Abstract:
A system and method for developing a financial tool is provided. The system is an enterprise level framework. The system for developing a financial tool includes a User Interface Module, a Component Module, a Business Logic Layer Module, and an Application Programming Interface (API). The User Interface Module is configured to develop a user interface of a financial tool, based on the requirements of a business solution. The Component Module is configured to define the structure and the function of the user interface of the financial tool being developed, based on the requirement of the business solution. The Business Logic Layer Module is configured to process data in the financial tool, based on the requirement of the business solution. The API is configured to retrieve data from an end-user or an external data source to further process the retrieved data based on the requirement of the business solution.
Abstract:
[0038] The present disclosure relates to configuration driven application persona on hand held terminals. The system comprises a data receiving unit configured to receive a memory unit and also to read the data present in the memory unit. The data receiving unit can also be initialized using the memory unit. The data authenticating unit coupled to the data receiving unit is configured to receive at least one input from the memory unit and at least one second input from the user to verify the data present in the memory unit. The data processing unit coupled with the data receiving unit processes the at least one input from the memory unit and at least one second input from the user to selectively display the features on an output display. The configuration unit is communicably coupled with the memory unit wherein the configuration unit can be used to update the memory unit.
Abstract:
The present disclosure is related to a method for securing financial transaction. The method includes encrypting transaction information on a server (102) upon receipt of said information from a computing device (101). Encoding the encrypted transaction information into a predefined image pattern and transmitting the encoded image to the computing (device 101). The method further includes scanning the image displayed on the computing device (101) from user's mobile device (103) to decode the scanned image and to decrypt the transaction information. The method also includes prompting the user upon successful decryption to enter Personal Identification Number (PIN) into the mobile device (103) to generate a unique signature. Finally, the user enters the signature on the computing device (101) for validation of said signature by the server (102) to secure the financial transaction.
Abstract:
A variety of technologies for partner portals are presented. The portal can support a wide variety of partner types and supporting functionality. Rights administration by partners can be supported via the portal. Common access functions, generic framework functions, co-partnering functions, and other functions can be supported.. Partner collaboration workflow can support a variety of processes. Customer onboarding can be accomplished by partners via the portal. Numerous other scenarios can be supported, such as partner empanelment, co-branding, incentive specification, tracking, and fulfillment, and communication between customers and independent service providers.
Abstract:
A computer system (100) enables real-time business event monitoring and tracking by means of a client-server computer asynchronously acquiring (110) physical event data from a variety of network-connected (105) data collection devices (102), processing the event data on the basis of the knowledge and history of previous events, and analyzing the event data using business logic/rules, filters, and/or other criteria to identify (115) “significant” business events for real-time communication to a network (120) of clients (122). The system (100) is bi-directional in that it also receives business information requests from the clients (122) and processes the requests in the light of the knowledge and history of previous client requests to generate a plurality of device-specific control commands for execution on one or more of the data collection devices (102).
Abstract:
The present invention provides a method, a system, and a computer program product for configuring a Web portal for a computer-based application using one or more menus available in the computer-based application. It comprises classifying the menus available in the application according to the functionalities. The menus classified under each functionality are configured in a hierarchical structure for presenting on the Web portal corresponding to the functionality. A context bar is defined for the Web portal by defining at least one context element. Thereafter, mapping is defined for at least one field of one or more menus presented under the Web portal with one of the at least one context element. The mapping allows auto-filling of fields of an invoked menu with the value of the mapped context element, thereby reducing the manual effort of a user.
Abstract:
A system, method and computer program product for facilitating non-interruptive transactions is provided, wherein the transactions are initiated at one or more transaction channels. The system comprises one or more transaction processing servers configured to perform transactions initiated at the transaction channels, each transaction processing server comprising predetermined logic for performing the initiated transactions. The system further comprises one or more monitors configured to monitor the availability of the transaction processing servers and forward the availability information to an integration module. The integration module is configured to forward the transactions initiated at the transaction channels to at least one transaction processing server based on the received availability information and predetermined criteria for forwarding transactions for processing to the transaction processing servers.
Abstract:
A method and a system have been disclosed for detecting one or more memory leaks in a program. The method includes receiving the program code. After receiving the program, the program is tokenized automatically in a predefined format. The predefined format may correspond to a format which is up-loadable to a database. Thereafter, the tokenized program code is analyzed to determine control flows in the program by using a memory leak pattern. The memory leak pattern is an incorrect control flow between the combination of memory allocation and memory de-allocation functions. After analyzing the tokenized program, the memory leaks are identified based on the determined control flows in the program. The memory leaks are identified during the development phase of the program code. Subsequently, the memory leaks are fixed by a programmer.
Abstract:
A method and a system have been described for maintaining a plurality of statuses corresponding to each of one or more cheque leaves of a cheque-book. Each of the plurality of statuses depicts a cheque leafs corresponding life-cycle stage. Various examples of the plurality of statuses may include, but are not limited to, "Issued but not acknowledged for use", "Unused", "Passed", "Stopped", "Revoked", "Cautioned", "Destroyed", "Return Paid", and "Rejected". The method described above includes assigning a default status to each cheque leaf. The default status is assigned to the cheque leaf while issuing the cheque-book to a customer. Once the cheque-book is issued, the default status and one or more statuses corresponding to each cheque leaf are maintained. Each of the one or more statuses is assigned to the cheque leaf based on the occurrence of a corresponding event from a list of pre-defined events.
Abstract:
A method and a system have been disclosed for the preemptive detection of occurrence of one or more faulty conditions based on the usage of one or more resources. The faulty conditions are detected during an execution of a program; the program includes at least one function. The method includes initializing Application Program Interfaces (APIs) across the at least one function. After this, calls to the APIs used within a namespace of the program are intercepted. The interception is performed by the at least one function through extended method classes. Thereafter, the usage of the resources for the at least function intercepting the APIs is checked against a corresponding predetermined threshold limit. Once the usage of the resources is checked, context of the usage of the resources is identified based on a predefined knowledge. Subsequently, the occurrence of the faulty conditions is determined based on the identification.