Patent application number | Description | Published |
20080209507 | MOBILE AUTHORIZATION USING POLICY BASED ACCESS CONTROL - An authorization engine is provided in a remote device for mobile authorization using policy based access control. To ensure that remote devices can enforce consistent authorization policies even when the devices are not connected to the server, the remote device downloads the relevant authorization policies when the business objects are downloaded and enforces the policies when operations are invoked. The memory footprint of downloadable authorization policies is reduced to fit onto a resource-constrained remote device. A policy evaluation engine interprets and enforces the downloaded policies on the remote device using only the limited computational resources of the remote device. | 08-28-2008 |
20090300072 | ADAPATIVE AND DYNAMIC DATA SYNCHRONIZATION SYSTEM FOR MANAGING DATA AND INVENTORY - A system and method for adaptive and dynamic synchronization includes a data synchronization controller which enables synchronization of a plurality of different data types between a main computer and one or more remotely disposed computer elements. The controller includes an orchestrator which responds to requests for data synchronization for components in accordance with predetermined policies maintained by a policy management system. A synchronization interface is controlled by the orchestrator in accordance with the policies to select a synchronization engine to service requests for synchronization of different data types from the orchestrator. Synchronization may be handled for on demand and/or for on schedule requests for synchronization in the policy-based system and method. | 12-03-2009 |
20100293594 | Mobile Authorization Using Policy Based Access Control - An authorization engine is provided in a remote device for mobile authorization using policy based access control. To ensure that remote devices can enforce consistent authorization policies even when the devices are not connected to the server, the remote device downloads the relevant authorization policies when the business objects are downloaded and enforces the policies when operations are invoked. The memory footprint of downloadable authorization policies is reduced to fit onto a resource-constrained remote device. A policy evaluation engine interprets and enforces the downloaded policies on the remote device using only the limited computational resources of the remote device. | 11-18-2010 |
20110083120 | MODELING AND LINKING DOCUMENTS FOR PACKAGED SOFTWARE APPLICATION CONFIGURATION - One or more document templates defining deployment procedures associated with deploying a packaged software application are obtained. One or more objects are created representing the one or more document templates and one or more elements of the one or more documents, and one or more links between the one or more objects are created. The one or more links represent one or more relationships between the created one or more objects. The one or more objects and the one or more links may be stored and/or output in a selected format. | 04-07-2011 |
20110099470 | HARVESTING ASSETS FOR PACKAGED SOFTWARE APPLICATION CONFIGURATION - Harvesting assets for packaged application practices, in one aspect, may include obtaining one or more work products associated with deployment of packaged software applications, extracting content and style, enhancing content and style with models of work products, and storing assets in asset repository. | 04-28-2011 |
20110282710 | ENTERPRISE RISK ANALYSIS SYSTEM - A system for analyzing enterprise risks is provided and includes a first subsystem to permit creation of enterprise risk management (ERM) templates and modification thereof into instances of searchable and retrievable ERM content, a second subsystem to permit visualization and editing of the ERM content, a plurality of integrated analysis tools and an ERM work product generator supported by the first and second subsystems to produce ERM analytical results and ERM work product based on the ERM content and a platform. | 11-17-2011 |
20120116839 | ENTERPRISE RISK ANALYSIS SYSTEM - A system is provided in which multiple sub-organizations are part of a parent organization and participate in common risk management. The system includes a first sub-system whereby each sub-organization provides a risk assessment, a second sub-system whereby the risk assessment of each sub-organization is converted into a risk assessment of the parent organization and a third sub-system whereby the respective risk assessments of the sub-organizations and the parent organization are employed for additional analysis. | 05-10-2012 |
20130174123 | SYSTEM AND METHOD FOR APPLICATION CONFIGURATION COMPARISON AND REUSE - A system and method allow a user to extract the set of customizations performed on an application and use these to estimate the time and effort and cost of (a) migrating to a new version of the application and/or (b) consolidating systems. The user can browse the extracted data and select configuration elements for re-use. After downloading the one or more configurations and comparing them, the user selects elements of the configurations for re-use. The first step is to scan one or more application systems and extract the configuration data using a surveyor. The method according to the invention automatically identifies configuration differences. The user then selects configuration elements for re-use. A graphic user interface (GUI) can be provided which allows the user to make these selections by dragging and dropping selected elements to a “To Be” configuration. The selected configurations are then uploaded and installed on an instance of the application. | 07-04-2013 |