Indirect measurement of business processes

Electrical computers and digital processing systems: multicomput – Computer network managing – Computer network monitoring

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C715S771000, C715S772000

Reexamination Certificate

active

07356583

ABSTRACT:
Systems and methods are provided for collecting a set of values from a computing device and associating the collected set of values with a process, such as an business process or industrial process. Process activity is monitored by collecting one or more parameters associated with specific repeatable tasks or activities performed on a computing device. The one or more collected parameters are then aggregated to form a specific process pattern that can be associated with the actual throughput and efficiency of a process.

REFERENCES:
patent: 5067977 (1991-11-01), Deb
patent: 5850548 (1998-12-01), Williams
patent: 5966510 (1999-10-01), Carbonneau et al.
patent: 6081207 (2000-06-01), Batio
patent: 7000193 (2006-02-01), Impink et al.
patent: 2002/0111887 (2002-08-01), McFarlane et al.
patent: WO 00 19664 (2000-06-01), None
Helman, P., et al.: “Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse”, IEEE Transactions on Software Engineering, IEEE Inc. New York, US, vol. 19, No. 9, Sep. 1, 1993, pp. 886-901, XP000415033 ISSN: 0098-5589, I. Introduction, II. Detection Objectives.
Heatley, S. K., et al.: “Data Mining Computer Audit Logs to Detect Computer Misuse”, International Journal of Intelligent Systems in Accounting, Finance and Management, Sep. 1998, Wiley, UK, vol. 7, No. 3, pp. 125-134, XP001156255, ISSN: 1055-615X, Introduction p. 125-27, Data Mining Process p. 127-32.
Lane, et al., “Temporal Sequence Learning and Data Reduction for Anomaly Detection” ACM Transactions on Information and System Security, ACM, New York, NY, US, vol. 2, No. 3, Aug. 1999, pp. 296-331, XP002907154, ISSN: 1094-9224, *Abstract*, 1. Introduction, 2. Building Classification Models.
Lee, et al., Data Mining Approaches for Intrusion of the Seventh Usenix Security Symposium, Proceedings of the Seventh Usenix Security Symposim, San Antonio, TX, USA, Jan. 26-29, 1998, pp. 79-93, XP002264916, 1998, Berkeley, CA, USA, Usenix Assoc, USA, ISBN: 1-880446-92-8, 1. Introduction, 2. Building Classification Models.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Indirect measurement of business processes does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Indirect measurement of business processes, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Indirect measurement of business processes will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2787896

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.