Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SAFE E-DOCUMENT SYNCHRONISATION, ANALYSIS AND MANAGEMENT SYSTEM
Document Type and Number:
WIPO Patent Application WO/2017/030517
Kind Code:
A1
Abstract:
The invention is related to system and methods which provides secure e-document(40) data transmission between document management infrastructure service provider(20) and its customer(30), and also keeps the customer side located e-document(40) data away from external interventions by hardware security methods, and analyses the data, which has financial content, by means of data mining methods, and displays raw and processed data in a secure manner at various levels of authorization after being decoded by a hardware decoder, and enables detecting and monitoring person or operation which causes security vulnerability.

Inventors:
OKSUZ CUNEYT (TR)
KUZU RIDVAN SALIH (TR)
BEYAZIT SOYHAN (TR)
ATAKLI IDRIS MURAT (TR)
ALAGOZ FATIH (TR)
GUNDUZ OGUDUCU SULE (TR)
Application Number:
PCT/TR2016/050294
Publication Date:
February 23, 2017
Filing Date:
August 18, 2016
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
IDEA TEKNOLOJI COZUMLERI BILGISAYAR SANAYI VE TICARET ANONIM SIRKETI (TR)
International Classes:
G06Q10/10; G06Q40/00
Domestic Patent References:
WO2005101270A12005-10-27
Foreign References:
US20080250157A12008-10-09
US8467609B22013-06-18
US20080235175A12008-09-25
US20010034845A12001-10-25
US20090030754A12009-01-29
US7322047B22008-01-22
US20070288336A12007-12-13
Attorney, Agent or Firm:
DESTEK PATENT, INC. (TR)
Download PDF:
Claims:
CLAIMS

A method which enables the transmission with use of security control protocols of an electronic data interchange format, raw formatted e-document (40) data, from service provider company (20) to service reipicient firms (30) which is the legal owner of the data, to store the data with respect to secure access protocols in service recipient firm's (30) local client machines (321 ), to analyse the data, and giving access to said data at different levels method, characterised in;

In order to provide e-document (40) synchronisation (50) from service provider firm (20) through service provider firm infrastructure (200), to service recipient firm infrastructure (300) on service recipient firms (30);

- receiving e-document (40) which is sent by third party organisations for service recipient firm (30) from authorised regulator (10) which is regulating the communication between service provider firms (20), by communication service (210) on service provider firm infrastructure (200),

- forwarding e-document (40) to be synchronised to application server (220) on service provider firm infrastructure (200), by communication service (210),

enveloping the e-document (40) to be synchronised with an encryption algorithm, by the application server (220)

- sending enveloped e-documents (40) to be synchronised, to service recipient firm infrastructure (300) over internet (40) via certification through encryption module (240), by application server (220)

- decrypting certificates of enveloped e-documents (40) received by service recipient firm infrastructure (200) by decryption module (310) on service provider firm (300)

- transmitting decrypted data to secure data storage and intepretation module (320) by decryption module (310)

- transforming received data from decyrption module (310) into e-document (40) via storing in encrypted raw format in client machine (321 ) or analysing and/or controlling with predetermined rules in order to be accessable by authorized users (330), by secure data storage and interpretation module (320)

An e-document (40) management system according to Claim 1 , characterized in; using HTTPS communication protocol in step of "sending enveloped e-documents (40) to be synchronised, to service recipient firm infrastructure (300) over internet (60) via certification through encryption module (240), by application server (220)"

An e-document(40) management system according to Claim 1 , characterized in; if "forwarding e-document (40) to be synchronised to application server (220) on service provider firm infrastructure (200), by communication service (210)," and "enveloping the e-document (40) to be synchronised with an encryption algorithm, by the application server (220)" steps comprising the steps of

taking a copy of aforementioned e-documents (40) by the application server

(220),

storing the copied e-documents (40) to application database (230) on service provider firm infrastructure (200) by application server (220)

informing service provider firm infrastructure (200) about availability of belonged client machine (321 ) for data synchronisation (50) by secure data storage and interpretation module (320)

pulling e-document (40) to be synchronised from database (230) by application server (220) if service provider firm infrastructure (300) is available for data synchronisation (50)

An e-document(40) management system according to Claim 3, characterized in; - connecting to client machine (321 ) through an electronic signing device (322) with a valid key by secure data storage and interpretation module (320)

An e-document (40) management method according to Claim 4, characterized in connecting to client machine (321 ) through interfaces with open and special keys by said electronic signature device (322).

An e-document (40) management method according to Claim 3, characterized in storing said e-documents (40) in the application database (230) such as Oracle, MS- SQL, MySQL, SQLite, etc by database engines.

An e-document(40) management system according to Claim 1 , characterized in; if " transforming received data from decyription module (310) into e-document (40) via storing in encrypted raw format in client machine (321 ) or analysing and/or controlling with predetermined rules in order to be accessable by authorized users (330), by secure data storage and interpretation module (320)" step is comprising the steps of

- in order to make financial forecasting of said raw e-documents (40), based on financial metrics according to the rules determined by service provider firm (20) and / or service recipient firm (30) In accordance with the parameters set by the e- documents (40) on analysis to make the financial projections based on financial metrics by financial forecasting module (323) comprising the steps of;

- requesting financial forecast (3231 ) by user (330),

- transmitting financial forecasting request (3231 ), to segment selection module (3233),

- pulling e-documents (40) releated to received financial forecasting request (3231 ) from financial forecasting e-document database (3232) to segment selection module (3233) consisting of segmentation algorithms for segmentation of processed data according to the analysis request,

- transmitting predetermined e-documents (40), after filtering in segment selection module (3233) to financial analysis module (3235) which is representing the data to be analysed in the feature space format in forecasting training module (3234).

An e-document (40) management method according to Claim 7, characterized in making segmentation calculations of micro forecasting for one company and macro forecasting for many companies

An e-document (40) management system according to Claim 1 , characterized in; " transforming received data from decyrption module (310) into e-document (40) via storing in encrypted raw format in client machine (321 ) or analysing and/or controlling with predetermined rules in order to be accessable by authorized users (330), by secure data storage and interpretation module (320)" step comprising the step of;

- in order to make financial forecasting of said raw e-documents (40), based on financial metrics according to the rules determined by service provider firm (20) and / or service recipient firm (30) In accordance with the parameters set by the e- documents (40) on analysis to make the financial projections based on financial metrics by financial forecasting module (323) comprising the steps of;

- requesting financial audit (3241 ) by user (330),

- transmitting financial audit request (3241 ) to e-document selection module (3243),

- pulling the e-documents (40) to be inspected from the financial audit e- document database (3242) by e-document selection module (3243), - sending pulled e-documents (40), for deterministic analysis in rule analysis module (3245) according to the predetermined rules in audit rule list (3244),

- making preliminary audit on selected e-documents (40) by rule analysis module (3245),

- informing the reporting module (325) about a financial fraud-fault detection in preliminary audit by rule analysis module (3245),

- transmitting selected e-documents (40) to probabilistic analysis module (3246) in case of not founding any financial fraud-fault with respect to the rule list,

- classification of incoming e-documents (40) based on predetermined features on audit training model (3247) by probabilistic analysis module (3246),

- determining probabilistic distribution of said e-documents (40) on a two class supervised training model with/without fraud-fault by probabilistic analysis module (3246),

- making a probabilistic scaling in order to predict fraud-fault case on said e- documents (40) by probabilistic analysis module (3246),

- sending results of scaling process on e-documents (40) to reporting module

(325) by probabilistic analysis module (3246).

10. An e-document (40) management system according to Claim 7 or 9, characterized in; financial forecasting module (323) and the financial fraud-fault detection module

(324) of the resulting output, for processing of financial analysis and reporting of results,

- visualizing e-document (40) outputs by reporting module (325),

- encrypting processed e-document (40) outputs with usage of cryptographic methods by reporting module (325),

- transmitting processed and encrypted e-documents (40) outputs to client machine (321 ) for archiving purposes by reporting module (325),

11. An e-document(40) management system according to Claim 1 , characterized in;

comprising the steps of when user (330), wants to access raw or processed e- documents (40),

- Sending a secure monitoring request (3261 ) from the user computer (331 ),

Pulling encrypted e-documents (40) which is user (330) wants to access, from stored client machine (321 ) to hardware decoding module (326) by user computer (331 ),

- Transmitting secure monitoring request (3261 ) to hardware decoding module

(326) in secure data storage and interpretation module (320),

- incoming of secure monitoring request (3261 ), to comparison and validation module (3262) in hardware decryption module (326)

- transmitting secure monitoring request (3261 ) from comparison and validation module (3262) to security control module (3263),

- checking encrypted e-documents (40) which is user (330) wants to access whether in the proper format by the security control module (3263),

- transmitting secure monitoring request (3261 ) from security control module (3263) to client security control module (3264) if encrypted e-documents (40) desired to access is in proper format,

- controlling whether the user of (330) has permission to access to selected e- document (40) by security control module (3264),

- sending the permisson message of related e-document (40) from client security control module (3264) to comparison and validation module (3262) if user (330) has the access persmission to the selected e-documents (40),

- decrypting the e-documents which is suitable to the request by comparison and validation module (3262),

- transmitting e-documents (40) pulled out from the envelope to the user screen (332) in a viewable format by comparison and validation module (3262).

12. An e-document (40) management system according to Claim 1 , characterized in; using, as financial documents, automatically received documents from enterprise resource planning software and documents needed to be stored with authorization rules, instead of said e-documents (40)

13. A method which enables the transmission with use of security control protocols of an electronic data interchange format, raw formatted e-document (40) data, from service provider company (20) to service reipicient firms (30) which is the legal owner of the data, to store the data with respect to secure access protocols in service recipient firm's (30) local client machines (321 ), to analyse the data, and giving access to said data at different levels method, characterised in;

- an authorised regulator organising and regulating the communication between service provider firms (20) ,

service provider company infrastructure (200) installed on service provider firm (20) which is providing storage of data of service recipient firms (30), communication with authorised regulator (10) and synchronisation (50) with service recipient firm infrastructure (300),

service recipient firm infrastructure (300) installed on service recipient firm (30) which is providing to transmit e-documents (40) of service recipient firms' (30) to the service recipient firm (30) local, store the e-documents and monitor the e- documents in a secure manner.

14. An e-document(40) management system according to Claim 13, characterized in;

service provider firm infrastructure (200);

- consisting a communication service (210) allowing data exchange between authorized regulator (10) and service provider firm (200) by receiving e-document (40) to be sycnhronised from authorized regulator (10),

- consisting an application server (220) providing to envelop the e-documents to be synchronised (40) with an encryption algorithm,

- consisting an application database (230) storing the copy of e-documents (40) to be synchronised by application server (220),

- consisting an encryption module (240) providing the certification of data to be sent to service recipient firm infrastructure (300) by application server (220),

15. An e-document (40) management system according to Claim 13, characterized in;

service recipient firm infrastructure (300);

- consisting a decryption module (310) for decrypting the certificate of enveloped data,

- consisting a secure data storage and interpretation module (320) transforming raw formatted data or processed data based on predetermined rules into accessable e-document (40) by authorised users (330).

16. An e-document(40) management system according to Claim 13, characterized in;

said secure data storage and interpretation module (320);

• recipients of services infrastructure company (300) data synchronization (50) the availability, infrastructure service provider company at (200) tasked with the client machine (321 ),

• synchronization (50) to ensure the continuity of operations, public and private keys with electronic signature device (322),

• service provider firm (20) and / or the service recipient firm (30) at specified parameters line by e-documents (40) made on pesitl analysis in order to generate predictions based on financial metrics financial forecasting module (323),

• financial process controls to ihtiyap heard denetp the ijpunc institutions and companies staff to help front financial trick-error checking operations, financial trick- error control module that enables automatic production over existing data (324), financial forecasting module (323) and the financial tricks-error control module (324) obtained PIKT are pesitl graphics, tables or flow diagrams to visualize and compare the reporting module (325),

user (330), raw or processed e-documents (40) of the rope access, to reach the desired encrypted e-document (40) Format compliance status and user (330) by questioning authority, data viewable format on the user screen (332) transmits a hardware password exposure module (326) comprises

Description:
DESCRIPTION

SAFE E-DOCUMENT SYNCHRONISATION, ANALYSIS AND MANAGEMENT SYSTEM Technical Field

The invention, e-documents of the data on quality, providing secure document management infrastructure service provider firm, this engine uses the service recipient firms construction of secure data transmission service recipient firm side of the positioning of e-documents kept closed tamper with hardware security methods in the nature of the data and financial content carrying trailers, analyzing electronic data mining methods; raw and processed data in a secure manner to appear in various authorization levels after dissolving with a hardware decoder, if the data is compromised, the security that led to the open process or operation from / reason will ensure the follow-up that caused the system and to a corresponding method on.

State of the Art

Financial reports and e-document production all over the world began to be used ropes certain standards. Universal business language (UBL) and extensible business reporting language (XBRL), among others. Invoices, checks, financial books and reports, such as e- documents related to inter-firm transmission / reception and sharing these standards makes easier through substantial of these documents between companies, circulation and companies that provide infrastructure services for the storage business, they assume higher responsibilities in the safe management of these documents . In addition, service providers positioned in the data are usually discarded and remain active in the company are used in a very limited proportion of data analysis will provide added value to the business.

US008467609B2 numbered United States patent document in the proposed document management system that enables the distribution between the electronic data of the server and clients, demonstrated a device that allows 30 data content that the optical character reader and to make the user's operations on the data.

US20080235175A1 numbered patent e-document management taken over by United States, electronic documents, electronic document storage system into 35 safely transferred, recorded and withdrawn when needed. In this system, stored and cataloged more legal documents is a method applied in achieving necessary.

According to the method described in the patent number US20010034845A1 United States, certain access rights to the people, the security sensitivity of the word, the data objects, and can have access to the character or icon view. Access authorization forming word or group using this method, different from the rest and secure any document drawn through the document is stored in one place. Users with access authorization to the file they want to achieve, sense of security with the words, again buried into the lO's file is shown in this way. US20090030754A1 numbered United States patent document discloses, an e-document management system proposed data transmission between servers and clients, the storage and display of said process is a solution, including data security. It also recommended that the system be expanded business reporting language (XBRL) also provides e-document management standards.

US007322047B2 numbered United States patent document discloses, secure document management system that allow access over the Internet. This system allows securely store electronic documents on computers, previously authorized people can view the contents of files remotely over the internet reach with access to those documents. This is particularly environments where multiple degrees of authorization are specifically designed rope. different authorization levels for different users of the rope can be adjusted accordingly and defined principles defined file viewing different content viewing privileges to different users.

Generally in the patents mentioned above is set forth in the scope of the invention that the e- document management system has a security method in this invention either absent or only software infrastructure. In addition, the present invention is that it allows the data mining methods with e-documents and control over the performance of financial analysis.

Financial analysis, changes on the performance of the company and the industry position of the company manager provides the ability to observe and interpret. This interpretation of the company's current financial situation of the sector where the data flow and the company's floss implications are dealing with, the company has a variety of methods to reach these conclusions. The most common method, the company has owned its own or where the rope through financial institutions specialized in advising financial situation assessment, taking walks in the form of sectoral analysis. The biggest disadvantage of being time consuming and high cost of this method can not always provide opportunities for deep analysis.

Various software tools to facilitate and accelerate the analysis of financial experts and consultants are available. For example, Entrepreneurial Edge Online (www.edgeonline.com) is a web-based application, various financial ratios of the company entering into this system the financial data and financial situation allows them to see the calculations. CPanalyst (www.icpas.org) financial software again in a similar way as financial data entry while 10, graphics and comparison charts with various financial status reports. However, the disadvantages of this type of software, is a limited company or a set of industry-specific software.

US20070288336A1 numbered United States patent discloses a new approach to overcome the constraints of the methods and software are proposed. The proposed system, different data taken from financial content sources, filtered with the help draft specific rules for companies and allows rearrangement. Thus, the developed software system allows each company to fit their needs analysis and reports to be generated. However, this patent recommended and other similar system generated reports comprise analyzes obtained on forward expected to be available or realized operation, can not produce actions or automatic assumptions about the strategic decisions to be taken based on this analysis.

Accurate analysis and interpretation of the financial situation of the company, but financial records kept in accordance with legal regulations and rules are available. In addition, the tax official state institutions of these recordings have been performed over the control and taxation. Irregularities in financial records as well as companies engaged in irregularities in this case an obstacle to the correct interpretation of their financial firms may be exposed to serious criminal penalties.

As financial irregularities can be sourced from a staff of faulty operation, there is a manager's consciously sourced from the company's financial condition may show different. Software is also available that these operations are identified and corrected for the errors of the financial operations involving potential trick-serve as various consulting firms.

US20070288336A1 numbered United States patent discloses, audit recommended that the planning system, the concentrations of trick-error process experts to examine the risks to the financial operations of the company and they offer an application that shows the possible effects. With this application surveyor can give you all the financial data in fraudulent-faulty operations in high-risk locations, reducing the possibility of losing sight of the audit priorities. However, this system is based on rule-based control algorithm defined rules for rare and does not have the ability to capture a bug-cheating case. In the above patent documents and practices as seen in e-document and distribute the encrypted take clients from the server hardware decoder that makes it accessible e- document with a device, the universal business language on e-document (UBL) and extensible business reporting language (XBRL) 10 that analysis of data by following the standard, which automatically projections about the companies' strategic decisions in financial analysis, can not be found in the rules-based controls, the audit error / fraud operations, a system that captures data mining methods are not available. It is believed that this invention includes innovations that address these deficiencies mentioned in the patent. Legal e-document generation and trade relations with other companies where the rope firms obligation to transmit this document is available. These carriers have an e-document storage and management to provide the infrastructure taxpayer company (service provider) to send via e-documents, required data is open to legal control or infrastructure provider companies through statutory auditor institutions (tax offices, etc.) It is obliged also to convey. Service buyers' stop for various reasons, the receiving services from companies that provide this legal basis, when you want to move to another infrastructure provider company, the data will be mentioned statutory audit is required to transfer to the new infrastructure provider company. In the present technique, the service providers include a common data transfer protocol or service is not mentioned among the often manual means or service area service providers, at the request of the company with the introduction of temporary service data transfer is realized.

Existing e-document storage and data in e-document of the transmission infrastructure provider, service provider, to be on the firm side kept restricts data service buyers' side in the resolution of the data mining method will provide added value. One reason for these restrictions, analysis and decoding operations due to take place on the server of the service provider infrastructure is the recipient firms do not want to have implications on the service provider of critical information about their financial future. Another reason is that many legitimate e-document generation payer, which have their own IT infrastructure to take from this data service providers are able to analyze the data mining methods.

Existing e-document storage and transmission infrastructure has seen increases not driven by the hardware security encryption methods. In addition, the data mining system that makes the service areas of companies, which analyzes the current perspective and financial control defined when the system performs the rules, based on financial metrics than the future over existing data in addition to the current perspective projections producing or artificial financial trick-error checking based on intelligence methods a system that does not exist.

Consequently, because of the lack of 10 issues and existing solutions because of the above shortcomings, all of these deficiencies is described in terms of turning around to reveal the integrated system, it has become necessary to make an improvement in the art.

Objects of the Invention

The invention aims at resolving the above mentioned disadvantages created inspired by the current situation.

The primary purpose of the invention, UBL, XBRL, and similar electronic data exchange format, raw state created the data in e-document attributes, data storage service that infrastructure providers from the company, the data of the actual legal owner of the service recipient company in the located client machine to is to ensure the transfer using the data security protocols.

Other objects of the invention;

· encryption on the client machine that condition located in e-document data quality and provide hardware security methods to keep closed to foreign intervention,

• removed and disposed of the case of electronic data, analyzing the data mining methods,

• data is made to move financial content, content owners of companies belonging to the current financial situation of the reporting operations, making automatic and future-term predictions by various artificial intelligence methods enable extraction with the help of financial data,

• need for the audit of financial processes, auditors third parties and the company staff to help front financial trick-error control operation of automatically producing over existing data and crude data or secure various authorization levels after dissolving with a hardware decoder of the reports produced by the aforementioned method provide a way to display,

• If the data has been compromised, security or operation of the process that led to open from / to follow reason is to ensure that originate.

Other object of the invention, located in e-document archive service providers, located in the service receiving side instantly by synchronizing the client machine in the universal data format is intended to be archived in a distributed architecture; When you want to change so that the recipient company infrastructure service provider access privileges in the hands of the client machine can be transferred to the new service provider.

Other object of the invention, e-document data in the legal nature of the current process flow of the company or business relationships with other records of the company is to be subject to analysis and provide the added value is retained as an archive.

This invention through e-documents on the client side receiver located at the service allows to make the following analysis:

• Electronic document if carried financial content, UBL, electronic data interchange standards like XBRL, and financial data mining done properly,

· Service sector firms or companies that are in its own relations / sector for inferences about the current financial situation of the group, automatically obtaining and reporting,

• Service sector firms that own or in relation rope company / group of industry, future- term financial condition or operations performed for the automatic forecasting process, based on quantitative metrics to be produced for forecasting services firms,

· Regulatory agencies prior to the audit, the possible errors in the financial data within the company and to determine instantly financial transactions by legal entities that may be considered cheating,

• ln-house source of potential errors giving rise to or financial fraud operation process by automatically detecting, producing the required reports in order to prevent the repetition.

This invention, apart from the existing e-document service delivery system in the server and service provider data for the permit to be stored in the client machine located in both service firms, the client also on the machine need to ensure that data security is needed. Such clients ensure data security on the rope followed the road, as the encryption of data and software when prompted to access this data is still in the form of a software solution to this password. But the software code of the examples that have become ineffective by malevolent persons or institutions with the help of various algorithms are known. In this regard, the new solution will include hardware-based secure data management the following methods to be followed:

• After encrypting the e-certificate by the service provider about the service receiver to be synchronized to the client on the firm side,

services firms in the various levels of authority to act on e-document users between client machines with computers and similar devices they use to access data located in hardware cryptography device with a resolution of encrypted data, • avoid violation of the authorization level, authorized to access the data to be managed through this hardware cryptography device.

Invention Briefly, the method relates to a device and this device combines all the features and methods described above, it aims to provide solutions.

Invention to carry out the objects described above;

Electronic data interchange format, raw state created the data in e-document quality, secure document management infrastructure from the service provider company that provides data to the actual legal owner and the service recipient company that uses this infrastructure, the transfer using the data security protocols, the service recipient company's secure on client machines in a local stored correctly to the access protocols, in the analyzing and pesitl authorization level data to said e-document management is the method of ensuring secure access;

• the service provider from the service provider company infrastructure on the company board, which is installed on the recipient company services clients on infrastructure company, to ensure the synchronization of e-documents;

• service communications service provider company on the infrastructure, sent e- documents from third parties, and business services buyers for the company, the service provider regulates communication between the company and the supervisory institution to receive the official regulator,

• Of communication services, e-documents synced to the service provider company forward in the application server infrastructure,

· Receipt of a copy of the application server by said e-paper,

• Copy e-documents, by the application server, application service provider company to be recorded in the database in the background,

• secure data storage and interpretation of client machines inside the module, the data synchronization to availability, to inform the service provider company infrastructure, · recipients of services infrastructure company, if it is appropriate for the data synchronization, the application server to be synchronized e-documents from the drawing database,

• by the application server, to be sealed with an encryption algorithm to synchronize e- documents,

· by the application server, to synchronize e-enveloped documents encryption 10 modules through sertifikalanarak service recipient company infrastructure (using HTTPS protocol) to be sent over the internet,

• an encrypted form, the recipient company is sealed from the service infrastructure of e-documents, analysis of the certificate by the decryption module in the service recipient company infrastructure,

• data analyzed by the decryption module to be transmitted to a secure data storage and interpretation module,

• data from the decryption module by secure data storage and interpretation module, client machines in an encrypted form of crude stored or analyzed in the framework of specific rules and / or inspection made accessible by authorized users e-document becomes a state,

• said raw e-documents, financial forecasting module by the service provider company and / or recipients of services in accordance with the parameters set by the company, to make financial projections based on financial metrics analysis on e-documents; o It is in the user's financial forecasting demand,

o demand for financial forecasting, to be transmitted to the segment selection module, e-documents related according to it from financial forecasting demand, drawn from the financial projections e-document database, according to their analysis from the data to be processed taken into consideration in the segment selection module containing segmentation algorithms, o according to preliminary criteria specified e-documents, after extracting the segment selection module, to be analyzed, the data represented in the educational model predictions will be analyzed in terms of the space that the specified attribute to be transmitted to the financial analysis module,

o said raw e-documents, by a financial trick-error control module, the time needed to audit the financial process, auditors third parties and the company staff to help front financial trick-error control operations, to ensure that automatically generated via the existing data; financial controls that exist on the user's request, then be forwarded to the e-document selection module of the financial audit request,

o e-document selection module, financial audits of e-documents to be checked e- document database of the withdrawal, he shot selected e-documents, within the guidelines set forth in the audit list of rules, to be sent to the rule analysis module to analyze a deterministic,

o pre-audit has done within selected e-documents by the rules analysis module, o by rule analysis module, if the pre-audit a financial trick-error is detected, the transmission of this reporting module, defined in that list of rules a financial-trick-error is not detected, the transmission of said selected e-documents probabilistic analysis modules,

o by rule analysis module has been detected pre-audit financial trick-error is forwarded to the state's reporting module that list of rules defined in a financial trick-error is not detected, the transmission of said selected e-documents probabilistic analysis modules,

o probabilistic analysis modules, which defined attributes in terms of e-documents on control model of education classification,

o probabilistic analysis modules, via mentioned attributes, these e-documents containing errors and fraut-free two-tier supervised to determine the probability distribution of the training model,

o probabilistic analysis modules, within mentioned e-documents, predictive inference for the fraud-error situation, making a probabilistic scaling,

o probabilistic analysis modules, and-above-mentioned documents, predictive inference for the fraud-error situation, making a probabilistic scaling

o probabilistic analysis modules, send e-documents on scaling the results of the gerpeklestir reporting module contains the processing steps.

Service recipient firms to start the synchronization process and to ensure continuity, located in secure data storage and interpretation module and the client is connected to the machine via an electronic signature device with a valid key. Said electronic signature device on open and client interfaces through which the private key is connected to the machine.

Financial forecasting module and financial trick-error of the output obtained from the control module for the processing of financial analysis and reporting of results;

• e-document output, visualization by the reporting module,

• reporting module, the output of processed e-documents, the encrypted using cryptographic methods,

• reporting module, processed and archived, encrypted e-document output to the client machine transfer process steps are performed.

If the user wants to access raw or processed e-documents

• users through the computer, finding safe viewing request,

• encrypted electronic documents that you want to access user by the user's computer, stored 10 from the client machine, the withdrawal of the hardware decryption module,

• located hardware decryption modules to be delivered in a secure data storage and secure visualization and interpretation modules of the request,

• safe viewing request, comparison and verification modules contained in the hardware decryption modules to arrive,

• safe viewing request is forwarded to the comparison and validation module security control modules,

• security control module, encrypted e-documents that the user wants to access, to check whether the proper format,

• access to the requested documents are in the proper format encrypted email, secure imaging request, the safety control module, to be transmitted to the client security control module,

• user selected to be controlled by client security control module whether the access authorization to the electronic document,

• If the user has selected e-document access privileges, the client security control module and verification module, sending a message that can be displayed in the relevant e-documents,

• comparison and validation module, the resolution of the electronic documents according to demand passwords,

• comparison and the validation module, electronic documents extracted from envelopes viewable format and forward it to user interface processing steps performed.

the purposes of the invention; e-document management system;

• service provider to regulate communication between companies and government agencies that control the regulator,

• the service provider and service recipient company which is built on companies that store data securely, enabling synchronization with performing official communication with the regulator and the service recipient company infrastructure service provider company infrastructure,

Service provider company infrastructure;

o To be synchronized from third parties and the company sent an e-certificate by the official regulator, communication service that allows the exchange of data between the regulator and the service provider company official infrastructure, o E-documents will be synchronized with an encryption algorithm application server that provides the envelope,

o application server to be synchronized by e-copies of documents held by the application database,

o application server by the service recipient company that provides data to the infrastructure of the certification of the cryptographic module,

- situated on the service recipient firms and service firms recipient of e-documents service recipient companies to be transferred safely to the tavern, and secure storage of the receiver to display services firm providing infrastructure services infrastructure consignee;

o resolving the certificate enveloped data decryption module,

o the raw state or stored in secure data storage and secure data storage and interpretation module specific rules interpretation module can be accessed by authorized users of the data processed in perpeve that have made e-documents;

- the status of compliance with data synchronization service recipient company infrastructure, infrastructure service provider company to inform the client machine guards,

- to ensure the continuity of the synchronization process, public and private keys with electronic signature device,

- service provider company and / or services according to parameters specified by the recipient firms, e-documents based on financial metrics to produce forecasts pesitl analyzes that financial forecasting module,

- The need for the audit of financial processes, auditors and company staff will help third parties to pre-financial fraud-error checking operations, financial trick-error control module that enables automatic production on existing data,

- financial forecasting module and the output obtained from financial trick-error control module, various graphs, tables or flow diagrams to visualize and compare the reporting module,

- To access the user's raw or processed e-documents to be accessed by querying the desired encrypted e-document format compatibility status and user's authority, the data that it contains hardware password exposure module transmits a viewable format on the user's screen.

The structural and characteristic features and all the advantages of the invention and the following figures, by means of the detailed description written by making reference to this figure will be understood more clearly, and therefore evaluation which must also be done considering these figures and detailed description.

Figures for a better understanding of the Invention

Figure-1 : System components is the overall scheme.

Figure -2: The scheme of service provider-receiver synchronization between firms.

Figure -3: Block diagram of the service recipient company infrastructure.

Figure -4: Block diagram of financial forecasting module.

Figure -5: Block diagram of financial fraud-error monitoring module.

Figure -6: Block diagram of the hardware decryption module.

The drawings need not necessarily be to scale and can be neglected. None of the details necessary to understand the present invention. Furthermore, at least substantially identical or that at least the elements that are substantially identical function are denoted by the same number.

Part References

10 Authorised Regulator

20 Service Provider Firm

30 Service Recipient Firm

40 E-document

50 Synchronisation

60 internet

200 Service Provider Firm Infrastructure

210 Communication Service

220 Application Server

230 Application Database

240 Encryption Module

300 Service Recipient Firm Infrastructure

310 Decryption Module

320 Secure Data Storage and Data Interpretation Module

321 Client Machine

322 Electronic Signature Device

323 Financial projections Module 3231 Financial Forecasting Demand

3232 Financial projections e-document database

3233 Segment Selection Module

3234 Forecasts Education Model

3235 Financial Analysis Module

324 Financial Fraud-Error Control Module

3241 Financial Audit Request

3242 Financial Auditing e-document database

3243 E-document Selection Module

3244 Control List of Questions

3245 Rule Analysis Module

3246 Probabilistic Analysis Module

3247 Audit Training Model

325 Reporting Module

326 Hardware Decryption Module

3261 Secure Imaging Request

3262 Comparison and Validation Module

3263 File Security Control Module

3264 Client Security Control Module

330 User

331 User Computer

332 User Display

Detailed Description of the Invention

This detailed description of preferred embodiments of the invention are described only for the better understanding of the subject and to create no limiting effect.

The invention, e-documents (40) of the data on quality, providing secure document management infrastructure service provider firm(20), this engine uses the service recipient firms (30) construction of secure data transmission service recipient firm (30) side of the positioning of e-documents (40) kept closed tamper with hardware security methods in the nature of the data and financial content carrying trailers, analyzing electronic data mining methods; raw and processed data in a secure manner to appear in various authorization levels after dissolving with a hardware decoder, if the data is compromised, the security that led to the open process or operation from / reason will ensure the follow-up that caused the system and to a corresponding method on.

At all stages of the invention, the entry or email the document is seen as output (40) the following documents and the like: financial documents, automatically received documents from enterprise resource planning software, documents required to be kept by the authorization, and so on. The may possess these documents may include the following formats: XML, XBRL, UBL, TXT, DOC, EXCEL, PNG, GIF, BMP, PDF, PS, EPS, EDI and so on.

Authorised regulator(I O), the main components of the architecture of the source of the invention, the service provider firms (20), service recipient firms (30) is shown in Figure-1 . As for this component will be announced; authorised regulator (10), the service provider firms (20) to regulate and control the communication between the institutions. Service buyers', other service recipient firms(30) is in trade relations, e-document (40) When you want to send, the service provider firm (20) over the infrastructure provided by authorised regulator (10) reach, which perform this operation. In addition, e-document (40) controls the company needed the service recipients firm (30) service provider firm (20) e-documents via infrastructure, authorised regulator (10) forwards.

As shown in Figure 2, from the service provider firms (20) via on board the service provider firm infrastructure (200), the service recipient firm (30) located on the service recipient firm infrastructure (300), e-document (Service recipient firm infrastructure (300), data synchronization (50) where appropriate, an application server (220) to be synchronized e- document (40) application database (230) by pulling an encryption algorithm envelopes. Enveloped data encryption module (240) through sertifikalanarak services infrastructure recipient firm infrastructure (300) Internet (60) is sent out.40) synchronization (50) are scheduled. Here processing technical process is as follows: Service provider firm infrastructure (200), communication service on (210), the service recipient firm (30) for sending e-documents from third parties and the firms from the authorised regulator (10) takes. This e-documents (40) has a copy of the application server (220) through the application data base (230) (Oracle, MS-SQL, MySQL, SQLite and so on. Through the database engine) is stored.

Service receiver firm infrastructure (300) on the decryption module (310), enveloped by data IO certification solutions secure data storage and interpretation module (320) passes. The data processed in the framework of authorized users of raw stored or specific rules in this module (330) can be accessed by e-document (40) it becomes.

Secure data storage and interpretation module (320) sub-components are detailed in Figure 3. Secure data storage and interpretation module (320) in the client machine (321 ), data synchronization (50) availability of service provider company infrastructure (200) is tasked with. Service recipient firm (30), synchronization (50) To ensure the continuation of a process electronic signature device (322) must have. This device is an electronic key bearing on the apical and a private car and USB, Ethernet, FireWire, etc. through interfaces client machine (321 ) is connected.

The client machine (321 ) service provider company infrastructure (200) and the internet (60) through communicating, the service recipients firms' (30) provides information about the If service recipient firm (30) contains a valid key (50) synchronization the starts.

The client machine (321 ) e-documents(40) stored on raw, financial forecasting module (323) and financial fraud-error control module (324) is used as input. Financial forecasts module (323), service provider firm (20) and / or service recipient firm (30) the determined parameters line by e-documents (40) above does various analyzes in order to generate predictions based on financial metrics. When the need for the audit of financial processes financial fraud-error control module (324) auditor third parties and the company staff to help front financial fraud-error checking operations ensures generated automatically via the existing data.

Reporting module (325); Financial forecasting module (323) and the financial tricks-error control module (324) obtained outcomes, is responsible for the various graphical visualization and comparison charts and flow diagrams. This module is processed obtained via the e-document (40) outcomes, the client machine (321 ) Although stored on the cryptographic envelope.

If User(330) wants to Access raw or processed e-documents(40), the user computer (331 ) sends safe viewing request (3261 ) to hardware decryption module (326). This module is suitable for request e-documents (40), from the client machine (321 ) pulling it out of the envelope. Then this data can be displayed in the format user screen (332) transmits.

If detail Financial forecasting module (323) the workflow, as shown in Figure 4 of users (330) from the financial forecasting demand (3231 ) is assessed in this module. From financial forecasting demand (3231 ), according to the relevant e-documents (40) financial projections e-documents from the database (3232) drawn in the segment selection module

(3233) is taken into consideration, segment selection module (3233), according to a request from the data analysis to be processed includes segmentation algorithms. The segmentation process is done mainly by the micro-macro forecasting and estimation criteria. Micro forecasting Standards-based segmentation, solely to one of the company has made in the commercial relationship e-documents (40) on the transaction, Ramada segmentation based on macro forecasting requirement, belonging to more than one company E-documents (40) is the process done. Micro and macro forecasting pre-determined according to the rope by e-documents (40) segment selection module (3233) to be analyzed after extracting the financial analysis module (3235) is transmitted.

Financial analysis module (3235) e-documents (40) to produce over desired outcomes, analyzed the data, forecasts educational model (3234) represents in terms of space specified attributes. Attributes most general terms; An e-document / file / report can be defined as the distinctive characteristics of all the others. This forecasts model of education

(3234) , uses the following types of attributes: area of the company, field of activity, payment trends (historical payment dates, payment rates, products purchased / service groups etc.), Defined credit limit, billing type, business operation frequency, debt coverage ratio, cash ratio for short-term liabilities, cash interest coverage ratio, the ratio of income and expenses and so on. Data classification structure is obtained by data mining methods using these attributes.

Financial analysis module (3235), the current education model forecasts (3234) will be made using the following types of inferences:

• customer profiling: the loyalty of customers, the benefits for the company, product and sector-based purchasing power, distribution channels,

• The discovery consecutive template: Based on the commercial inputs and outputs will occur in the near future when the provision of commercial input-output period in my motion,

• performance appraisal of: products, services and industry-based business performance measurement and comparison,

• strategic market recommendations: economic trends in different segments of the market, relational structure analysis between products and services, complementary, and the validity of the key. identification of competitive products and services,

• risk analysis firm: company, sector and product / service determined on the basis of expected payment of the estimated delay, be expressed in measurable metric of commercial risk groups according to the base.

Financial fraud-error control module (324) begins with business flow chart as shown in figure-5 from the user (330) from the financial audit request (3241 ). Later that financial audit request (3241 ) e-document selection module (3243) is transmitted, to be supervised e- document (40) from financial control e-documents the database (3242) withdrawal provided. Later, these e-documents (40) sends, the control rules list (3244), stated within the rules to be as deterministic analysis rule analysis module (3245). If the rule analysis module (3245) selected e-documents (40) the preliminary audit in a financial fraud-error is detected, in this case reporting module (325) is transmitted. But the list of rules defined in a financial-fraud- error detection is not locked, it selected E-documents (40) probabilistic analysis module (3246) is transmitted. Probabilistic analysis module (3246), education control model (3247) on gender-defined attributes from the E-documents (40) represents. These attributes are debt / equity ratio, sales / total assets ratio, gross over-sold difference before interest and tax earnings, working capital, z-score, total debt / total assets ratio, net income / total assets ratio, working capital / total assets ratio of gross income / total assets ratio and so on. financial data may be. Later on these attributes, this e-document (40) contains errors and cheating-free two-class probabilistic distribution on a supervised educational model is determined. E-document (40) on the trick-error status for predictive inference, probabilistic scaling system ( 0's and 1 's) is used. Reporting module (325) This predictive inference to be transferred, the rule analysis module (3245) contains no certainty as is fuzzy.

Data coming from financial forecasting module (323) and financial faud-error from the control module (324) construct the column data in the desired format, pie, bar, area, regulates the distribution graph

or table structure by reporting module(325). These formats may include the following types of data:

• The financial estimation module (323) according to the generated output; potential customer losses list, higher-margin services, the ratio of the demands of real sales, local, national, international or industry-based customer spending, cash trends, market trends, risk analysis, campaign and discount offers, products or services on the market the most appropriate entry date suggestions etc.

• Financial faued-error from the control module (324) according to the generated output; transactions involving certain error by the rules, suspicious transaction records, the credibility of this process, due process or the operation of the process, risk ratio resulting from fraudulent-erroneous records, and so on.

The encrypted outputs on the client machine(321 ) transferred to the reporting module(325) to be archived.

When user(330) wants to sage viewing request(3261 ) raw or processed e-documents(40), client machine(321 ) pulled that data to hardware decryption module(326). As seen in Figure 6, the safe viewing request (3261 ) and verification module (3262) communicated prior to file security control module (3263), then the client from the security control module (3264) It passes. File as mendtioned before desired to ceyptic security reach to control module (3263), e-document (40) is check whether it is in the proper format. If e-document (40) is in the proper format user (330) selected e-document (40) client whether access authorisation security control module (3264) is carried through. If successfully pass both control, and verification module (3261 ) approved by raw or processed e-document (40) Once decrypted user computer (331 ) to appear on the user screen (332) is transferred.




 
Previous Patent: MODULAR GARAGE WITH SOLAR PANELS

Next Patent: HEAT ENGINE