible to the non-affiliated user, said object associated with the non-affiliated user non-accessible to the user, said object facilitating switching from one or more than one application based on the request; and creating one or more file selected from the group consisting of a log, a journal, and an error report based on the object.
- 58. A system providing standardized transmission of data comprising an adapter to provide an interface to one or more user, said adapter translating either or both of a non-native request and/or a non-native response to the request to and from a normalized format or to a format needed for processing the request and or response.
- 59. The system of claim 58 wherein the adapter uses a model driven architecture to interface to an existing point to point architecture.
- 60. The system of claim 59 wherein the architecture comprises a platform-independent model and one or more platform-specific model and interface definition set, each describing how the base model is implemented.
- 61. The system of claim 58 wherein functionality and behavior are modeled one time.
- 62. The system of claim 58 wherein interoperability with a future service is automatic.
- 63. The system of claim 58 further comprising a session manager for maintaining contextual data associated with channel interaction, internal processing, and one or more than one external system of record.
- 64. The system of claim 63 wherein the data is maintained in one or more than one internal security application, external security application and credential storage facility.
- 65. The system of claim 63 wherein the contextual data is maintained for a time equal to the duration of the session.
- 66. The system of claim 63 wherein the data is one or more that one of a channel device ID, a session key, a service provider ID, and authentication information.
- 67. The system of claim 58 wherein the adapter creates one or more unique session object, said object facilitating switching from one or more than one application based on the request and or response.
- 68. The system of claim 67 wherein the adapter processes the request using a single sign-on from the user.
- 69. The system of claim 67 wherein the adapter creates one or more file selected from the group consisting of a log, a journal, and an error report based on the object.
- 70. The system of claim 67 wherein no user has access to the object of another user.
- 71. The system of claim 67 wherein the adapter associates the object with one or more than one device, user, activity, request, response, internal system, external system, internal module, and external module.
- 72. The system of claim 67 wherein the object is used by a second application.
- 73. The system of claim 67 wherein the adapter uses the object to proxy the session to a second system.
- 74. The system of claim 67 wherein the adapter uses the object to determine an internal security application.
- 75. The system of claim 67 wherein the adapter links one or more request and or response to create a log of a dialog of one or more user.
- 76. The system of claim 67 wherein a user generates a connection ID if an external system does not generate one, the adapter using said connection ID to proxy the session to one or more second user.
- 77. The system of claim 76 wherein the adapter uses the connection ID to create a log of one or more than one interface point for a specific dialog.
- 78. The system of claim 67 wherein the adapter uses the object to validate one or more than one subsequent interaction with a device associated with the user or an interface point.
- 79. The system of claim 78 wherein the validation determines one or more than one level of authorization.
- 80. The system of claim 67 wherein the adapter codes an authorization path in the object.
- 81. The system of claim 78 or claim 80 wherein the adapter manages authorization for one or more than one user, device, request, interface, and response.
- 82. The system of claim 67 wherein the adapter caches the object.
- 83. The system of claim 67 wherein the adapter stores one or more object in a central location to support fail over.
- 84. The system of claim 82 or claim 83 wherein the cache or store comprises information concerning role and or one or more rule associated with the session.
- 85. The system of claim 67 wherein the adapter links one or more session to manage the dialog of the session in real time and or off line.
- 86. The system of claim 85 wherein the adapter creates a file of the linked interactions.
- 87. The system of claim 86 wherein the file is a report and or a security file.
- 88. The system of claim 58 wherein the normalized format is an XML format.
- 89. The system of claim 58 wherein the adapter interfaces to trusted and or untrusted users and comprises one or more than one authorization, authentication, secure communications, and non-repudiation.
- 90. The system of claim 58 wherein the adapter generates code for the creation of a translator object from meta data.
- 91. The system of claim 58 wherein output from a Graphic User Interface (GUI) mapping tool generates one or more translator.
- 92. The system of claim 58 wherein translation occurs between and among 1) a request being made, 2) a device the request is being made from, 3) an owner of the device making the request, 4) an agent device, service provider or infrastructure making the request, 5) a credential and or a security element presented, and 6) the service provider and or owner of the system or systems containing the information of record for the request.
- 93. The system of claim 58 wherein non-repudiation is established by integrating and or aggregating one or more external security application into a single service providing authentication and or authorization.
- 94. The system of claim 58 wherein the adapter interacts with one or more internal security system and or external security system to access one or more security management application.
- 95. The system of claim 94 wherein the security management application is one or more than one of a Resource Access Control Facility (RacF), an Access Control Facility (ACF2), a Public Key Infrastructure (PKI), and a Lightweight Directory Access Protocol (LDAP).
- 96. The system of claim 94 wherein the security management application is one or more than one of a biometrics, a digital certificate, a PKI, an LDAP, and a smart card.
- 97. A system providing standardized transmission of data based on a single sign-on from a user comprising:
an adapter to provide an interface to one or more user, said adapter translating either or both of a non-native request and/or a non-native response to the request to and from a normalized format or to a format needed for processing the request and or response, said adapter using a model driven architecture to interface to an existing point to point architecture; a session manager for maintaining contextual data associated with at least one of channel interaction, internal processing, and one or more than one external system of record, said data maintained in one or more than one internal security application, external security application and credential storage facility; one or more unique session object, said object associated with the user non-accessible to a second user, said object associated with the second user non-accessible to the user, said object facilitating switching from one or more than one application based on the request and or response, said object used to validate one or more than one subsequent interaction with a device associated with the user or an interface point to determine one or more than one level of authorization; one or more file selected from the group consisting of a log, a journal, and an error report based on the object; one or more link from and to one or more session, said link managing a dialog of the session in real time and or off line; and one or more than one of an authorization, authentication, secure communication, and non-repudiation.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application is a continuation in part of co-pending application Ser. No. 10/283,038 filed on Oct. 25, 2002, DIALECT INDEPENDENT MULTI-DIMENSIONAL INTEGRATOR USING A NORMALIZED LANGUAGE PLATFORM AND SECURE CONTROLLED ACCESS, and a continuation in part of co-pending application Ser. No. 09/578,329 filed on Feb. 25, 2000, SECURE E-COMMERCE SYSTEM WITH GUARANTEED FUNDS AND NET SETTLEMENT.
Continuations (1)
|
Number |
Date |
Country |
| Parent |
10283038 |
Oct 2002 |
US |
| Child |
10459694 |
Jun 2003 |
US |
Continuation in Parts (1)
|
Number |
Date |
Country |
| Parent |
09578329 |
May 2000 |
US |
| Child |
10459694 |
Jun 2003 |
US |