Selecting ecosystem features for inclusion in operational tiers of a multi-domain ecosystem platform for secure personalized transactions
First Claim
Patent Images
1. A method of automating configuration of servers and mobile clients as new participants in a multi-domain ecosystem comprising:
- taking a data structure of a reference implementation of a specific server-executable application operating across a client device and a server, the application using each of a service tier, a personalization tier, and an enablement tier in a multi-domain computing ecosystem;
using heuristics in an analysis of the data structure, the analysis performed by a computer to automatically break down the reference implementation into ecosystem configurable features selected from the list consisting of;
service requirements, customer requirements, end-user requirements, regulatory mandates, regulatory guidelines, security mandates, security guidelines, security requirements, trust models, economic models, business logic, business workflow, commonality with other services, operational factors, design factors, technology factors, devices, platforms, projected technology evolution, and operating constraints;
automatically determining with a networked computing device participants for the reference implementation selected from the list consisting of;
end users, network providers, merchants, service providers, transaction instrument acquirers, transaction instrument issuers, widget providers, wallet providers, and trusted service managers;
analyzing the broken down ecosystem configurable features of the reference implementation in view of service provider requirements for participating in the multi-domain ecosystem, thereby automatically establishing multi-domain ecosystem feature configuration parameters for effecting the implementation of each of the service tier, the enabling tier, and the personalization tier for at least a server of the service provider and at least one target mobile client device; and
configuring a server of a new networked computing participant in the ecosystem with a service tier module that performs server-side transaction functions, the service tier module being configured based on the analyzed broken down features of the reference implementation, the configuring occurring over a network through which the participants in the ecosystem perform secure personalized transactions;
configuring the new networked computing participant server further with a personalization tier module that performs server-side personalization of mobile device executable modules that upon execution by the mobile device enables a mobile device participant to perform secure personalized transactions with the newly configured server, the personalization tier being configured based on the analyzed broken down features of the reference implementation and occurring over the network through which the participants in the ecosystem perform secure personalized transactions, andconfiguring, over the network through which the participants in the ecosystem perform secure personalized transactions, the new networked computing participant server yet further with an enabling tier module, the enabling tier module being configured based on the analyzed broken down features of the reference implementation, the configured enabling tier providing device independence to the configured service tier module and the configured personalization tier module via at least one Application Programming Interface.
2 Assignments
0 Petitions
Accused Products
Abstract
Selecting ecosystem features for inclusion in operational tiers includes taking a reference implementation of a specific application adapted to operate in a multi-domain computing ecosystem and, using a computer, breaking down the reference implementation into service related components, determining ecosystem participants for the reference implementation, and using a feature allocation engine to configure operational features that enable one of the service related components.
370 Citations
16 Claims
-
1. A method of automating configuration of servers and mobile clients as new participants in a multi-domain ecosystem comprising:
-
taking a data structure of a reference implementation of a specific server-executable application operating across a client device and a server, the application using each of a service tier, a personalization tier, and an enablement tier in a multi-domain computing ecosystem; using heuristics in an analysis of the data structure, the analysis performed by a computer to automatically break down the reference implementation into ecosystem configurable features selected from the list consisting of;
service requirements, customer requirements, end-user requirements, regulatory mandates, regulatory guidelines, security mandates, security guidelines, security requirements, trust models, economic models, business logic, business workflow, commonality with other services, operational factors, design factors, technology factors, devices, platforms, projected technology evolution, and operating constraints;automatically determining with a networked computing device participants for the reference implementation selected from the list consisting of;
end users, network providers, merchants, service providers, transaction instrument acquirers, transaction instrument issuers, widget providers, wallet providers, and trusted service managers;analyzing the broken down ecosystem configurable features of the reference implementation in view of service provider requirements for participating in the multi-domain ecosystem, thereby automatically establishing multi-domain ecosystem feature configuration parameters for effecting the implementation of each of the service tier, the enabling tier, and the personalization tier for at least a server of the service provider and at least one target mobile client device; and configuring a server of a new networked computing participant in the ecosystem with a service tier module that performs server-side transaction functions, the service tier module being configured based on the analyzed broken down features of the reference implementation, the configuring occurring over a network through which the participants in the ecosystem perform secure personalized transactions; configuring the new networked computing participant server further with a personalization tier module that performs server-side personalization of mobile device executable modules that upon execution by the mobile device enables a mobile device participant to perform secure personalized transactions with the newly configured server, the personalization tier being configured based on the analyzed broken down features of the reference implementation and occurring over the network through which the participants in the ecosystem perform secure personalized transactions, and configuring, over the network through which the participants in the ecosystem perform secure personalized transactions, the new networked computing participant server yet further with an enabling tier module, the enabling tier module being configured based on the analyzed broken down features of the reference implementation, the configured enabling tier providing device independence to the configured service tier module and the configured personalization tier module via at least one Application Programming Interface. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method comprising:
-
taking a reference implementation of a specific application operating in a multi-domain computing ecosystem; using a server to apply a set of rules that govern use of services by participants of the ecosystem to; break down the reference implementation into components selected from the list consisting of;
service requirements, customer requirements, end-user requirements, regulatory mandates, regulatory guidelines, security mandates, security guidelines, security requirements, trust models, economic models, business logic, business workflow, commonality with other services, operational factors, design factors, technology factors, target devices, platforms, projected technology evolution, and operating constraints, wherein automatically breaking down the reference implementation is based, in least in part, on one or more of analytics and heuristics and is performed using an expert engine the operation of which is based, at least in part, on artificial intelligence; anddetermine with a server participants for the reference implementation selected from the list consisting of;
end users, network providers, merchants, service providers, transaction instrument acquirers, transaction instrument issuers, widget providers, wallet providers, and trusted service managers; andconfiguring a server of a new networked computing participant in the ecosystem with a service tier module that performs server-side transaction functions, the service tier module being configured based on the broken down components of the reference implementation, the configuring occurring over a network through which the participants in the ecosystem perform secure personalized transactions; configuring the new networked computing participant server further with a personalization tier module that performs server-side personalization of mobile device executable modules that upon execution by the mobile device enables a mobile device participant to perform secure personalized transactions with the newly configured server, the personalization tier being configured based on the broken down components of the reference implementation and occurring over the network through which the participants in the ecosystem perform secure personalized transactions, and configuring, over the network through which the participants in the ecosystem perform secure personalized transactions, the new networked computing participant server yet further with an enabling tier module, the enabling tier module being configured based on the broken down components of the reference implementation, the configured enabling tier providing device independence to the configured service tier module and the configured personalization tier module via at least one Application Programming Interface. - View Dependent Claims (14, 15, 16)
-
Specification