The present invention provides systems and methods for conducting electronic transactions in a distributed computing environment. A communications protocol is provided that enables reliable transactional state synchronization for peers participating in a distributed transaction. A transaction proces
The present invention provides systems and methods for conducting electronic transactions in a distributed computing environment. A communications protocol is provided that enables reliable transactional state synchronization for peers participating in a distributed transaction. A transaction processing application is deployed on a local computer system to manage transactions thereon. The local computer system contacts a remote computer system to obtain authorization to execute a transaction. The local computer system initiates a failure-recovery job that is operable to automatically resend status signals and other information to the remote system if the communication with the remote system exhibits certain predefined fault conditions. The remote system is able to dynamically adjust the definition of the predefined fault conditions. If the transaction concludes without triggering the predefined fault conditions, the failure-recovery job is cancelled. The transaction processing application may also allow deferred transactions between remote parties. The transaction processing application maintains a record of the transactions performed by the consumer on the consumer's local system. Upon the occurrence of predefined conditions, transactional records are sent to a remote vendor or clearinghouse. The vendor or clearinghouse can manage the risk it bears by setting the predefined conditions appropriately.
대표청구항▼
1. A method for managing the transmission of transaction audit records from a first computer system to a clearinghouse, the method comprising: generating an audit record at the first computer system;in response to generating the audit record, incrementing a first count of a number of audit records a
1. A method for managing the transmission of transaction audit records from a first computer system to a clearinghouse, the method comprising: generating an audit record at the first computer system;in response to generating the audit record, incrementing a first count of a number of audit records accumulated at the first computer system;comparing the first count with a first predefined threshold value;transmitting a predefined number of audit records to the clearinghouse;receiving a signal from the clearinghouse, the signal including a time indicator;at a time specified by the time indicator, sending a request to the clearinghouse to transmit one or more acknowledgements relating to audit records;receiving a first acknowledgement from the clearinghouse and decrementing the first count in response to the first acknowledgement;maintaining a second count of a value of unpaid transactions conducted at the first computer system, the value of unpaid transactions forming part of said audit records;receiving a second acknowledgement from the clearinghouse; anddecrementing the second count in response to the second acknowledgement. 2. The method of claim 1, further comprising: before the step of receiving a second acknowledgement from the clearinghouse: accumulating the value of unpaid transactions;comparing the second count with a second predefined threshold value; andtransmitting at least part of the accumulated value of unpaid transactions to the clearinghouse. 3. The method of claim 2, further comprising: determining that the second count is greater than the second predefined threshold value; andin response to the determination, disallowing a transaction request. 4. The method of claim 2, further comprising: determining that the first count is greater than the first predefined threshold value; andin response to the determination, disallowing a transaction request. 5. The method of claim 2, further comprising: determining that the first count is greater than the first predefined threshold value and the second count is greater than the second predefined threshold value, andin response to the determination, disallowing a transaction request. 6. The method of claim 1, wherein generating the audit record at the first computer system comprises generating an audit record at the first computer system corresponding to a predefined money value. 7. The method of claim 1, wherein generating the audit record at the first computer system comprises generating an audit record at the first computer system corresponding to a plurality of transactions. 8. The method of claim 1, wherein the first predefined threshold value corresponds to a predefined money value. 9. A non-transitory computer-readable storage medium storing instructions that, when executed by a processor included in a first computer system, cause the first computer system to: generate an audit record at the first computer system;increment a first count of a number of audit records accumulated at the first computer system in response to generating the audit record;compare the first count with a first predefined threshold value;transmit a predefined number of audit records to a clearinghouse;receive a signal from the clearinghouse, the signal including a time indicator;at a time specified by the time indicator, send a request to the clearinghouse to transmit one or more acknowledgements relating to audit records;receive a first acknowledgement from the clearinghouse and decrement the first count in response to the first acknowledgement;maintain a second count of a value of unpaid transactions conducted at the first computer system, the value of unpaid transactions forming part of said audit records;receive a second acknowledgement from the clearinghouse; anddecrement the second count in response to the second acknowledgement. 10. The non-transitory computer-readable storage medium of claim 9, wherein the instructions are further configured to cause the first computer system to: before receiving a second acknowledgement from the clearinghouse: accumulate the value of unpaid transactions;compare the second count with a second predefined threshold value; andtransmit at least part of the accumulated value of unpaid transactions to the clearinghouse. 11. The non-transitory computer-readable storage medium of claim 10, wherein the instructions are further configured to cause the first computer system to: determine that the second count is greater than the second predefined threshold value; andin response to the determination, disallow a transaction request. 12. The non-transitory computer-readable storage medium of claim 10, wherein the instructions are further configured to cause the first computer system to: determine that the first count is greater than the first predefined threshold value; andin response to the determination, disallow a transaction request. 13. The non-transitory computer-readable storage medium of claim 10, wherein the instructions are further configured to cause the first computer system to: determine that the first count is greater than the first predefined threshold value and the second count is greater than the second predefined threshold value, andin response to the determination, disallow a transaction request. 14. The non-transitory computer-readable storage medium of claim 9, wherein generating the audit record at the first computer system comprises generating an audit record at the first computer system corresponding to a predefined money value. 15. The non-transitory computer-readable storage medium of claim 9, wherein, wherein generating the audit record at the first computer system comprises generating an audit record at the first computer system corresponding to a plurality of transactions. 16. The non-transitory computer-readable storage medium of claim 9, wherein, wherein the first predefined threshold value corresponds to a predefined money value.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (69)
Dolev Danny (Mevasserret ILX) Reischuk Rdiger K. (Mnster-Altheim CA DEX) Strong Hovey R. (San Jose CA), Anonymous time synchronization method.
Gopinath Bhaskarpillai (Watchung NJ) Kurshan David (Sea Bright NJ), Composition of systems of objects by interlocking coordination, projection, and distribution.
Dolev Danny,ILX ; Reischuk Rudiger Karl,DEX ; Strong Hovey Raymond, Computer program product for use with a network node for performing anonymous time synchronization in a network.
Cheung Yeung Joemanne Chi,GBX ; Thompson Jonathan A.,GBX ; Lysejko Martin,GBX ; Cooper Guy A.,GBX, Control message transmission in telecommunications systems.
Talati Kirit K. (207 Sun Ray La. Sunnyvale TX 75102), Control system and method for direct execution of software application information models without code generation.
Stefik Mark J. (Woodside CA) Russell Daniel M. (Palo Alto CA) Bobrow Daniel G. (Palo Alto CA) Henderson ; Jr. D. Austin (La Honda CA), Document processing system utilizing document service cards to provide document processing services.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Baecker,Thomas; Buddendiek,Joerg; Carnahan,Kevin; Egert,Ralph; Feder,Patrick C.; Frank,Carsten; Nargolwalla,Tanya F.; Zahm,Robert R., Event-driven trade link between trading and clearing systems.
Gill Robert Bradley,CAX ; Baghdadi Gaby,CAX ; Symonds Robert D. ; Singer Irek,CAX ; St. George Peter,CAX ; Shirah Roy ; Stock Timothy M., Fault monitoring and notification system for automated banking machines.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
Doyle Thomas F. (San Diego CA), Method and apparatus for detecting fault conditions in a vehicle data recording device to detect tampering or unauthoriz.
Brunmeier Terry J. (Shoreview MN) Byers Larry L. (Apple Valley MN) Miller John A. (Shoreview MN) Robeck Gary R. (Albertville MN), Method and apparatus for determining the source and nature of an error within a computer system.
Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
Herzberg Amir ; Krawczyk Hugo Mario ; Kutten Shay ; Le An Van ; Matyas Stephen Michael ; Yung Marcel Mordechay, Method and system for the secured distribution of multimedia titles.
Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA) Lampson Butler W. (Cambridge MA), Method for delegating authorization from one entity to another through the use of session encryption keys.
Walker Jay S. ; Case T. Scott ; Jorasch James A. ; Sparico Thomas M., Method, apparatus, and program for pricing, selling, and exercising options to purchase airline tickets.
Goldsmith Amy M. (Los Gatos CA) Goldsmith David B. (Los Gatos CA) Pettus Christopher E. (San Francisco CA), Object-oriented remote procedure call networking system.
Dolev Danny (Jerusalem ILX) Reischuk Rudiger K. (Munster-Altheim DEX) Strong Hovey R. (San Jose CA), Processing system for use as a network node for performing anonymous time synchronization in a network.
Higgins Peter ; Hebert Mark P. ; Lynch John T., Redundancy, expanded switching capacity and fault isolation arrangements for expandable telecommunications system.
Ketcham Larry R. (Laguna Niguel CA), Software security system for maintaining integrity of compiled object code by restricting users ability to define compil.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
McManis Charles E. (Sunnyvale CA), System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.