Transaction architecture utilizing transaction policy statements
First Claim
Patent Images
1. A transaction processing system comprising:
- a processor, a memory, computer readable instructions stored in the memory that when executed by the processor perform the process of;
receiving a plurality of transaction packets, each transaction packet comprising a document and a transaction policy statement, and wherein each transaction policy statement includes a set of rules specific to its respective transaction packet and not the other transaction packets in the plurality of transaction packets;
accessing by a rule parser each of the plurality of transaction packets the transaction policy statements and the set of rules specific to each of said packets, wherein the set of rules in at least one of the transaction policy statements includes one or more signature rules that define requirements for electronically signing its respective document;
retrieving role verification rules from a server;
determining by a verification agent whether the signature rules are met,verifying a role of a signatory based on role verification rules retrieved from said server; and
preventing by a signature inhibitor the respective document from being electronically signed based on the verifying of a role of a signatory.
3 Assignments
0 Petitions
Accused Products
Abstract
A transaction receiver obtains a transaction packet comprising at least one document and instructions for processing the at least one document to complete a transaction. Thereafter, a rule parser accesses a transaction policy statement associated with the transaction packet including one or more rules for allowing the at least one document to be electronically signed. A verification agent then determines whether the rules of the transaction policy statement are met, after which a signature inhibitor prevents the at least one document from being electronically signed unless each rule of the transaction policy statement is met.
161 Citations
66 Claims
-
1. A transaction processing system comprising:
-
a processor, a memory, computer readable instructions stored in the memory that when executed by the processor perform the process of; receiving a plurality of transaction packets, each transaction packet comprising a document and a transaction policy statement, and wherein each transaction policy statement includes a set of rules specific to its respective transaction packet and not the other transaction packets in the plurality of transaction packets; accessing by a rule parser each of the plurality of transaction packets the transaction policy statements and the set of rules specific to each of said packets, wherein the set of rules in at least one of the transaction policy statements includes one or more signature rules that define requirements for electronically signing its respective document; retrieving role verification rules from a server; determining by a verification agent whether the signature rules are met, verifying a role of a signatory based on role verification rules retrieved from said server; and preventing by a signature inhibitor the respective document from being electronically signed based on the verifying of a role of a signatory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A transaction processing system in a computer network, comprising:
-
a processor, a memory, computer readable instructions stored in the memory that when executed by the processor perform the process of; obtaining by a transaction receiver a plurality of transaction packets through the computer network, each transaction packet including a document and a transaction policy statement, and wherein each transaction policy statement includes a set of rules specific to its respective transaction packet and not the other transaction packets in the plurality of transaction packets; accessing by a rule parser each of the plurality of transaction packets the transaction policy statements, and the set of rules specific to each of said packets, wherein the set of rules in at least one of the transaction policy statements includes one or more rules for allowing the respective transaction to proceed; retrieving role verification rules from a server;
determining by a verification agent whether the set of rules of the at least one transaction policy statement are met, verifying a role of a user based on role verification rules retrieved from said server; andpreventing by a signature inhibitor the respective document from being electronically signed based on the verifying of a role of a user.
-
-
19. A transaction processing system in a computer network, comprising:
-
a processor, a memory, computer readable instructions stored in the memory that when executed by the processor perform the process of; obtaining by a transaction receiver a plurality of transaction packets through the computer network, each transaction packet including a document and a transaction policy statement, and wherein each transaction policy statement includes a set of rules specific to its respective transaction packet and not the other transaction packets in the plurality of transaction packets; accessing by a rule parser each of the plurality of transaction packets the transaction policy statements, and the set of rules specific to each of said packets, wherein the set of rules in at least one of the transaction policy statements includes one or more rules to be complied with during the respective transaction; retrieving role verification rules from a server; and executing by a compliance agent a compliance action for each rule in the set of rules of the at least one transaction policy statement verifying a role of a viewer based on the role verification rules stored on the server and preventing by a signature inhibitor the respective document from being electronically signed based on the verifying of a role of a viewer. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
- 31. The system of claim, wherein the at least one transaction policy statement includes a packet integrity rule specifying that the respective transaction packet is to be verified to be free from tampering.
-
33. A method in a transaction processing system comprising:
-
receiving, by a receiving computer system, a plurality of transaction packets, each transaction packet comprising a document and a transaction policy statement, and wherein each transaction policy statement includes a set of rules specific to its respective transaction packet and not the other transaction packets in the plurality of transaction packets; accessing from each of the transaction packets the transaction policy statements, and the set of rules specific to each of said packets, wherein the set of rules in at least one of the transaction policy statements includes one or more signature rules that define requirements for electronically signing its respective document; retrieving role rules from a server; verifying a role associated with a signatory based on the role rules retrieved from said server; verifying, using the receiving computer system, whether the signature rules are met; and
preventing by a signature inhibitor the respective document from being electronically signed based on the verifying of a role of a signatory and the verifying whether the signature rules are met. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49)
-
-
50. A method in a transaction processing system in a computer network comprising:
-
receiving, by a processor, a plurality of transaction packets, each transaction packet including a document and a transaction policy statement, and wherein each transaction policy statement includes a set of rules specific to its respective transaction packet and not the other transaction packets in the plurality of transaction packets; accessing from each of the transaction packets the transaction packet and not the other transaction packets in the plurality of transaction packets; accessing from each of the transaction packets the transaction policy statements, and the set of rules specific to each of said packets, wherein the set of rules in at least one of the transaction policy statements includes one or more rules for allowing the respective transaction to proceed; retrieving role rules from a server, verifying a role associated with a user based on the role verification rules retrieved from said server, verifying, using the processor, whether the set of rules of the at least one transaction policy statement are met; and preventing by a signature inhibitor the respective document from being electronically signed based on the verifying of a role of a signatory and the verifying whether the set of rules of the at least one transaction policy statement are met.
-
-
51. A method in a transaction processing system in a computer network comprising:
-
receiving, by a processor, a plurality of transaction packets, each transaction packet including a document and a transaction policy statement that processes the document to complete a transaction, wherein each transaction policy statement, and wherein each transaction policy statement includes a set of rules specific to its respective transaction packet and not the other transaction packets in the plurality of transaction packets; accessing from each of the transaction packets the transaction policy statements, and the set of rules specific to each of said packets, wherein the set of rules in at least one of the transaction policy statements includes one or more rules to be complied with during the respective transaction;
retrieving role rules from a server;verifying a role associated with a viewer based on the role verification rules retrieved from said server; and executing a compliance action for each rule in the set of rules of the at least one transaction policy statement and preventing by a signature inhibitor the respective document from being electronically signed based on the verifying of a role of a viewer. - View Dependent Claims (52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64)
-
-
65. A transaction processing apparatus comprising:
-
a processor, a memory, computer readable instructions stored in the memory that when executed by the processor perform the process of; receiving a plurality of transaction packets, each transaction packet comprising a document and a transaction policy statement, and wherein each transaction policy statement includes a set of rules specific to its respective transaction packet and not the other transaction packets in the plurality of transaction packets; accessing from each of the plurality of transaction packets the transaction policy statements and the set of rules specific to each of said packets, wherein the set of rules in at least one of the transaction policy statements includes one or more signature rules that define requirements for electronically signing its respective document; retrieving role verification rules from a server;
verifying a role associated with a user based on the role verification rules retrieved from said server;verifying whether the signature rules are met; preventing by a signature inhibitor the respective document from being electronically signed based on the verifying step.
-
-
66. A computer program product comprising program code for performing a method in a transaction processing system, the method comprising:
-
receiving, by a processor, a plurality of transaction packets, each transaction packet comprising a document and a transaction policy statement, and wherein each transaction policy statement includes a set of rules specific to its respective transaction packet and not the other transaction packets in the plurality of transaction packets; accessing from each of the transaction packets the transaction policy statements, and the set of rules specific to each of said packets, wherein the set of rules in at least one of the transaction policy statements includes one or more signature rules that define requirements for electronically signing the respective document; retrieving role rules from a server; verifying a role associated with a user based on the role verification rules retrieved from said server; verifying, using the processor, whether the signature rules are met; and preventing by a signature inhibitor the respective document from being electronically signed based on the verifying of the role and the verifying whether the signature rules are met.
-
Specification