Sign In to Follow Application
View All Documents & Correspondence

Generating Instruction Sets Implementing Rules Designed To Update Objects Specified According To An Application Data Model

Abstract: An aspect of the present disclosure generates instruction sets implementing rules designed to update objects specified according to an application data model. In one embodiment rules designed to update objects are processed to form a set of buckets (of rules) such that each bucket contains rules that do not have inter dependency in execution order. Then for each bucket subsets of rules designed to update a common object are determined and a corresponding single instruction set is generated for each determined subset of rules. The instruction sets generated for the subsets of rules contained in each bucket are then executed concurrently.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
09 March 2017
Publication Number
21/2017
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application
Patent Number
Legal Status
Grant Date
2024-01-25
Renewal Date

Applicants

ORACLE FINANCIAL SERVICES SOFTWARE LIMITED
Oracle Park, Off. Western Express Highway, Goregaon (East), Mumbai 400063 (IN).

Inventors

1. NAGULAKONDA Gangadhar
Gopalan Enterprises (I) Pvt Ltd, (SEZ), Global Axis, Unit-I, # 152, EPIP Zone, Whitefield, Bangalore 560066 (IN).
2. VADAPANDESHWARA Rajaram Narasimha
Gopalan Enterprises (I) Pvt Ltd, (SEZ), Global Axis, Unit-I, # 152, EPIP Zone, Whitefield, Bangalore 560066 (IN).

Specification

GENERATING INSTRUCTION SETS IMPLEMENTING RULES DESIGNED TO UPDATE OBJECTS SPECIFIED ACCORDING TO AN APPLICATION DATA MODEL
Priority Claim
5 [001] The instant patent application is related to and claims priority from the below co-pending applications, which are incorporated in their entirety herewith:
[002] A. India patent application entitled, "Generating Instruction Sets Implementing Business Rules Designed To Update Business Objects Of Financial Applications", naming the same Applicant as in the instant patent application, Serial No.: 4421/CHE/2014, Filed: 09-September-
10 2014; and
[003] B. U.S. Non Provisional Patent Application entitled "Generating Instruction Sets Implementing Business Rules Designed To Update Business Objects Of Financial Applications", naming the same Applicant as in the instant patent application, Serial No. 14/595,223, filed 13-JAN-2015
15
Background [004] Technical Field
[005] The present disclosure relates to enterprise application servers, and more specifically to generating instruction sets implementing rules designed to update objects specified according to
20 an application data model.
[006] Related Art
[007] Applications are used to process data and provide corresponding desired functionality.
Financial applications are a class of applications which relate to management of financial 25 instruments such as credit cards, loans, bank accounts, etc. Financial applications find use in
diverse business enterprises such as banks, insurance companies, stock brokerages, etc., as is
well known in the relevant arts.
[008] Applications are often developed on the basis of data models ("application data models"),
which can be different from the data model according to which the data is stored. For example, 30 data may be stored in the form of tables according to relational database model, while the
applications may be developed based on objects (hereafter "data objects") specified according to
an application data model. A data object is defined to contain various attributes, with an instance
("object instance") of the data object having corresponding values for respective attributes.
[009] Rules are employed in applications to update data objects specified according to 35 application data models. Rules are at a conceptual level, which are understandable to users (e.g.,
administrators, managers, analysts, senior management, etc.), who may not be conversant with

corresponding implementations closer to the level (e.g., programming language, SQL queries,
etc.) at which machines are able to operate.
[010] Updating a data object implies a change to corresponding values of one or more attributes
of respective object instances of the data object. As a simple case, a bank may have a rule that
updates an interest rate depending on different levels of credit ratings of the customer (high risk,
medium risk and low risk) and the type of the loan (e.g., home, car, personal, etc.). As may be
readily appreciated, performance of the rule causes a change to multiple object instances.
Complex rules typically involve several more variables/dimensions, update to multiple attributes
and/or complex computations for the values of the updated attributes.
[Oil] Rules are converted to equivalent instruction sets, which are more suitable for execution on
machines. For example, assuming that data objects are stored in relational database systems, the
instruction sets include SQL (structured query language) queries directed to the tables of the
relational database systems.
[012] Aspects of the present disclosure are directed to generating instruction sets implementing
rules designed to update objects specified according to an application data model.
Brief Description of the Drawings [013] Example embodiments of the present disclosure are described with reference to the accompanying drawings briefly described below.
[014] Figure 1 is a block diagram illustrating an example environment in which several aspects of the present disclosure can be implemented.
[015] Figure 2 is a flow chart illustrating the manner in which instruction sets implementing rules designed to update objects specified according to an application data model are generated according to an aspect of the present disclosure.
[016] Figure 3A illustrates the manner in which rules are specified for execution in one embodiment.
[017] Figure 3B illustrates the manner in which rules are processed according to several aspects of the present disclosure in one embodiment.
[018] Figure 4A illustrates the manner in which the subsets of rules determined as being suitable for merging are displayed to a user in one embodiment.
[019] Figure 4B illustrates the manner in which the results of merging subsets of rules are displayed to a user in one embodiment.
[020] Figure 5 is a block diagram illustrating the details of a digital processing system in which several aspects of the present disclosure are operative by execution of appropriate software instructions.

WO 2016/038478

PCT/IB2015/055820

[021] In the drawings, like reference numbers generally indicate identical, functionally similar, and/or structurally similar elements. The drawing in which an element first appears is indicated by the leftmost digit(s) in the corresponding reference number.
5 Description of Example Embodiments
[022] 1. Overview
[023] An aspect of the present disclosure generates instruction sets implementing rules designed to update objects specified according to an application data model. In one embodiment, rules designed to update objects are processed to form a set of buckets (of rules) such that each bucket
10 contains rules that do not have inter-dependency in execution order. Then, for each bucket, subsets of rules designed to update a common (data) object are determined, and a corresponding single instruction set is generated for each determined subset of rules. The instruction sets generated for the subsets of rules contained in each bucket are then executed concurrently. [024] By generating a single instruction set (for example, translated eventually into a single SQL
15 query) for each subset of rules updating a common object, the total duration such a common object is required for processing of the rules of a bucket may be reduced. Assuming that exclusive access (e.g., using locking of the table/columns in a database) is to be provided to an object during such updates, the duration of exclusive access is also accordingly reduced, thereby reducing probability of conflicting contention for the same object with other applications
20 requiring exclusive access to the object. In addition, by executing instruction sets corresponding to rules within a bucket concurrently, similar efficiencies may be obtained at least when the underlying environment provides sufficient multi-processing capabilities.
[025] According to another aspect of the present disclosure, the subsets of rules determined in a bucket are sent for display, while indicating that each of the subsets of rules can be merged (that
25 is, a single instruction set can be generated). As such, the generating of instruction sets corresponding to the subsets of rules is performed only if an input data is received from a user, indicating that each of the subsets of rules is to be merged.
[026] Accordingly, the user (of an application) is facilitated to indicate the specific subsets that are to be merged (and a single instruction set generated), and which subsets are not to be merged
30 (that is, individual instructions sets for each rule is to be generated). Thus if the input data (received from the user) indicates that a specific rule in a subset of rules is to be excluded from merging, the corresponding single instruction set for the subset of rules is generated excluding the specific rule (that is, only for the other rules in the subset). As a result, a user may be provided enhanced control over the merger of rules.
3

[027] According to one more aspect of the present disclosure, a precedence data is received indicating a corresponding set of rules that are to be executed prior to execution of each rule. Accordingly, the buckets are formed such that the corresponding set of rules is not included in the same bucket containing the rule (since the rule has a dependency on the corresponding set of rules for execution).
[028] According to yet another aspect of the present disclosure, the objects specified according to the application data model are stored in a relational database server. As such, each rule, if executed independently, would be implemented as a corresponding SQL (structured query language) command directed to the relational database server. Also, the corresponding single instruction set is implemented in the form of a single SQL command directed to the relational database server. Accordingly, the different SQL commands that would be executed corresponding to the rules in a subset are replaced by the single SQL command. [029] Several aspects of the present disclosure are described below with reference to examples for illustration. However, one skilled in the relevant art will recognize that the disclosure can be practiced without one or more of the specific details or with other methods, components, materials and so forth. In other instances, well-known structures, materials, or operations are not shown in detail to avoid obscuring the features of the disclosure. Furthermore, the features/aspects described can be practiced in various combinations, though only some of the combinations are described herein for conciseness. [030] 2. Example Environment
[031] Figure 1 is a block diagram illustrating an example environment in which several aspects of the present disclosure can be implemented. The block diagram is shown containing end user systems 110A-110Z, Internet 120, intranet 130, server systems 140A-140C, administrator system 150, and data stores 180A-180B.
[032] Merely for illustration, only representative number/type of systems is shown in the Figure. Many environments often contain many more systems, both in number and type, depending on the purpose for which the environment is designed. Each system/ device of Figure 1 is described below in further detail.
[033] Intranet 130 represents a network providing connectivity between server systems 140A-140C, administrator system 150 and data stores 180A-180B all provided within an enterprise (shown with dotted boundaries). Internet 120 extends the connectivity of these (and other systems of the enterprise) with external systems such as end user systems 110A-110Z. Each of intranet 140 and Internet 120 may be implemented using protocols such as Transmission Control Protocol (TCP) and/or Internet Protocol (IP), well known in the relevant arts. In general, in TCP/IP environments, an IP packet is used as a basic unit of transport, with the source address

being set to the IP address assigned to the source system from which the packet originates and
the destination address set to the IP address of the destination system to which the packet is to be
eventually delivered.
[034] An IP packet is said to be directed to a destination system when the destination IP address
of the packet is set to the IP address of the destination system, such that the packet is eventually
delivered to the destination system by networks 120 and 130. When the packet contains content
such as port numbers, which specifies the destination application, the packet may be said to be
directed to such application as well. The destination system may be required to keep the
corresponding port numbers available/open, and process the packets with the corresponding
destination ports. Each of Internet 120 and intranet 130 may be implemented using any
combination of wire-based or wireless mediums.
[035] Each of data stores 180A-180B represents a non-volatile (persistent) storage facilitating
storage and retrieval of a collection of data by enterprise applications (such as financial
application, analytical frameworks, etc.) executing in other systems of the enterprise such as
server systems 140A-140C and administrator system 150.
[036] Each of the data stores 180A-180B may be implemented as a database server using
relational database technologies and accordingly provide storage and retrieval of data using
structured queries such as SQL (Structured Query Language). Alternatively, each of data stores
180A-180B may be implemented as a file server providing storage and retrieval of data in the
form of files organized as one or more directories, as is well known in the relevant arts.
[037] In one embodiment, the data maintained in data stores 180A-180B is provided access
according to an application data model (provided external to the data stores) containing data
objects, attributes and object instances, as noted above in the Background Section. When stored
in a relational database system, a data object may correspond to one or more tables, with each
attribute corresponding to a respective column of such table (s) and each object instance
corresponding to a row in such table (s). When stored in a file server, each data object may
correspond to one or more files, with each object instance represented by a set of lines in the
file(s), each line in turn specifying an attribute and corresponding value.
[038] Each of end user systems 110A-110Z represents a system such as a personal computer,
workstation, mobile station, mobile phones, computing tablets, etc., used by users to generate
and send user requests directed to specific systems of the enterprise. The user requests may be
generated using appropriate user interfaces (for example, web pages provided by applications
executing in the enterprise). For example, the users may send user requests for performing
various tasks to enterprise applications executing in server systems 140A-140C.
[039] Each of server systems 140A-140C represents a server, such as a web/application server,
5

executing enterprise applications (such as financial applications, analytical frameworks, etc.) capable of performing tasks requested by users using end user systems 110A-110Z. In response to receiving requests from end user systems, each server system performs the tasks specified in the requests and sends the result of performance of the tasks to the requesting end user system. Each server system may use data stored internally (for example, in a non-volatile storage/hard disk within the server), external data (e.g., maintained in data stores 180A-180B) and/or data received from external sources (e.g., from the user) in performing such tasks. [040] Administrator system 150, represents a server, such as a web/application server, that facilitates users to manage (create, update, delete) the corresponding data accessed by the different enterprise applications executing in server system 140A-HOC. In one embodiment, an analytical framework executing in administrator system 150 facilitates users to specify rules for updating the objects specified according to an application data model, with the framework then converting the rules to corresponding instruction sets (for example, SQL queries) as suitable to the implementation of data stores 180A-180B. An example of such an analytical framework is Oracle Financial Services Analytical Applications (OFSAA) available from Oracle Corporation, the intended assignee of the instant application.
[041] In one prior approach, the analytical framework converts each rule into a corresponding instruction set (that is, the number of instruction sets equals the number of rules). It is accordingly desirable that an optimal (lesser) number of instruction sets be generated for a given set of rules. Administrator system 150, extended according to several aspects of the present disclosure, facilitates the generation of such optimal instruction sets implementing rules designed to update objects specified according to an application data model, as described below with examples.
[042] 3. Generating Instruction Sets Implementing Rules
[043] Figure 2 is a flow chart illustrating the manner in which instruction sets implementing rules designed to update objects specified according to an application data model are generated according to an aspect of the present disclosure. The flowchart is described with respect to Figure 1, in particular, administrator system 150 merely for illustration. However, many of the features can be implemented in other environments (and using potentially other types of systems/servers) also without departing from the scope and spirit of several aspects of the present disclosure, as will be apparent to one skilled in the relevant arts by reading the disclosure provided herein.
[044] In addition, some of the steps may be performed in a different sequence than that depicted below, as suited to the specific environment, as will be apparent to one skilled in the relevant arts. Many of such implementations are contemplated to be covered by several aspects of the

present disclosure. The flow chart begins in step 201, in which control immediately passes to
step 210.
[045] In step 210, administrator system 150 receives rules designed to update data objects
specified according to an application data model. Thus, each rule contains operator(s) and
operand(s), with at least one of the operands being data objects or corresponding attribute(s).
The rules may be received from a user using one of end user systems 110A-1 10Z.
[046] In step 220, administrator system 150 forms buckets of rules such that rules in each bucket
do not have inter-dependency in execution order. Inter-dependency is said to exist if the
execution of a later rule is required to commence only after completion of execution of a prior
rule in the execution order. In the absence of such inter-dependency, both rules can potentially be
performed concurrently.
[047] In an embodiment described below, a user specifies a precedence data/ordering (i.e.,
manual indication of which prior rules have to be completed for performance of a given rule),
though such or other dependencies may be inferred by examining the inputs and outputs
specified for each rule. In such a scenario, administrator system 150 ensures that the prior rules
are not included in the bucket containing the given rule.
[048] In step 230, administrator system 150 selects a bucket from the one or more buckets
formed at step 220. In particular, a bucket whose rules have not been processed (as per steps 240
through 270 described below) is selected. The selection of such unprocessed bucket may be
performed in a known way. For example, each bucket may be associated with a flag indicating
whether the corresponding bucket has been processed (a first value) or not (a second value).
Accordingly, administrator system 150 may select a bucket whose flag is set to the second value.
[049] In step 240, administrator system 150 identifies data objects (and corresponding attributes)
updated by each rule of the selected bucket. The identification of the data objects updated may
be determined by examining a meta-data maintained by the analytical framework.
[050] In step 250, administrator system 150 determines subsets of rules that update the same data
object. In other words, the rules in a bucket that update a same data object are included in the
same subset. In an embodiment, the determined subsets of rules are sent for display on a display
unit (associated with one of end user systems 110A-110Z) while indicating that each of the
subsets of the rules can be merged (that is, a single instruction set can be generated). A user is
enabled to select the specific subsets and/or the specific rules in each subset to be merged. The
description is continued assuming that an input data indicating that all of the subsets of rules are
to be merged is received from the user.
[051] In step 260, administrator system 150 generates a single instruction set for each of the
subset of rules. The single instruction set generated for a subset is designed to perform the

updates of the values (as determined by the rules in the subset) for the attributes of the data
object (corresponding to the subset). In an embodiment, the single instruction set is formed as a
single SQL statement, for example, as a "MERGE" statement having multiple columns for
update.
[052] In step 270, administrator system 150 marks the different instruction sets (generated for
different subsets of rules) for concurrent execution. In other words, if four subsets of rules are
formed in step 250, the corresponding four instruction sets can be executed concurrently.
[053] In step 280, administrator system 150 checks whether there are more buckets to be
processed (that is, whose flag is set to the second value). Prior to such checking, administrator
system 150 first sets the flag associated with the selected bucket to the first value to indicate that
the selected bucket as been processed. Control passes to step 230 if there are more buckets,
wherein a new (not yet processed) bucket is selected or to step 299 otherwise (after all the
buckets have been processed). The flowchart ends in step 299.
[054] Thus, by identifying which of a given set of rules can be combined into a single instruction
set, optimal instruction sets may be generated for the given set of rules designed to update data
objects. Furthermore, by enabling a user (such as a manager, who operates at a high conceptual
level) to select the specific rules to be merged, it may be appreciated that the selection of the
rules may be performed based on business/ financial considerations, rather than based on the
underlying implementation of the data objects.
[055] The manner in which administrator system 150 may perform the generation of instruction
sets according to Figure 2 is illustrated below with examples.
[056] 4. Illustrative Example
[057] Figures 3A-3B and 4A-4B together illustrate the manner in which instructions sets
implementing rules designed to update objects specified according to an application model are
generated in one embodiment. Each of the Figures is described in detail below.
[058] Figure 3A illustrates the manner in which rules are specified for execution in one
embodiment. For illustration, the rules are shown specified in the form of a table (having rows
and columns). However, in alternative embodiments, the rules may be specified in any
convenient manner, using appropriate user interfaces. An example user interface for specifying
rules is described in detail in US Patent No. 8,856,126, entitled "SIMPLIFYING GROUPING
OF DATA ITEMS STORED IN A DATABASE".
[059] Thus, table 310 depicts a set of rules (designed to update data objects) specified in the
analytical framework by a user using one of end user systems 110A-110Z. Column 311 ("Rule
Id") specifies a unique identifier (such as Rl, R2, etc.) of the rule, column 312 ("Hierarchies/
Domains") specifies a corresponding sets of values (named HI, H2, etc.) that are used as inputs

by the rule, and column 313 ("Measures/Range") specifies the attributes (of various data objects)
such as Ml, M2, etc. that are updated by the rule.
[060] Each hierarchy/domain represents a corresponding set of potential values that may be
stored in an attribute of a data object. The potential values are organized in the form of a tree
data structure, well known in the arts. Each measure represents a corresponding one or more
attributes (in a data object) that are to be updated with the result of performing an associated set
of computations. When data objects are stored in a relational database system, each hierarchy
represents the potential values that may be stored in a column in the database system, while each
measure represents a column (of a table) in the database system.
[061] Each of the rows of table 310 specifies a corresponding rule to be employed for updating
data objects of an enterprise application. In general, each rule specifies for various combinations
of the values of the hierarchies/domains (the inputs in column 312), corresponding computations
whose resultant values are to be stored in the measures/range (in column 313). For example, row
318 indicates that a rule uniquely identified by the name "R3" specifies for various combinations
of the values in hierarchies H4 and H5 corresponding computations whose resultant values are
updated in measure M4. Similarly, other rows specify the details of corresponding rules.
[062] Table 320 depicts a set of measures specified in the analytical framework, typically by a
developer/administrator of the analytical framework. Column 321 ("Measure Id") specifies a
unique identifier (such as Ml, M2, etc.) of the measure, while columns 322 ("Object(s)") and
323 ("Attribute^)") specifies the corresponding data objects and attributes represented by the
measure.
[063] Each of the rows of table 320 specifies a corresponding measure that may be updated by
rules specified in the analytical framework. For example, row 328 indicates that the measure M4
(updated by rule R3 as indicated by row 318) corresponds to attributes A5 and A6 contained in
the data object Bl. Similarly, other rows specify the details of corresponding measures used in
the analytical framework.
[064] Table 330 depicts a set of processes defined as part of a run definition in the analytical
framework. A run definition represents an application process flow which is specified in the
form of a sequence of processes/steps (performed in a sequential order). A user may indicate one
or more components (such as a rule) provided by the analytical framework as a process in the run
definition. In the description below, the various processes of the run definition are assumed to
indicate only rules.
[065] Thus, table 330 depicts a set of process steps specified in the analytical framework by a
user using one of end user systems 110A-110Z. Column 331 ("Process Id") specifies an
identifier (such as PI, P2, etc.) of the process for the process step. It should be noted that the

same process identifier may be repeated in multiple rows to indicate that the corresponding process steps specifies in the multiple rows are part of the same process. Column 332 ("Rule Id") specifies the identifier of a rule that is to be executed as the process step, and column 333 ("Precedence") indicates which prior rules have to be completed for performance of the rule specified in the corresponding process step. The lack (as indicated by the symbol "-") of a prior rule implies that the rule (such as Rl, R2, R3) may be executed concurrently. [066] Each of the rows in table 330 specifies a sequence of processes (PI, P2), with each process indicated to execute a corresponding set of rules. For example, process PI is indicated (based on the same identifier PI in column 331) to execute rules Rl, R2, R4, R6, R3, R5 and R9 as corresponding process steps. Some of the rules are shown (in column 333) as having an inter-dependency on prior rules implying that the execution of the rule is to be commenced only after the completion of execution of the one or more prior rules. For example, row 338 indicates that rule R4 has inter-dependency on rule R2 to imply that the execution of rule R4 can be commenced only after the completion of execution of rule R2.
[067] It may be appreciated that the sequence and precedence noted above enforces an execution order among the rules. In the disclosure herein, it is assumed that a user checks for various conditions that can cause inter-dependency and specifies the sequence in line with the conditions present among the rules. For example, the user may check whether two rules update measures that are mapped to the same attribute in the same data object, and accordingly specify that inter-dependency exists between the two rules. In alternative embodiments, such inter-dependency in execution order may be determined by administrator system 150 by inspecting the various measures updated by each rule.
[068] Thus, a user is enabled to specify the desired measures corresponding to attributes of objects specified according to an application data model, rules for updating the measures (and correspondingly the attributes of the data objects), and a run definition specifying a sequence of rules to be executed according to a desired execution order. The manner in which the user specified rules may be processed by administrator system 150 to generate optimal instructions sets is described below with example. [069] 5. Processing Rules
[070] Figure 3B illustrates the manner in which rules are processed in one embodiment. In particular, the processing of the rules specified in Figure 3A for the process PI is shown in Figure 3B and is described in detail below.
[071] Administrator system 150, in response to receiving the run definition of table 330, first forms buckets of rules for the process PI such that the rules in each bucket do not have inter-dependency in execution order. In general, rules having no prior rules indicated (by the symbol

"-") in the precedence data of column 333 are grouped into a common bucket. Any rule having a
prior rule indicated in the precedence data is then grouped into other buckets based on the bucket
to which the prior rule belongs. In particular, the prior rules are not included in the same bucket
as the rule being grouped.
[072] Table 340 specifies the set of buckets formed for the rules in process PI of the received run
definition (table 330). Each bucket (such as #1, #2) is shown containing a corresponding
group/set of rules (such as {Rl, R2, R3, R9} and {R4, R5, R6}). It may be noted that bucket # 1
is formed from the rules having no precedence rules (as indicated by '-' in table 330). The other
rules R4, R5 and R6 are shown grouped into bucket #2 since all the rules have corresponding
precedence rules belonging to the same bucket #1.
[073] Administrator system 150 may thereafter process each bucket of rules. Tables 350 and 355
together illustrates the manner in which the rules in bucket # 1 are processed, while tables 360
and 365 together illustrates the manner in which the rules in bucket #2 are processed. The
manner in which the rules in bucket # 1 are processed is described in detail below.
[074] Administrator system 150 first identifies the data objects (and attributes) updated by each
rule in bucket #1. The identification may be performed by first identifying the measures updated
by each rule based on table 310, and thereafter determining the specific attributes/data objects
corresponding to the updated measures based on table 320. Tables 350 depicts the data objects
(Bl and B2) and corresponding attributes (such as Al, A2, etc.) identified by administrator
system 150 for the rules in bucket # 1 (that is, {Rl, R2, R3, R9}).
[075] Administrator system 150 then determines subsets of rules that update the same data object.
Table 355 indicates the various subsets of rules determined for bucket #1. It may be observed
that the rules Rl, R3 and R9 are shown to be included in a first subset as all these rules update
the same data object Bl, while rule R2 is shown included in a second subset as the rule R2
update a different data object B2.
[076] Administrator system 150 then generates a single instruction set for the rules {Rl, R3, R9}
and another instruction set for the rules {R2}. Similarly, administrator system 150 processes (as
shown in tables 360 and 365) the rules in bucket #2 (that is, {R4, R5, R6}), and generate
respective instruction sets for the subsets {R4, R6} and {R5}. It may be observed that only 4
instruction sets are generated corresponding to the four subsets of rules determined for the
process PI. This is in contrast to the 7 instructions sets that would have been generated
(corresponding to the seven rules in process PI) in the prior approach noted above.
[077] Table 380 illustrates the manner in which the determined subsets of rules are provided to a
user as part of a run definition. Table 380 is similar to table 330, and accordingly the description
of the common elements is not repeated here for conciseness. It may be observed that each

subset of rules is shown as a sub-process (such as SIl, S12, S21, etc.) under the corresponding process (PI, P2) in the run definition. Each sub-process is shown containing the various rules determined to be in the subset by administrator system 150. For example, sub-process Sll corresponds to the subset of rules {Rl, R3, R9} determined by administrator system 150 for bucket # 1 (as shown in table 355).
[078] In one embodiment, administrator system 150 generates a single instruction set for the various rules specified as part of a sub-process. Accordingly, the determined subsets of rules that are to be merged are shown as corresponding sub-processes in table 380. However, in alternative embodiments, the sub-processes may be used merely for visual representation of the subsets. Administrator system 150 may then store additional data (for example, a number indicating the subset) indicating the rules that belong to the various subsets, and accordingly generate single instructions sets based on the additional data.
[079] According to an aspect of the present disclosure, the determined subsets of rules are displayed to a user, for example, on a display unit (not shown in Figure 1) associated with one of end user systems 110A-110Z. The merging (generation of the single instruction set) of the subsets of rules is performed only in response to an input data (received from the user) indicating that such merging (of the corresponding subsets) is to be performed. The manner in which administrator system 150 may display the determined subsets and receive input data from users (using end user system 110A-1 10Z) is described below with examples. [080] 6. Displaying Rules for Merging
[081] Figure 4A illustrates the manner in which the subsets of rules determined as being suitable for merging are displayed to a user in one embodiment. While the example environment herein corresponds to a banking/financial application, the features described herein can be applied to other environments employing similar architectures.
[082] Display area 400 depicts a portion of a user interface provided on a display unit (not shown in Figure 1) associated with one of end user systems 110A-110Z (assumed to be 110A for illustration). In one embodiment, display area 400 corresponds to a browser displaying respective web pages provided by administrator system 150. The web pages are provided in response to a user sending appropriate requests (for example, by specifying corresponding URLs) using the browser in end user system 110A.
[083] In particular, the user interface of display area 400 facilitates a user/manager to view (and edit) the details of a process/run definition. Display area 410 provides the details such as the name, type, version, etc. of the process definition. Display area 420 depicts the hierarchy of the process steps specified as part of the process definition. In particular, display area 420 indicates

that the process contains two steps named "Non-Sec Pre-Migration RWA-EL" and "Non-Sec
Pre-Migration RWA-UL".
[084] Display area 430 specifies the details of each of the process steps specified in the process
definition. In particular, display area 430 indicates a unique identifier of each object/process step
(same as in display area 420), the precedence of the object (indicating which prior steps/objects/
rules are to be executed before execution of the corresponding step) and the type of the object. It
may be observed that the object type of both the objects/process steps is indicated to be a
Computation Rule.
[085] It may be further observed that both of the objects are shown to be selected (by the
selection of the corresponding checkboxes) indicating that the subset of the two objects/rules can
be merged (and a single instruction set generated). It should be noted that in alternative
embodiments, any appropriate visual highlighting (such as usage of a same color, font, etc.) may
be used to indicate the specific subsets of rules that can be merged. For example, all the rules that
cannot be merged may be displayed in a common color, while each subset of rules may be
displayed with a corresponding unique color (different from the common color).
[086] Accordingly, a user is enabled to indicate the specific subsets that are to be merged using
the user interface of display area 400. For example, the user may exclude a rule in a subset (by
removing the selection in the corresponding checkbox). In addition, the user may observe (based
on the indication/visual highlighting of the subsets), that a specific rule is not included in a
subset of rules in view of the specific rule not updating the common data object updated by the
other rules in the subset. The user may accordingly modify the specific rule to form a modified
rule (that updates the common data object) and then perform the determination of the subsets to
cause the modified rule to be included in the subset (and displayed in display area 430).
[087] After the user has selected the subsets to be merged, the user clicks/ selects "Merge Rules"
link/button 450 to indicate that the selected subsets of rules (here "Non-Sec Pre-Migration
RWA-EL" and "Non-Sec Pre-Migration RWA-UL") are to be merged. In response,
administrator system 150 creates sub-processes corresponding to each of the subsets of rules
indicated to be merged (by the input data received from the user in display area 430).
Administrator system 150 may then display the created sub-processes to the user as described in
detail below.
[088] Figure 4B illustrates the manner in which the results of merging subsets of rules are
displayed to a user in one embodiment. In particular, Figure 4B depicts the results in response to
the user clicking on the "Merge Rules" link 450 in Figure 4A.
[089] Display area 470 depicts the hierarchy of the process steps after merging of the
corresponding subsets of rules. It may be observed that display area 470 indicates that a new

process step named "Merged Exe Sub Process" has been created with the previous two steps "Non-Sec Pre-Migration RWA-EL" and "Non-Sec Pre-Migration RWA-UL" being shown under the new process step. Display area 480 indicates that the new process step "Merged Exe Sub Process" is a sub-process (as indicated by the type).
[090] Thus, a user is displayed the results of merging subsets of rules in the form of various sub-processes of a process definition. The user may thereafter click/ select "Save" button 490 to indicate that the process definition, including the various subsets of rules to be merged is to be saved/stored as part of the process definition. In response to executing the saved process/run definition (of Figure 4B), administrator system 150 generates a single instruction set for the process step "Merged Exe Sub Process", and then executes the single instruction set (concurrently with other single instruction sets) to cause the specific measures to be updated based on corresponding computations.
[091] In one embodiment, the data objects used by the enterprise application are stored in a relational database server. As such, each rule, if executed independently, is implemented as a corresponding SQL (structured query language) command directed to the relational database server. Appendix A depicts the SQL command that may be generated and executed by administrator system 150 if the rule "Non-Sec Pre-Migration RWA-EL" is independently executed. Similarly, Appendix B depicts the SQL command that may be generated for the rule "Non-Sec Pre-Migration RWA-UL". The single instruction set, upon executing, is also implemented in the form of a single SQL command directed to the relational database server. Appendix C depicts the SQL command that may be generated as the single instruction set for the merged subset of rules/sub-process "Merged Exe Sub Process". The SQL command is then executed, while potentially realizing one or more of the efficiencies noted above in the Overview section.
[092] It should be further appreciated that the features described above can be implemented in various embodiments as a desired combination of one or more of hardware, executable modules, and firmware. The description is continued with respect to an embodiment in which various features are operative when the instructions in the executable modules are executed. [093] 7. Digital Processing System
[094] Figure 5 is a block diagram illustrating the details of digital processing system 500 in which several aspects of the present disclosure are operative by execution of appropriate software instructions. Digital processing system 500 corresponds to administrator system 150. [095] Digital processing system 500 may contain one or more processors (such as a central processing unit (CPU) 510), random access memory (RAM) 520, secondary memory 530, graphics controller 560, display unit 570, network interface 580, and input interface 590. All the

components except display unit 570 may communicate with each other over communication path 550, which may contain several buses as is well known in the relevant arts. The components of Figure 5 are described below in further detail.
[096] CPU 510 may execute instructions stored in RAM 520 to provide several features of the present disclosure. CPU 510 may contain multiple processing units, with each processing unit potentially being designed for a specific task. Alternatively, CPU 510 may contain only a single general-purpose processing unit. RAM 520 may receive instructions from secondary memory 530 using communication path 550.
[097] RAM 520 is shown currently containing software instructions constituting shared environment 525 and/or user programs 526 (such as financial applications, analytical framework, etc.). Shared environment 525 contains utilities shared by user programs, and such shared utilities include operating system, device drivers, virtual machines, flow engines, etc., which provide a (common) run time environment for execution of user programs 526. [098] Graphics controller 560 generates display signals (e.g., in RGB format) to display unit 570 based on data/instructions received from CPU 510. Display unit 570 contains a display screen to display the images defined by the display signals (such as the portions of the user interfaces of Figures 4A-4B). Input interface 590 may correspond to a keyboard and a pointing device (e.g., touch-pad, mouse) that may be used to provide various inputs (such as to specify the desired inputs, etc. in the user interfaces of Figures 4A-4B). Network interface 580 provides connectivity to a network (e.g., using Internet Protocol), and may be used to communicate with other connected systems (such as server systems 130A-130C, data stores 180A-180B). [099] Secondary memory 530 may contain hard drive 535, flash memory 536, and removable storage drive 537. Secondary memory 530 represents a non-transitory medium, which may store the data (for example, portions of data shown in Figures 3A-3B) and software instructions (for example, for performing the steps of Figure 2), to enable digital processing system 500 to provide several features in accordance with the present disclosure. The code/instructions stored in secondary memory 530 may either be copied to RAM 520 prior to execution by CPU 510 for higher execution speeds, or may be directly executed by CPU 510.
[0100] Secondary memory 530 may contain hard drive 535, flash memory 536, and removable storage drive 537. Some or all of the data and instructions may be provided on removable storage unit 540, and the data and instructions may be read and provided by removable storage drive 537 to CPU 510. Removable storage unit 540 may be implemented using medium and storage format compatible with removable storage drive 537 such that removable storage drive 537 can read the data and instructions. Thus, removable storage unit 540 includes a computer readable (storage) medium having stored therein computer software and/or data. However, the computer (or

machine, in general) readable medium can be in other forms (e.g., non-removable, random access, etc.).
[0101] In this document, the term "computer program product" is used to generally refer to removable storage unit 540 or hard disk installed in hard drive 535. These computer program products are means for providing software to digital processing system 500. CPU 510 may retrieve the software instructions, and execute the instructions to provide various features of the present disclosure described above.
[0102] The term "storage media/medium" as used herein refers to any non-transitory media that store data and/or instructions that cause a machine to operate in a specific fashion. Such storage media may comprise non-volatile media and/or volatile media. Non-volatile media includes, for example, optical disks, magnetic disks, or solid-state drives, such as storage memory 530. Volatile media includes dynamic memory, such as RAM 520. Common forms of storage media include, for example, a floppy disk, a flexible disk, hard disk, solid-state drive, magnetic tape, or any other magnetic data storage medium, a CD-ROM, any other optical data storage medium, any physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, NVRAM, any other memory chip or cartridge.
[0103] Storage media is distinct from but may be used in conjunction with transmission media. Transmission media participates in transferring information between storage media. For example, transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 550. Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications. [0104] Reference throughout this specification to "one embodiment", "an embodiment", or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present disclosure. Thus, appearances of the phrases "in one embodiment", "in an embodiment" and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
[0105] Furthermore, the described features, structures, or characteristics of the disclosure may be combined in any suitable manner in one or more embodiments. In the above description, numerous specific details are provided such as examples of programming, software modules, user selections, network transactions, database queries, database structures, hardware modules, hardware circuits, hardware chips, etc., to provide a thorough understanding of embodiments of the disclosure. [0106] 8. Conclusion

[0107] While various embodiments of the present disclosure have been described above, it should be understood that they have been presented by way of example only, and not limitation. Thus, the breadth and scope of the present disclosure should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
[0108] It should be understood that the figures and/or screen shots illustrated in the attachments highlighting the functionality and advantages of the present disclosure are presented for example purposes only. The present disclosure is sufficiently flexible and configurable, such that it may be utilized in ways other than that shown in the accompanying figures.
[0109] Further, the purpose of the following Abstract is to enable the Patent Office and the public generally, and especially the scientists, engineers and practitioners in the art who are not familiar with patent or legal terms or phraseology, to determine quickly from a cursory inspection the nature and essence of the technical disclosure of the application. The Abstract is not intended to be limiting as to the scope of the present disclosure in any way.

APPENDIX A SQL generated for Non-Sec Pre-Migration RWA-EL
merge INTO fct_non_sec_exposures TT USING (SELECT *
FROM (SELECT fct_non_sec_exposures.n_acct_skey, fct_non_sec_exposures.n_gaap_skey, fct_non_sec_exposures.n_run_skey, fct_non_sec_exposures.n_mis_date_skey, (fct_non_sec_exposures.n_pre_mitigation_rwa_el ) AS T_ll 3766867 1329_0, (CASE WHEN ((((1=1))) AND NOT (((( CASE WHEN dim_basel_asset_class.f_latest_record_indicator = Y ' THEN dim_basel_asset_class.v_basel_asset_class_code_lvll
END = 'EQ'))) OR (((CASE
WHEN dim_basel_asset_class.f_latest_record_indicator = Y'
THEN dim_basel_asset_class.v_basel_asset_class_code_lvll
END = 'EQ'))) )) THEN 10
ELSE 11
END) AS
CONDJ 137668671329_10, (CASE
WHEN 1=1 THEN fct_non_sec_exposures.n_pre_mitigation_el_amt
ELSE NULL
END * 12.5 ) AS
EXP_1137668671329_10, (fct_non_sec_exposures.n_pre_mitigation_rwa_el ) AS
EXP_1137668671329_11 FROM fct_non_sec_exposures
left outer join dim_cleared_txn_bank_role
18

ON dim_cleared_txn_bank_role. n_cleared_txn_bank_role_id = fct_non_sec_exposures.n_cleared_txn_bank_role_id
left outer join dim_basel_credit_rating
ON dim_basel_credit_rating.n_basel_rating _
fct_non_sec_exposures.n_basel_rating
left outer join dim_basel_asset_class
ON
dim_basel_asset_class.n_basel_asset_class_skey =
fct_non_sec_exposures.n_basel_asset_class_skey
left outer join dim_basel_product_type
ON
dim_basel_product_type.n_basel_prod_type_skey =
fct_non_sec_exposures.n_basel_prod_type_skey
left outer join dim_basell_product_type
ON
dim_basell_product_type.n_basell_prod_type_skey=
fct_non_sec_exposures.n_basell_prod_type_skey
left outer join dim_product
ON fct_non_sec_exposures.n_prod_skey =
dim_product. n_prod_skey
left outer join dim_oecd_indicator
ON dim_oecd_indicator.f_oecd_indicator =
fct_non_sec_exposures.f_oecd_indicator
left outer join dim_party_type
ON dim_party_type.n_party_type_skey =
fct_non_sec_exposures.n_counterparty_type_skey
left outer join dim_exposure_underlying_type
ON
dim_exposure_underlying_type .n_underlying_type_skey =
fct_non_sec_exposures.n_underlying_type_skey
left outer join dim_standard_party_type
ON
dim_standard_party_type. n_standard_party_type_skey =
fct_non_sec_exposures.n_std_counterparty_type_skey

left outer join dim_basel_transaction_type
ON dim_basel_transaction_type. n_basel_txn_type_skey=
fct_non_sec_exposures.n_basel_txn_type_skey
left outer join dim_lob
ON dim_lob.n_lob_skey =
fct_non_sec_exposures.n_lob_skey
left outer join dim_run
ON fct_non_sec_exposures.n_run_skey =
dim_run. n_run_skey
left outerj oin dim_basel l_customer_type
ON dim_basell_customer_type.n_basell_cust_type_skey=
fct_non_sec_exposures.n_basell_cust_type_skey
left outer join dim_gaap
ON fct_non_sec_exposures.n_gaap_skey =
dim_gaap. n_gaap_skey
left outer join dim_dates
ON fct_non_sec_exposures.n_mis_date_skey =
dim_dates. n_date_skey
left outer join dim_country
ON fct_non_sec_exposures.n_country_skey =
dim_country.n_country_skey
left outer join dim_industry
ON fct_non_sec_exposures.n_d_cust_industry_skey =
dim_industry.n_d_cust_industry_skey
left outer join dim_standard_acct_head
ON fct_non_sec_exposures.n_std_acct_head_skey =
dim_standard_acct_head.n_std_acct_head_skey

dim_business_unit.n_business_unit_skey
left outer join dim_run_identifier
ON fct_non_sec_exposures.n_run_identifier_skey =
dim_run_identifier.n_run_identifier_skey
left outerj oin run_parameters
ON fct_non_sec_exposures.n_run_parameter_setup_skey=
run_parameters.n_run_parameter_setup_skey
AND run_parameters.n_run_skey = fct_non_sec_exposures.n_run_skey
AND run_parameters.n_date_skey =
fct_non_sec_exposures.n_mis_date_skey
left outer j oin (run_exe_parameters
inner join dim_run
ON dim_run.n_run_skey = run_exe_parameters.n_run_skey
AND dim_run.n_run_skey = '$RUNSK'
inner j oin dim_org_structure
ON dim_org_structure.v_entity_code =
run_exe_parameters.v_param_value_code
AND dim_org_structure.f_latest_record_indicator = Y '
AND run_exe_parameters.n_run_skey =
dim_run. n_run_skey)
ON run_exe_parameters.n_run_skey = fct_non_sec_exposures.n_run_skey
AND run_exe_parameters.v_param_id = 'LE'
left outer join dim_interest_type
ON dim_interest_type.n_interest_type =
fct_non_sec_exposures.n_interest_type
left outer join dim_capital_comp_group
ON fct_non_sec_exposures.n_underlying_cap_comp_grp_skey =
dim_capital_comp_group.n_cap_comp_group_skey
WHERE (1=1)
AND (dim_dates.d_calendar_date =$ misdate
AND dim_run.n_run_skey = '$RUNSK'))
WHERE ((cond_1137668671329_10 <> 11))) ss
ON (TT.n_acct_skey= ss.n_acct_skey AND TT.n_gaap_skey= ss.n_gaap_skey AND
TT.n_run_skey= ss.n_run_skey AND TT.n_mis_date_skey= ss.n_mis_date_skey)
WHEN matched THEN

UPDATE SET TT.n_pre_mitigation_rwa_el = CASE
WHEN cond_1137668671329_10 = 10 THEN expjl 37668671329_10 ELSE exp_l 137668671329_1 1 END
APPENDIX B SQL generated for Non-Sec Pre-Migration RWA-UL
merge INTO fct_non_sec_exposures TT USING (SELECT *
FROM (SELECT fct_non_sec_exposures.n_acct_skey,
fct_non_sec_exposures.n_gaap_skey,
fct_non_sec_exposures.n_run_skey,
fct_non_sec_exposures.n_mis_date_skey,
(fct_non_sec_exposures.n_pre_mitigation_rwa_ul ) AS
T_1137668723538_0,
(CASE
WHEN (((1=1))) THEN 10
ELSE 11
END) AS
COND_1137668723538_10, ( 12.5 * Coalesce(CASE
WHEN 1 = 1 THEN fct_non_sec_exposures.n_pre_mitigation_capital_ul ELSE NULL END, 0) * CASE
WHEN 1 = 1 THEN
fct_non_sec_exposures.n_ead_pre_mi ligation
ELSE NULL
END) AS
EXP_1137668723538_10,
(fct_non_sec_exposures.n_pre_mitigation_rwa_ul ) AS EXP_1137668723538_11 FROM fct_non_sec_exposures left outer join dim_cleared_txn_bank_role

ON dim_cleared_txn_bank_role.n_cleared_txn_bank_role_id _
fct_non_sec_exposures.n_cleared_txn_bank_role_id
left outer join dim_basel_credit_rating
ON dim_basel_credit_rating.n_basel_rating =
fct_non_sec_exposures.n_basel_rating
left outer join dim_basel_asset_class
ON dim_basel_asset_class.n_basel_asset_class_skey _
fct_non_sec_exposures.n_basel_asset_class_skey
left outer join dim_basel_product_type
ON dim_basel_product_type.n_basel_prod_type_skey =
fct_non_sec_exposures.n_basel_prod_type_skey
left outer join dim_basell_product_type
ON dim_basell_product_type.n_basell_prod_type_skey =
fct_non_sec_exposures.n_basell_prod_type_skey
left outer join dim_product
ON fct_non_sec_exposures.n_prod_skey =
dim_product. n_prod_skey
left outer join dim_oecd_indicator
ON dim_oecd_indicator.f_oecd_indicator =
fct_non_sec_exposures.f_oecd_indicator
left outer join dim_party_type
ON dim_party_type.n_party_type_skey =
fct_non_sec_exposures.n_counte§ arty_type_skey
left outer join dim_exposure_underlying_type
ON dim_exposure_underlying_type.n_underlying_type_skey =
fct_non_sec_exposures.n_underlying_type_skey
left outer join dim_standard_party_type
ON dim_standard_party_type.n_standard_party_type_skey =
fct_non_sec_exposures.n_std_counterparty_type_skey
left outer join dim_basel_transaction_type
ON dim_basel_transaction_type.n_basel_txn_type_skey =
fct_non_sec_exposures.n_basel_txn_type_skey
left outer join dim_lob
ON dim_lob.n_lob_skey = fct_non_sec_exposures.n_lob_skey
left outer join dim_run

ON fct_non_sec_exposures.n_run_skey = dim_run.n_run_skey
left outer join dim_basell_customer_type
ON dim_basell_customer_type.n_basell_cust_type_skey =
fct_non_sec_exposures.n_basell_cust_type_skey
left outer join dim_gaap
ON fct_non_sec_exposures.n_gaap_skey = dim_gaap.n_gaap_skey
left outer join dim_dates
ON fct_non_sec_exposures.n_mis_date_skey =
dim_dates .n_date_skey
left outer join dim_country
ON fct_non_sec_exposures.n_country_skey =
dim_country.n_country_skey
left outer join dim_industry
ON fct_non_sec_exposures.n_d_cust_industry_skey =
dim_industry.n_d_cust_industry_skey
left outer join dim_standard_acct_head
ON fct_non_sec_exposures.n_std_acct_head_skey =
dim_standard_acct_head.n_std_acct_head_skey
left outer join dim_basel_methodology
ON fct_non_sec_exposures.n_basel_method_skey =
dim_basel_methodology.n_basel_method_skey
left outer join dim_basell_issuer_type
ON dim_basell_issuer_type.n_basell_issuer_type_skey =
fct_non_sec_exposures.n_basell_issuer_type_skey
left outer join dim_business_unit
ON fct_non_sec_exposures.n_business_unit_skey =
dim_business_unit.n_business_unit_skey
left outer join dim_run_identifier
ON fct_non_sec_exposures.n_run_identifier_skey =
dim_run_identifier.n_run_identifier_skey
left outer join run_parameters
ON fct_non_sec_exposures.n_run_parameter_setup_skey =
run_parameters.n_run_parameter_setup_skey
AND run_parameters.n_run_skey = fct_non_sec_exposures.n_run_skey
AND run_parameters.n_date_skey =

fct_non_sec_exposures.n_mis_date_skey
left outerjoin(run_exe_parameters
inner join dim_run
ON dim_run.n_run_skey = run_exe_parameters.n_run_skey
AND dim_run.n_run_skey = '$RUNSK'
inner join dim_org_structure
ON dim_org_structure.v_entity_code =
run_exe_parameters.v_param_value_code
AND dim_org_structure.f_latest_record_indicator = Y '
AND run_exe_parameters.n_run_skey =
dim_run. n_run_skey)
ON run_exe_parameters.n_run_skey = fct_non_sec_exposures.n_run_skey
AND run_exe_parameters.v_param_id = 'LE'
left outer join dim_interest_type
ON dim_interest_type.n_interest_type =
fct_non_sec_exposures.n_interest_type
left outer join dim_capital_comp_group
ON fct_non_sec_exposures.n_underlying_cap_comp_g(() _skey =
dim_capital_comp_group.n_cap_comp_group_skey
WHERE (1=1)
AND ( dim_dates.d_calendar_date =$ misdate
AND dim_run.n_run_skey = '$RUNSK'))
WHERE ((cond_1137668723538_10 <> 11))) ss >N (TT.n_acct_skey= ss.n_acct_skey AND TT.n_gaap_skey= ss.n_gaap_skey ANI T.n_run_skey= ss.n_run_skey AND TT.n_mis_date_skey= ss.n_mis_date_skey) /HEN matched THEN UPDATE SET TT.n_pre_mitigation_rwa_ul = CASE
WHEN cond_1137668723538_10 = 10 THEN exp_1137668723538_10 ELSE exp_l 137668723538_1 1 END
APPENDIX C QL generated for Merged Exe Sub Process
lerge INTO fct_non_sec_exposures TT
25

USING (SELECT *
FROM (SELECT fct_non_sec_exposures.n_acct_skey, fct_non_sec_exposures.n_gaap_skey, fct_non_sec_exposures.n_run_skey,
fct_non_sec_exposures.n_mis_date_skey/* next target f (fct_non_sec_exposures.n_pre_mitigation_rwa_el ) AS T_ll 3766867 1329_0, (CASE WHEN ((((1=1)))
AND NOT (((( CASE WHEN dim_basel_asset_class.f_latest_record_indicator = Y ' THEN dim_basel_asset_class.v_basel_asset_class_code_lvll
END = 'EQ'))) OR (((CASE
WHEN dim_basel_asset_class.f_latest_record_indicator = Y'
THEN dim_basel_asset_class.v_basel_asset_class_code_lvll
END = 'EQ'))) )) THEN 10
ELSE 11
END) AS
CONDJ 137668671329_10, (CASE
WHEN 1=1 THEN fct_non_sec_exposures.n_pre_mitigation_el_amt
ELSE NULL
END * 12.5 ) AS
EXP_1137668671329_10, (fct_non_sec_exposures.n_pre_mitigation_rwa_el ) AS
EXP_1137668671329_11, /*next target */ (fct_non_sec_exposures.n_pre_mitigation_rwa_ul ) AS
T_1137668723538_0, (CASE

WHEN (((1=1))) THEN 10
ELSE 11
END) AS
CONDJ 137668723538_10, ( 12.5 * Coalesce(CASE WHEN 1 = 1 THEN
fct_non_sec_exposures .n_pre_mitigation_capital_ul ELSE NULL END, 0) * CASE WHEN 1 = 1 THEN
fct_non_sec_exposures.n_ead_pre_mitigation
ELSE NULL
END ) AS EXP_1 137668723538_10,
(fct_non_sec_exposures.n_pre_mitigation_rwa_ul ) AS
EXP_1137668723538_11 FROM fct_non_sec_exposures
left outer join dim_cleared_txn_bank_role
ON dim_cleared_txn_bank_role.n_cleared_txn_bank_role_id = fct_non_sec_exposures.n_cleared_txn_bank_role_id left outer join dim_basel_credit_rating
ON dim_basel_credit_rating.n_basel_rating = fct_non_sec_exposures.n_basel_rating left outer join dim_basel_asset_class
ON dim_basel_asset_class.n_basel_asset_class_skey = fct_non_sec_exposures.n_basel_asset_class_skey left outer join dim_basel_product_type
ON dim_basel_product_type.n_basel_prod_type_skey = fct_non_sec_exposures.n_basel_prod_type_skey left outer join dim_basell_product_type
ON dim_basell_product_type.n_basell_prod_type_skey= fct_non_sec_exposures.n_basell_prod_type_skey

left outer join dim_product
ON fct_non_sec_exposures.n_prod_skey = dim_product. n_prod_skey
left outer join dim_oecd_indicator
ON dim_oecd_indicator.f_oecd_indicator = fct_non_sec_exposures.f_oecd_indicator
left outer join dim_party_type
ON dim_party_type.n_party_type_skey = fct_non_sec_exposures.n_counterparty_type_skey left outerj oin dim_exposure_underlying_type ON
dim_exposure_underlying_type .n_underlying_type_skey = fct_non_sec_exposures.n_underlying_type_skey left outer join dim_standard_party_type ON
dim_standard_party_type. n_standard_party_type_skey = fct_non_sec_exposures.n_std_counterparty_type_skey left outer join dim_basel_transaction_type ON dim_basel_transaction_type. n_basel_txn_type_skey= fct_non_sec_exposures.n_basel_txn_type_skey left outer join dim_lob ON dim_lob.n_lob_skey = fct_non_sec_exposures.n_lob_skey left outer join dim_run ON fct_non_sec_exposures.n_run_skey = dim_run. n_run_skey left outer join dim_basell_customer_type ON dim_basell_customer_type.n_basell_cust_type_skey= fct_non_sec_exposures.n_basell_cust_type_skey left outer join dim_gaap ON fct_non_sec_exposures.n_gaap_skey = dim_gaap. n_gaap_skey left outer join dim_dates
ON fct_non_sec_exposures.n_mis_date_skey = dim_dates. n_date_skey

left outer join dim_country
ON fct_non_sec_exposures.n_country_skey =
dim_country.n_country_skey
left outer join dim_industry
ON fct_non_sec_exposures.n_d_cust_industry_skey =
dim_industry.n_d_cust_industry_skey
left outer join dim_standard_acct_head
ON fct_non_sec_exposures.n_std_acct_head_skey =
dim_standard_acct_head.n_std_acct_head_skey
left outerj oin dim_basel_methodology
ON fct_non_sec_exposures.n_basel_method_skey =
dim_basel_methodology.n_basel_method_skey
left outer join dim_basell_issuer_type
ON dim_basell_issuer_type.n_basell_issuer_type_skey=
fct_non_sec_exposures.n_basell_issuer_type_skey
left outer join dim_business_unit
ON fct_non_sec_exposures.n_business_unit_skey =
dim_business_unit.n_business_unit_skey
left outer join dim_run_identifier
ON fct_non_sec_exposures.n_run_identifier_skey =
dim_run_identifier.n_run_identifier_skey
left outer join run_parameters
ON fct_non_sec_exposures.n_run_parameter_setup_skey=
run_parameters.n_run_parameter_setup_skey
AND run_parameters.n_run_skey = fct_non_sec_exposures.r
AND run_parameters.n_date_skey =
fct_non_sec_exposures.n_mis_date_skey
left outer j oin (run_exe_parameters
inner join dim_run
ON dim_run.n_run_skey = run_exe_parameters.n_run_skey
AND dim_run.n_run_skey = '27'
inner join dim_org_structure
ON dim_org_structure.v_entity_code =
run_exe_parameters.v_param_value_code
AND dim_org_structure.f_latest_record_indicator = Y '
29

AND run_exe_parameters.n_run_skey = dim_run. n_run_skey)
ON run_exe_parameters.n_run_skey = fct_non_sec_exposures.n_run_skey AND run_exe_parameters.v_param_id = 'LE' left outer join dim_interest_type ON dim_interest_type.n_interest_type = fct_non_sec_exposures.n_interest_type left outer join dim_capital_comp_group
ON fct_non_sec_exposures.n_underlying_cap_comp_grp_skey = dim_capital_comp_group.n_cap_comp_group_skey WHERE (1=1)
AND (dim_dates.d_calendar_date = To_date ('20140723', 'yyyymmdd') AND dim_run.n_run_skey = '27' ) AND ( (1= 1) AND (1=1) AND (9 = 9)))
WHERE ((cond_l 137668671329_10 oil) OR (cond_l 137668723538_10 o 11))) ss
ON (TT.n_acct_skey= ss.n_acct_skey AND TT.n_gaap_skey= ss.n_gaap_skey l TT.n_run_skey= ss.n_run_skey AND TT.n_mis_date_skey= ss.n_mis_date_skey WHEN matched THEN UPDATE SET TT.n_pre_mitigation_rwa_el = CASE
WHEN cond_l 137668671329_10 = 10 THEN
expjl 37668671329_10
ELSE exp_l 137668671329_1 1 END, TT.n_pre_mitigation_rwa_ul = CASE
WHEN cond_1137668723538_10 = 10 THEN
exp_1137668723538_10
ELSE exp_l 137668723538_1 1 END

I/WE CLAIM:
1. A computer implemented method comprising:
receiving a plurality of rules, each rule designed to update a corresponding set of objects specified according to an application data model, each object containing respective attributes according to said application data model;
forming a set of buckets, each bucket containing rules of said plurality of rules that do not have inter-dependency in execution order, wherein rules having inter-dependency in execution order are placed into different buckets of said set of buckets; for each bucket of said set of buckets:
determining a plurality of subsets of rules contained in the bucket, wherein rules of each subset of rules are designed to update respective different attributes of a common object according to said application data model;
generating a corresponding single instruction set for each subset of said plurality of subsets of rules; and
executing concurrently, the instruction sets generated for said plurality of subsets of rules contained in the bucket.
2. The method of claim 1, wherein said determining determines a first plurality of subsets
of rules in a first bucket of said set of buckets, wherein said first plurality of subset of rules
includes a first subset of rules, said method further comprising:
sending for display said first plurality of subsets of rules, including said first subset of rules, while indicating that each of said first plurality of subsets of rules can be merged,
wherein said generating is performed for said first subset of rules only if an input data is received, from a user, indicating that said first subset of rules is to be merged.
3. The method of claim 2, wherein said first plurality of subset of rules also includes a
second subset of rules,
wherein said input data indicates that a first rule of said second subset of rules is to be excluded from merging,
wherein said generating generates said corresponding single instruction set for said second subset of rules excluding said first rule.
4. The method of claim 2 or 3, wherein said first plurality of subset of rules includes a
third subset of rules designed to update a third object, wherein a third rule also of said first

bucket is not included in said third subset of rules in view of said third rule not updating said third object, said method further comprising:
receiving a modified rule of said third rule, wherein said modified rule is designed to update said third object,
wherein said determining and said generating are performed again to cause said modified rule to be included in said third subset of rules and said corresponding single instruction set for said third subset of rules to be generated to include said modified rule.
5. The method of any preceding claims, wherein a first rule and a second rule is deemed
to have inter-dependency if the execution of said second rule is required to commence only after
completion of execution of said first rule according to said execution order, wherein said first
rule and said second rule is contained in said plurality of rules,
wherein said forming includes said first rule in a first bucket and said second rule in a second bucket different from said first bucket, wherein said first bucket and said second bucket are contained in said set of buckets.
6. The method of claim 5, wherein said receiving also receives a precedence data
indicating a corresponding set of rules that are required to be executed prior to execution of each
rule of said plurality of rules,
wherein said precedence data indicates that said first rule is required to be executed prior to said second rule.
7. The method of any preceding claims, wherein the objects specified according to said
application data model are stored in a relational database server,
wherein each of said plurality of rules, if executed independently, would be implemented as a corresponding SQL (structured query language) command directed to said relational database server,
wherein said corresponding single instruction set, upon said executing, is implemented in the form of a single SQL command directed to said relational database server.
8. A non-transitory machine readable medium storing one or more sequences of
instructions for enabling a system to support management of rules, wherein execution of said one
or more instructions by one or more processors contained in said system enables said system to
perform the actions of:

receiving a plurality of rules, each rule designed to update a corresponding set of objects specified according to an application data model, each object containing respective attributes according to said application data model;
forming a set of buckets, each bucket containing rules of said plurality of rules that do not have inter-dependency in execution order, wherein rules having inter-dependency in execution order are placed into different buckets of said set of buckets; for each bucket of said set of buckets:
determining a plurality of subsets of rules contained in the bucket, wherein rules of each subset of rules are designed to update respective different attributes of a common object according to said application data model;
generating a corresponding single instruction set for each subset of said plurality of subsets of rules; and
executing concurrently, the instruction sets generated for said plurality of subsets of rules contained in the bucket.
9. The non-transitory machine readable medium of claim 8, wherein said determining
determines a first plurality of subsets of rules in a first bucket of said set of buckets, wherein said
first plurality of subset of rules includes a first subset of rules, further comprising one or more
instructions for:
sending for display said first plurality of subsets of rules, including said first subset of rules, while indicating that each of said first plurality of subsets of rules can be merged,
wherein said generating is performed for said first subset of rules only if an input data is received, from a user, indicating that said first subset of rules is to be merged.
10. The non-transitory machine readable medium of claim 9, wherein said first plurality
of subset of rules also includes a second subset of rules,
wherein said input data indicates that a first rule of said second subset of rules is to be excluded from merging,
wherein said generating generates said corresponding single instruction set for said second subset of rules excluding said first rule.
11. The non-transitory machine readable medium of claim 9 or 10, wherein said first
plurality of subset of rules includes a third subset of rules designed to update a third object,
wherein a third rule also of said first bucket is not included in said third subset of rules in view of
said third rule not updating said third object, further comprising one or more instructions for:
34

receiving a modified rule of said third rule, wherein said modified rule is designed to update said third object,
wherein said determining and said generating are performed again to cause said modified rule to be included in said third subset of rules and said corresponding single instruction set for 5 said third subset of rules to be generated to include said modified rule.
12. The non-transitory machine readable medium of any of claims 8 to 11, wherein a first rule and a second rule is deemed to have inter-dependency if the execution of said second rule is required to commence only after completion of execution of said first rule according to said 10 execution order, wherein said first rule and said second rule is contained in said plurality of rules, wherein said forming includes said first rule in a first bucket and said second rule in a second bucket different from said first bucket, wherein said first bucket and said second bucket are contained in said set of buckets.
15 13. The non-transitory machine readable medium of claim 12, wherein said receiving also
receives a precedence data indicating a corresponding set of rules that are required to be executed prior to execution of each rule of said plurality of rules,
wherein said precedence data indicates that said first rule is required to be executed prior to said second rule.
20
14. The non-transitory machine readable medium of any of claims 8 to 13, wherein the
objects are stored in a relational database server,
wherein each of said plurality of rules, if executed independently, would be implemented as a corresponding SQL (structured query language) command directed to said relational 25 database server,
wherein said corresponding single instruction set, upon said executing, is implemented in the form of a single SQL command directed to said relational database server.
15. A digital processing system comprising:
30 a processor;
a random access memory (RAM);
a non-transitory machine readable medium to store one or more instructions, which when retrieved into said RAM and executed by said processor causes said digital processing system to process rules, said digital processing system performing the actions of:

35

OFIN-011-PCT-IN

receiving a plurality of rules, each rule designed to update a corresponding set of objects according to an application data model, each object containing respective attributes according to said application data model;
forming a set of buckets, each bucket containing rules of said plurality of rules
5 that do not have inter-dependency in execution order, wherein rules having inter-
dependency in execution order are placed into different buckets of said set of buckets; for each bucket of said set of buckets:
determining a plurality of subsets of rules contained in the bucket,
wherein rules of each subset of rules are designed to update respective
10 different attributes of a common object;
generating a corresponding single instruction set for each subset of said plurality of subsets of rules; and
executing concurrently, the instruction sets generated for said plurality of subsets of rules contained in the bucket. 15
16. The digital processing system of claim 15, wherein for said determining, said digital
processing system determines a first plurality of subsets of rules in a first bucket of said set of
buckets, wherein said first plurality of subset of rules includes a first subset of rules, said digital
processing system further performing the actions of:
20 sending for display said first plurality of subsets of rules, including said first subset of
rules, while indicating that each of said first plurality of subsets of rules can be merged,
wherein said digital processing system performs said generating for said first subset of rules only if an input data is received, from a user, indicating that said first subset of rules is to be merged.
25
17. The digital processing system of claim 16, wherein said first plurality of subset of
rules also includes a second subset of rules,
wherein said input data indicates that a first rule of said second subset of rules is to be
excluded from merging,
30 wherein said digital processing system generates said corresponding single instruction set
for said second subset of rules excluding said first rule.
18. The digital processing system of claim 15 to 17, wherein said first plurality of subset
of rules includes a third subset of rules designed to update a third object, wherein a third rule also

36

OFIN-011-PCT-IN

of said first bucket is not included in said third subset of rules in view of said third rule not updating said third object, said digital processing system further performing the actions of:
receiving a modified rule of said third rule, wherein said modified rule is designed to
update said third object,
5 wherein said digital processing system performs said determining and said generating
again to cause said modified rule to be included in said third subset of rules and said corresponding single instruction set for said third subset of rules to be generated to include said modified rule.
10 19. The digital processing system of any of claims 15 to 18, wherein a first rule and a
second rule is deemed to have inter-dependency if the execution of said second rule is required to commence only after completion of execution of said first rule according to said execution order, wherein said first rule and said second rule is contained in said plurality of rules,
wherein said digital processing system also receives a precedence data indicating a
15 corresponding set of rules that are required to be executed prior to execution of each rule of said plurality of rules, wherein said precedence data indicates that said first rule is required to be executed prior to said second rule,
wherein said digital processing system includes said first rule in a first bucket and said second rule in a second bucket different from said first bucket, wherein said first bucket and said
20 second bucket are contained in said set of buckets.
20. The digital processing system of any of claims 15 to 19, wherein the objects are stored in a relational database server,
wherein each of said plurality of rules, if executed independently, would be implemented 25 as a corresponding SQL (structured query language) command directed to said relational database server,
wherein said corresponding single instruction set, upon said executing, is implemented in the form of a single SQL command directed to said relational database server.
30 Dated this 09th Day of March 2017
(P. Dileep Kumar) Registration Number: IN/PA-13 64 35 For Law Firm of Naren Thappeta Agent for Applicant

37

OFIN-011-PCT-IN

Documents

Application Documents

# Name Date
1 Priority Document [09-03-2017(online)].pdf 2017-03-09
2 Power of Attorney [09-03-2017(online)].pdf 2017-03-09
3 Form 5 [09-03-2017(online)].pdf 2017-03-09
4 Drawing [09-03-2017(online)].pdf 2017-03-09
5 Description(Complete) [09-03-2017(online)].pdf_309.pdf 2017-03-09
6 Description(Complete) [09-03-2017(online)].pdf 2017-03-09
7 201747008319.pdf 2017-03-10
8 Correspondence by Agent_Form 5_13-03-2017.pdf 2017-03-13
9 abstract 201747008319.jpg 2017-05-20
10 201747008319-Proof of Right (MANDATORY) [08-09-2017(online)].pdf 2017-09-08
11 201747008319-FORM 3 [08-09-2017(online)].pdf 2017-09-08
12 Correspondence By Agent_Proof Of Right_11-09-2017.pdf 2017-09-11
13 201747008319-FORM 18 [09-08-2018(online)].pdf 2018-08-09
14 201747008319-Information under section 8(2) [01-06-2021(online)].pdf 2021-06-01
15 201747008319-FORM 3 [01-06-2021(online)].pdf 2021-06-01
16 201747008319-PETITION UNDER RULE 137 [02-06-2021(online)].pdf 2021-06-02
17 201747008319-OTHERS [02-06-2021(online)].pdf 2021-06-02
18 201747008319-FORM 13 [02-06-2021(online)].pdf 2021-06-02
19 201747008319-FER_SER_REPLY [02-06-2021(online)].pdf 2021-06-02
20 201747008319-CLAIMS [02-06-2021(online)].pdf 2021-06-02
21 201747008319-Annexure [02-06-2021(online)].pdf 2021-06-02
22 201747008319-ABSTRACT [02-06-2021(online)].pdf 2021-06-02
23 201747008319-FER.pdf 2021-10-17
24 201747008319-US(14)-HearingNotice-(HearingDate-03-01-2024).pdf 2023-12-11
25 201747008319-Correspondence to notify the Controller [18-12-2023(online)].pdf 2023-12-18
26 201747008319-Written submissions and relevant documents [12-01-2024(online)].pdf 2024-01-12
27 201747008319-POA [12-01-2024(online)].pdf 2024-01-12
28 201747008319-MARKED COPIES OF AMENDEMENTS [12-01-2024(online)].pdf 2024-01-12
29 201747008319-FORM 13 [12-01-2024(online)].pdf 2024-01-12
30 201747008319-Annexure [12-01-2024(online)].pdf 2024-01-12
31 201747008319-AMMENDED DOCUMENTS [12-01-2024(online)].pdf 2024-01-12
32 201747008319-PatentCertificate25-01-2024.pdf 2024-01-25
33 201747008319-IntimationOfGrant25-01-2024.pdf 2024-01-25

Search Strategy

1 searchstrategyE_04-12-2020.pdf

ERegister / Renewals

3rd: 16 Apr 2024

From 31/07/2017 - To 31/07/2018

4th: 16 Apr 2024

From 31/07/2018 - To 31/07/2019

5th: 16 Apr 2024

From 31/07/2019 - To 31/07/2020

6th: 16 Apr 2024

From 31/07/2020 - To 31/07/2021

7th: 16 Apr 2024

From 31/07/2021 - To 31/07/2022

8th: 16 Apr 2024

From 31/07/2022 - To 31/07/2023

9th: 16 Apr 2024

From 31/07/2023 - To 31/07/2024

10th: 11 Jul 2024

From 31/07/2024 - To 31/07/2025

11th: 17 Jun 2025

From 31/07/2025 - To 31/07/2026