Method and system for implementing effective governance of transactions between trading partners

Information

  • Patent Grant
  • 8301529
  • Patent Number
    8,301,529
  • Date Filed
    Monday, October 23, 2006
    18 years ago
  • Date Issued
    Tuesday, October 30, 2012
    12 years ago
Abstract
An embodiment of the present invention is directed to receiving a first independent log from a first trading partner wherein the first independent log comprises at least one request log entry associated with a transaction wherein the request log entry comprises at least a request identifier; receiving a second independent log from a second trading partner wherein the second independent log comprises at least one reply log entry associated with the transaction between the first trading partner and the second trading partner, wherein the reply log entry comprises at least a reply identifier; matching the at least one request log entry and the at least one reply log entry based on one or more of the request identifier and the reply identifier at a third party interface; identifying non-matching log entries at the third party interface; and forwarding the non-matching log entries for one or more of error processing and dispute resolution.
Description
FIELD OF THE INVENTION

The present invention relates generally to transactions between trading partners and, more particularly, to a method and system for implementing effective governance of transactions between trading partners in the financial industry through a third party matching entity.


BACKGROUND OF THE INVENTION

Trading partners are often associated with one another to perform certain types of business transactions or to use shared facilities, such as a communications network. The level of trust among partners may vary depending on the nature of the association, the value of the shared resources, and the value of the transactions carried out. One way of enhancing trust between the members is for an association to charter a third party with the responsibility for governing the use of the network, enforcing business practices, and performing reporting and accounting activities appropriate to the transactions.


In the past, such third parties, including credit card, debit card, and ACH network associations, have discharged their role by actively participating in the transmission of transactions between their members, typically by establishing communications “switches” that received, parsed, evaluated, logged, routed, and transmitted the messages within a secure location controlled by the third party. These “star” or “multi-star” networks, with their centralized switches, were compatible with the networking technology of the day, which relied upon leased lines and minicomputer or mainframe-based messaging hubs.


The Internet (and internet technologies used in private networks) is designed with an entirely different architecture. More specifically, Internet technologies rely on the routing of Internet Protocol packets among routers whose functions are deliberately minimized so as to allow high-speed processing and maximum efficiency in directly connecting network endpoints. There is no small set of centralized hubs through which all messages between the endpoints flow, and functionality is deliberately devolved from the “intelligent network” to the “intelligent periphery.”


For Internet Protocol (IP) networks a new approach to governing the use of the network and the integrity of the transactions is needed.


One approach is for the third party to deploy its own devices at the periphery. There are several disadvantages of this approach, including the number of locations to be equipped, the difficulty of administering and maintaining dispersed devices, and the need to find suitable locations for sheltering, powering, cooling and securing the devices. If the devices are placed in the trading partners' data centers, then there are considerations as to whether the devices are outside a partner's firewalls, within the DMZ, or within the server farm. De-Militarized Zone refers to a network compartment separated from the external network by an external firewall and from the internal corporate networks and corporate server farms by an internal firewall. Devices located on a partner's premises may also be attacked and subverted by the partner, if there is an incentive to do so.


In view of the foregoing, it would be desirable to provide a method and system for implementing effective governance of transactions between trading partners in the financial industry through a third party log entry matching entity, which overcomes the above-described inadequacies and shortcomings.


SUMMARY OF THE INVENTION

According to an embodiment of the present invention, a method and a system provides for effective governance of transactions between trading partners in the financial industry through a third party log entry matching entity.


According to an exemplary embodiment of the present invention, a computer implemented method for governing business transactions between trading partners comprises the steps of: receiving a first independent log from a first trading partner wherein the first independent log comprises at least one request log entry associated with a transaction wherein the request log entry comprises at least a request identifier; receiving a second independent log from a second trading partner wherein the second independent log comprises at least one reply log entry associated with the transaction between the first trading partner and the second trading partner, wherein the reply log entry comprises at least a reply identifier; matching the at least one request log entry and the at least one reply log entry based on one or more of the request identifier and the reply identifier at a third party interface; identifying non-matching log entries at the third party interface; and forwarding the non-matching log entries for one or more of error processing and dispute resolution.


In accordance with other aspects of this exemplary embodiment of the present invention, the matching log entries are used to perform a business function as agreed to in a preexisting agreement between the first trading partner and the second trading partner; the business function comprises one or more of billing the first or second partner and transferring value between the partners; each of the request log entry and reply log entry contains at least part of a message plaintext exchanged between the first trading partner and the second trading partner; the message plaintext is encrypted and each of the request log entry and reply log entry contains cryptographic hash functions to allow later verification that the message plaintext logged by the first trading partner and the second trading partner was the actual message communicated in the transaction; the message plaintext is encrypted and each of the request log entry and reply log entry contains cryptographic digital signatures to allow later verification that the message plaintext logged by the first trading partner and the second trading partner was the actual message communicated in the transaction; the first independent log and the second independent log are sent by the first trading partner and the second trading partner, respectively, to the third party interface in real time, wherein each of the request log entry and reply log entry contains time stamps; each of the request log entry and reply log entry is cryptographically signed by each of the first trading partner and the second trading partner before the first independent log and the second independent log are sent to the third party interface; the third party interface matches each log entry in real time and notifies one or more of the first trading partner and the second trading partner that a mismatch has occurred; the third party interface matches each log entry in real time and notifies one or more of the first trading partner and the second trading partner that a match has occurred; each log entry contains data describing a value of a transaction; the value of the transaction comprises an amount of money transferred in the transaction between the first trading partner and the second trading partner; the third party interface uses the value of transactions with matching log data to provide financial settlement between or among the first trading partner and the second trading partner; the first trading partner and the second trading partner regard a transaction as settled when no notification of a mismatch is received from the third party interface or when notification of a match is received from the third party interface; the first trading partner and the second trading partner redo the transaction when one or more of the first trading partner and the second trading partner detects a failure; and the first trading partner and the second trading partner redo the transaction when one or more of the first or the second trading partner is notified of a log entry mismatch by the third party interface.


According to an exemplary embodiment of the present invention, a computer implemented system for governing business transactions between trading partners comprises a receiving module for receiving a first independent log from a first trading partner wherein the first independent log comprises at least one request log entry associated with a transaction wherein the request log entry comprises at least a request identifier and receiving a second independent log from a second trading partner wherein the second independent log comprises at least one reply log entry associated with the transaction between the first trading partner and the second trading partner, wherein the reply log entry comprises at least a reply identifier; and a matching module for matching the at least one request log entry and the at least one reply log entry based on one or more of the request identifier and the reply identifier at a third party interface; identifying non-matching log entries at the third party interface; and forwarding the non-matching log entries for one or more of error processing and dispute resolution.





BRIEF DESCRIPTION OF THE DRAWINGS

In order to facilitate a fuller understanding of the present inventions, reference is now made to the appended drawings. These drawings should not be construed as limiting the present inventions, but are intended to be exemplary only.



FIG. 1 is an exemplary diagram of a system for third party logging, according to an embodiment of the present invention.



FIG. 2 is an exemplary diagram of details of transactions, according to an embodiment of the present invention.



FIG. 3 is an exemplary flowchart illustrating a method for third party logging, according to an embodiment of the present invention.



FIG. 4 is an exemplary flowchart illustrating a method for third party dispute resolution, according to an embodiment of the present invention.





DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENT(S)

An embodiment of the present invention generally relates to a method and system for implementing effective governance of transactions between trading partners in the financial industry through a third party matching entity. In many business situations, the trading partners are not motivated individually to subvert the integrity of the network, since it requires two colluding partners in order to use the network for purposes not authorized by the governing association. Therefore, effective governance can be established by having both participants report the essentials of a transaction to a third party.



FIG. 1 is an exemplary diagram of a system for third party logging, according to an embodiment of the present invention. In this exemplary system, trading partners may include financial institutions, such as banks represented by Bank 110 and Bank 120. Trading partners may include any entity who communicates and/or performs transactions with other entities. Trading partners are often associated with one another to perform certain types of business transactions or to use shared facilities, such as a communications network. The level of trust among partners may vary depending on the nature of the association, the value of the shared resources, and/or the value of the transactions carried out.


Bank 110 may include an inquiry application 112 and a logging module 114 in accordance with an embodiment of the present invention. In addition, Bank 120 may include a responding application 122 and a logging module 124. Similarly, if Bank 120 also functions as an inquiring entity, Bank 120 may include an inquiry application and if Bank 110 also functions as a responding entity, Bank 110 may include a responding application. The illustrative blocks, modules or components may be multiplied for various applications or different application environments. In addition, the modules or components may be further combined into a consolidated unit. Other architectures may be realized. The modules and/or components may be further duplicated, combined and/or separated across multiple systems at local and/or remote locations.


While a single inquiry bank and a single responding bank are shown in FIG. 1, multiple trading partners may also be implemented as inquiry and/or responding entities. For example, multiple trading partners may include a supplier entity, a receiver entity and a manufacturer entity, where each trading partner supplies log entries to a Third Party Logging Entity. In addition, a requesting entity, a transporter entity and a receiving entity may be trading partners in system 100. According to another exemplary application, an inquiry bank, responding bank and an escrow entity may be trading partners in system 100. In this example, the escrow entity may release data, items, funds, etc. after a condition has been met to the satisfaction of one or more of the banks. Other types of entities may participate in system 100. In addition, other applications may be realized.


According to an embodiment of the present invention, Bank 110 may transmit an inquiry to Bank 120. The inquiry may be transmitted via various modes of communication, such as electronic (e.g., email, instant messages, Internet, Intranet, etc.), voice (e.g., wireless, phone, etc.), mobile devices (e.g., PDA, etc.) and/or other methods of communicating digital information. For example, Bank 110 may forward a Request 130 to Bank 120. The Request 130 may include a Request Header 132 and Request Body 134. In response, Bank 120 may forward a Response 140 to Bank 110. Response 140 may include a Reply Header 142 and Reply Body 144.


The inquiry may concern account and/or other information. For example, Bank 110 may receive a check or other payment instrument drawn on Bank 120. To verify the existence of the account, Bank 110 may inquire whether a particular account number is open and/or valid. Bank 120 may reply to the inquiry. The response may include confirmation that the account number is open or closed. The response may include a simple yes or no response or other response indicating the same. If desired, additional information concerning an invalid account may be relayed, such as when the account was closed, under what circumstances, and whether fraud was involved thereby alerting the inquiry entity of a possible fraud situation.


In addition, Bank 110 may inquire whether an account has available funds for withdrawal or other action prior to or shortly thereafter payment of the same. In this example, the responding bank may indicate availability of funds. In addition, further details concerning the amount or level of funds available may be provided. Further, Bank 110 may inquire about a customer's credit history or other related information. According to another embodiment, the trading partners may be different types of entities. For example, a mortgage company may transmit an inquiry to a financial institution concerning a particular customer. A requesting entity may request confirmation that certain accounts exist and/or that information provided by the customer is accurate. In addition, the requesting entity may request data concerning fraudulent and/or potentially fraudulent activities.


For example, a requesting entity may request that money be moved between an account at Bank 110 and an account at Bank 120. For example, the request may contain the Federal Reserve Routing and Transit Number, account number, check number, amount, and/or other data for one or more checks along with corresponding check images. The reply may contain an indication of whether the check(s) had been received for clearing and settlement in good order or not. Other non-check payment instructions may also be included corresponding to various payment types and/or payment services. However, the method is not limited to value bearing or non-value bearing transactions between financial institutions, but may also include purchasing transactions between commercial partners, transfer of records between medical organizations, and/or other transfer of useful information.


Participating trading partners may enter into agreements between or among themselves. In addition, the trading partners may enter into an agreement with a third party, individually or collectively. For example, Bank 110 and Bank 120 may have an existing agreement. In this example, a business agreement among the partners may indicate that Bank 110 will pay the third party for carrying the messages over an IP network service or other network, and Bank 110 will pay Bank 120 for the information about the account, provided that the response was received promptly. Other conditions and arrangements may be agreed upon.


For privacy and security, the Request Body 134 of the Request 130 and the Reply Body 144 of the Reply 140 may be encrypted between the Inquiry Application 112 of Bank 110 and a Responding Application 122 of Bank 120. The headers on the messages (e.g., Request Header 132 and Reply Header 142) may include an identifier for correlating the request with the reply. In addition, the header may also include the identities of the banks, the request type, possibly “public” data which is not sensitive and which may be recapitulated from the body, the bank's digital cryptographic signature on the body and/or other data. More specifically, the sending bank may first create a digital cryptographic signature on the message body, which the receiving bank may use to authenticate the identify of the sending bank. In addition, the receiving bank may verify that the message has not been modified in transit, and/or assure itself that the sending bank cannot repudiate the message contents to the extent agreed a priori. Other functions may be performed. Since the body of the message, including the signature may be encrypted to ensure privacy and confidentiality of the content, a copy of the digital cryptographic signature may be copied into the header so that the third party log may contain the time of transmission, the signature and/or other data. Further, the third party may provide a digital notary service without being privy to the message content. Other encryption and/or security measures may be implemented.


For example, Bank 110 may sign the request body using Bank 110's private key (or other secure signature). Bank 120 may verify Bank 110's signature on the request body using Bank 110's public key. Similarly, Bank 120 may sign the reply body using Bank 120's private key (or other secure signature). Bank 110 may verify Bank 120's signature on the request body using Bank 120's public key. During the logging process, both Banks may privately log the plaintext request body and the reply body, as well as the signatures on each, so that each Bank may obtain a complete record of the business transaction.


As Bank 110 executes transactions with Bank 120 and with other trading partners, Bank 110 may log each entry where each entry may include a request header, a send time, a reply header and a receive time, through Logging Module 114. Other data may be included in each log entry. Bank 120 may perform similar logging operations through Logging Module 124. Immediately or at predetermined intervals, each trading partner may forward a log of log entries to Third Party Logging Entity 160.


Third Party Logging Entity 160 may include various modules for performing matching and other functionality in accordance with the various embodiments of the present invention. For example, Third Party Logging Entity 160 may include a Receiving Module 170 for receiving the respective logs (as shown by Log Entries 150 and Log Entries 152) from Bank 110 and Bank 120. Third Party Logging Entity 160 may include Matching Module 172 for matching log entries from the respective logs 150, 152 forwarded by requesting and responding banks, e.g., Bank 110 and Bank 120. Third Party Logging Entity 160 may identify the matching log entries in a database 162 or other storage mechanism. Third Party Logging Entity 160 may represent a service provider or other independent entity.


As shown by 164, matching entries may be used to bill or pay one or more trading partners for the agreed upon fees or to create settlement entries in the case of value-bearing transactions. For example, if the third party provides the data communications network, it may bill the requesting or responding Bank to recover the costs of data communications. In another example, the Third Party may bill the requesting Bank and pay the responding Bank an amount to compensate the responding Bank for the value of its information. Other header information, such as the type of transaction or the time between request and response may be used. In some cases, the responding Bank may not be paid if it does not respond within a Service Level Agreement defined interval. Finally, if the transaction clears a check or checks, and the aggregate value thereof is contained in the header, the Third Party may debit the responding Bank's settlement account and credit the requesting Bank's settlement account to transfer the funds between the Banks. Other business arrangements related to governance of transactions, the collection of fees or the transfer of value may be implemented as desired by the Banks. If a dispute arises, it may be agreed to forward the dispute to an agreed upon fourth party dispute resolver, as detailed below in connection with FIG. 4 discussed below.


Third Party may identify unmatched entries at 166. The unmatched entries may be forwarded for error processing, as shown by 168. For example, unmatched entries may be due to failures of the software components, servers, and communications lines and devices between the trading partners. However, with modern transactional protocols between the partners, the layers of error detection and recovery in IP network protocol stacks, and the protection of encryption and digital signatures, a mismatch due to technical factors will be very rare. This is in contrast to former networks which employed analog modems to connect partners to switches using elementary protocols.


When unmatched entries are identified, the third party may notify one or more of the trading partners and take an appropriate action. For example, one action may be to suspend billing for services until the discrepancy is resolved. This may involve determining whether a technical problem has occurred or whether one of the partners is at fault. Another action may involve suspending the settlement of a value-bearing transaction. Another exemplary action may include reducing the amount settled if the reply header contains a lesser amount than the request header, due to the responding Bank's not accepting one or more checks contained in the request. Any systematic attempt by any single trading partner to deny that transactions have occurred will be revealed by a pattern of unmatched log entries from other trading partners. The logs collected by the third party may also be used to resolve disputes regarding the content of the transactions themselves.



FIG. 2 is an exemplary diagram of details of transactions, according to an embodiment of the present invention. In connection with FIG. 1, FIG. 2 provides details concerning the transactions between trading partners and the third party. As discussed above, Request 130 may include Request Header 132 and Request Body 134. Request Header 132 may include Request Identifier, Bank 110, Bank 120, Request Type, “Public” Request Data and Bank 110's signature on the Request Body. Examples of “Request Type” may include “clear a check(s),” “verify that an account is open and able to be debited,” “verify that an identified individual has authority over an account,” etc. Examples of “Public Request Data” may include the value of the check(s) being cleared, the Federal Reserve Routing and Transit Number of an account, or the type of identifier (e.g., tax ID, driver's license, passport number, etc.) being used. Reply 140 may include Reply Header 142 and Reply Body 144. Reply Header 142 may include Reply Identifier, Bank 110, Bank 120, Reply Type, “Public” Reply Data and Bank 120's signature on the Reply Body.


As discussed above, Bank 110 may forward a log of log entries to the third party. Each log entry may include Request Header, Request Send Time at Bank 110, Reply Header and Reply Receive Time at Bank 110. In addition, Bank 120 may forward log entries to third party. This transaction may include Request Header, Request Receive Time at Bank 120, Reply Header and Reply Send Time at Bank 120.



FIG. 3 is an exemplary flowchart illustrating a method for third party logging, according to an embodiment of the present invention. At step 310, Bank A may log an entry. At step 312, Bank A may transmit a log entry or file of log entries to a Third Party. At step 314, Bank Z may log an entry. At step 316, Bank Z may transmit a log entry or file of log entries to a Third Party. At step 318, the Third Party may match the respective log entries from trading partners, e.g. Bank A and Bank Z. If a match is determined, a billing process, or other business processes depending on message types, business agreements and/or other considerations may be implemented at step 320. If a match is not determined, the data may be forwarded for error processing, as shown by step 322. For example, error processing may involve identifying a mismatch, at step 324 and/or identifying a pattern of errors, at step 326. Based on the results of the error processing, one or both Banks may be notified, at step 328. The Bank may then take appropriate action, at step 330. The steps of FIG. 3 will be described in detail below.


At step 310, Bank A may log an entry. The log entry may include a request, reply header and respective time data. The log entries from each trading partner may contain part or all of a message plaintext exchanged between the trading partners. The message plaintext may be encrypted and the log entries may contain cryptographic hash functions to allow later verification that a plaintext message logged by a trading partner was the actual message communicated. In addition, the log entries may contain cryptographic digital signatures or other signature mechanism for subsequent verification.


At step 312, at a predetermined time or other interval, Bank A may transmit a log entry or a file of log entries to a Third Party. The logs may be sent by each respective trading partner to the third party in real time, wherein each log entry may contain time stamps or other indication. Each log entry of each log may be cryptographically signed by the trading partners before the logs are sent to the third party.


At step 314, Bank Z may log an entry. The log entry may include a request, reply header and respective time data. The log entries from each trading partner may contain part or all of a message plaintext exchanged between the trading partners. The message plaintext may be encrypted and the log entries may contain cryptographic hash functions to allow later verification that a plaintext message logged by a trading partner was the actual message communicated. In addition, the log entries may contain cryptographic digital signatures or other signature mechanism for subsequent verification.


In addition, each log entry (at either or both trading partner) may contain data describing characteristics of a transaction. For example, the log entry may contain the value of the transaction, e.g., an amount of money transferred between the trading partners. Other data may be included.


At step 316, at a predetermined time or other interval, Bank Z may transmit a log entry or file of log entries to a Third Party. The logs may be sent by each respective trading partner to the third party in real time, wherein each log entry may contain time stamps or other indication. Each log entry of each log may be cryptographically signed by the trading partners before the logs are sent to the third party.


At step 318, the Third Party may match the respective log entries from trading partners, e.g. Bank A and Bank Z. For example, the third party may match the log entries by an identifier, such as a request identifier and a reply identifier. One method of matching may involve Bank A uniquely identifying each request with successive values from a counter, and for Bank B to reuse the request serial number as the reply identifier serial number. In this case, the matching may be achieved by sorting and aligning the corresponding log entries from the two banks. In addition, the two Banks may independently generate globally unique identifiers for the request identifier and reply identifier using the mechanisms available in operating systems and include both the request and reply identifiers in each log entry. In this case, the Third Party may choose to sort on the request or reply identifier, align the log entries accordingly, and in the case of mismatches attempt to sort and align log entries on the other identifier before declaring a mismatch. The third party may match each log entry in real time and notify either or both trading partners that a mismatch or a match has occurred within a predetermined time interval.


If a match is determined, the billing process may be implemented at step 320. For example, each bank may be billed for matching entries, per an agreement. The trading partners may regard a transaction as final based on an event. For example, if a notification of a mismatch is not received from the third party or if notification of a match is received from a third party, the transaction may be considered settled. As discussed above, log entries may contain data describing characteristics of a transaction. For example, the log entry may contain the value of the transaction, e.g., an amount of money transferred between the trading partners. According to an embodiment of the present invention, the third party may use the value of transactions with matching log data to provide financial settlement between or among the partners.


If a match is not determined, the data may be forwarded for error processing, as shown by step 322. The trading partners may redo any transaction based on certain circumstances, such as if the trading partners independently detect a failure with by their own analysis of cryptographic hashes and/or the completion of transactional protocols.


For example, error processing may involve identify a mismatch, at step 326 and/or identify a pattern of errors, at step 326. Based on the results of the error processing, one or both Banks may be notified, at step 328. For example, the trading partners may be notified of a log entry mismatch by the third party. The Bank may then take appropriate action, at step 330. According to an embodiment of the present invention, trading partners may update their records prior to any feedback from the third party. Either they get no message from the third party or they receive an indication that there was no match, in which case the course of action to redo or rollback the transaction is dependent on the business practices between the trading partners.



FIG. 4 is an exemplary flowchart illustrating a method for third party dispute resolution, according to an embodiment of the present invention. As shown in FIG. 4, the third party may provide a combined log, as shown by 410. The combined log may include log information from both trading partners. In this example, the combined log may include the Request Header with sent time and receive time data combined with the Reply Header with sent time and receive time data. The combined log entry of 410 may also have been dated, time stamped, and/or countersigned cryptographically by the Third Party at the time when the log entries were matched, which is useful when the dispute resolution is decided and enforced by a Fourth Party, such as in providing evidence to a court. Each trading partner may submit data concerning a disputed transaction. For example, evidence from a disputing entity may include the unencrypted request body 420 and unencrypted reply body 422 as recorded in and extracted from the disputing party's private transaction logs. In addition, the request identifier, the public request data and public reply data may be contained in the appropriate Request Body and Reply Body. Thus, the plaintext of the request and reply may be forwarded to a fourth party “resolver” to resolve the dispute.


The resolver can verify the public key signatures as logged by the third party on both the request and response plaintext. For example, the resolver may verify Bank 110's signature to prove that the unencrypted body is a true or accurate copy of the Request that was logged. Evidence from Bank 110 may include Bank 110's public key data, as illustrated by 430. In addition, the resolver may verify Bank 120's signature to prove that the unencrypted body is a true or accurate copy of the reply that was logged. Evidence from Bank 120 may include Bank 120's public key data, as illustrated by 432. According to an embodiment of the present invention, the third party is trusted to deliver a true or accurate copy of the logged data. For example, the third party may sign the log data using the third party private key and then return the logs to each trading partner for signature verification and individual safekeeping. Accordingly, the third party does not need to retain any data.


The fact that the signatures are provided by the third party prevents either trading partner from modifying the plaintext and computing a new digital signature and it prevents either trading partner from denying that the transaction occurred at or near the time the log data was collected. According to an exemplary application, the time that a transmission occurred may be prior to the time that the log entry was received by the Third Party. Successive log entries in a continuous stream of transactions may also be used to demonstrate that the transaction occurred after the time of the log entry for a previous transaction received by the Third Party. Furthermore, the time stamps applied to a stream of headers may be used by the Third Party to detect a systematic error or bias in the clocks of Banks 110 and 120. In particular, the two times provided by Bank 120 may be logically between the two time stamps provided by Bank 110. That fact, along with the Third Party's collection of network transit times generally, may be used to estimate the relative inaccuracy of the two Bank's clocks.


According to an embodiment of the invention, the systems and processes described above invention may be implemented on any general or special purpose computational device, either as a standalone application or applications, or even across several general or special purpose computational devices connected over a network and as a group operating in a client-server mode. According to another embodiment of the invention, a computer-usable and writeable medium having a plurality of computer readable program code stored therein may be provided for practicing the process of the present invention. The process and system of the embodiments of the present inventions may be implemented within a variety of operating systems, such as a Windows® operating system, various versions of a Unix-based operating system (e.g., a Hewlett Packard, a Red Hat, or a Linux version of a Unix-based operating system), or various versions of an AS/400-based operating system. For example, the computer-usable and writeable medium may be comprised of a CD ROM, a floppy disk, a hard disk, or any other computer-usable medium. One or more of the components of the system or systems embodying the embodiments of the present inventions may comprise computer readable program code in the form of functional instructions stored in the computer-usable medium such that when the computer-usable medium is installed on the system or systems, those components cause the system to perform the functions described. The computer readable program code for the embodiments of the present inventions may also be bundled with other computer readable program software. Also, only some of the components may be provided in computer-readable code.


Additionally, various entities and combinations of entities may employ a computer to implement the components performing the above-described functions. According to an embodiment of the invention, the computer may be a standard computer comprising an input device, an output device, a processor device, and a data storage device. According to other embodiments of the invention, various components may be computers in different departments within the same corporation or entity. Other computer configurations may also be used. According to another embodiment of the invention, various components may be separate entities such as corporations or limited liability companies. Other embodiments, in compliance with applicable laws and regulations, may also be used.


According to one specific embodiment of the present invention, the system may comprise components of a software system. The system may operate on a network and may be connected to other systems sharing a common database. Other hardware arrangements may also be provided.


The present invention is not to be limited in scope by the specific embodiments described herein. Indeed, various modifications of the present invention, in addition to those described herein, will be apparent to those of ordinary skill in the art from the foregoing description and accompanying drawings. Thus, such modifications are intended to fall within the scope of the following appended claims. Further, although the present invention has been described herein in the context of a particular implementation in a particular environment for a particular purpose, those of ordinary skill in the art will recognize that its usefulness is not limited thereto and that the present invention can be beneficially implemented in any number of environments for any number of purposes. Accordingly, the claims set forth below should be construed in view of the full breath and spirit of the present invention as disclosed herein.

Claims
  • 1. An automated computer implemented method for governing business transactions between trading partners, wherein the method is executed by a programmed computer processor which communicates with a user via a network, the computer implemented method comprising the steps of: receiving a first independent log from a first trading partner wherein the first independent log comprises at least one request log entry associated with a transaction wherein the at least one request log entry comprises at least a request identifier via the network;receiving a second independent log from a second trading partner wherein the second independent log comprises at least one reply log entry associated with the transaction between the first trading partner and the second trading partner, wherein the at least one reply log entry comprises at least a reply identifier via the network;matching the at least one request log entry and the at least one reply log entry based on one or more of the request identifier and the reply identifier at a third party interface, using the programmed computer processor;identifying matching log entries at the third party interface for implementing a billing process for the matching log entries;identifying non-matching log entries at the third party interface; andforwarding the non-matching log entries for one or more of error processing and dispute resolution, via the network.
  • 2. The method of claim 1, wherein the matching log entries are used to perform a business function as agreed to in a preexisting agreement between the first trading partner and the second trading partner.
  • 3. The method of claim 2, wherein the business function comprises one or more of billing the first trading partner or the second trading partner and transferring value between the partners.
  • 4. The method of claim 1, wherein each of the at least one request log entry and the at least one reply log entry contains at least part of a message plaintext exchanged between the first trading partner and the second trading partner.
  • 5. The method of claim 4, wherein the at least part of the message plaintext is encrypted and each of the at least one request log entry and the at least one reply log entry contains cryptographic hash functions to allow later verification that the message plaintext logged by the first trading partner and the second trading partner was an actual message communicated in the transaction.
  • 6. The method of claim 4, wherein the at least part of the message plaintext is encrypted and each of the at least one request log entry and the at least one reply log entry contains cryptographic digital signatures to allow later verification that the message plaintext logged by the first trading partner and the second trading partner was an actual message communicated in the transaction.
  • 7. The method of claim 1, wherein the first independent log and the second independent log are sent by the first trading partner and the second trading partner, respectively, to the third party interface in real time, wherein each of the at least one request log entry and the at least one reply log entry contains time stamps.
  • 8. The method of claim 1, wherein each of the at least one request log entry and the at least one reply log entry is cryptographically signed by each of the first trading partner and the second trading partner before the first independent log and the second independent log are sent to the third party interface.
  • 9. The method of claim 1, wherein the third party interface matches each log entry in real time and notifies one or more of the first trading partner and the second trading partner that a mismatch has occurred.
  • 10. The method of claim 1, wherein the third party interface matches each log entry in real time and notifies one or more of the first trading partner and the second trading partner that a match has occurred.
  • 11. The method of claim 1, wherein each log entry contains data describing a value of a transaction.
  • 12. The method of claim 11, wherein the value of the transaction comprises an amount of money transferred in the transaction between the first trading partner and the second trading partner.
  • 13. The method of claim 11, wherein the third party interface uses the value of transaction with matching log data to provide financial settlement between or among the first trading partner and the second trading partner.
  • 14. The method of claim 1, wherein the first trading partner and the second trading partner regard a transaction as settled when no notification of a mismatch is received from the third party interface or when notification of a match is received from the third party interface.
  • 15. The method of claim 1, wherein the first trading partner and the second trading partner redo the transaction when one or more of the first trading partner and the second trading partner detects a failure.
  • 16. The method of claim 1, wherein the first trading partner and the second trading partner redo the transaction when one or more of the first trading partner or the second trading partner is notified of a log entry mismatch by the third party interface.
  • 17. A computer implemented system for governing business transactions between trading partners, the computer implemented system comprising: a receiving module for receiving a first independent log from a first trading partner wherein the first independent log comprises at least one request log entry associated with a transaction wherein the at least one request log entry comprises at least a request identifier and receiving a second independent log from a second trading partner wherein the second independent log comprises at least one reply log entry associated with the transaction between the first trading partner and the second trading partner, wherein the at least one reply log entry comprises at least a reply identifier; anda matching module for matching the at least one request log entry and the at least one reply log entry based on one or more of the request identifier and the reply identifier at a third party interface; identifying matching log entries at the third party interface for implementing a billing process for the matching log entries; identifying non-matching log entries at the third party interface; and forwarding the non-matching log entries for one or more of error processing and dispute resolution.
  • 18. The system of claim 17, wherein the matching log entries are used to perform a business function as agreed to in a preexisting agreement between the first trading partner and the second trading partner.
  • 19. The system of claim 18, wherein the business function comprises one or more of billing the first trading partner or the second trading partner and transferring value between the partners.
  • 20. The system of claim 17, wherein each of the at least one request log entry and the at least one reply log entry contains at least part of a message plaintext exchanged between the first trading partner and the second trading partner.
  • 21. The system of claim 20, wherein the at least part of the message plaintext is encrypted and each of the at least one request log entry and the at least one reply log entry contains cryptographic hash functions to allow later verification that the message plaintext logged by the first trading partner and the second trading partner was an actual message communicated in the transaction.
  • 22. The system of claim 20, wherein the at least part of the message plaintext is encrypted and each of the at least one request log entry and the at least one reply log entry contains cryptographic digital signatures to allow later verification that the message plaintext logged by the first trading partner and the second trading partner was an actual message communicated in the transaction.
  • 23. The system of claim 17, wherein the first independent log and the second independent log are sent by the first trading partner and the second trading partner, respectively, to the third party interface in real time, wherein each of the at least one request log entry and the at least one reply log entry contains time stamps.
  • 24. The system of claim 17, wherein each of the at least one request log entry and the at least one reply log entry is cryptographically signed by each of the first trading partner and the second trading partner before the first independent log and the second independent log are sent to the third party interface.
  • 25. The system of claim 17, wherein the third party interface matches each log entry in real time and notifies one or more of the first trading partner and the second trading partner that a mismatch has occurred.
  • 26. The system of claim 17, wherein the third party interface matches each log entry in real time and notifies one or more of the first trading partner and the second trading partner that a match has occurred.
  • 27. The system of claim 17, wherein each log entry contains data describing a value of a transaction.
  • 28. The system of claim 27, wherein the value of the transaction comprises an amount of money transferred in the transaction between the first trading partner and the second trading partner.
  • 29. The system of claim 27, wherein the third party interface uses the value of transaction with matching log data to provide financial settlement between or among the first trading partner and the second trading partner.
  • 30. The system of claim 17, wherein the first trading partner and the second trading partner regard a transaction as settled when no notification of a mismatch is received from the third party interface or when notification of a match is received from the third party interface.
  • 31. The system of claim 17, wherein the first trading partner and the second trading partner redo the transaction when one or more of the first trading partner and the second trading partner detects a failure.
  • 32. The system of claim 17, wherein the first trading partner and the second trading partner redo the transaction when one or more of the first trading partner or the second trading partner is notified of a log entry mismatch by the third party interface.
  • 33. An automated computer implemented method for governing business transactions between trading partners, wherein the method is executed by a programmed computer processor which communicates with a user via a network, the computer implemented method comprising the steps of: receiving a first independent log from a first trading partner wherein the first independent log comprises at least one request log entry associated with a transaction wherein the at least one request log entry comprises at least a request identifier via the network;receiving a second independent log from a second trading partner wherein the second independent log comprises at least one reply log entry associated with the transaction between the first trading partner and the second trading partner, wherein the at least one reply log entry comprises at least a reply identifier via the network;matching the at least one request log entry and the at least one reply log entry based on one or more of the request identifier and the reply identifier at a third party interface, using the programmed computer processor;identifying matching log entries at the third party interface;identifying non-matching log entries at the third party interface; andforwarding the non-matching log entries for one or more of error processing and dispute resolution via the network;wherein the matching log entries are used to perform a business function as agreed to in a preexisting agreement between the first trading partner and the second trading partner; wherein the business function comprises one or more of billing the first trading partner or the second trading partner and transferring value between the partners;wherein each of the at least one request log entry and the at least one reply log entry contains at least part of a message plaintext exchanged between the first trading partner and the second trading partner; wherein the at least part of the message plaintext is encrypted and each of the at least one request log entry and the at least one reply log entry contains one or more of cryptographic hash functions and cryptographic digital signatures to allow later verification that the message plaintext logged by the first trading partner and the second trading partner was an actual message communicated in the transaction;wherein the first independent log and the second independent log are sent by the first trading partner and the second trading partner, respectively, to the third party interface in real time, wherein each of the at least one request log entry and the at least one reply log entry contains time stamps;wherein the third party interface matches each log entry in real time and notifies one or more of the first trading partner and the second trading partner that a mismatch or match has occurred;wherein each log entry contains data describing a value of a transaction; wherein the value of the transaction comprises an amount of money transferred in the transaction between the first trading partner and the second trading partner; andwherein the third party interface uses the value of transaction with matching log data to provide financial settlement between or among the first trading partner and the second trading partner.
CROSS-REFERENCE TO RELATED APPLICATIONS

This patent application claims priority to U.S. Provisional Patent Application No. 60/732,155, filed Nov. 2, 2005, which is hereby incorporated by reference herein in its entirety.

US Referenced Citations (394)
Number Name Date Kind
3653480 Yamamoto et al. Apr 1972 A
4050375 Orlens Sep 1977 A
4141078 Bridges, Jr. et al. Feb 1979 A
4205780 Burns et al. Jun 1980 A
4264808 Owens et al. Apr 1981 A
4321672 Braun et al. Mar 1982 A
4396985 Ohara Aug 1983 A
RE31692 Tyburski et al. Oct 1984 E
4495018 Vohrer Jan 1985 A
4617457 Myers Oct 1986 A
4672377 Murphy et al. Jun 1987 A
4694397 Grant et al. Sep 1987 A
4700055 Kashkashian, Jr. Oct 1987 A
4713761 Sharpe et al. Dec 1987 A
4752877 Roberts et al. Jun 1988 A
4797913 Kaplan Jan 1989 A
4799156 Shavit Jan 1989 A
4807177 Ward Feb 1989 A
4812628 Boston Mar 1989 A
4823264 Deming Apr 1989 A
4893333 Baran et al. Jan 1990 A
4931793 Fuhrmann et al. Jun 1990 A
4939674 Price et al. Jul 1990 A
4948174 Thomson et al. Aug 1990 A
4974878 Josephson Dec 1990 A
4975841 Kehnemuyi et al. Dec 1990 A
4988849 Sasaki Jan 1991 A
4992646 Collin Feb 1991 A
4992940 Dworkin Feb 1991 A
5023904 Kaplan Jun 1991 A
5053607 Carlson Oct 1991 A
5054096 Beizer Oct 1991 A
5080748 Bonomi Jan 1992 A
5111395 Smith May 1992 A
5121945 Thomson et al. Jun 1992 A
5122950 Mee Jun 1992 A
5136502 Van Remortel et al. Aug 1992 A
5175682 Higashiyama Dec 1992 A
5187750 Behera Feb 1993 A
5198975 Baker et al. Mar 1993 A
5220501 Lawlor Jun 1993 A
5225978 Peterson et al. Jul 1993 A
5237159 Stephens Aug 1993 A
5265007 Barnhard, Jr. et al. Nov 1993 A
5283829 Anderson Feb 1994 A
5287269 Dorrough et al. Feb 1994 A
5311594 Penzias May 1994 A
5315508 Bain et al. May 1994 A
5321238 Watanabe et al. Jun 1994 A
5326959 Perazza Jul 1994 A
5336870 Hughes Aug 1994 A
5349170 Kern Sep 1994 A
5350906 Brody et al. Sep 1994 A
5367581 VanHorn et al. Nov 1994 A
5373550 Campbell Dec 1994 A
5396417 Burks Mar 1995 A
5402474 Miller Mar 1995 A
5412190 Kopesec et al. May 1995 A
5424938 Wagner Jun 1995 A
5430644 Deaton et al. Jul 1995 A
5432506 Chapman Jul 1995 A
5444794 Uhland Aug 1995 A
5444841 Glaser et al. Aug 1995 A
5446740 Yien Aug 1995 A
5448471 Deaton et al. Sep 1995 A
5459482 Orlen Oct 1995 A
5465206 Hilt et al. Nov 1995 A
5477040 Lalonde Dec 1995 A
5479494 Clitherow Dec 1995 A
5483445 Pickering Jan 1996 A
5484988 Hills Jan 1996 A
5502576 Ramsay et al. Mar 1996 A
5504677 Pollin Apr 1996 A
5506691 Bednar et al. Apr 1996 A
5508731 Kohorn Apr 1996 A
5513250 McAllister Apr 1996 A
5532464 Josephson et al. Jul 1996 A
5544043 Miki et al. Aug 1996 A
5544046 Niwa Aug 1996 A
5550734 Tarter et al. Aug 1996 A
5551021 Harada et al. Aug 1996 A
5557515 Abbruzzese et al. Sep 1996 A
5563400 Le Roux Oct 1996 A
5566330 Sheffield Oct 1996 A
5568489 Yien Oct 1996 A
5570465 Tsakanikas Oct 1996 A
5572004 Raimann Nov 1996 A
5583759 Geer Dec 1996 A
5583760 Klesse Dec 1996 A
5590196 Moreau Dec 1996 A
5590197 Chen Dec 1996 A
5592377 Lipkin Jan 1997 A
5592378 Cameron Jan 1997 A
5599528 Igaki Feb 1997 A
5603025 Tabb Feb 1997 A
5615109 Eder Mar 1997 A
5621201 Langhans Apr 1997 A
5640577 Scharmer Jun 1997 A
5642419 Rosen Jun 1997 A
5649117 Landry Jul 1997 A
5652786 Rogers Jul 1997 A
5659165 Jennings Aug 1997 A
5659469 Deaton et al. Aug 1997 A
5659741 Eberhardt Aug 1997 A
5666493 Wojcik et al. Sep 1997 A
5677955 Doggett et al. Oct 1997 A
5679938 Templeton Oct 1997 A
5679940 Templeton Oct 1997 A
5687250 Curley et al. Nov 1997 A
5692132 Hogan Nov 1997 A
5699528 Hogan Dec 1997 A
5703344 Bezy et al. Dec 1997 A
5704044 Tarter et al. Dec 1997 A
5708422 Blonder et al. Jan 1998 A
5715298 Rogers Feb 1998 A
5715314 Payne Feb 1998 A
5715399 Bezos Feb 1998 A
5717989 Tozzoli et al. Feb 1998 A
5724424 Gifford Mar 1998 A
5727153 Powell Mar 1998 A
5748780 Stolfo May 1998 A
5751842 Eccles et al. May 1998 A
5757917 Rose et al. May 1998 A
5770843 Rose et al. Jun 1998 A
5774553 Rosen Jun 1998 A
5783808 Josephson Jul 1998 A
5784696 Melnikof Jul 1998 A
5793861 Haigh Aug 1998 A
5794221 Egendorf Aug 1998 A
5802498 Comesanas Sep 1998 A
5802499 Sampson et al. Sep 1998 A
5819236 Josephson Oct 1998 A
5819238 Fernholz Oct 1998 A
5826241 Stein Oct 1998 A
5826245 Sandberg-Diment Oct 1998 A
5832447 Rieker Nov 1998 A
5832460 Bednar Nov 1998 A
5832464 Houvener et al. Nov 1998 A
5832488 Eberhardt Nov 1998 A
5835580 Fraser Nov 1998 A
5835603 Coutts Nov 1998 A
5835899 Rose et al. Nov 1998 A
5852812 Reeder Dec 1998 A
5859419 Wynn Jan 1999 A
5864609 Cross et al. Jan 1999 A
5870456 Rogers Feb 1999 A
5870721 Norris Feb 1999 A
5870723 Pare Feb 1999 A
5870725 Belinger et al. Feb 1999 A
5873072 Kight Feb 1999 A
5878141 Daly et al. Mar 1999 A
5883810 Franklin et al. Mar 1999 A
5884288 Chang Mar 1999 A
5884290 Smorodinsky et al. Mar 1999 A
5897625 Gustin Apr 1999 A
5898157 Mangili et al. Apr 1999 A
5903881 Schrader May 1999 A
5910896 Hahn-Carlson Jun 1999 A
5910988 Ballard Jun 1999 A
5915246 Patterson et al. Jun 1999 A
5917965 Cahill et al. Jun 1999 A
5920847 Kolling et al. Jul 1999 A
5930778 Geer Jul 1999 A
5940811 Norris Aug 1999 A
5940844 Cahill et al. Aug 1999 A
5943656 Crooks Aug 1999 A
5945653 Walker et al. Aug 1999 A
5956700 Landry Sep 1999 A
5963659 Cahill et al. Oct 1999 A
5963925 Kolling et al. Oct 1999 A
5966698 Pollin Oct 1999 A
5978780 Watson Nov 1999 A
5987435 Weiss et al. Nov 1999 A
5987436 Halbrook Nov 1999 A
5987439 Gustin et al. Nov 1999 A
5991750 Watson Nov 1999 A
6000832 Franklin et al. Dec 1999 A
6003762 Hayashida Dec 1999 A
6006208 Forst et al. Dec 1999 A
6009442 Chen et al. Dec 1999 A
6014636 Reeder Jan 2000 A
6016482 Molinari et al. Jan 2000 A
6016484 Williams et al. Jan 2000 A
6018718 Walker et al. Jan 2000 A
6026388 Liddy et al. Feb 2000 A
6029139 Cunningham et al. Feb 2000 A
6032133 Hilt et al. Feb 2000 A
6032137 Hallard Feb 2000 A
6035281 Crosskey et al. Mar 2000 A
6035285 Schlect et al. Mar 2000 A
6035287 Stallaert et al. Mar 2000 A
6038553 Hyde, Jr. Mar 2000 A
6041312 Bickerton et al. Mar 2000 A
6041315 Pollin Mar 2000 A
6044362 Neely Mar 2000 A
6045039 Stinson et al. Apr 2000 A
6047261 Siefert Apr 2000 A
6052674 Zervides et al. Apr 2000 A
6058380 Anderson et al. May 2000 A
6058381 Nelson May 2000 A
6061665 Bahreman May 2000 A
6064764 Bhaskaran et al. May 2000 A
6064987 Walker et al. May 2000 A
6065675 Teicher May 2000 A
6067524 Byerly et al. May 2000 A
6070150 Remington et al. May 2000 A
6070798 Nethery Jun 2000 A
6073104 Field Jun 2000 A
6073113 Guinan Jun 2000 A
6076072 Libman Jun 2000 A
6078907 Lamm Jun 2000 A
6081790 Rosen Jun 2000 A
6085168 Mori et al. Jul 2000 A
6088683 Jalili Jul 2000 A
6088685 Kiron et al. Jul 2000 A
6088686 Walker et al. Jul 2000 A
6092056 Tull, Jr. et al. Jul 2000 A
6098053 Slater Aug 2000 A
6098070 Maxwell Aug 2000 A
6105011 Morrison, Jr. Aug 2000 A
6108639 Walker et al. Aug 2000 A
6110044 Stern Aug 2000 A
6111858 Greaves et al. Aug 2000 A
6115690 Wong Sep 2000 A
6119106 Mersky et al. Sep 2000 A
6119107 Polk Sep 2000 A
6125354 MacFarlane et al. Sep 2000 A
6125391 Meltzer et al. Sep 2000 A
6128602 Northington et al. Oct 2000 A
6128603 Dent et al. Oct 2000 A
6129273 Shah Oct 2000 A
6138118 Koppstein et al. Oct 2000 A
6144946 Iwamura Nov 2000 A
6148293 King Nov 2000 A
6149055 Gatto Nov 2000 A
6149056 Stinson et al. Nov 2000 A
6173272 Thomas et al. Jan 2001 B1
6181837 Cahill et al. Jan 2001 B1
6185544 Sakamoto et al. Feb 2001 B1
6202054 Lawlor et al. Mar 2001 B1
6205433 Boesch et al. Mar 2001 B1
6213391 Lewis Apr 2001 B1
6227447 Campisano May 2001 B1
6233565 Lewis et al. May 2001 B1
6233566 Levine et al. May 2001 B1
6236972 Shkedy May 2001 B1
6240444 Fin et al. May 2001 B1
6278981 Dembo et al. Aug 2001 B1
6289322 Kitchen et al. Sep 2001 B1
6292789 Schutzer Sep 2001 B1
6301379 Thompson et al. Oct 2001 B1
6301567 Leong et al. Oct 2001 B1
6304858 Mosler et al. Oct 2001 B1
6321212 Lange Nov 2001 B1
6324524 Lent et al. Nov 2001 B1
6338047 Wallman Jan 2002 B1
6338049 Walker et al. Jan 2002 B1
6343279 Bissonette et al. Jan 2002 B1
6363164 Jones et al. Mar 2002 B1
6363364 Nel Mar 2002 B1
6363365 Kou Mar 2002 B1
6366967 Wagner Apr 2002 B1
6374235 Chen et al. Apr 2002 B1
6390362 Martin May 2002 B1
6393409 Young et al. May 2002 B2
6405173 Honarvar et al. Jun 2002 B1
6415259 Wolfinger et al. Jul 2002 B1
6418419 Nieboer et al. Jul 2002 B1
6418420 DiGiorgio et al. Jul 2002 B1
6418430 DeFazio et al. Jul 2002 B1
6434159 Woodward et al. Aug 2002 B1
6446072 Schulze et al. Sep 2002 B1
6460020 Pool et al. Oct 2002 B1
6490568 O'Mara et al. Dec 2002 B1
6493685 Ensel et al. Dec 2002 B1
6535896 Britton et al. Mar 2003 B2
6536663 Lozier et al. Mar 2003 B1
6554185 Montross et al. Apr 2003 B1
6574350 Rhoads et al. Jun 2003 B1
6574377 Cahill et al. Jun 2003 B1
6578000 Dodrill et al. Jun 2003 B1
6578015 Haseltine et al. Jun 2003 B1
6609113 O'Leary et al. Aug 2003 B1
6609125 Layne et al. Aug 2003 B1
6629081 Cornelius et al. Sep 2003 B1
6636615 Rhoads et al. Oct 2003 B1
6658393 Basch et al. Dec 2003 B1
6661910 Jones et al. Dec 2003 B2
6704714 O'Leary et al. Mar 2004 B1
6721715 Nemzow Apr 2004 B2
6728397 McNeal Apr 2004 B2
6820058 Wood et al. Nov 2004 B2
6825940 Wu et al. Nov 2004 B1
6860375 Hallowell et al. Mar 2005 B2
6954896 Dodrill et al. Oct 2005 B1
6965882 Lapstun et al. Nov 2005 B1
6970259 Lunt et al. Nov 2005 B1
6970855 Das et al. Nov 2005 B2
RE38957 Laussermair et al. Jan 2006 E
7004382 Sandru Feb 2006 B2
7062456 Riehl et al. Jun 2006 B1
7068832 Price et al. Jun 2006 B1
7104443 Paul et al. Sep 2006 B1
7133846 Ginter et al. Nov 2006 B1
7177836 German et al. Feb 2007 B1
7194437 Britto et al. Mar 2007 B1
7200255 Jones et al. Apr 2007 B2
7313543 Crane et al. Dec 2007 B1
7317823 Price et al. Jan 2008 B1
7337148 Xie et al. Feb 2008 B2
7349884 Odom et al. Mar 2008 B1
7380707 Fredman Jun 2008 B1
7401048 Rosedale et al. Jul 2008 B2
20010011222 McLauchlin et al. Aug 2001 A1
20010018666 Sugiyama et al. Aug 2001 A1
20010018739 Anderson et al. Aug 2001 A1
20010032139 Debonnett, Jr. Oct 2001 A1
20010037300 Miyazaki et al. Nov 2001 A1
20010037309 Vrain Nov 2001 A1
20010047334 Nappe et al. Nov 2001 A1
20010047489 Ito et al. Nov 2001 A1
20010051533 Wietzke et al. Dec 2001 A1
20020012445 Perry Jan 2002 A1
20020013728 Wilkman Jan 2002 A1
20020023055 Antognini et al. Feb 2002 A1
20020026394 Savage et al. Feb 2002 A1
20020038363 MacLean Mar 2002 A1
20020046169 Keresman, III et al. Apr 2002 A1
20020052842 Schuba et al. May 2002 A1
20020055907 Pater et al. May 2002 A1
20020069134 Solomon Jun 2002 A1
20020072976 Virtanen et al. Jun 2002 A1
20020077978 O'Leary et al. Jun 2002 A1
20020082985 MacKay Jun 2002 A1
20020087415 Allen et al. Jul 2002 A1
20020087468 Ganesan et al. Jul 2002 A1
20020087469 Ganesan et al. Jul 2002 A1
20020091635 Dilip et al. Jul 2002 A1
20020100803 Sehr Aug 2002 A1
20020107770 Meyer et al. Aug 2002 A1
20020107788 Cunningham Aug 2002 A1
20020111837 Aupperle Aug 2002 A1
20020128981 Kawan et al. Sep 2002 A1
20020138398 Kalin et al. Sep 2002 A1
20020169658 Adler Nov 2002 A1
20020170966 Hannigan et al. Nov 2002 A1
20020178071 Walker et al. Nov 2002 A1
20020184151 Maloney Dec 2002 A1
20020194096 Falcone et al. Dec 2002 A1
20020198817 Dhir Dec 2002 A1
20020199182 Whitehead Dec 2002 A1
20030018557 Gilbert et al. Jan 2003 A1
20030037002 Higgins et al. Feb 2003 A1
20030040959 Fei et al. Feb 2003 A1
20030046218 Albanese et al. Mar 2003 A1
20030055675 Klein Twennaar Mar 2003 A1
20030069780 Hailwood et al. Apr 2003 A1
20030097335 Muskowitz et al. May 2003 A1
20030105641 Lewis Jun 2003 A1
20030110442 Battle Jun 2003 A1
20030120686 Kim et al. Jun 2003 A1
20030130945 Force et al. Jul 2003 A1
20030130952 Bell et al. Jul 2003 A1
20030144942 Sobek Jul 2003 A1
20030187789 Karas et al. Oct 2003 A1
20030191710 Green et al. Oct 2003 A1
20030200107 Allen et al. Oct 2003 A1
20030208421 Vicknair et al. Nov 2003 A1
20030208441 Poplawski et al. Nov 2003 A1
20030225663 Horan et al. Dec 2003 A1
20030233305 Solomon Dec 2003 A1
20030237046 Parker et al. Dec 2003 A1
20040078328 Talbert et al. Apr 2004 A1
20040133516 Buchanan et al. Jul 2004 A1
20040201735 Baron Oct 2004 A1
20040228514 Houle et al. Nov 2004 A1
20040243539 Skurtovich et al. Dec 2004 A1
20050033690 Antognini et al. Feb 2005 A1
20050055254 Schmidtberg et al. Mar 2005 A1
20050086178 Xie et al. Apr 2005 A1
20050091156 Hailwood et al. Apr 2005 A1
20050097050 Orcutt May 2005 A1
20050144059 Schuessler Jun 2005 A1
20050177480 Huang Aug 2005 A1
20050209954 Asher et al. Sep 2005 A1
20050261955 Humble et al. Nov 2005 A1
20060106650 Bush May 2006 A1
20060106717 Randle et al. May 2006 A1
20060136335 Ferguson Jun 2006 A1
20060178986 Giordano et al. Aug 2006 A1
20060206427 Love et al. Sep 2006 A1
20060282389 Gupte Dec 2006 A1
20060287953 Chauhan Dec 2006 A1
20080193008 Mount et al. Aug 2008 A1
Foreign Referenced Citations (17)
Number Date Country
0099999 Jul 1983 EP
421808 Apr 1991 EP
1014318 Jun 2000 EP
WO 9116691 Oct 1991 WO
WO 9308545 Apr 1993 WO
WO 9428497 Dec 1994 WO
WO 9608783 Mar 1996 WO
WO 9612242 Apr 1996 WO
WO 9714108 Apr 1997 WO
WO 9745796 Dec 1997 WO
WO 9745814 Dec 1997 WO
WO 9809260 Mar 1998 WO
WO 9910823 Mar 1999 WO
WO 0039979 Jul 2000 WO
WO 0175730 Oct 2001 WO
WO 02063432 Aug 2002 WO
WO 2004079603 Sep 2004 WO
Provisional Applications (1)
Number Date Country
60732155 Nov 2005 US