Secure event-driven EDI transaction processing using the internet
First Claim
1. A method of performing secure repair and service order data transfer operations over a global computer network, the method comprising:
- extracting repair and service order data from a database stored on a first computer system connected to the global computer network;
translating the repair and service order data extracted from the database from a first format into a second format to generate formatted data;
encrypting the formatted data to generate encrypted data; and
transmitting the encrypted data over the global computer network to a second computer system connected to the global computer network.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus are provided for performing secure data transfer operations over a global computer network. This is accomplished by extracting data from a database stored on a first computer system connected to the global computer network, translating the data extracted from the database into a standard format, encrypting the formatted data, and transmitting the encrypted data to a second computer system connected to the global computer network. The second computer system, in turn, receives the encrypted data, decrypts it, translates into a format compatible with the second computer system and merges the reformatted data into a database stored on the second computer system. Unlike prior art techniques, in which data transfers are performed in batch off-line, the method and apparatus of the present invention allow for secure data transfer operations to be performed on-line in real-time. In addition, since a global computer network is utilized, there is no need to maintain a dedicated communication line between the first and the second computer system, but rather a single network connection can be used by the first and the second computer system to communicate with any number of computer systems connected to the global computer network.
-
Citations
20 Claims
-
1. A method of performing secure repair and service order data transfer operations over a global computer network, the method comprising:
-
extracting repair and service order data from a database stored on a first computer system connected to the global computer network;
translating the repair and service order data extracted from the database from a first format into a second format to generate formatted data;
encrypting the formatted data to generate encrypted data; and
transmitting the encrypted data over the global computer network to a second computer system connected to the global computer network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
receiving the encrypted data on a second computer system connected to the global computer network;
decrypting the encrypted data to generate decrypted data;
translating the decrypted data from the second format into the first format to generate reformatted data; and
merging the reformatted data into a database stored on the second computer system.
-
-
3. The method of claim 2, wherein the reception, decryption, translation and merge are performed in real-time.
-
4. The method of claim 1, wherein the extraction, translation, encryption and transmission are performed in real-time.
-
5. The method of claim 1, further comprising validating the repair and service order data stored in the database to verify that the repair and service order data is in a format for transmission to a business partner.
-
6. The method of claim 1, wherein the formatted data is formatted according to the X12.143 standard.
-
7. The method of claim 1, wherein the encrypted data is encrypted using DES/RSA encryption standards.
-
8. The method of claim 1, further comprising packaging the encrypted data according to the MIME protocol.
-
9. The method of claim 1, wherein the global computer network further comprises the Internet.
-
10. A computer system for performing secure repair and service order data transfer operations, the system comprising a first and a second programmed computers connected to a global computer network, the first computer comprising instructions for:
-
extracting repair and service order data from a database stored on the first computer system connected to the global computer network;
translating the repair and service order data extracted from the database from a first format into a second format to generate formatted data;
encrypting the formatted data to generate encrypted data; and
transmitting the encrypted data over the global computer network to the second computer system connected to the global computer network. - View Dependent Claims (11, 12, 13, 14, 15, 16)
receiving the encrypted data on the second computer system connected to the global computer network;
decrypting the encrypted data to generate decrypted data;
translating the decrypted data from the second format into the first format to generate reformatted data; and
merging the reformatted data into a database stored on the second computer system.
-
-
12. The computer system of claim 10, wherein the repair and service order data stored in the database is validated to verify that the repair and service order data is in a format for transmission to a business partner.
-
13. The computer system of claim 10, wherein the formatted data is formatted according to the X12.143 standard.
-
14. The computer system of claim 10, wherein the encrypted data is encrypted using the DES/RSA encryption standards.
-
15. The computer system of claim 10, wherein the encrypted data is packaged according to the MIME protocol prior to transmission to the second computer system.
-
16. The computer system of claim 10, wherein the global computer network further comprises the Internet.
-
17. A computer-readable medium storing a computer program, the program comprising instructions for:
-
extracting repair and service order data from a database stored on a first computer system connected to a global computer network;
translating the repair and service order data extracted from the database from a first format into a second format to generate formatted data;
encrypting the formatted data to generate encrypted data; and
transmitting the encrypted data over the global computer network to a second computer system connected to the global computer network. - View Dependent Claims (18, 19, 20)
receiving encrypted repair and service order data on the first computer system connected to the global computer network from the second computer system connected to the global computer network;
decrypting the encrypted data to generate decrypted data;
translating the decrypted data from the second format into the first format to generate reformatted data; and
merging the reformatted data into a database stored on the first computer system.
-
-
19. The computer-readable medium of claim 17, wherein the instructions are performed in real-time.
-
20. The computer-readable medium of claim 18, wherein the instructions are performed in real-time.
Specification