The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
Disclosed is a method for scrambling confidential customer master
data in an enterprise resource planning system.
English (United States)
This text was extracted from a PDF file.
This is the abbreviated version, containing approximately
59% of the total text.
Page 1 of 1
Method for Scrambling Confidential Customer Master Data in an Enterprise Resource Planning System
In an Enterprise Resource Planning system like SAP* R/3, information related to business partners (e.g. customers), materials, products, or other concepts is stored as master data that seldomly changes during system operation. Besides other attributes, customer master data comprises confidential information like address, telephone number, contact information, or order probability. In the ERP software development cycle, it is common practice to use a productive master data set or extracts thereof to populate a development or test system. The copied master data serves as a basis for testing software or business process modifications in a realistic environment. The problem is that every system user with access to the development/test system can also access the copied customer data although there is no business need for these users to know the confidential information.
A solution is disclosed based upon a custom developed customer master data scrambler. The scrambler can be used to exchange confidential customer master data with fictitious, still human-readable customer data. While confidential information is eliminated in the scrambling process, the overall structure and semantics of the processed data sets are preserved. The resulting "scrambled" data can be used for testing purposes without jeopardizing confidentiality of the original customer data.