[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

NZ527092A - Data transfer and/or transformation system and method using meta data descriptors - Google Patents

Data transfer and/or transformation system and method using meta data descriptors

Info

Publication number
NZ527092A
NZ527092A NZ527092A NZ52709202A NZ527092A NZ 527092 A NZ527092 A NZ 527092A NZ 527092 A NZ527092 A NZ 527092A NZ 52709202 A NZ52709202 A NZ 52709202A NZ 527092 A NZ527092 A NZ 527092A
Authority
NZ
New Zealand
Prior art keywords
data
meta
descriptors
source
target
Prior art date
Application number
NZ527092A
Inventor
Peter William Garden
Michael Darren Rowley
Jason Anthony Nigro
Original Assignee
Orderware Solutions Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Orderware Solutions Ltd filed Critical Orderware Solutions Ltd
Priority to NZ527092A priority Critical patent/NZ527092A/en
Priority claimed from PCT/NZ2002/000004 external-priority patent/WO2002057926A1/en
Publication of NZ527092A publication Critical patent/NZ527092A/en

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A computer implemented method of processing data comprises the steps of :- (a) Defining meta-data descriptors to represent the data; (b) In an interactive user application defining a process associated with at least one of the meta-data descriptors; and (c) Processing the data in accordance with the defined process.

Description

52 7 0 WO 02/057926 PCT/NZ02/00004 1 DATA PROCESSING SYSTEM AND METHOD Field of the Invention The invention relates to methods of processing data. An abstract object 5' layer is utilised in relation to data to define a process for the data. A user may interactively define the process using meta-data.
Background to the invention In many distributed computer systems there is a need to transfer data 10 from one computer system to another computer system, often a remote computer system. Often the data is stored in a different format on each system.
When dealing with certain types of structured information rules can be 15 established to transform data stored in a first format to data format according to a second format. US6,085,196 discloses a method which enables mapping relationships to be defined between structured information in a first format and structured information in a second format, particularly between SGML and HTML. In this patent a mapping 20 database is defined by a user which defines the mapping relationship between elements (e.g. fields) of a first format and elements {e.g. tags) of a second format. This patent deals with structured data where elements are defined within a description document (e.g. a DTD or XSD). Data from a source data source is then parsed utilising the transformations 25 defined in the mapping database to produce target data, formatted according to the second format. The method of this patent involves the definition of rules for transforming defined generic data elements according to a first format to defined generic data elements according to a second format.
Often there is a need to transport or transform data to another format. This need can arise where data, stored without meta-data, must be transported or transformed to,a format where the meta-data is defined. 2 The method of US6,085,196 does not provide means of transforming data where the elements are not defined within a description document (i.e. SGML elements and HTML tags). Furthermore, the method only provides for one to one mapping of source and target fields.
It is an object of the present invention to provide a flexible method and system for enabling the transfer or transformation of data between a wide variety of data formats or to at least provide the public with a useful choice.
According to a first aspect of the invention there is provided a computer implemented method of processing data comprising the steps of: i) defining meta-data descriptors to represent the data; ii) in an interactive user application defining a process associated with at least one of the meta-data descriptors; and iii) processing the data in accordance with the defined process.
A meta-data descriptor may describe formatting, relationships, structure, 20 and attributes relating to data. Meta-data descriptors may be defined by querying a structured database, examining an XML or HTML file, querying an XML schema or based on contextual criteria.
Access to data may be assisted by a meta-data connector. A specific 25 meta-data connector exists for each data. For example, a text file where there are three fields being Name, ID, and Address will have a text file./ meta-data connector that specifies the location of the text file, any other information required to access that text file, and any information required to access text files generally. Another text file with different data but the 30 same fields will use the same meta-data connector. A different text file with different fields will use a different text file meta-data connector. A database file accessed using JDBC will use a JDBC meta-data connector. 3 Processing data can include manipulating data, transforming data, and/or transferring data.
Preferably the method involves the transformation of data from a source 5 data source to a target data source. A data source is data accessed through a meta-data connector. The interactive user application displays source meta-data descriptors and target meta-data descriptors and allows a user to define rules for transforming data represented by the source meta-data descriptors into data represented by the target meta-data 10 descriptors. Transformation may be performed at times according to a user defined schedule. Data may be obtained from remote sources and remote devices may perform part of the transformation operation. Transformation may be initiated by a trigger event at a remote device which may be another computer system or software program that sends a 15 "signal" to start the process.
Target data elements may be supplied with the associated target metadata descriptors to a target data source or a file containing the target data elements may be sent to the target data source. By using different types 20 of meta-data connectors the method may enable transformations between different types of data including JDBC, text, EDI, IDOC, XML and HTML files, dynamic web pages,, telnet terminal sessions, web services, and reai-time data streams.
According to a further aspect of the invention there is provided a computer implemented method of transforming selected data from one or more source data sources to one or more target data sources comprising the steps of: i) defining meta-data descriptors for the source data sources 30 and for the target data sources; ii) in an interactive user application defining a transformation process between the source meta-data descriptors and the target meta-data descriptors; and 4 iii} transforming source data extracted from the source data sources in accordance with the defined transformation process to generate target data for supply to the target data sources.
According to a further aspect of the invention there is provided a computer system for processing data comprising: i) a processor; ii) memory for supplying data to the processor; iii). an input device for providing user input to the processor; iv) a display device for displaying info.rmation from the processor; v) an application residing in memory which, when executed by the processor, is responsive to user input to define meta- data descriptors to represent data and to define a process associated with at least one of the meta-data descriptors; and to process the data in accordance with the defined process.
The invention will now be described by way of example with reference to the accompanying drawings in which: Figure 1: shows a functional diagram illustrating the method for defining the transformation process and processing the data.
Figure 2: shows a functional diagram illustrating the method for defining meta-data descriptors by examining the data through a meta-data connector.
Figure 3:- shows a functional diagram illustrating the method for defining meta-data descriptors with user assistance.
Figure 4: shows a functional diagram illustrating the method for defining the transformation process.
Figure 5: shows a functional diagram illustrating the method for 5 transforming data according to the defined transformation process.
Figure 6: shows an example of a meta-data descriptor.
Figure 7: shows the components of a system for implementing the 10 method shown in figures 1 to 5.
Figure 8: shows an example of source data as a CSV file.
Figure 9: shows a screen illustrating a user creating a meta-data 15 connector for the CSV file.
Figure 10: shows a screen illustrating a meta-data descriptor for the CSV file.
Figure 11: shows an XML file from which a meta-data descriptor will be extracted.
Figure 12: shows a screen illustrating a user creating a meta-data connector for the XML file.
Figure 13: shows a screen illustrating the meta-data descriptor for the XML file.
Figure 14: shows a screen illustrating the interactive user application for 30 defining a transformation process by dragging source elements to target elements and establishing a one-to-one direct map. 6 Figure 15: shows a screen illustrating the interactive user application for creating calculation operations.
Figure 16: shows a screen illustrating the interactive user application 5 where target elements resulted from by direct one-to-one maps with the source elements, transformations from the source elements, and calculated data..
Figure 17: shows a screen illustrating the creation of an activity.
Figure 18: shows a screen illustrating the creation of an action.
Figure 19: shows a screen illustrating constructing an activity from actions.
Figure 20: shows a screen illustrating the scheduling application when scheduling dates for activities and actions.
Figure 21: shows a screen illustrating the scheduling application when 20 scheduling times for activities and actions.
Figure 22: shows a screen illustrating the scheduling application, when scheduling an action.
. Figure 23: shows a screen illustrating a function of the scheduling application.
Figure 24: shows the components of the simplest system for implementing a method shown in figures 1 to 5.
Figure 25: shows the components of a system for implementing the method shown in figures 1to 5. 7 The present invention relates to a method which enables the transfer of data between distributed devices and the transformation of data between a first format and a second format. The method involves the creation of 5 an abstract object layer between the source and target data sources to define the required transformation operations. This, provides great flexibility and enables users to define- required transformations for specific data types and transformation operations.
Referring to the example shown in figure 1, the transformation process is defined by mapping elements 1 represented by meta-data descriptors 2 for the source data 3 to elements 4 represented by meta-data descriptors 5 for the target data 6. The definition of the transformation process is assisted by a user within an interactive user application. The 15 transformation process may involve mappings which transform or manipulate the source data elements by applying various operations 7 including programmatic and arithmetic operations.
. The defined transformation process 8 uses a meta-data connector 9 to 20 access the source data 3. The meta-data connector contains specific information about the source data including how to access the source data. For example, if the source data is to come from a telnet session the meta-data connector may include logon information, information about key strokes required to access the data, and information about how to 25 handle error exceptions received from the telnet session.
In addition to containing specific information about the particular source data, the meta-data connector contains general data for accessing data of that type. For example, a JDBC meta-data connector type 10 used for 30 JDBC data, a XML meta-data connector type 11 used for XML data, or a telnet meta-data connector type 12 used for telnet data. 8 Data resulting from the transformation process is inserted into the target data 6 using a meta-data connector 13.
Referring to the example shown in figure 2, the first step is to identify the 5 location of the data 14. This may be locai or remote data. Meta-data descriptors 15 for that data may be defined by using a meta-data' connector 16 to examine the data.
Referring to the example shown in figure 3, meta-data descriptors 18 may 10 be defined with the assistance of a user in an interactive user application 17.
Structured data is data where meta-data is recorded within the data, such as a database. Unstructured data is data where meta-data is not recorded 15 within the data.
Structured data may be examined to determine the meta-data descriptors. For example, a database may be queried to extract meta-data descriptors . For unstructured data, such as text files, rules must be established to 20 enable the meta-data descriptors to be defined. A user may identify the location of the data and the manner in which the data should be parsed to define the meta-data descriptors For unstructured data, such as text files, telnet terminal sessions, or 25 HTML pages, contextual criteria may be specified. For example it may be specified that the first row contains field headings. Record terminators and field separators may also be defined. With this information it is possible to parse the data and return field names, data types, data structure and other relevant information to construct a meta-data 30 descriptor. .
The data may be source data from which data is to be extracted or target data to which data is sent, in the process described above identification WO 02/057926 PCT/NZ02/00004 9 of ail target meta-data descriptors and source meta-data descriptors for the target and source data is possible whether the data is structured or unstructured.
In the example shown in Figure 4 a process for transforming data represented by the meta-data descriptors is defined. Any number of steps within the process may be defined for execution. The source meta-data descriptors 19,20 are preferably displayed on one side of the screen and the target meta-data descriptors 21,22 displayed on the other side of the 10 screen. With an interactive user application 23 a user may then define mapping relationships between source meta-data descriptors and target meta-data descriptors or any number of operations that must be performed to map source meta-data descriptors to target meta-data descriptors, for example an operation to combine data represented by two 15 source meta-data descriptors to result in data represented by one target meta-data descriptor. Mapping may be performed using a drag and drop operation or another method to associate source and target meta-data descriptors.
Certain operations may involve calculations including the concatenation or breaking up of data represented by source meta-data descriptors to map to a target meta-data descriptor. Target meta-data descriptors can also be specified as calculations without any relationship whatsoever to the source meta-data descriptors for example, where the target data needs to 25 contain constant or calculated values .
In the example shown in figure 5 a source data source 24 and a source data source 25 are shown. It will be appreciated that any number of data sources may be utilised. The data transformation manager using the 30 defined process 26 transforms the source data elements into target data elements of target data source 27 and target data source 28. Again, it will be appreciated that any number of target data sources may be created or utilised to accept data.
Transformations may be performed iocaiiy or by a remote transformation manager. Where a remote transformation manager is employed data associated with selected source meta-data descriptors must be supplied 5 to the remote transformation manager which returns data relating to the selected target meta-data descriptors. The remote transformation manager may further require data from a remote data source to complete a transformation. Software may be installed on a remote computer connected by a TCP/IP connection which enables data to be easily 10 extracted from the remote computer and transported to the local . computer by one of a number of transport protocols such as SOAP over HTTP or RMI. Transport protocols may incorporate authentication and encryption to allow the remote computer to communicate securely with the local computer.
Data represented by target meta-data descriptors may be mapped or combined according to a specified function to produce the required target data elements. The transformation software may include a "calculator" which determines the value of target data elements based upon source 20 data and/or target data elements. The calculation may be a simple one to one mapping or use complex predefined or user defined functions. Preferably, the. calculations are performed using a scripting language such as Python, Jython, Javascript or VB script. The calculations may include • mathematical operators (multiply, divide, add, subtract, assignment, mod, 25 brackets) string operators (concatenation), logical operators (equal, not equal, less than, greater than, less than or equal, greater than or equal, AND, OR, XOR), flow control operators (if, if ... else, if ... else if ... else, for, for ... else, while, while ... else, break, continue, pass) and utility operators (number to string conversion). Calculations may include 30 mathematical functions (abs (val), complex (reai[,imag3), pow(xy), divmod (a, b), pi, e, trig functions, exponential functions, logarithmic functions etc). Calculations may also include calendar and date and time functions, 11 * string functions, utility functions, list functions, key generators, SQL utilities, variable utilities and area handling utilities.
Target data elements may be sent to respective target data sources with 5 their associated target meta-data descriptors or a file containing the target data elements may be sent to the relevant target data sources.
Referring now to figure 6 an example of a meta-data descriptor is shown.
Referring now to figure 7 a system for implementing the method of the invention is shown. A server 29 is seen to include an Executor component 30, a Database 31, a Timer 32 .and a 3rd Party Application accessed through an intelligent datasource 33 and its associated Database 34.
A client computer 35 is seen to include an Administrator component 36, a Remote data transfer component 37 and a data source 38. The remote data transfer component 37 is a lightweight component and is connected to server 29 via a TCP/IP connection over a WAN. The remote data 20 transfer component 37 enables executor component 30 to call data from client computer 35 to facilitate a connection and the transfer of data from a remote computer where no direct connection exists.
Administrator component 36 may communicate with the executor 25 component 30 to allow a remote user to schedule actions. These actions may then be performed by executor module 30 at specified times or upon the happening of specified events. Trigger events may include communications from a remote device such as client computer 35. A client computer 39 is seen to have a browser application 40.
The system enables the transport and transformation of data between databases 34 and 38. The Administrator module 36 allows a client to define actions as-described above in relation to figure 3. Administrator WO 02/057926 PCT/NZ02/00004 12 module 36 also enables the actions to be scheduled to be executed at specified times or upon specified events. The actions and schedule may be stored on server 29. Executor module 30 executes the specified actions as set out in the schedule at specified times or upon receipt of 5 event information the specified actions are executed. The event mechanism may allow an external application such as the 3rd Party Application to initiate workflow activities or actions in the Executor module 30. Data is obtained from Database 34 and, where required, information is requested by the Executor module 30 via the remote data 10 transfer component 37 to query data source 38 and return the required data to executor module 30. The required data transformations are performed and the target data elements are transferred to data source 38.
A worked example illustrating the creation of meta-data connectors, the 15 creation of meta-data descriptors, and the definition of a process for transforming source data to target data all by the administrator component 36 as seen by a user will now be described with reference to figures 8 to 16.
Referring firstly to figure 8 a CSV file is shown. This CSV file contains field headings in the first row and the subsequent rows contain data relating to "Orders". This file will be used in the transformation process in figure 14 as the source data.
In figure 9 a screen is shown where a user defines the meta-data connector for the CSV file. The data source is given the name "Order CSV file" and the file name or URL at which the file can be called is given. The user has also selected the "First row contains field headings" box. This enables the Executor module 30 to query the CSV file and recover 30 the field headings. The field headings form the meta-data descriptor for this data.
WO 02/057926 PCT/NZ02/00004 13 The "Select" button is then actioned and the screen shown in figure 10 shows the fields extracted from the CSV file after the "Import" button is actioned. The source field names "Customer" to "ETA" are listed on the Screen.
' In figure 11 an XML file is shown.
In figure 12 the meta-data connector for an XML target data source is defined by the user. The user enters the name of the data source as "1.0 10 • XML Order" and a Filename/URL is entered. In this case the meta-data •descriptor will be extracted from the XML file shown in figure 11.
In figure 13 the meta-data descriptor that is going to be used as the target meta-data descriptor is displayed. In this case the meta-data 15 descriptor has two entities "Headerlnfo" and "Lineltemlnfo" as children of an entity "Order" which is in turn a child of entity "Orders". The entity "Headerlnfo" has target field names "Account" to "TotalAmount". The entity "Lineltemlnfo" has target field names "Price" to "ProductCode". Additional entities and field names may be added if necessary.
In figure 14 the transformation process is defined. On the left side the source entity and field names from the meta-data descriptor for the CSV file are displayed. On the right side the target entities and field names from the meta-data descriptor extracted from the XML file are displayed. 25 The user may map source field names to target field names. In figure 14 the user has clicked and dragged source field names to a corresponding target field name. This creates a direct one-to-one mapping. In the example the user has dragged "Customer" to "Account". The user can map one'or more source fields to one target field or one source field to 30 many target fields. The user may also define certain calculations to result in data for target field names by pressing the Calculation button. 14 In figure 15 the calculation component is shown. Data for target field names can result from calculations made in relation to source fields or ■calculations resulting from constant data, data from another source, or other data unrelated to data from the source fields.
Figure 16 shows another example of-the definition of a transformation process. In this example the user has directly mapped the "Price" source field to the "Price" target field and the "Qty" source field to the "Quantity" target.field. The user has used the calculation component to 10 enter a constant value "Std Item" in the "ItemDescription" target field and prefixed "014-" to data from the "ProductCode" source field to result in the "ProductCode" target field.
The Administrator module 36 allows a client to define activites. An 15 activity consists of actions. The actions may be arranged according to a script. The actions can consist of data transfer actions and other actions that control the computer environment, send e-mails, or handle errors. The actions can consist of functions that monitor or control the current activity or other activities, execute programs or iterate other actions, or 20 other standard programmatic functions. New types of actions can be created by the user. For example the user may require a particular network connection to be operational before a defined process to transform data is started.
One of the actions within an activity may be a defined process to transform data as described in figure 5.
The execution of actions or activities can be dependent on a trigger event. A trigger event includes events generated by a remote system, a 30 scheduler application, or a specified change on the local system.
Figure 17 shows the creation of an activity, the user gives the activity a name, in this example "Process Daily e-mail Orders", and a description.
Intellectual Property Office of M.Z. 2 4 FEB 200 RECEI Figure 18 shows a screen where a user is defining a particular action. The action is a POP 3 e-mail action that logs into a mail server and retrieves e-mails matching certain header fields defined by the user, and extracts the e-mail message and attachments to 5 the local hard drive.
Figure 19 shows how an activity may be composed or various actions. In this example the process is: • Get order e-mails from the POP3 server - "get all order e-mails".
• Unzip attachments to extract the CSV files containing orders - "Unzip order attachments".
• Convert the CSV orders to an XML format - "CSV to XML purchase order". This step represents a defined process to transform data as in figure 5.
• Validate the resulting XML data against an XML schema to ensure the orders 15 contain valid data - "Validate data against XML PO schema".
• Copy the resulting XML file to an AS/40 system - "Copy XML file to AS/400".
• Execute a command on the AS/400 that will send the orders into an ERP system on the AS/400 - "Process batch on AS/400".
The scheduling component may include a graphical user interface as shown in Figures 20 to 23. Figure 20 shows a screen listing for defined actions. Figure 21 shows a screen showing the scheduling of actions in a calendar format. Figure 22 shows the action scheduled for a day. Users can view the scheduling of actions in any desired 25 format.
Referring to Figure 21 a screen showing scheduling properties is shown. A user can select an action, a date and time for execution of the action and in the "Repeat" portion define the periodicity of the action. Actions may also be set up to be triggered upon 30 the occurrence of trigger events including communications from external devices, changes in data etc. Figure 23 shows a schedule listing a series of actions. i WO 02/057926 PCT/NZ02/00004 16 Figure 24 shows a possible computer system for implementing the method. The method may be deployed on computer hardware comprising an Intel processor 41, SDRAM memory 42, a keyboard and mouse input 5 device 43, a computer monitor visual display device 44 and an application 45 residing in the SDRAM memory.
Figure 25 shows another possible computer system for implementing the method. The method may be deployed on computer hardware comprising 10 an Intel processor 41, SDRAM memory 42, a keyboard and mouse input device 43, a computer monitor visual display device 44 and an application 45 residing in the SDRAM memory. The computer system may include a database 46 residing on a remote system which the processor can access through a remote transfer component proxy device 47 also residing on the 15 remote system 48. The computer system also includes a hardware clock timer device 49 and a local database 50.
Those skilled in the art will appreciate that the method may be deployed on a computer system with more than one processor, more than one 20 memory component, other types of input devices or more than one database located on remote systems or locally. Those skilled in the art will appreciated that the method may be deployed on a network such that some components may communicate to each other over a network such as a LAN or WAN using a protocol such as TCP/IP.
It will be seen that the invention provides a convenient means for transferring data formatted according to a first format to another system in which data is stored in a second format. The invention also provides a method and system which provides great flexibility for a user in the 30 transformation of a wide range of data source formats to a wide range of target source formats. The invention also provides a method whereby changes in the way data is accessed does not affect the defined process as data access information is isolated to the rneta-data connector for that 17 data. The invention is platform independent as the remote data transfer component can be deployed on any system and all transformations managed by a central server. Furthermore, due to the abstract nature of the meta-data connectors and the interactive user interface used to define 5 transformations, inexperienced 3rd party programmers can add new meta data connector types and define new transformation processes easily. The ability of the invention to define meta-data connectors enables the use of the invention for legacy systems which use out-dated or unusual data access methods, such as telnet sessions. The access complexity 10 handled by the meta-data connectors enables the invention to be used to manage data from a source which requires complex error handling capabilities.
Where in the foregoing description reference has been made to integers or 15 components having known equivalents then such equivalents are herein incorporated as if individually set forth.
Although this invention has been described by way of example it is to be appreciated that improvements and/or modifications may be made thereto 20 without departing^ from the scope of the invention as defined in the appended claims.

Claims (84)

Claims
1. A computer implemented method of processing data comprising the steps of: iv) defining meta-data descriptors to represent the data; 5 v) in an interactive user application defining a process associated with at least one of the meta-data descriptors; and vi) processing the data in accordance with the defined process. 10
2. A method as claimed in claim 1 wherein access to the data is through a metadata connector.
3. A method as claimed in claim 2 wherein the meta-data connector comprises information about how to access the data. 15
4. A method as claimed in any one of claims 2 to 3 wherein the information includes database, ftp, mail server, web page or telnet logon procedures, navigation procedures, location of the data, and location of data within the data. 20
5. A method as claimed in any one of claims 2 to 4 wherein different types of meta-data connectors are used to access different types of data.
6. A method as claimed in any one of claims 2 to 5 wherein the meta-data connectors are defined by a user in an interactive user application. 25
7. A method as claimed in one of the preceding claims wherein the meta-data descriptors represent the structure of the data.
8. A method as claimed in claim 7 wherein the structure of the data consists of 30 entities and their elements and any relationships between the entities or between the elements. INTELLECTUAL PROPERTY OFFICE OF M.7. 2 3 MAR 2005 RECEIVED . - 19-
9. A method as claimed in any one of the preceding claims wherein the meta-data descriptors describe rules to identify specific elements of data and specific types of data within the data. 5
10. A method as claimed in claim 9 wherein at least one rule specifies contextual criteria.
11. A method as claimed in any one of the preceding claims wherein the meta-data descriptors are obtained by examination of the data. 10
12. A method as claimed in any of the preceding claims wherein meta-data descriptors are obtained by examination of one or more secondary sources.
13. A method as claimed in any one of the preceding claims wherein the meta-data 15 descriptors are defined with the assistance of a user through an interactive user application.
14. A method as claimed in any one of the preceding claims wherein the meta-data descriptors are defined by any combination of the following operating in 20 conjunction: examination of the data, assistance of a user through an interactive user application, and examination of one or more secondary sources.
15. A method as claimed in any one of the preceding claims wherein the meta-data descriptors are defined by the examination of a database by querying the 25 database.
16. A method as claimed in any one of the preceding claims wherein the meta-data descriptors are defined by examination of a series of keystrokes and screen captures resulting from a telnet session with the assistance of a user through an 30 interactive user application. INTELLECTUAL PROPERTY OFFICE Or M.7. 2 3 MAR 2005 RECEIVED
17. -20- A method as claimed in any one of the preceding claims wherein the meta-data descriptors are defined by examination of an XML structure or schema.
18. A method as claimed in any one of the preceding claims wherein the meta-data 5 descriptors are defined by examination of an EDI or IDOC file.
19. A method as claimed in any one of the preceding claims wherein the meta-data descriptors are defined by parsing the data and automatically identifying the meta-data. 10
20. A method as claimed in any one of claims 2 to 19 wherein examination of the data occurs through the use of the meta-data connector.
21. A method as claimed in any one of the preceding claims wherein the defined 15 process is created in an interactive user application that displays meta-data descriptors and allows a user to define steps for processing the data represented by the meta-data descriptors.
22. A method as claimed in claim 21 wherein the process defines steps for 20 transforming data represented by source meta-data descriptors into data represented by target meta-data descriptors.
23. A method as claimed in any one of claims 21 to 22 wherein a defined step involves manipulations or transformations occurring via programmatic or 25 arithmetic methods.
24. A method as claimed in any one of claims 21 to 23 wherein a defined step involves an arithmetic calculation, string transformation, key generation, an SQL calculation, a calendar calculation, a date/time calculation, a financial 30 calculation or a statistical calculation. INTELLECTUAL PROPERTY OFRCl OF ;\|.Z 2 3 mar 2005 REXE IV ED
25.
26
27.
28,
29.
30.
31
32
33 -21 - A method as claimed in any one of claims 21 to 24 wherein the defined step is performed by a device that is remote from the device initiating the step. A method as claimed in any one of claims 21 to 25 wherein a defined step includes the mapping of source meta-data descriptors to target meta-data descriptors. A method as claimed in claim 26 wherein at least one source meta-data descriptor is mapped to a plurality of target meta-data descriptors. A method as claimed in claim 26 or claim 27 wherein at least one source metadata descriptor is mapped to target meta-data descriptors of more than one target data source. A method as claimed in any one of claims 26 to 28 wherein more than one source meta-data descriptor is mapped to at least one target meta-data descriptor. A method as claimed in any one of claims 26 to 29 wherein meta-data descriptors of a plurality of source data sources are mapped to target meta-data descriptors of at least one target data source. A method as claimed in any one of claims 26 to 30 wherein meta-data descriptors of a plurality of source data sources are mapped to target meta-data descriptors of a plurality of target data sources. A method as claimed in any one of the preceding claims wherein data referenced by meta-data descriptors is remotely located. A method as claimed in any one of the preceding claims wherein the defined process is used to processed data. INTELLECTUAL PROPERTY OFFICE OF -M.7 2 3 MAR 2005 RECE l v ED -22-
34. A method as claimed in any of the preceding claims wherein the defined process is used to transform data extracted from one or more source data sources for supply to one or more target data sources. 5
35. A method as claimed in any of the preceding claims wherein an application is provided to enable the definition of an activity consisting of actions where at least one of the actions executes the defined process.
36. A method as claimed in claim 35 wherein the application is a graphical user 10 application provided to enable a user to define the activity.
37. A method as claimed in claim 36 wherein the user defines new actions.
38. A method as claimed in any one of claims 35 to 37 wherein the activity is 15 defined by a script.
39. A method as claimed in claim 38 wherein the script is written in a high-level programming language. 20
40. A method as claimed in any one of claims 35 to 39 wherein the activity contains an action which can stop the current activity until a different activity reaches a certain state.
41. A method as claimed in any one of claims 35 to 40 wherein the activity 25 contains an action with the ability to start the execution of another activity either synchronously or asynchronously.
42. A method as claimed in any one of claims 35 to 41 wherein the activity contains an action with the ability to manipulate the environment of a computer 30 system. INTELLECTUAL PROPERTY 0FRCC OF i\!.7 2 3 mar 2005 received 10 -23-
43. A method as claimed in any one of claims 35 to 42 wherein the activity contains an action which can execute defined processes, execute an email function, execute a program, pass parameters to an executing program, or set an internal flag.
44. A method as claimed in any one of claims 35 to 43 wherein the activity contains an action with the ability to control repetition of certain actions within the activity based upon programmatic manipulation of values within the data undergoing processing.
45. A method as claimed in any one of claims 35 to 44 wherein the activity is executed upon the occurrence of a trigger event.
46. A method as claimed in any one of claims 35 to 45 wherein the execution of an 15 action is dependent on the occurrence of a trigger event.
47. A method as claimed in any one of the preceding claims wherein a schedule of the time or times for executing each activity is created and the activities are executed at the scheduled times. 20
48. A method as claimed in claim 47 wherein a user can schedule the times for execution of activities via a graphical interface.
49. A method as claimed in any one of claims 47 to 48 wherein the occurrence of 25 time for executing each activity generates a trigger event.
50. A method as claimed in any one of the preceding claims wherein a proxy module residing on a remote computer is utilised to accept data resulting from the processes and to modify data residing on the remote computer. 30 INTELLECTUAL PROPERTY OFFICE OF W.7. 2 3 MAR 2005 RECEIVED -24-
51. A method as claimed in any one of the preceding claims wherein a proxy module residing on a remote computer is utilised to extract data from the remote computer for the processes. 5
52. A method as claimed in any one of claims 45 to 51 wherein the trigger event is a data and/or time.
53. A method as claimed in claim 45 to 52 wherein the trigger event is a type of data entry. 10
54. A method as claimed in any one of claims 45 to 53 wherein the trigger event is a specified change in status of an activity or action.
55. A method as claimed in any one of claims 45 to 54 wherein the trigger event is 15 a specified change in status of a file system.
56. A method as claimed in any one of claims 45 to 55 wherein the trigger event is an occurrence of a specified state in a network system.
57. A method as claimed in any one of claims 45 to 56 wherein the trigger event is 20 generated by the schedule.
58. A method as claimed claim 34 or any one of claims 35 to 57 when dependent upon claim 34 wherein the data resulting from the process and the associated meta-data descriptors are sent to the computer hosting the target data source for 25 the host computer to update the target data source.
59. A method as claimed claim 34 or any one of claims 35 to 57 when dependent upon claim 34 wherein the data resulting from the process is sent to the computer hosting the target data source as a file to update the target data source. 30 INTELLECTUAL PROPERTY OFFICE OF N.Z 2 3 mar 2005 received n
60. -25- A method as claimed in any preceding claim wherein the data is unstructured data. 10
61. A method as claimed in claim 60 wherein the data is a text file.
62. A method as claimed in claim 60 wherein the data is a telnet terminal session.
63. A method as claimed in any of the preceding claims 1 to 59 wherein the data is structured data.
64. A method as claimed in claim 63 wherein the data is an EDI, IDOC, XML, CSV, or a database file.
65. A computer implemented method of transforming selected data from one or 15 more source data sources to one or more target data sources comprising the steps of: iv) defining meta-data descriptors for the source data sources and for the target data sources; v) in an interactive user application defining a transformation process 20 between the source meta-data descriptors and the target meta-data descriptors; and vi) transforming source data extracted from the source data sources in accordance with the defined transformation process to generate target data for supply to the target data sources. 25
66. A computer system for processing data comprising: vi) a processor; vii) memory for supplying data to the processor; viii) an input device for providing user input to the processor; 30 ix) a display device for displaying information from the processor; INTELLECTUAL PROPERTY OFFICE Or M.Z 2 3 MAR 2005 RECEIVED -26- x) an application residing in memory which, when executed by the processor, is responsive to user input to define meta-data descriptors to represent data and to define a process associated with at least one of the meta-data descriptors; and to process the data in accordance with the 5 defined process.
67. A computer system as claimed in claim 66 wherein the application defines meta-data descriptors by examining the data. 10
68. A computer system as claimed in claim 66 wherein the application defines meta-data descriptors by querying a database.
69. A computer system as claimed in claim 66 wherein user input from the input device assists the application in defining the meta-data descriptors. 15
70. A computer system as claimed in claims 66 to 69 wherein the application defines the process by displaying meta-data descriptors on the display device and accepting user input from the input device. 20
71. A computer system as claimed in claim 70 wherein the defined process includes transformation or manipulation operations all relating to meta-data descriptors.
72. A computer system as claimed in claim 71 wherein the transformation operations include programmatic or arithmetic operations. 25
73. A computer system as claimed in claims 70 to 72 wherein the user input comprises mouse or keyboard actions.
74. A computer system as claimed in claims 66 to 73 including: one or more data 30 sources. INTELLECTUAL PROPOTV QFRCE rr m.7 2 3 MAR 2005 RECEIVED -27-
75. A computer system as claimed in claim 74 wherein one or more of the data sources reside on a remote system.
76. A computer system as claimed in any one of claims 66 to 75 including: 5 a proxy device.
77. A computer system as claimed in claim 76 when dependent on claim 75 wherein the proxy device resides on the remote system. 10
78. A computer system as claimed in claim 77 wherein the proxy device transfers data from the data sources on the remote system to the processor.
79. A computer system as claimed in claim 78 wherein the proxy device transfers data from the processor to the data sources on the remote system. 15
80. A computer system as claimed in any one of claims 66 to 79 including: a timer device
81. A computer system as claimed in claim 80 wherein the application is responsive 20 to user input to define times when an activity should occur and when times are reached as determined by the timer device executes the activities.
82. A computer system as claimed in claim 81 wherein the activity includes the defined process. 25
83. A computer system for processing data substantially as herein described with reference to Figures 7 to 25 of the accompanying drawings.
84. A computer implemented method of processing data substantially as herein 30 described with reference to Figures 1 to 5 of the accompanying drawings. INTELLECTUAL PROPERTY OFRC'L or i\!.7. 2 3 MAR 2905 RECEIVED -28- A computer system as claimed in claim 66 wherein said application when executed carries out the method of processing data as claimed in any one of claims 1 to 65. Software for effecting the method or system of any one of claims 1 to 64 when executed by a processor. Storage media containing software as claimed in claim 86. INTELLECTUAL PROPFRTV OFRCL (T « 2 3 MAR 2005 RECEIVED
NZ527092A 2001-01-19 2002-01-18 Data transfer and/or transformation system and method using meta data descriptors NZ527092A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
NZ527092A NZ527092A (en) 2001-01-19 2002-01-18 Data transfer and/or transformation system and method using meta data descriptors

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
NZ50948301 2001-01-19
NZ527092A NZ527092A (en) 2001-01-19 2002-01-18 Data transfer and/or transformation system and method using meta data descriptors
PCT/NZ2002/000004 WO2002057926A1 (en) 2001-01-19 2002-01-18 Data transfer and/or transformation system and method

Publications (1)

Publication Number Publication Date
NZ527092A true NZ527092A (en) 2005-09-30

Family

ID=35006707

Family Applications (1)

Application Number Title Priority Date Filing Date
NZ527092A NZ527092A (en) 2001-01-19 2002-01-18 Data transfer and/or transformation system and method using meta data descriptors

Country Status (1)

Country Link
NZ (1) NZ527092A (en)

Similar Documents

Publication Publication Date Title
AU2002228506B2 (en) Data transfer and/or transformation system and method
US6216164B1 (en) Computerized system and method for managing information
EP1077405A2 (en) Generating a graphical user interface from a command syntax for managing multiple computer systems as one computer system
US7877678B2 (en) System and method for rendering of financial data
AU2002228506A1 (en) Data transfer and/or transformation system and method
US20050138081A1 (en) Method and system for reducing information latency in a business enterprise
US20020169789A1 (en) System and method for accessing, organizing, and presenting data
US6253244B1 (en) System and computer-implemented method for providing access to host-based screen applications using business-centric software components
US7853938B2 (en) Creating multiple and cascading business interpretations from raw application data using transformation layering
US10178248B2 (en) Computing device for generating a document by combining content data with form data
US7302489B2 (en) Systems and methods for synchronizing data objects among participating systems via asynchronous exchange of messages
WO2004102435A1 (en) Application interface for analytical tasks
US20110131587A1 (en) Systems and methods for providing a generic audit trail service
CN112527609B (en) Early warning information pushing method and device, electronic equipment and storage medium
US7673245B2 (en) Converting user interface panels
US20030135557A1 (en) Distributed revision block service
EP4198713A1 (en) A method for handling and processing executable data flows based on design of a process
NZ527092A (en) Data transfer and/or transformation system and method using meta data descriptors
US7694307B2 (en) Analytical task invocation
US7366727B2 (en) Management of inbound conflicts when merging data of distributed systems
US20030076360A1 (en) Project management system
US9384012B2 (en) Standalone data entry for backend system
Cheng Leave Management Reporting System (LMS Reporting)/Cheng Keang Lim
Chin et al. Using natural language and stereotypical knowledge for acquisition of software models
EP1574955A1 (en) Management of inbound conflicts when merging data of distributed systems

Legal Events

Date Code Title Description
PSEA Patent sealed
RENW Renewal (renewal fees accepted)
RENW Renewal (renewal fees accepted)
RENW Renewal (renewal fees accepted)
ASS Change of ownership

Owner name: JAVELIN LIMITED, NZ

Effective date: 20130523

RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 18 JAN 2016 BY PIPERS

Effective date: 20141020

RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 18 JAN 2017 BY PIPERS

Effective date: 20160105

RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 18 JAN 2018 BY PIPERS

Effective date: 20161018

RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 18 JAN 2019 BY PIPERS

Effective date: 20171030

RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 18 JAN 2020 BY PIPERS

Effective date: 20181102

RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 18 JAN 2021 BY PIPERS

Effective date: 20191218

RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 18 JAN 2022 BY PIPERS

Effective date: 20201222

EXPY Patent expired