System, method and article of manufacture for contract term certification utilizing a network
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-017/60
H04K-001/00
H04L-009/00
출원번호
US-0544708
(2000-04-06)
발명자
/ 주소
Durfee, Glenn
Franklin, Matthew K.
출원인 / 주소
Xerox Corporation
인용정보
피인용 횟수 :
8인용 특허 :
12
초록▼
A system, method and article of manufacture are provided for certifying contracts utilizing a network. Initially, a first and second contract is received utilizing a network. Each contract includes a plurality of terms. It is then certified that the terms of the second contract are consistent with t
A system, method and article of manufacture are provided for certifying contracts utilizing a network. Initially, a first and second contract is received utilizing a network. Each contract includes a plurality of terms. It is then certified that the terms of the second contract are consistent with the terms of the first contract.
대표청구항▼
1. A method for certifying contracts utilizing a network, comprising:(a) receiving a first contract including a plurality of terms utilizing the network; (b) receiving a second contract including a plurality of terms utilizing the network; and (c) certifying that the terms of the second contract are
1. A method for certifying contracts utilizing a network, comprising:(a) receiving a first contract including a plurality of terms utilizing the network; (b) receiving a second contract including a plurality of terms utilizing the network; and (c) certifying that the terms of the second contract are consistent with the terms of the first contract wherein at least a portion of the terms of at least one of the contracts are obfuscated. 2. The method as recited in claim 1, and further comprising receiving proof that the terms of the second contract are consistent with the terms of the first contract utilizing the network, wherein the certification is based on the proof.3. The method as recited in claim 2, wherein the proof is generated by comparing the terms of the first and second contract.4. The method as recited in claim 1, wherein the first contract involves an agreement between a first party and a second party, and the second contract involves a subsequent agreement between the second party and a third party.5. The method as recited in claim 4, and further comprising generating a certifier if it is certified that the terms of the second contract are consistent with the terms of the first contract.6. The method as recited in claim 5, and further comprising sending the second contract and the certifier to the third party.7. The method as recited in claim 1, wherein the first contract is received with a certifier indicating that the terms of the first contract are consistent with terms of a previous contract.8. The method as recited in claim 1, and further comprising sending the second contract with obfuscated terms utilizing the network.9. A computer program embodied on a computer readable medium for certifying contracts utilizing a network, comprising:(a) a code segment for receiving a first contract including a plurality of terms utilizing the network; (b) a code segment for receiving a second contract including a plurality of terms utilizing the network; and (c) a code segment for certifying that the terms of the second contract are consistent with the terms of the first contract wherein at least a portion of the terms of at least one of the contracts are obfuscated. 10. The computer program as recited in claim 9, and further comprising a code segment for receiving proof that the terms of the second contract are consistent with the terms of the first contract utilizing the network, wherein the certification is based on the proof.11. The computer program as recited in claim 10, wherein the proof is generated by comparing the terms of the first and second contract.12. The computer program as recited in claim 9, wherein the first contract involves an agreement between a first party and a second party, and the second contract involves a subsequent agreement between the second party and a third party.13. The computer program as recited in claim 12, and further comprising a code segment for generating a certifier if it is certified that the terms of the second contract are consistent with the terms of the first contract.14. The computer program as recited in claim 13, further comprising a code segment for sending the second contract and the certifier to the third party.15. The computer program as recited in claim 9, wherein the first contract is received with a certifier indicating that the terms of the first contract are consistent with terms of a previous contract.16. The computer program as recited in claim 9, and further comprising a code segment for sending the second contract with obfuscated terms utilizing the network.17. A system for certifying contracts utilizing a network, comprising:(a) logic for receiving a first contract including a plurality of terms utilizing a network; (b) logic for receiving a second contract including a plurality of terms utilizing the network; and (c) logic for certifying that the terms of the second contract is consistent with the terms of the first contract wherein at least a portion of the terms of at least one of the contracts are obfuscated. 18. A computer-controlled method for obfuscating terms of a document, comprising:(a) receiving the document including a plurality of terms; (b) identifying at least one of the terms of the document; (c) obfuscating the at least one identified term of the document; and (d) providing the document with the at least one obfuscated term. 19. The method as recited in claim 18, wherein the document is a contract.20. The method as recited in claim 19, wherein the contract is received from a first party, and wherein the step of providing further comprises sending the contract with the at least one obfuscated term to a second party.21. The method as recited in claim 20, wherein the contract is received and sent utilizing a network.22. The method as recited in claim 18, wherein the at least one term of the document is identified based on a list of terms.23. A computer program embodied on a computer readable medium for obfuscating terms of a document, comprising:(a) a code segment for receiving the document including a plurality of terms; (b) a code segment for identifying at least one of the terms of the document; and (c) a code segment for obfuscating the at least one identified term of the document. 24. The computer program as recited in claim 23, wherein the document is a contract.25. The computer program as recited in claim 24, wherein the contract is received from a first party, and further comprising a code segment for sending the contract with the at least one obfuscated term to a second party.26. The computer program as recited in claim 25, wherein the contract is received and sent utilizing a network.27. The computer program as recited in claim 23, wherein the at least one term of the documents is identified based on a list of terms.28. A system for obfuscating terms of a document, comprising:(a) logic for receiving the document including a plurality of terms; (b) logic for identifying at least one of the terms of the document; and (c) logic for obfuscating the at least one identified term of the document.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (12)
Hoyt Daniel M. ; Lee Robin M. ; Lickiss Alan L., Automated contract negotiator/generation system and method.
Graziano James M. (4662 Weld County Rd. 34 Platteville CO 80651) Dziewit Halina S. (5260 Centennial Trail Boulder CO 80302), Knowledge based system for document authentication.
Anderson Milton ; Jaffe Frank ; Hibbert Chris ; Virkki Jyri ; Kravitz Jeffrey ; Chang Sheveling ; Palmer Elaine, Method and system for processing electronic documents.
Kruse John M. (Minneapolis MN) Collins John E. (Hudson WI) Sisley Elizabeth M. (Woodbury MN), Resource assignment system providing mixed-initiative user interface updates.
Bisbee Stephen F. (Gibson Island MD) Trotter Douglas H. (Baltimore MD), System and method for electronic transmission storage and retrieval of authenticated documents.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Gioia, Gene George; Gioia, Andrew Nicholas; Fogarty, Brendan Michael, Method and computer readable medium relating to creating child virtual decks from a parent virtual deck.
Gioia, Gene George; Gioia, Andrew Nicholas; Fogarty, Brendan Michael, Method and device for physically randomizing a plurality of playing instruments in absence of a random number generator.
Gioia, Gene George; Gioia, Andrew Nicholas; Fogarty, Brendan Michael, System and computer-executable instructions for physically randomizing a plurality of playing instruments in absence of a random number generator.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.