×

Evaluation compiler method

  • US 8,713,543 B2
  • Filed: 02/11/2009
  • Issued: 04/29/2014
  • Est. Priority Date: 02/11/2009
  • Status: Active Grant
First Claim
Patent Images

1. A computer system for extracting and protecting a model, said computer system comprising computer hardware, including a processor, programmed with computer software, comprising:

  • an extractor module, running inside a model creating software program, wherein said extractor module is configured to perform the steps of;

    identifying key inputs and key outputs of a model;

    identifying each of the model threads that lead from the key inputs to the key outputs;

    identifying patterns and relationships in said threads;

    generating compilable mathematical code that reflects the logic of the model and which is based on one or more of said inputs, outputs, threads, patterns, and relationships,wherein said mathematical code comprises mathematical equations, formulas, or functions;

    a compiler module that compiles the mathematical code to create an executable file;

    an evaluator module capable of opening said executable file, modifying the inputs, and processing the mathematical code to generate new outputs;

    a smart algorithm embedded in said system, said smart algorithm programmatically seizing the existing model, inserting source code into the existing model so as to monitor each keystroke and mouse click, and selectively deciding if a specific action is executed, wherein said smart algorithm forces the compiler to programmatically seize a keystroke or mouse click, by bypassing the existing model, and said smart algorithm running the keystroke or mouse click on the compiler,wherein said executable file can exist outside of said model creating software program, is self-executable and capable of running independent of another software program, is configured to run in memory independent from said model software program, is optimized to run more efficiently than said existing model in said model creating software program, and is encrypted to prevent an end-user from modifying the mathematical equations, formulas, or functions of the mathematical.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×