Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Methods and systems for policy statement execution engine

a technology of policy statement and execution engine, which is applied in the field of compliance monitoring of electronic enterprise transactions, can solve the problems of affecting the integrity of transactions and reporting of an enterprise, affecting the integrity of business systems, and affecting the integrity of business transactions, so as to reduce asset losses, increase operational effectiveness, and increase corporate and shareholder confiden

Inactive Publication Date: 2008-04-03
KENNIS PETER H +7
View PDF38 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

"The present invention relates to a computer-executable policy statement execution engine for use in a computerized transaction compliance monitoring system. The engine detects exceptions to policies expressed in computer-executable policy statements by retrieving data from a data storage device and evaluating indicators in the policy statements. The engine can detect and respond to potential policy violations in real-time, providing a valuable tool for managing enterprise policies. The invention also includes a system for monitoring electronic transactions and reporting policy exceptions to authorized users. The invention can be used in conjunction with various data sources such as ERP systems, enterprise application systems, external data sources, and information technology infrastructure data."

Problems solved by technology

However, automated business systems are subject to errors, misuse, and fraud, just like manual, unautomated systems.
Furthermore, automated business systems can open the door for business “hacks” resulting in asset misappropriation and significant financial losses.
Both intentional and unintentional problems can jeopardize the integrity of transactions and reporting of an enterprise.
Vulnerabilities in electronic transaction systems can: (1) permit access to target business applications to launch fraudulent schemes, (2) unknowingly introduce system errors that affect asset appropriation, such as create duplicate payments, or (3) allow system control to be overridden or circumvented, which then provides others the opportunity to abuse or misuse the system to commit fraud.
Present day financial controls of modern business enterprises do not do enough to mitigate business risks from fraud and error within the organization.
According to reports from the Association of Certified Fraud Examiners (ACFE), fraud and white collar hacks collectively drain 6 percent of a typical business enterprise's annual revenue.
Failure to establish and abide by some government-imposed requirements can result in criminal as well as civil penalties, so many businesses and other organizations are scrambling to establish policies and compliance monitoring systems.
The real-time nature of information, analysis, decision-making, and policy validation creates additional complexities in financial controls and compliance monitoring.
In the process of exploring automated monitoring systems, many enterprises are facing tradeoffs between stringent controls, operational efficiency, and business risk.
While stringent systems controls may stop a small percent of insiders who intend to defraud the enterprise, stringent controls place a heavy burden on the vast majority of insiders who are honest.
However, prior efforts to provide efficient and effective automated transaction monitoring systems have not been entirely successful.
Such limited approaches are watchful of only a small percentage of transactions on a computer system.
Problematic issues in areas outside of the monitored fields can be overlooked though such issues may result in problems in seemingly non-critical transactions, may affect critical transactions with subtlety, and may result in disperse adverse affects that amount in summations to problems deserving attention but that may go undetected.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and systems for policy statement execution engine
  • Methods and systems for policy statement execution engine
  • Methods and systems for policy statement execution engine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0112]Prior to a detailed description of the invention(s), the following definitions are provided as an aid to understanding the subject matter and terminology of aspects of the present invention(s), and not necessarily limiting of the invention(s), which are expressed in the claims. Whether or not a term is capitalized is not considered definitive or limiting of the meaning of a term. As used in this document, a capitalized term shall have the same meaning as an uncapitalized term, unless the context of the usage specifically indicates that a more restrictive meaning for the capitalized term is intended. A capitalized term within the glossary usually indicates that the capitalized term has a separate definition within the glossary. However, the capitalization or lack thereof within the remainder of this document is not intended to be necessarily limiting unless the context clearly indicates that such limitation is intended.

DEFINITIONS / GLOSSARY

[0113]Actor: an individual responsible ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A policy statement execution engine for use in connection with a policy compliance monitoring system that determines exceptions to policies expressed by computer-executable policy statements. The system allows establishment, codification, and maintenance of enterprise policies, monitors electronic transactions of the enterprise from various data sources, detects exceptions to established policies, reports exceptions to authorized users such as managers and auditors, and / or provides a case management system for tracking exceptions and their underlying transactions. A storage device stores a set of computer-executable policy statements. A data storage device stores enterprise data analyzed in connection with determining policy exceptions. A policy analysis engine retrieves data from the data storage device that is referenced by the policy statement, evaluates an indicator provided in the policy statement, and determines a confidence level associated with the indicator. An exception determining component responsive to the confidence level generates data indicating a policy exception.

Description

CROSS-REFERENCE TO RELATED APPLICATION[0001]This application is a continuation of copending U.S. patent application entitled “METHODS AND SYSTEMS FOR TRANSACTION COMPLIANCE MONITORING” by Peter H. Kennis, Daniel R. Kuokka, Charles A. Coombs, Stayton D. Addison, Andrew T. Otwell, Jeffrey Z. Johnson, Patrick Taylor, and Michael E. Lortz, having application Ser. No. 11 / 085,725, filed on Mar. 21, 2005, which claims the benefit of and priority on U.S. Provisional Patent Application No. 60 / 554,784 entitled “METHODS AND SYSTEMS FOR CONTINUOUS MONITORING OF TRANSACTION DATA FLOW” BY Peter H. Kennis, Stayton D. Addison, Charles A. Coombs, Andrew T. Otwell, and Daniel R. Kuokka, filed on Mar. 19, 2004, the disclosures of which are hereby incorporated herein by reference in their entirety.[0002]This application is also related to and incorporates by reference herein the following US patent applications:(1) application Ser. No. 11 / ______, filed on ______, entitled “Methods and Systems for Extra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06Q10/00G06F17/00G06F17/40G06Q40/00
CPCG06F17/30569G06Q10/06G06Q10/063G06Q10/06311G06Q40/00G06Q10/0635G06Q10/0637G06Q10/06393G06Q10/063114G06F16/258
Inventor KENNIS, PETER H.KUOKKA, DANIEL R.COOMBS, CHARLES A.ADDISON, STAYTON D.OTWELL, ANDREW T.JOHNSON, JEFFREY Z.TAYLOR, PATRICK J.D.LORTZ, MICHAEL E.
Owner KENNIS PETER H
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products