AU2001250580A1 - Electronic activity and business system and method - Google Patents

Electronic activity and business system and method

Info

Publication number
AU2001250580A1
AU2001250580A1 AU2001250580A AU2001250580A AU2001250580A1 AU 2001250580 A1 AU2001250580 A1 AU 2001250580A1 AU 2001250580 A AU2001250580 A AU 2001250580A AU 2001250580 A AU2001250580 A AU 2001250580A AU 2001250580 A1 AU2001250580 A1 AU 2001250580A1
Authority
AU
Australia
Prior art keywords
user
information
activity
users
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
AU2001250580A
Other versions
AU2001250580B2 (en
Inventor
Alan M. Metcalfe
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority claimed from PCT/IB2001/000727 external-priority patent/WO2001055810A2/en
Publication of AU2001250580A1 publication Critical patent/AU2001250580A1/en
Application granted granted Critical
Publication of AU2001250580B2 publication Critical patent/AU2001250580B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Description

ELECTRONIC ACTIVITY AND BUSINESS SYSTEM AND METHOD
Field of the Invention.
[0001] This invention relates to an electronic method for creating secure environments for conducting activities such as business, including the negotiation and fulfillment of contracts.
Background of the Invention.
[0002] Millions of people throughout the world now use the Internet as a faster and more cost-effective means of communication than previous methods of communication. Many see its potential as a medium for business. However only a very small percentage is yet able to use the Internet for business. The vast majority of Internet users cannot use the Internet foi business because there is no readily av ailable, electronic business ("e-business") system that can easily, safely, and affordably be adopted by the masses. The Internet (and the World Wide Web) is based on communications standards. However, an acceptable standard for wide-scale e-business has yet to be established.
[0003] If the world is going to make the transition to e-business, there must be a safe, secure, affordable and ubiquitous way for businesses large and small, to do e-business. There must be an effective e-business system based on enforceable laws that establish a level playing field for all users. The system must not only be affordable and appropriate, but it must be extremely user friendly. To be highly user friendly means that it must incorporate a high level of artificial intelligence. This means that it must be compatible with the way people think and do business.
[0004] To build such a system, there must also be a way to integrate the many and vaned ways of business, including tying all the front office and back office functions together.
[0005] Without such a system, e-business will remain limited to the few who understand the increasingly complicated technology and those few who can afford to acquire that knowledge. Business-to-business sites were found by the Gartner Group to cost about
$1.2 million to develop and to take at least six months to build. The custom coding of infrastructure is the biggest cost and time factor.
[0006] It should be noted, however, that even the minoπty that is now capable of using the Internet for business is now increasingly experiencing guerrilla style "hacker" attacks that are turning the Internet into a place of anarchy. Even Microsoft was successfully hacked in late 2000. [0007] This is nappe nng because there is no way to establish law and order on the Internet. The open architecture of the Internet works against any attempt to stifle free expression regardless of how such fieedom is interpreted or expressed as Microsoft and even the most powerful governments in the world have found Such unfettered freedom is not conducive to business. Business relies on enforceable law and order.
Summary of the Invention.
[0008] This Patent Application defines a fully integrated system for creating an environment in which e-business and other activities can be conducted in parallel to the Internet or a similar communications network in an acceptably secure and cost efficient way.
It solves the following problems associated with currently trying to do business on the
Internet.
• Affordability - The need to custom build e-business systems is the major factor of their cost This system establishes a common standard for e-business that significantly reduces the cost of custom building e-business systems.
• Privacy and Security - Pπvacy, including information (data) security, is the pπ ary concern of Internet users because it is now widely known that its is almost impossible to prevent hacker attacks in such an open environment. Custom built secuπty systems for Internet communication are available, however they are expensive and not a part of any general purpose e-business system that is now generally available. This system establishes a safe and secure environment where users can maintain the highest levels of pπvacy through an in-built secuπty structure that incorporates a pubhc/pπvate key encryption methodology. Pub c/pπvate key encryption and electronic signature awareness is widespread throughout the Internet community However, there is no easy way to introduce these secuπty measures on a global basis. This System overcomes this problem.
• Authentication - Information posted on the Internet cannot always be trusted because there is yet no easy way to guard against identity theft. It is impossible in most cases to authenticate the identity of the person with whom one is communicating on systems like the Internet. This undermines the trust factor that is essential to the establishment of e- business. This system easily incorporates authentication methodologies.
• Law and Order - Business relies on law and order. Business succeeds only where and when there is an enforceable law that is common to all and creates a widely known and acceptable order. Where no such law and order exist, it is difficult for business to function. The Internet does not and probably cannot provide such an environment for business. The Internet therefore does not and cannot allow governments to maintain their essential legal and taxing systems. This undermines the stability of the global business community and is a major deterrent to the widespread adoption of e-business. This system is based on generally accepted operating rules and creates a secure environment where law and order can be established and maintained.
• Integration - The current, common approach to commercializing digital technology is modular and disintegrated. Consequently, the integration of the many different computer systems and devices that have been developed is now a major concern of business and government. Most businesses also have numerous customer and supplier relationships that need to be integrated The existing individual Web site approach now common to the Internet makes this difficult, if not impossible to achieve because Internet Web sites are rarely built according to a common design and there is currently no way to commonly connect Web sites on a controllable business basis. This system provides a holistic rather than a modular approach to digital technology and e-business and establishes a fully integrated e- business system that can be easily and cost effectively applied to any business. It also provides a central control mechanism that enables the integration of any number of business into local and wide area networks This provides business managers with a simple and effective way to monitor and control any number of divisions, customers, partners and digital activities and devices within one system.
• Expert Business Guidance - Most people do not know how to best manage their businesses and very few know how to conduct e-business on a generally acceptable global basis. This means that any attempt to establish an e-business standard tor the Internet must include a significant level of artificial intelligence based on common rules of logic that apply to business. There is no evidence that anyone has yet attempted to create such a common logic. Existing general purpose Internet access systems also do not attempt to provide users with such business guidance or expert assistance. Any incorporation of artificial intelligence is left to costly consultants to custom build systems that most users cannot afford. The advice of consultants is also almost always vaπed and adds to the general confusion of business activity on the Internet This system is based on operating rules that replicate the Law of Thought that descπbes the way people think to do business or any other activity. The Law of Thought is adapted here to provide users with an -built logical business methodology that seamlessly, unobtrusively and intuitively guides the way they do e-business while it increases user confidence in e-business.
• User Friendliness - Because existing e-business systems are disintegrated, modular (custom built), and are regularly upgraded (changed), they are generally complicated and require considerable training and retraining to achieve acceptable levels of operator efficiency. They are rarely intuitive because they are not based on any generally accepted standard. This is a major deterrent to the wide adoption of e-business, particularly among small and micro businesses that cannot afford regular updates and costly training and retraining programs This system introduces maximum user fnendhness because it is based on the Law of Thought that descπbes the logical way that people think and work that is common and intuitive to all. Users therefore need very little training to understand how to use the system.
• Technological Stability - The modular, disintegrated approach to digital technology means that the technology is constantly changing. The rate of change is so fast in most instances that it is difficult for even the best and most wealthy businesses to keep-up.
This is not conducive to the stability of e-business and means that most digital solutions have a very short life span. This system overcomes this problem by providing a common platform for business based on a model with wide application.
• Financial Transaction Capability and Accountability - Transaction processing and accountability is an integral function of every business activity. It is essential to the orderly establishment of an electronic business world that businesses are fully and easily accountable to their owners and managers and are answerable to government taxing authorities. Existing general purpose Internet access systems do not provide an in-built financial transaction capability or any way to properly account for the activities transacted by these systems. Any incorporation of a transaction capability is left to costly consultants to custom build systems that most users cannot afford. This system incorporates transaction processing and accounting as an integral feature.
• Customer Credit Arrangements - Customer credit arrangements an integral part of all business. Existing general purpose Internet access systems do not enable users to incorporate their customer credit arrangements into their online activities. Any incorporation of customer credit arrangements is left to costly consultants to custom build systems that most users cannot afford. This system incorporates a customer credit organizer as an integral part of the system. • Customer Relations Management and Protection - The current disintegrated approach to e-business is placing the long established and hard won customer relationships of many organizations at πsk because it is extremely difficult to protect customer relationships on the Internet. The high opportunity for fraud and destructive and dishonest competitive practices places every company that now does business on the Internet at πsk of damaging its customer relations and even losing its customers. This is disruptive to the world economy and is not conducive to good business practice. This system provides businesses with a practical and effective way to establish secure pπvate networks that can be integrated with other secure pπvate networks and the Internet in a way that allows them to control their customer relationships and still enjoy the benefits of e-business and the Internet
• Global Markets - Electronic business on a global scale requires a common global marketplace for products that are international in nature Existing general purpose Internet access systems do not provide for the establishment of a structured global market There are many modular database systems available for creating global markets and there is frantic activity to create online marketplaces. However, none of these markets are integrated or is capable of providing the level-playing field that is essential to a common global market. Therefore they can only serve to further distort the market and limit the potential of e- business and the global economy This system creates fully integrated, common global markets as an integral feature. Fair and Effective Search Engine Service The existing domain (URL) name-based
Internet is controlled by Search Engines that do not offer a true and fair service to all users Long established business names mean little and the current system is clearly biased towards higher paying customers. This system places the emphasis on product files rathei than domain names similar to the successful yellow pages directory concept. This provides a faster and more reliable method of matching sellers and buyers. It also gives every company the opportunity to compete on its meπts and largely overcomes the trade in domain names.
[0010] In one aspect of the invention, there is provided an electronic system for regulating activity. The system includes a user interface means for determining the πghts and abilities of users within the electronic business system and requiπng a common format for transaction data used in the system, a common market permitting users employing the user interface means to locate propositions of interest and to negotiate transactions, and a central cleaπnghouse for authoπzation and authentication of users [0011] In another aspect of ti e invention, there is provided a method of data handling in connection with a proposed activity, comprising the steps of successively prompting a user for and receiving from the user who/what information relating to the activity, why/how information relating to the activity, and where/when information relating to the activity, recording received discussions relating to the activity, recording agreement between the user and another party, and, in a fulfillment stage, prompting and monitoring fulfillment steps in accordance with the where/when information.
Brief Description of the Figures. [0012] Figure 1 is a schematic diagram of a system of the invention.
Figure 2 schematically depicts categories of information for use with the invention.
Figures 3A and 3B are a flow diagram depicting a process flow according to the invention Figure 4 is a flow diagram depicting a process flow according to the invention.
Figure 5 is a flow diagram depicting a process flow according to the invention. Detailed Description of an Embodiment of the Invention.
[0013] Referring now to Figure 1, there is shown a schematic diagram of a system of the invention. The system 5 of the invention includes, within a virtual or actual private network, a clearinghouse 10, a common market 15, and a plurality of users 30. Each connection of a user 30 to the network 10 is via a common user interface 25 designed in accordance with the operating rules of the invention. Among its various functions the common user interface creates the content of the central clearinghouse and the common market and is used to operate both entities. Common user interface 25 includes a common background shell and secondary interfaces.
[0014] The common network of the system 10 is made up of computers, each of which includes one or more processors, memory devices, and input and output devices, running software to execute the methods of the invention. The computers may be linked to the Internet or another electronic network. The central clearinghouse 20 and the common market are linked to the network and all users through suitable secure connections but are not directly connected to the Internet. Any connection with the Internet or any other network is made through a separate secure connection to protect the integrity of the system. Each user 30 represents a computer of a user of the system and must be registered with the central clearinghouse to use the system and be granted certain access rights. Overall access rights are controlled by the central cleaπnghouse whereas individual user applications of the system control their own access πghts. Users may be individuals, entities, or other systems. Each user 30 is connected through a copy of the common user interface and a suitable secure connection to the network 5 Any suitable secure data connection may be employed. Examples include the use of secure socket technology in transmitting data across the
Internet.. All data input and output is exchanged through the common user interface 25. The common user interface is designed to complement the business rules of the system, as explained below The common user interface has the function of ensuπng that all data is formatted and filed in a standard intelligent way. The common user interface may be in the form of software running on a user computer 30, which causes the processor of user computer
30 to execute specified instructions as explained below Alternatively, the common user interface may be in the form of software or a combination of software and hardware and may be displayed on or employ a hand-held device. The user may have a thin client device, with the common user interface running on a server remote from the thin client device. [0015] The common market 15 uses the software of the system and the common user interface to create a global market for potential transactions that users 30 may wish to enter into and may wish to advertise globally throughout the system. The common market is a system of lists or indices of products, services and other offeπngs identified by remote resource locators that link files created by the common user interface and held by users to the common market As information is systematically created by virtue of the common user interface 25, it is filed into individual files and a remote resource locator or tracking code is created for each file that may be connected to the common market Access to files may also be controlled by vaπous levels of access πghts granted to individual users. The data making up the common market is preferably maintained at a central server; it will be appreciated that the data may be duplicated in mirror servers or divided among multiple servers.
[0016] The central cleaπnghouse 20 has the functions of maintaining records for each user, checking and authenticating users and authoπzing access and transactions throughout the system. This feature of the central cleaπnghouse 20 may be used to create a merchant credit system 35 to permit exchanges of credit and barter among users without the need to access the banking system. It may also be used to ci ea'e an electronic voting system, or wherever there is a need to securely authenticate the πghts of vaπous users or to regulate access to vaπous devices. The central cleaπnghouse is hnked to relevant bank systems to facilitate credit card processing and other transfers among bank accounts of users. [0017] The system operates according to operating rules that give the system a degree of artificial intelligence and ensure its user friendliness. The operating rules function as a logical interactive scπpt or workflow for processing the vaπous activities of users and may be designed into the common user interface or they may be located on a remote server to facilitate network computing Throughout the system, all activity reflects the workflow of the operating rules. The operating rules may be contained within separate files are as set forth in summary in Figure 2. The operating rules are designed to allow the system to process all activities as either facts or propositions. The operating rules reflect a question and answer mechanism and are 1) who/what 201, 2) why/how 202, 3) where/when 203, 4) discussion 204, 5) agreement 205, and 6) fulfillment 206. It will be appreciated that equivalent terminology may be employed to suit vaπous applications Structuπng the operating rules in this way provides an intelligent standard framework for inputting and outputting all information to and from the system Users are permitted to put information into the system and take information out of the system by way of secondary interfaces designed to interact with the operating rules and thereby benefit from the logical workflow
Secondary interfaces are loaded into the common user interface as requested by the user or as part of the process of the operating rules. Secondary interfaces prompt users to input information in specific fields and formats. Secondary interfaces may prompt the user to correct or supplement information if information that is not in a proper format is input, or if one or more required fields are skipped Secondary interfaces function like templates or forms in this regard. The interaction of the secondary interfaces with the operating rules piovidcs secondary interfaces with a level of artificial intelligence that is important to user friendliness. Secondary interfaces are required for each activity including interfacing with any device or legacy third party system. Secondary interfaces must be designed to interface with the operating rules to operate within theThe use of the operating rules will now further be explained with reference to Figure 3. Figure 3 is a flow chart depicting a the process or workflow according to the invention. .At the outset, the interaction between the common user interface and the operating rules, as that interaction is embodied in software running on the user's computer, prompts the user to identify whether a new transaction (a proposition) or an existing transaction (a fact) is involved. If the activity involves filing an existing record (a matter of fact) an appropπate secondary interface is provided andthe user is prompted to indicate the subject, in the who/what field 201 of Figure 2, of the activity, as indicated by block 315. This is the first stage of the operating rules. The subject (who/what) of the transaction may be one of a number of predetermined selections. The subjects may include the identity of a particular person, group or organization, goods, services, technology, concept, industry, vertical market, or other subject matter. The user interface receives the subject of the activity from the user, as indicated by block 320.
[0018] The user interface then prompts the user to identify the purpose of the activity, why it is to be used, as indicated by block 325. This is the first pan or the question aspect of the second stage of the process of the operating rules that controls how secondary interfaces gather information about a transaction. This aspect corresponds to why/how 202 of Figure 2. The system may provide a list of possible responses, or make a list of possible responses available to the user on request at this point. For example, a pull-down list of alternative purposes may be presented. Examples include general data entry, general business, personal-pπvate, personal-business, and personal-departmental. The system then receives the purpose of the transaction, as indicated by block 335 The user interface may also at this time prompt the user to identify at this time if the transaction is pπvate or public, or the level of pπvacy or availability to the public, as appropπate. The system may provide a number of levels of pπvacy or publicity, and furnish users the opportunity to indicate the level of pπvacy or publicity required to access each transaction, or provide rules for determining the level of pπvacy based on the purpose of the transaction. The system may provide the user the opportunity to set levels of pπvacy or publicity available to other users or classes of users. The system may designate levels of pπvacy for transactions, based on the purpose information furnished by the user and existing rules.
[0019] When the user identifies the purpose (and the system receives the purpose), the system responds by presenting the appropπate secondary interface to facilitate that activity, as indicated by block 345. This is the second part or the response part of the second stage of the process of the operating rules that controls how secondary interfaces gather information about a transaction. The system has the potential to make available an unlimited number of secondary interfaces to the user. The design of the secondary interfaces assists users to systematically gather information and produce reports, and other documents. The use of secondary interfaces permits the linking of the front end of a business to the back end of abusiness or finding the answer to the question. The operating rules provide the basis for secondary interfaces to do this. Secondary interfaces need to be developed for different users, to reflect the vaπous ways that the system can be used. The selection of secondary interfaces is determined by why the user wants to use the system. Matching files containing lists of why the system required and secondary interfaces for how the system can achieve these goals may be maintained by the system to assist users and facilitate such selection. When the system has received a puroose from a user, or in other words, knows why it is to be used, it selects a secondary interface corresponding to the purpose indicated by the user. The selection may be made based on information in matching files. For example, if the purpose for which the system is to be used is data entry, a secondary interface for data entry is provided. If the purpose is general business, a secondary interface for general business is selected. If the purpose is personal-pπvate. a secondary interface for personal-pπvate activity is selected. If the purpose is to sell a product, a secondary interface for product selling is selected. The system then presents the selected secondary interface for to the user through the common user interface.. [0020] When the user has been presented with the appropπate secondary interface, the system then prompts the user to descπbe the objective or goal of the activity (where it is required to be when completed), provide terms and conditions, and provide time information, as indicated by block 350. This is the first part or the question part of the third stage of the process of the operating rules that controls how secondary interfaces gather information about a transaction This third stage corresponds to the where/when block 203 of
Figure 2. . This third stage relates to the status where the activity is required to be at a given time, and responses to this question may be supported by business plans, product descπptions or other forms of documentation that descπbe the objective of the activity. Exhibits may also be attached to the transaction at this stage. Exhibits may include video, audio, multimedia or other presentations in digital form to enhance the transaction. As noted, the system should also prompt the user at this point to provide the proposed terms and conditions of agreement for the transaction in question The proposed terms and conditions of agreement may be in the form of a text file, or selected from a menu of agreements for a particular class of transaction. The provision of proposed terms and conditions of agreement provide a basis for negotiation and are essential to the fulfillment of the transaction and therefore should include details of how the agreement should be fulfilled once agreed. Details will vary from product to product and buyer to buyer. For example, if the user interface has been designed to support a wholesaler of a particular product, the fulfillment conditions may include directing instructions to a warehouse location to package an ordered quantity when known, to use a particular shipper, to provide confirmation when the order is shipped, and to place orders with specific suppliers if quantities in stock are not sufficient and these terms and conditions may be vaπed duπng negotiation from buyer to buyer
[0021] When the user has completed the where part of the secondary interface, the system then prompts the user to enter information relative to the time or times when the transaction is to be performed. This is the second part or the response part of the third stage of the process of the operating rules that controls how secondary interfaces gather information about a transaction. The system deals with proposed times and actual times to reflect facts and propositions. Proposed times are necessary for scheduling when a proposition may be heard or negotiated in the case of a court heaπng or creating a diary of proposed events. Actual times are times when the event actually occurs or must occur in the example of an application to use the system to control devices that must be turned on or off at a specific time. A calendar or a list of peπodic times may be presented to the user at this stage to assist in the time selection process Peπodic times may be every hour, every day, every week, every month, every year, or some other peπod of time as determined by the user. When an event actually occurs is the actual time of the event. The system should also record the actual time of every event for tracking and accounting purposes The individual file structure of the system enables this
[0022] Secondary interlaces assemble all information relative to a transaction into an individual files in the user's database that may be part of the user's computer or they may be held remotely to the user's computer. The creation of individual files is cπtical to the recording of actual times when events occur and the tracking of transactions throughout the system. The system database that stores information relevant to the common market and links the common market to individual user files may be associated with the cleaπnghouse or held separately. The step of stoπng information and creating a file is indicated by block 375 A unique tracking code or resource locator is created for each file at the time it is created based on the time of creation of the file to enable each file to be individually identified and tracked throughout the system. This is necessary for tracking and accounting for transactions throughout the system. The tracking code is based on a formula designed to assure that no two files may have the same tracking code. For example, every tracking code may consist of both the time of creation and information uniquely identifying a location of storage. This tracking code is the remote resource locator that is used to establish the common market. It provides third parties with a direct link to resources held in individual files on user computers. This aids the search for information process. [0023] If the transaction is in the nature of a proposition, rather than a fact, the final step is to create a link to the common market, as u icated by blocks 380 and 390. If the transaction is in the nature of a fact, the tiansaction file is complete and may be stored with a unique tracking number, as indicated by block 385. At th s stage the interface prompts the user for the proposed terms and conditions of agreement. The terms and conditions may be in the form of a text file containing an agreement, or selected from a menu for a particular class of transaction. At this stage, the user interface also prompts the user to enter all information known at this time required to achieve fulfillment. The information provided will vary depending on the specific user interface. For example, if the user interface has been designed to support a wholesaler of a particular product, the fulfillment conditions may include directing instructions to a warehouse location to package an ordered quantity when known, to use a particular shipper, to provide confirmation when the order is shipped, and to place orders with specific suppliers if quantities in stock are not sufficient.
[0024] All information relative to a transaction or activity is stored in an individual file Preferably, a unique tracking code is created for each file based on the time of creation of the file and the location of the file The system will have assigned unique identifiers to each storage device associated with the system
[0025] The difference between facts and propositions under the design of this invention is that propositions have to be negotiated and facts do not. For example, if the activity involves the entry of existing or fixed information such as a diary entry or the recording of existing records, the transaction will be characteπzed as a fact. If the activity involves the creation of offers to sell or solicitations to purchase products or services, the transaction will be characteπzed as a proposition. In an application of the system for a law court, a case that has to be heard will be considered a proposition, whereas a case that has been heard will be treated as a fact. Facts are activities that do not require a response. Propositions are transactions, such as offers ol a product or service that require a heaπng, negotiation, or a response involving another party or entity
[0026] For activities that constitute propositions, the system creates a forum file associated with the activity file, to record all communications relating to the that activity.
This is the fourth stage of the process of the operating rules and controls how secondary interfaces facilitate the negotiation or heaπng of a transaction. This stage corresponds to discussion 204 of Figure 2. The forum file is stored locally in the user's database as part of the individual transaction file, and is normally accessible only to the user. In the example of a court case however, the record of the heaπng is a forum file and is often a part of the public record. Any communication between the parties in a transaction, such as questions and counteroffers, or evidence in a court heaπng, are recorded in the forum file. Any communications directed by the user in response to such received communications associated with the activity are also recorded in the forum file that facilitates discussion between the parties in a transaction.
[0027] The fourth stage of the process of the workflow of the operating rules is the negotiation stage. Negotiation may be between humans or other systems, or in the case of mining a database, it may involve a search of the entire information held within the system. The proposition or question on offer may be communicated directly to selected users employing secure communications and smart agents or information relating to the proposition may be acquired through the common market. Preferably, the common market does not store a copy of the complete information pertaining to the proposition. While storage of all of the information is possible at the common market, the transmission and storage of such information would ordinaπly be undesirable. Rather, the interface selects summary information for provision to the common market in accordance with predetermined cπteπa. The selected information must include the identification of the file that contains the information in the transaction file that is designated as available to prospective respondents. The cπteπa may call for storage in the common market of information identifying generally a product or service offered, or may be more detailed, such as identifying particular products by part number code. The identification of the file containing more detailed information is in the nature of a resource locator or tracking code.
[0028] Users access information through established supply chains or networks or they may search for products, services, or other offeπngs on the common market.
One or more users may elect to respond to a proposition. A user may accept or reject any offer made with reference to a proposition, or may respond by a counteroffer or comment or question aspects of the offer. Comments, questions, and counteroffers are collected in the forum file of the user that created the proposition and create a record of the activities associated with this proposition.
[0029] At this stage, as indicated in Figure 4, at block 400, the user's system may either receive an inquiry from the common market or directly from the user or from another user. The system records all communications in the forum file, as indicated by block 405. The system also presents the appropπate file to the inquirer, as indicated by block 410. [0030] The fifth stage of the workflow of the process of the operating rules is the decision stage. This corresponds to agreement 205 of Figure 2. If a user indicates agreement on the terms and conditions presented as part of the proposition, then the secondary interface records agreement at that point in time in the file of the relevant activity, as indicated by blocks 415 and 420. . It will be appreciated that if the activity is in the form of a request for proposals, or otherv'ise indicates that the activity is not an offer available for acceptance by anyone, the user will need to respond in order for an agreement to be formed. If agreement is not indicated, then he user interface continues to record communications in the forum file, as indicated by the line labeled NO leading from decision block 415 to block 425. The secuπty features of the system that require every user to register and establish its credentials provide an assurance that an electronic acceptance is reliable. For accurate accounting purposes the time of the agreement should also be recorded in the central cleaπnghouse. The agreement closes the negotiation file, and automatically results in the launch of tasks required by the fulfillment file as indicated by block 430. This is the sixth and final stage of the workflow of the operating rules, and corresponds to fulfillment 206 of
Figure 2.. To activate the fulfillment stage, the terms and conditions of agreement between the parties are forwarded to the fulfillment file for. The fulfillment file of the operating rules systematically checks the terms and conditions of agreement to fulfill the obligations of the agreement which may include the delivery process, the payment process, and any notices that have to be sent to the vaπous parties, or reports that have to be generated as a result of the fulfillment process. By way of example, the system may send notices, create work orders, create purchase orders, and report to specified users. The system may launch digital devices duπng the fulfillment process to perform certain functions
[0031] To facilitate negotiation and agreement, the system may use a vaπety of standard agreements. The system should also require users to enter into agreement with the operator of the system to protect the interests of the operator. Examples include the transaction fee payment agreement This agreement allows the common market to list product information on a non-exclusive basis. By listing product information on the common market, this means making available to the public or the general community of users references to information stored at user computer locations. Other standard agreement may assist the user to establish the terms and conditions of payment and delivery for sales made through the system.
[0032] The agreement between the system operator and the user should also allow the operator or system administrator to track all transactions throughout the system. [0033] A project option and financing agreement should also be provided for a project requiπng financing. This agreement should include the terms and conditions of the financing and the commission shaπng arrangement. In this type of transaction or any other transaction, taxation may be deducted and paid to the relevant authoπties and agreement with parties and the operator should be agreed to allow for this to happen where required. The individual file structure of the system and its ability to track each individual transaction facilitates the accurate gatheπng and payment of taxation on an item by item basis.
[0034] The common user interface controls the πghts of users within the system. The common user interface may also permit connection to existing sites on the world wide web The common user interface connects the URL of their existing web site through a specific secondary interface. The use of a specific secondary interface allows connection to the world wide web or any other network to be controlled. This is essential to the secuπty of the system.
[0035] The common user interface consists of two parts, the common background shell of the interface and secondary interfaces that are loaded into this shell. Secondary interfaces may be stored locally on the user's system or on a remote server and downloaded as required Secondary interfaces are required for all tasks and for all connections to third party software or digital devices used by the system, and all connections to legacy systems. All secondary interfaces must be compatible with the operating rules, with only the content changing. Common functions are standardized throughout the system and may be represented by buttons or any similar interface.
[0036] Ideally a standard interface template is should be made available to developers of secondary interfaces. The standard interface template will establish the parameters of the interface so that it will interact with the operating rules and the common user interface used by all users. All a developer then needs to do is create the content of the secondary interface corresponding to the task for which the interface will be used. To gain the best benefits of the system, secondary interfaces are preferably developed for each task. This allows tasks to be monitored and function independently Each business organization and division that has users of that organization that wishes to use the system will need to develop their own applications of the system to suit their specific requirements. The workflow of the operating rules reflect a question and answer mechanism that is basically descπbed as 1) who/what, 2) why/how, 3) where/when, 4) discussion, 5) agreement, and 6) fulfillment or as these words may otherwise be interpreted to suit vaπous applications. This logical structure is an equation solving mechanism designed to enable the system to apply to any business or any digital activity involving a question and answer, action and reaction, cause and consequence, fact and proposition type of mechanism. Secondary interfaces may be developed that differ from the common interface in as little as in the interpretation of the basic descπption of these steps , or may require extensions of the content of the standard secondary interface but they will work so long as they related to the essence of the workflow of the operating rules. Secondary interfaces are preferably developed to corresponding to with each form m a business that is currently conducted either using paper or using discrete business software to input or output information.
[0037] Additional files related to the system will now be discussed. All information that is entered into the system is concurrently sorted and allocated into its appropπate file within the system. The function of sorting and allocation is accomplished by suitable programming in the operating This gatheπng and sorting of information simplifies the creation of features like diaπes and address books, and also activities like budgeting, forecasting, market analysis and other planning and accounting activities. The diary of the system is a calendar-based secondary interface designed to maintainthe record of times when events of any descπption occurred or are scheduled to occur. Each user has a separate diary. The address book of the system lelates to an index of all user files within the system that are related to the user may contain such personal details as the user's access rights, voting πghts and credit arrangements where merchant credit is involved. [0038] A specific secondary interface is required to output all information from the system. Once such secondary interface for outputting information may be is an accounting interface. This interface may be used to access and employ budgeting information. Other secondary interfaces may be developed to output information into tax returns or any other form that a user may require. A secondary interface may also be developed to mine information systematically from the system and report on trends or demographics within the system
[0039] The central cleaπnghouse is a vaπation of the basic system template. It provides a number of functions including management of the network employed by the system, maintaining records of transactions and responding to queπes relating to access πghts to vaπous features of the system, management of the user authentication process, and management of the user authoπzation process. Each user, upon registeπng with the system, creates a user profile that is stored in a separate user file in database of the central cleaπnghouse. The user profile includes information used in authenticating the identity of users and authoπzing their access πghts throughout the system, including credit πghts and voting πghts if applicable. In a preferred embodiment, when any user signs on, authentication information must be provided to the central cleaπnghouse, and the central cleaπnghouse must confirm that the authentication information matches the authentication information stored in the corresponding user profile before access will be granted The central cleaπnghouse is preferably accessed only by users of the system, and should not be directly accessed via the Internet or any other network
[0040] The merchant credit exchange is an application of the system's secuπty, authoπzation, and authentication system. It is created by a specific secondary interface The merchant credit exchange allows businesses to provide credit to their customers within the system. Files are created for each participating business and customer, which files are preferably maintained by the user's computer system with relevant records held on the database of the central cleaπnghouse for monitoπng, accounting, and billing purposes T4ιe Participating merchants must agree to the terms and conditions of the merchant credit exchange before accepting any credit transactions Users who employ the merchant credit exchange are responsible for creating their own credit terms and conditions, and managing their own credit extensions and collections The merchant credit exchange provides users with an alternative to credit card, electronic funds transfer, and allows them to maintain customer relationships based on hard copy check payment against extended credit.
[0041] The common market is another vaπation of the basic system template that may function as a single market or as an exchange of exchanges (a market of markets) Users create the common market by establishing a link between their product information file and the common market at the time they create the product information file. At that point they choose to either hold their product information locally for display through their local application of the system, or they can also make it more widely available to the public through the common market This method of creating a central market avoids the need for the common market to hold product information Instead, the common market is an index of bπef descπptions generated by the tracking codes that connect to product information files held remotely by users.
[0042] An important secondary interface, which also may be deemed a template or a form is that which facilitates the online sale of products and services When the who/what purpose for using the system is a product of any kind, and the why is to sell the product, the system presents the product information form This secondary interface creates a product information file.. Product information files may include smart agents that perform specific tasks for this file such as global information accessing or matching sellers and buyers The secondary interface for product information files also fulfills a number of other important purposes. • It creates a Product °rofile for display so that buyers can see what the seller has to offer.
• It gives users the option to list the Product Profile on the Common Market.
• It provides a basis for rating Product Profiles. Rating may help buyers evaluate a Product Profile listed on the Common Market.
• It provides the basis for matching sellers and buyers.
The system's standard interface structure benefits the recovery of information within the system for the same reasons that it benefits the inputting of information. To recover information from the database, the user simply selects the relevant Secondary Interface. Secondary interfaces can be used to produce activity reports and any other back office forms and reports that a business, or a court, other organization, or a system, may require. The system could provide a standard set of secondary output interfaces that may be customized by users as required, such as
• Work Order Form • Invoice
• Statement for Payment of Account
• Information Request
• Tax Reports/Filings
• Commission Statements • Work Reports
• Activity Reports for Advertisers
[0043] A secondary interface for e-mail should be a standard feature of this system. This secondary interface is used for personal (private) and business e-mail. It should complement the filing system and allow users to separate their private affairs from their public (business) activities. Incoming and unsolicited e-mail may be appended to existing files or new files may be created to store such mail. The e-mail interface should allow for normal cut, copy, paste and save capabilities that allow users to transfer information contained within incoming e-mail to be stored where appropriate in the system. Access Rights control what users can do within the system. All users must have a registered copy of the common user interface and access rights to operate within the system. They will also need to establish their credit arrangements if they wish to trade on-line with one or more merchants (suppliers) using merchant credit. Users establish their access rights and their merchant credit details by registeπng with the central cleaπnghouse. Where a group of users are involved, one person should be appointed to control the issuance of access πghts and merchant credit.
[0044] A new user must register to access the system. To do this a user must get a copy of the common user interface either on some form of digital storage disk, or it may downloaded from an on-line service such as the Internet, or it may come bundled with their computer.
[0045] When an unregistered copy of the common user interface is received and opened the secondary interface called the registration form should appear on the screen. This form must be completed and processed before the system can be accessed. The common user interface must be connected to the system netwoik duπng the registration process to enable processing Information provided in the secondary registration interface enables a user's profile (file) to be created within the central clearinghouse for the user. The user profile file contains essential pπvate/personal information such as name, contact details, access πghts, and credit details that the system needs to function and authenticate transactions instigated by the user. This information may relate to an individual or a corporation and must be able to be up-dated (refreshed) by the duly authoπzed person. In the event that the user is a corporation, organization or network of users, separate files need to be created for all personnel that are authoπzed to use the system. Users may part of the corporate user. However they may also have personal merchant credit and access πghts beyond those granted by their employer
[0046] When the registration form is completed, uploaded, processed, and accepted, the user's unique tracking code is created and the latest version of the common user interface may then be downloaded to the user's machine, if necessary. For secuπty and authoπzation purposes, a unique user tracking code must be allocated to every user at the time of completing the registration form The tracking code is created from the user profile, or may be generated by a pπvate key/public key generator It relates to the user's file within the system. The user's tracking code is used to identify the user [for electronic signature (e-Sign) purposes] and to assist in the tracking of the user's activitie s withm the system. A copy of all user tracking codes is held within the central cleaπnghouse [0047] For added secuπty, the user tracking code may also be wπtten to a user secuπty disk (key) that each user must subsequently use to open the system. Users must then insert their user secuπty disk and be connected to the central cleaπnghouse for authentication before they can operate within the system. The insertion of their user secuπty disk converts their common user interface into a type of personal on-line credit vehicle.
[0048] At the time of insertion, the user's public key information on the user secuπty disk (key) is matched with the user's profile that is kept in the central cleaπnghouse to authenticate a user's access nghis. In addition to the user secuπty disk, the user access interface may also require additional basic secuπty questions before reactivating, such as mother's maiden name and date of birth. For added secuπty the user secuπty disk may also be combined with biometπcs.
[0049] Refemng now to Figure 5, the method of engaging in a transaction will be descπbed from the buyer's view point. As indicated in block 500, the user interface receives a request for a search of the common market. The common user interface presents a secondary interface that prompts the user for search terms, as indicated in block 505. The search terms are received from the user, as indicated in block 510. The secondary search interface then searches the data in the common market to locate the search terms, as indicated by block 515 If the common market contains listings according to the search terms secondary search interface presents the list of resource locators for these listings to the user, as indicated by block 520. The user interface receives an identification of resource locators as to which additional data is desired, as indicated by block 525. If the user wishes to view further information the secondary search interface then retπeves the relevant information files from the location where they are stored as shown by block 530. Any suitable data transfer protocol may be employed.
[0050] Once the information is received, the user may enter into negotiation with the seller, as indicated by block 532, or simply choose to place an order with the seller. If an order is placedthe terms and conditions of agreement are forwarded to the fulfillment file for execution, as indicated by blocks 535 and 540. If no order is placed, the user exits the process as shown by block A record of all negotiations is maintained in the forum file and relevant information is maintained in the buyer's user profile in central cleaπnghouse.. The system will then veπfy the buyer's ability to pay for the order. If a credit card purchase is involved, the central cleaπnghouse will check with the credit card issuer in the normal course. If the purchase involves merchant credit, the buyer's merchant credit will be veπfied at the central cleaπnghouse, and advised to the parties.
[0051] The information on merchant credit at the central cleaπnghouse may include the nature of users who are entitled to merchant credit, the length of time available to pay, available discounts, and other information. The buyer's user profile will be updated from time to time with payment history information. If payment is to be by electronic funds transfer, the buyer's EFT details will be checked and automatically included into the Order Form by the system. Pπor arrangements will need to have been made with the banks involved to permit the central cleaπnghouse to veπfy the electromc funds transfer information. At the same time, if the system is compensated by a fee for each transaction, the system transaction fee should be calculated, and the system transaction fee and any other charges will be added to the order form. If the buyer is qualified to make either a merchant credit purchase or an EFT purchase, the system may issue a buyer approval number for the purchase that will be attached to the order form The order form is then e-mailed to the buyer,. If the buyer does not have the appropπate EFT arrangements in place, or does not have the merchant credit to purchase the order, the buyer should then be sent a cancellation advice informing the buyer of this and advising what the buyer must do to correct the buyer's position and effect such an order. The transaction is concurrently. The failed buyer must make the appropπate changes before the same buyer can place the order again. [0052] Regardless of the nature of the transaction, a copy of the order form and any cancellation advice may also sent to the forum file of the product that generated the inquiry and to the forum file of the agent(s) involved (if any). Any calculated transaction fee payable to system shouldbe sent to the system accounts file under accounts payable in the system forum file. All forms should carry appropriate disclaimers. For example, such disclaimers should protect the system from being liable for claims of buyers when sellers do not deliver. When seller receives an order form and is prompted to, seller should provide confirmation of product availability and terms and conditions of delivery. Seller may do this by completing the confirmation form attached to the order form.
[0053] Upon receiving confirmation from the seller, and before returning the order form to the buyer, the system may generate a seller confirmation number and attach this to the order form.
[0054] The system returns the completed order form to the buyer. A copy of the order form may also sent to the agreement file of the product that generated the transaction, to a forum file of the agent(s) involved (if any) and to a system accounts file located under accounts payable in the system master forum file This indicates that this transaction has now been confirmed.
[0055] The next step in the process involves payment. The mechanics of payment vary depending on the type of payment. If the order is a credit card transaction, and the seller has the buyer's details, the seller can submit these to the appropπate bank for payment. No transaction fee is payable to system unless an arrangement exists with the credit card company.
[0056] If the order involves merchant credit, the payment arrangement (agreement) is filed in the forum file of the product that generated the inquiry and to the forum file of the agent(s) involved (if any) The time when the payment is due is also recorded in a file, the diary associated with the buyer's records in the central cleaπnghouse an account for payment is generated from diary , at the end of each relevant peπod, such as once each month The account for payment (including a copy of the order form) may then be sent to the buyer's bank for payment by electronic funds transfer (EFT), or direct to the buyer for payment by check The amount of the transaction fee payable is included in the amount payable through the buyer's account.
[0057] Payment by check is not preferred by this system However, users may want to use this method until they are comfortable with the on-line payment system Where payment is to be made by check, the seller is responsible for paying the appropπate transaction fee to the system The system will then need to settle with any agent(s) The agreement with agents will cover this
[0058] If the order involves electronic funds transfer (EFT), the payment arrangement (agreement) is filed in the forum file of the product that generated this inquiry and to the file of the agent involved (if any) The time when the payment is due is then recorded in the diary maintained by the central cleaπnghouse and associated with the buyer and an account for payment is generated from the diary , at the end of each month, or other appropπate peπod, including this payment The account for payment (including a copy of the order form) is then sent to the buyer's bank for payment by electronic funds transfer (EFT). The amount of the transaction fee payable is included on the order form
[0059] It will be appreciated that the method and system of the invention provides a method and system which achieves the objectives set forth above under Summary of the Invention, as well as other objectives [0060] While the system and method of the invention have been described with respect to particular embodiments, there are other embodiments and variations which come within the scope and spirit of the present invention.

Claims (17)

What is claimed is:
1. An electronic system for regulating activity, compπsing. a user interface means for determining the πghts and abilities of users with the electronic business system and requiπng a common format for transaction data used in the system, a common market permitting users employing said user interface means to locate propositions of interest and to negotiate transactions, and a central cleaπnghouse for authoπzation and authentication of users
2. The system of claim 1 , wherein the user interface means requires the user to provide, before accepting any activity, who/what information relating to the activity, why/how information relating to the activity, and where/when information relating to the activity.
3. The system of claim 2, wherein the activity is a proposed business transaction, and upon the user interface receiving said who/what, why/how and where/when information, selected information relating to the activity is automatically available for searching in the common market.
4. The system of claim 3, wherein said who/what information identifies a product, said why/how information identifies the product as being for sale, and said where/when information identifies details of fulfillment of a sale of the product.
5 The system of claim 4, wherein users engaged in selling of products may select credit terms for payment, and users engaged in purchasing of products may provide information permitting electronic funds transfer from a bank account of the purchasing user, said system compπsing means for recording credit terms and amount owed upon completion of a sale, said system being adapted to request electronic funds transfer from the bank account at a time when payment is due in accordance with the credit terms.
6. The system of claim 1, wherein said user inteiface means compπses a plurality of secondary interface means, each of said secondary interface means corresponding to why/how information, and said secondary interface means being automatically presented to said user upon entry of corresponding why/how information.
7. The system of claim 4, said system further compπsing means for automatically executing steps identified in said where/when information upon agreement on sale of a product.
8. The system of claim 1, wherein all communications relating to an activity are recorded in a file associated with the activity.
9. A method of data handling m connection with a proposed activity, compπsing the steps of successively prompting a user for and receiving from the user who/what information relating to the activity, why/how information relating to the activity, and where/when information relating to the activity, recording received discussions relating to the activity, recording agreement between the user and another party, and, in a fulfillment stage, prompting and monitoπng fulfillment steps in accordance with said where/when information.
10. The method of claim 9, wherein the activity is a proposed business transaction, and upon the user interface receiving said who/what, why/how and where/when information, selected information relating to the activity is automatically available to one or more other users of the system for searching in a common market accessible to users of the system.
11 The method of claim 10, wherein said who/what information identifies a product, said why/how information identifies the product as being for sale, and said where/when information identifies details of fulfillment of a sale of the product.
12. The method of claim 1 1, wherein users engaged in selling of products may select credit terms for payment, and users engaged in purchasing of products may provide information permitting electronic funds transfer from a bank account of the purchasing user, and the method compπsing the steps of recording credit terms and amount owed upon completion of a sale, and requesting electronic funds transfer from the bank account at a time when payment is due in accordance with the credit terms.
13. The method of claim 9, further compπsing the step of selecting, based on information received from the user, one of a plurality ol templates defining information for which the user is to be prompted.
14. The method of claim 13, wherein each of said templates is selected based on a purpose of the activity as received from the user.
15. The method of claim 11, further compπsing the step of, following agreement on the sale of the product, automatically taking steps set forth in the details of fulfillment.
16. The method of claim 15, wherein said steps set forth in the details of fulfillment include directing a communication identifying an order quantity and destination.
17. The method of claim 9, wherein all communications relating to the activity are recorded in a file.
AU2001250580A 2000-01-25 2001-01-25 Electronic activity and business system and method Ceased AU2001250580B2 (en)

Applications Claiming Priority (9)

Application Number Priority Date Filing Date Title
US17791800P 2000-01-25 2000-01-25
US60/177,918 2000-01-25
US18911900P 2000-03-14 2000-03-14
US60/189,119 2000-03-14
US20699500P 2000-05-25 2000-05-25
US60/206,995 2000-05-25
US23106900P 2000-09-08 2000-09-08
US60/231,069 2000-09-08
PCT/IB2001/000727 WO2001055810A2 (en) 2000-01-25 2001-01-25 Electronic activity and business system and method

Publications (2)

Publication Number Publication Date
AU2001250580A1 true AU2001250580A1 (en) 2001-10-18
AU2001250580B2 AU2001250580B2 (en) 2007-02-08

Family

ID=27497252

Family Applications (2)

Application Number Title Priority Date Filing Date
AU2001250580A Ceased AU2001250580B2 (en) 2000-01-25 2001-01-25 Electronic activity and business system and method
AU5058001A Pending AU5058001A (en) 2000-01-25 2001-01-25 Electronic activity and business system and method

Family Applications After (1)

Application Number Title Priority Date Filing Date
AU5058001A Pending AU5058001A (en) 2000-01-25 2001-01-25 Electronic activity and business system and method

Country Status (4)

Country Link
US (2) US7233915B2 (en)
EP (1) EP1259924A4 (en)
AU (2) AU2001250580B2 (en)
WO (1) WO2001055810A2 (en)

Families Citing this family (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7980462B1 (en) * 1998-11-27 2011-07-19 Diebold Self-Service Systems Division Of Diebold, Incorporated Automated transaction machine with card reader that can read unique magnetic characteristic of a magnetic stripe
US7007088B1 (en) * 2000-05-31 2006-02-28 Sun Microsystems, Inc. Method and apparatus for providing an E-business audit trail in a distributed computing system
US20050229003A1 (en) 2004-04-09 2005-10-13 Miles Paschini System and method for distributing personal identification numbers over a computer network
US7395212B2 (en) * 2000-08-04 2008-07-01 Aol Llc Online reactivation of an account or service
US8255791B2 (en) 2000-11-29 2012-08-28 Dov Koren Collaborative, flexible, interactive real-time displays
US20020078070A1 (en) * 2000-12-18 2002-06-20 Philips Electronics North America Corp. Calendar software application with personal and historical data
US6980983B2 (en) * 2001-08-07 2005-12-27 International Business Machines Corporation Method for collective decision-making
EP1417574A1 (en) * 2001-08-14 2004-05-12 Humana Inc Web-based security with controlled access to data and resources
US7472077B2 (en) * 2001-10-31 2008-12-30 Amazon.Com, Inc. User interfaces and methods for facilitating user-to-user sales
US7130843B2 (en) * 2002-05-20 2006-10-31 International Business Machines Corporation Method, system and program product for locating personal information over a network
US20040064363A1 (en) * 2002-09-30 2004-04-01 Mostad Matthew A. Technique for effectively promoting goods for service through an information assistance service
US10205721B2 (en) 2002-12-10 2019-02-12 Ewi Holdings, Inc. System and method for distributing personal identification numbers over a computer network
WO2004107280A2 (en) 2003-05-28 2004-12-09 Ewi Holdings, Inc. System and method for electronic prepaid account replenishment
US11475436B2 (en) 2010-01-08 2022-10-18 Blackhawk Network, Inc. System and method for providing a security code
US7280644B2 (en) 2004-12-07 2007-10-09 Ewi Holdings, Inc. Transaction processing platform for faciliating electronic distribution of plural prepaid services
US11599873B2 (en) 2010-01-08 2023-03-07 Blackhawk Network, Inc. Systems and methods for proxy card and/or wallet redemption card transactions
US7613666B1 (en) 2004-04-23 2009-11-03 Microsoft Corporation Generating a class model from a business vocabulary to represent facts expressible in the business vocabulary
US7620935B2 (en) 2004-04-30 2009-11-17 Microsoft Corporation Generating programmatic interfaces from natural language expressions of authorizations for request of information
US7802231B2 (en) * 2004-04-30 2010-09-21 Microsoft Corporation Generating programmatic interfaces from natural language expressions of authorizations for provision of information
US7499850B1 (en) 2004-06-03 2009-03-03 Microsoft Corporation Generating a logical model of objects from a representation of linguistic concepts for use in software model generation
US7613676B2 (en) * 2004-07-27 2009-11-03 Microsoft Corporation Generating a database model from natural language expressions of business rules
US8050907B2 (en) * 2004-07-30 2011-11-01 Microsoft Corporation Generating software components from business rules expressed in a natural language
US20060069995A1 (en) * 2004-09-30 2006-03-30 British Telecommunications Public Limited Company Personalised process automation
US8191135B2 (en) * 2005-01-20 2012-05-29 International Business Machines Corporation Secured web based access of failed flows in an integration server
WO2006113336A2 (en) * 2005-04-15 2006-10-26 United States Postal Service Tasking, invoicing, and reporting methods
US7647131B1 (en) * 2006-03-09 2010-01-12 Rockwell Automation Technologies, Inc. Dynamic determination of sampling rates
US8001021B1 (en) * 2006-05-16 2011-08-16 Intuit Inc. System and method for compensation query management
US10296895B2 (en) 2010-01-08 2019-05-21 Blackhawk Network, Inc. System for processing, activating and redeeming value added prepaid cards
US20090006162A1 (en) * 2007-06-29 2009-01-01 Microsoft Corporation Workflows Leveraging Process Stages and Cross-Entity Records
US20090326925A1 (en) * 2008-06-27 2009-12-31 Microsoft Corporation Projecting syntactic information using a bottom-up pattern matching algorithm
US20090326924A1 (en) * 2008-06-27 2009-12-31 Microsoft Corporation Projecting Semantic Information from a Language Independent Syntactic Model
WO2012027664A1 (en) 2010-08-27 2012-03-01 Blackhawk Network, Inc. Prepaid card with savings feature
AU2011203954A1 (en) 2010-01-08 2012-07-26 Blackhawk Network, Inc. A system for processing, activating and redeeming value added prepaid cards
US10037526B2 (en) * 2010-01-08 2018-07-31 Blackhawk Network, Inc. System for payment via electronic wallet
US20110252459A1 (en) * 2010-04-12 2011-10-13 Walsh Robert E Multiple Server Access Management
US11042870B2 (en) 2012-04-04 2021-06-22 Blackhawk Network, Inc. System and method for using intelligent codes to add a stored-value card to an electronic wallet
CA3171304A1 (en) 2012-11-20 2014-05-30 Blackhawk Network, Inc. Method for using intelligent codes in conjunction with stored-value cards
KR101315117B1 (en) 2013-06-18 2013-10-07 (주)이미지스테크놀로지 Method for sensing state of output load change in a primary-regulated switched mode power supply, and apparatus for performing the method
WO2015044706A1 (en) * 2013-09-24 2015-04-02 Yogesh Chunilal Rathod Integrated and dynamic advertisement, marketing, and e-commerce platform
JP6465376B2 (en) 2014-06-16 2019-02-06 株式会社インタラクティブソリューションズ Display information management system
US9967221B2 (en) * 2015-09-22 2018-05-08 International Business Machines Corporation Retaining a single thread after insertion of a new e-mail
US20180012240A1 (en) * 2016-07-06 2018-01-11 IRIO Inc. System and method of communicating informational messages and monitoring receipt and use of messages
US10684939B2 (en) 2016-09-08 2020-06-16 International Business Machines Corporation Using workload profiling and analytics to understand and score complexity of test environments and workloads
US10592911B2 (en) * 2016-09-08 2020-03-17 International Business Machines Corporation Determining if customer characteristics by customer geography, country, culture or industry may be further applicable to a wider customer set
US10586242B2 (en) 2016-09-08 2020-03-10 International Business Machines Corporation Using customer profiling and analytics to understand customer workload complexity and characteristics by customer geography, country and culture
US10643168B2 (en) 2016-09-08 2020-05-05 International Business Machines Corporation Using customer and workload profiling and analytics to determine, score, and report portability of customer and test environments and workloads
US10664786B2 (en) 2016-09-08 2020-05-26 International Business Machines Corporation Using run time and historical customer profiling and analytics to determine customer test vs. production differences, and to enhance customer test effectiveness
US10643228B2 (en) 2016-09-14 2020-05-05 International Business Machines Corporation Standardizing customer and test data and information collection for run time and historical profiling environments and workload comparisons
US10628840B2 (en) 2016-09-14 2020-04-21 International Business Machines Corporation Using run-time and historical customer profiling and analytics to determine and score customer adoption levels of platform technologies
US10621072B2 (en) 2016-09-14 2020-04-14 International Business Machines Corporation Using customer profiling and analytics to more accurately estimate and generate an agile bill of requirements and sprints for customer or test workload port
US10509921B2 (en) * 2017-05-31 2019-12-17 Intuit Inc. System for managing transactional data
US11354714B1 (en) * 2019-12-23 2022-06-07 Stripe, Inc. Systems and methods for dynamic interface generation for commerce platform onboarding
US11902266B1 (en) * 2020-07-30 2024-02-13 Stripe, Inc. Systems and methods for generating and using secure sharded onboarding user interfaces

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5732400A (en) 1995-01-04 1998-03-24 Citibank N.A. System and method for a risk-based purchase of goods
US5794210A (en) 1995-12-11 1998-08-11 Cybergold, Inc. Attention brokerage
US5615269A (en) 1996-02-22 1997-03-25 Micali; Silvio Ideal electronic negotiations
US6119101A (en) * 1996-01-17 2000-09-12 Personal Agents, Inc. Intelligent agents for electronic commerce
AUPN815796A0 (en) 1996-02-19 1996-03-14 Lancaster Australia Pty Limited Universal contract exchange
US6401080B1 (en) * 1997-03-21 2002-06-04 International Business Machines Corporation Intelligent agent with negotiation capability and method of negotiation therewith
US5991740A (en) * 1997-06-10 1999-11-23 Messer; Stephen Dale Data processing system for integrated tracking and management of commerce related activities on a public access network
US5950178A (en) 1997-07-29 1999-09-07 Borgato; Sergio Data processing system and method for facilitating transactions in diamonds
US5970475A (en) 1997-10-10 1999-10-19 Intelisys Electronic Commerce, Llc Electronic procurement system and method for trading partners
US5966697A (en) * 1997-10-30 1999-10-12 Clearcommerce Corporation System and method for secure transaction order management processing
US6101485A (en) 1998-03-26 2000-08-08 International Business Machines Corporation Electronic solicitations for internet commerce
US6035288A (en) 1998-06-29 2000-03-07 Cendant Publishing, Inc. Interactive computer-implemented system and method for negotiating sale of goods and/or services
US6067531A (en) 1998-07-21 2000-05-23 Mci Communications Corporation Automated contract negotiator/generation system and method
CA2343164A1 (en) 1998-09-18 2000-03-30 I2 Technologies, Inc. System and method for multi-enterprise supply chain optimization
US6230146B1 (en) * 1998-09-18 2001-05-08 Freemarkets, Inc. Method and system for controlling closing times of electronic auctions involving multiple lots
US6141653A (en) 1998-11-16 2000-10-31 Tradeaccess Inc System for interative, multivariate negotiations over a network
US6260024B1 (en) * 1998-12-02 2001-07-10 Gary Shkedy Method and apparatus for facilitating buyer-driven purchase orders on a commercial network system
CA2368858A1 (en) 1999-04-12 2000-10-19 Digital Media On Demand, Inc. Secure electronic commerce system
US6064981A (en) 1999-06-17 2000-05-16 Barni; Neil A. Method for online display and negotiation of cargo rates
MXPA01013320A (en) * 1999-07-06 2002-07-09 B Duncan Dana On-line interactive system and method for transacting business.
US6868392B1 (en) * 1999-07-09 2005-03-15 Fujitsu Limited System and method for electronic shopping using an interactive shopping agent

Similar Documents

Publication Publication Date Title
US7233915B2 (en) Electronic activity and business system and method
AU2001250580A1 (en) Electronic activity and business system and method
US7668782B1 (en) Electronic commerce system for offer and acceptance negotiation with encryption
JP5118959B2 (en) Online authentication method and system
US20020046187A1 (en) Automated system for initiating and managing mergers and acquisitions
US20080301055A1 (en) unified platform for reputation and secure transactions
US20020082961A1 (en) Apparatus, systems and methods for transacting and managing like-kind exchanges
US7536336B1 (en) Multi-party electronic transactions
US20090259595A1 (en) Systems and Methods for Operating a Computerized Trade Finance Network
WO2000029972A1 (en) System for iterative, multivariate negotiations over a network
WO2000029973A1 (en) Electronic non-repudiation system and method
WO2000033271A2 (en) Method and apparatus for facilitating buyer-driven purchase orders on a commercial network system
JP2003533793A (en) System and method for electronically executing a derivative transaction
US20060036530A1 (en) Method and apparatus for facilitating micro energy derivatives transactions on a network system
US20010047329A1 (en) Electronic exchange apparatus and method
TW511016B (en) Multi-party electronic transactions
US20080222041A1 (en) Methods and Systems for Electronic Agency in Performance of Services
WO2006006310A1 (en) Buyer terminal, purchase surrogating method, consignment purchase system, and consignment purchase method
WO2002063437A9 (en) An automated bidding process and system
JP2005250809A (en) Financial product transaction support system
WO2011075209A1 (en) System and method for registering users for an ip marketplace
US8275670B2 (en) Electronic sales and contracting
US20230316841A1 (en) Dynamic voting exchange platform
JP7481308B2 (en) Electronic real estate contract support system
US11790338B2 (en) Transaction system and method