Evaluation compiler method
First Claim
Patent Images
1. A computer system for extracting and protecting a model, said computer system comprising computer hardware, including a processor, programmed with computer software, comprising:
- an extractor module, running inside a model creating software program, wherein said extractor module is configured to perform the steps of;
identifying key inputs and key outputs of a model;
identifying each of the model threads that lead from the key inputs to the key outputs;
identifying patterns and relationships in said threads;
generating compilable mathematical code that reflects the logic of the model and which is based on one or more of said inputs, outputs, threads, patterns, and relationships,wherein said mathematical code comprises mathematical equations, formulas, or functions;
a compiler module that compiles the mathematical code to create an executable file;
an evaluator module capable of opening said executable file, modifying the inputs, and processing the mathematical code to generate new outputs;
a smart algorithm embedded in said system, said smart algorithm programmatically seizing the existing model, inserting source code into the existing model so as to monitor each keystroke and mouse click, and selectively deciding if a specific action is executed, wherein said smart algorithm forces the compiler to programmatically seize a keystroke or mouse click, by bypassing the existing model, and said smart algorithm running the keystroke or mouse click on the compiler,wherein said executable file can exist outside of said model creating software program, is self-executable and capable of running independent of another software program, is configured to run in memory independent from said model software program, is optimized to run more efficiently than said existing model in said model creating software program, and is encrypted to prevent an end-user from modifying the mathematical equations, formulas, or functions of the mathematical.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and software system allowing the ability to use an existing Excel model and extract the business intelligence, relationships, computations and model into pure mathematical relationships and codes such that the business intelligence in the original model is completely protected and the model can be run at extremely high speed and advanced simulations of hundreds of thousands to millions of trials can be run.
-
Citations
11 Claims
-
1. A computer system for extracting and protecting a model, said computer system comprising computer hardware, including a processor, programmed with computer software, comprising:
-
an extractor module, running inside a model creating software program, wherein said extractor module is configured to perform the steps of; identifying key inputs and key outputs of a model; identifying each of the model threads that lead from the key inputs to the key outputs; identifying patterns and relationships in said threads; generating compilable mathematical code that reflects the logic of the model and which is based on one or more of said inputs, outputs, threads, patterns, and relationships, wherein said mathematical code comprises mathematical equations, formulas, or functions; a compiler module that compiles the mathematical code to create an executable file; an evaluator module capable of opening said executable file, modifying the inputs, and processing the mathematical code to generate new outputs; a smart algorithm embedded in said system, said smart algorithm programmatically seizing the existing model, inserting source code into the existing model so as to monitor each keystroke and mouse click, and selectively deciding if a specific action is executed, wherein said smart algorithm forces the compiler to programmatically seize a keystroke or mouse click, by bypassing the existing model, and said smart algorithm running the keystroke or mouse click on the compiler, wherein said executable file can exist outside of said model creating software program, is self-executable and capable of running independent of another software program, is configured to run in memory independent from said model software program, is optimized to run more efficiently than said existing model in said model creating software program, and is encrypted to prevent an end-user from modifying the mathematical equations, formulas, or functions of the mathematical. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification