Systems and methods for monitoring business processes of enterprise applications
First Claim
1. A system for a monitoring a business process of an enterprise application, comprising:
- an adapter component, wherein the adapter component extracts data relating to the business process from the enterprise application;
an adapter database, wherein the adapter component stores the data in the adapter database in a format substantially similar to a format used by the enterprise application to store the data;
a core services component, wherein the core services component communicates with the adapter component, schedules data extraction by the adapter component from the enterprise application, and receives the data in a second format from the adapter component that is extracted from the adapter database by the adapter component and converted to the second format by the core services component;
a core services database, wherein the core services component stores the data in the second format in the core services database, wherein the core services component creates a business process rule relating to the business process, wherein the core services component executes the business process rule against the core services database, and wherein the core services component creates a report based on a result of the execution; and
a user interface, wherein the user interface allows a user to control creation of the business process rule by the core services component and wherein the user interface allows a user to monitor the business process by displaying the report created by the core services component.
7 Assignments
0 Petitions
Accused Products
Abstract
A system and method for monitoring the business processes of an enterprise application are presented. Data relating to the business process is extracted from the enterprise application. The data is stored in a first database in a format substantially similar to a format used by the enterprise application to store the data. The data is extracted from the first database and is converted to a second format. The data is stored in the second format in a second database. A business process rule relating to the business process is created. The business process rule is converted to a query. The query is executed against the second database. A report is created and displayed based on a result of the query.
97 Citations
29 Claims
-
1. A system for a monitoring a business process of an enterprise application, comprising:
-
an adapter component, wherein the adapter component extracts data relating to the business process from the enterprise application;
an adapter database, wherein the adapter component stores the data in the adapter database in a format substantially similar to a format used by the enterprise application to store the data;
a core services component, wherein the core services component communicates with the adapter component, schedules data extraction by the adapter component from the enterprise application, and receives the data in a second format from the adapter component that is extracted from the adapter database by the adapter component and converted to the second format by the core services component;
a core services database, wherein the core services component stores the data in the second format in the core services database, wherein the core services component creates a business process rule relating to the business process, wherein the core services component executes the business process rule against the core services database, and wherein the core services component creates a report based on a result of the execution; and
a user interface, wherein the user interface allows a user to control creation of the business process rule by the core services component and wherein the user interface allows a user to monitor the business process by displaying the report created by the core services component. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for monitoring a business process of an enterprise application, comprising:
-
extracting data relating to the business process from the enterprise application;
storing the data in a first database in a format substantially similar to a format used by the enterprise application to store the data;
extracting the data from the first database;
converting the data to a second format;
storing the data in the second format to a second database;
creating a business process rule relating to the business process;
executing the business process rule against the second database; and
creating and displaying a report based on a result of the execution. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method for monitoring user activity of enterprise applications, comprising:
-
extracting a first user, a first user role, and a first user permission from a first enterprise application;
storing the first user, the first user role, and the first user permission in a first database in a format substantially similar to a format used by the first enterprise application to store the data;
extracting the first user, the first user role, and the first user permission from the first database;
mapping the first user role to a first functional role and the first user permission to a first effective right;
storing the first user, a first role mapping to the first functional role, and a first effective right mapping to the first effective right to a second database;
creating a business process rule relating the first functional role and the first effective right;
executing the business process rule against the second database; and
creating and displaying a report based on a result of the execution. - View Dependent Claims (15, 16, 17)
-
-
18. A method for monitoring business transactions of enterprise applications, comprising:
-
extracting business transaction data from an enterprise application;
storing the business transaction data in a first database in a format substantially similar to a format used by the enterprise application to store the data;
extracting the business transaction data from the first database;
converting the business transaction data to a second format;
storing the business transaction data in the second format to a second database;
creating a business process rule relating to the business transaction;
executing the business process rule against the second database; and
creating and displaying a report based on a result of the execution. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
-
26. A method for detecting false positives when monitoring a first business process and a second business process of an enterprise application, comprising:
-
extracting first business process data and second business process data from the enterprise application;
storing the first business process data and the second business process data in a first database in a format substantially similar to a format used by the enterprise application to store the data;
extracting the first business process data and the second business process data from the first database;
converting the first business process data and the second business process data to a second format;
storing the first business process data and the second business process data in the second format to a second database;
creating a business process rule relating to the first business process data;
converting the business process rule to a query;
executing the query against the second database;
if the query results in a violation of the business process rule, comparing the violation to the second business process data; and
if the comparing the violation to the second business process data shows that the violation is not a business process problem, not reporting the violation. - View Dependent Claims (27, 28, 29)
-
Specification