0% found this document useful (0 votes)
242 views14 pages

Enterprise Automation Solutions

The document describes Laiye RPA+AI's intelligent automation product line which includes robotic process automation (RPA) to automate mundane tasks, intelligent document processing (IDP) to extract data from unstructured documents, and chatbots for real-time communications and custom conversations. The platform features include an automation creator to build and monitor processes, an automation commander to orchestrate multi-robot businesses, and a human-bot collaborator for exception handling.

Uploaded by

Rafael Serrano
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
242 views14 pages

Enterprise Automation Solutions

The document describes Laiye RPA+AI's intelligent automation product line which includes robotic process automation (RPA) to automate mundane tasks, intelligent document processing (IDP) to extract data from unstructured documents, and chatbots for real-time communications and custom conversations. The platform features include an automation creator to build and monitor processes, an automation commander to orchestrate multi-robot businesses, and a human-bot collaborator for exception handling.

Uploaded by

Rafael Serrano
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Laiye RPA+AI

Security Features

Intelligent Automation
ENTERPRISE-CLASS INTELLIGENT AUTOMATION

A TRANSFORMATIVE PRODUCT LINE-UP

RPA IDP CHATBOT

Automate mundane tasks Tackle unstructured data Real-Time Comms

Connect legacy systems Extract Data Points Custom Conversations

No Dev Skills Required OOTB Models Integrate Anywhere


An All-In-One Intelligent Automation Platform

ENTERPRISE-CLASS INTELLIGENT AUTOMATION

Human-Bot Collaborator
(AKA The Hub)
REST APIs & Connectors

AUTOMATION COMMANDER

Operational Analytics
Bot
Store
Process Automation Contextual Dialogue
OCR Form Parser
Recorder Creator Memory Flows / Trees
Pre-Built
Solutions
Process Automation Self-learning Text Transactional
Mining Worker Models Classification BYO Interfaces
Conversations

LOW-CODE DESIGNER

Multi-Language Natural Language Natural Language Machine Computer Deep Neural


Support Processing Understanding Learning Vision Networks
Automation to connect legacy systems

Human-Bot Collaborator
(AKA The Hub)

AUTOMATION COMMANDER

Operational Analytics
Bot Store
REST APIs &
Connectors
Process Automation Contextual Dialogue
OCR Form Parser Pre-Built
Recorder Creator Memory Flows / Trees
Solutions
Process Automation Self-learning Text Transactional
Mining Worker Models Classification BYO Interfaces
Conversations

LOW-CODE DESIGNER

Multi-Language Natural Language Natural Language Machine Deep Neural


Computer Vision
Support Processing Understanding Learning Networks

Automation Creator: Builds and monitor business processes

Automation Commander: Centralized orchestrator for multi-robot businesses

Automation Worker: the execution agent who completes the work

Human-Bot Collaborator: Exception handling hub


IDP to tackle unstructured data

Human-Bot Collaborator
(AKA The Hub)

AUTOMATION COMMANDER

Operational Analytics
Bot Store
REST APIs &
Connectors
Process Automation Contextual Dialogue
OCR Form Parser Pre-Built
Recorder Creator Memory Flows / Trees
Solutions
Process Automation Self-learning Text Transactional
Mining Worker Models Classification BYO Interfaces
Conversations

LOW-CODE DESIGNER

Multi-Language Natural Language Natural Language Machine Deep Neural


Computer Vision
Support Processing Understanding Learning Networks

OCR: Convert images to text

Form Parser: Extract data from complex forms and tables

Self-Learning Models: Build and maintain a model with your custom documents; in your environment

Text Classification: Classify fully unstructured texts like emails, contracts, and CVs
Chatbots to enable self-service solutions in real-time

Human-Bot Collaborator
(AKA The Hub)

AUTOMATION COMMANDER

Operational Analytics
Bot Store
REST APIs &
Connectors
Process Automation Contextual Dialogue
OCR Form Parser Pre-Built
Recorder Creator Memory Flows / Trees
Solutions
Process Automation Self-learning Text Transactional
Mining Worker Models Classification BYO Interfaces
Conversations

LOW-CODE DESIGNER

Multi-Language Natural Language Natural Language Machine Deep Neural


Computer Vision
Support Processing Understanding Learning Networks

Contextual Memory: Utilizes past answers to inform future answers

BYO Interfaces: OOTB integration with common interfaces like WhatsApp, FB Messenger, and Telegram

Dialogue Flows / Trees: Easily design conversation patterns to customize the chatbot experience

Transactional Conversations: Pull/Push data to 3rd party systems to execute actions and facilitate more dynamic conversations.
Laiye RPA Platform Structure
• The picture shows the hierarchy of Creator and
Worker, and the core part of BotScript is written in
C++.
• UIRoBot Core is the UI automation layer, providing
a series of abstract interfaces to connect with
BotScript in different ways on different platforms
• UI Adapter is the connector for all UI operations
and can be connected to various applications such
as COM, JAB, SAP, etc.
• The Extend module supports C/C++, Java,
Python, .Net, Lua and other languages, and can
automatically convert to the built-in BotScript
language.
• BotScript adds a debugging check to the source
code, it will check whether the current process is
debugged by the attachment, and once it is
checked that it has been attached for debugging, it
will stop all business activities related to the
process.
• In order to protect debugging and inspection and
avoid false alarms by anti-virus software, BotScript
decompilation uses CodeVirtualizer's VM shell for
reinforcement. In addition, a unique key is set
under the shell for the core code to double
guarantee the operation of UiBot.
Laiye RPA Creator Security Analysis

Functions
• Do not modify the properties of web page elements
• Administrator privileges and Internet are not required for
running the Creator and Worker
• Commander administrators can see all the functions used by
developers when reviewing the process and prevent the release
of malicious processes
• Multiple symmetric key encryption
• Dynamic key

• Does not require administrator privileges at runtime and do not depend on the Internet to run and can minimize
the possibility of external factors threatening the security of the system without a network or an internal
network.
• Does not modify the attributes of web page elements. Does not use process injection, message hooks, API
hooks and other operations that may endanger system security.
• Commander review process can see all the functions used by the developer and prevent the release of
malicious processes.
• Symmetric key encryption, dynamic key, are used to insure a high level of encryption. This insure that no
security threats are encountered in the development environment, and no new security threats will be brought
about in the operating environment.
Laiye RPA Worker Security Analysis

Security Functions
• The automatic operation of keyboard and mouse is
carried out through the Windows open interface or
browser, which is safe and reliable
• All passwords are stored in the Commander’s
database and kept by the administrator
• Asymmetric key is used for encryption and all
passwords are automatically erased after input to
prevent leakage
• Multiple dynamic encryption technology is used
• Logs and screen records of all operations can be
selected as evidence which greatly helps for audit.
• You can start a new Window session and automate it
while you are doing your current work. No one except
the administrator can see what the new desktop
displays
Laiye RPA Commander Security Analysis
Functions • Commander is implemented using .Net Core, MySQL
• Commander is implemented using .Net Core database is used for data storage, and other databases
• MySQL database is used for data storage, and other databases such as SQL Server can also be used. The technical
such as SQL Server can also be used. solution is mature and reliable, and the possibility of
• The network connection between Commander and Worker uses security threats is small.
WebSocket (WS) protocol, which is suitable for a relatively safe
• The network connection between Commander and
and controllable network environment within the enterprise
• The WebSocket Secure (WSS) protocol is used for network Worker uses WebSocket (WS) protocol, which is
environments with Internet connection suitable for a relatively safe and controllable network
• Strict authority control to ensure the controllability of the process environment within the enterprise. It can also be
and its operation upgraded to the WebSocket Secure (WSS) protocol,
which is suitable for a network environment with
Internet connection. This environment is encrypted for
transmission, which is difficult to intercept or tamper
with, and it is usually necessary to verify the credibility
of the certificate on the Internet.
• Strict authority control to ensure the controllability of the
process and its operation. The administrator has all
permissions and can add ordinary users and manage
user departments. User permissions are controlled by
the department and can only control the resources
under the department.
Laiye RPA Architecture
•Load Balancing
Providing access to UiBot Services
and load balancing capabilities
Enterprise
certification
service •Database MySQL
Providing database storage

•ElasticSearch
Load Balancing Store log information with a large
amount of data and provide
efficient data analysis functions

•Minio
Store file objects in UiBot, including
process packages, screen
recordings, screenshots, etc.

•Redis
High-performance distributed
Optional cache service

•Rabbit MQ
High-performance distributed data
queue service
Security Framework Summary

Credential Security Transmission Security


• Symmetric key encryption, dynamic Key • WebSocket (WS) protocol for intranet
• AES-256 for Credentials • WebSocket Secure (WSS) for internet
• ISO 27001 • HTTPS / TLS 1.2
• Veracode Certified

• Double Salted SHA-256 • Role-based Access Control


• Passwor automatically erased after • Event logs captured on three levels:
input to prevent leakage Creator, Worker and Commander
Password Encryption Access Control, Audit & Accountability
Network Diagram - IDP
Thanks danilo@laiye.com
www.laiye.com

You might also like