Intelligent secure data manipulation apparatus and method
First Claim
1. An apparatus through which to exchange electronic data over a network between remote machines, the apparatus comprising:
- a security module to secure an exchange of electronic data between the remote machines;
a secure portal capable to reformat the electronic data, to be exchanged over the network, from a first protocol to a second protocol;
a data shaping module to manipulate the electronic data that is to be exchanged over the network, from a first format to a second format; and
a management module to enable configuration of the security module, the secure portal, and the data shaping module.
5 Assignments
0 Petitions
Accused Products
Abstract
A data manipulation appliance can be installed or plugged into a computer network between business partners, and can perform many of the difficult and tedious data manipulation operations in a substantially automated manner. Examples of operations that can be performed by an embodiment of the apparatus include, but are not limited to, encryption, authentication, auditing, shaping data to a common intermediate format for exchange between partners, other auditing of data exchanges in transaction logs, filtering data for privacy compliance and risk management, error detection and correction, mapping internal non-standard data elements to external standard code sets, proxy and protocol re-writing, and so on. The appliance can be embedded with various tools to perform these operations, and therefore appears to be “intelligent.”
365 Citations
49 Claims
-
1. An apparatus through which to exchange electronic data over a network between remote machines, the apparatus comprising:
-
a security module to secure an exchange of electronic data between the remote machines;
a secure portal capable to reformat the electronic data, to be exchanged over the network, from a first protocol to a second protocol;
a data shaping module to manipulate the electronic data that is to be exchanged over the network, from a first format to a second format; and
a management module to enable configuration of the security module, the secure portal, and the data shaping module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49)
-
-
27. A method to facilitate an exchange of electronic data over a network between remote machines, the method comprising:
-
securing an exchange of electronic data between the remote machines;
if needed, re-formatting the electronic data to be exchanged over the network from a first protocol to a second protocol;
manipulating the electronic data that is to be exchanged over the network from a first format to a second format; and
enabling remote configuration of the securing, routing, or manipulation of the electronic data.
-
-
39. An article of manufacture, comprising:
a machine-readable medium having instructions stored thereon to;
secure an exchange of electronic data between the remote machines;
if needed, re-format the electronic data to be exchanged over the network from a first protocol to a second protocol;
manipulate the electronic data that is to be exchanged over the network from a first format to a second format; and
enable remote configuration of the securing, routing, or manipulation of the electronic data.
Specification