Acquiring a form using a proxy applicant and delegation data

Data processing: presentation processing of document – operator i – Presentation processing of document – Layout

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C715S252000, C715S252000

Reexamination Certificate

active

09669598

ABSTRACT:
To provide a predetermined user with a privilege for a delegated application processing without providing the user with the application requester's log-in password. The application requester specifies a form class for identifying a form that requests a delegated application, both starting and ending dates for identifying a term of the requested delegated application together with a proxy applicant user ID that specifies a proxy applicant requested for the delegated application, then registers those items in the electronic form system. The electronic form system then registers those items in a proxy applicant definition table together with the application requester user II). The proxy applicant can thus enter the form submission mode of the application requester. In the form submission mode of the application requester, forms that can be submitted by the proxy applicant are selected according to the information of the form class, the starting date, the ending date, etc. registered beforehand and displayed as a list.

REFERENCES:
patent: 6208339 (2001-03-01), Atlas et al.
patent: 6292904 (2001-09-01), Broomhall et al.
patent: 6345278 (2002-02-01), Hitchcock et al.
patent: 6421693 (2002-07-01), Nishiyama et al.
patent: 6499042 (2002-12-01), Markus
patent: 6651217 (2003-11-01), Kennedy et al.
patent: 6684369 (2004-01-01), Bernardo et al.
patent: 2002/0023108 (2002-02-01), Daswani et al.
Wobber et al, “Authentication in the TAOS Operating System”, ACM Trans. on Comput. Sys., vol. 12, No. 1, Feb. 1994, pp. 3-32.
Lampson et al, “Authentication in Distributed Systems: Theory and Practice”, ACM Trans. on Comput. Sys., vol. 10, No. 4, Nov. 1992, pp. 265-310.
Bertino, E., “A Flexible Authorization Mechanism for Relational Data Management Systems”, ACM Trans. on Informat. Sys., vol. 17, No. 2, Apr. 1999, pp. 101-140.
“Process-Driven Logon And Logoff As User-Driven”, IBM TDB, vol. 33, No. 8, Jan. 1991.
“Application and Workstation Access Control by User a Token Ring Local Area Network”, IBM TDB, vol. 40, No. 7, Jul. 1997.
“Using Paradox 5 For Windows” Special Edition, Que, 1994, pp. 133-139, and 526-529.
Mitsuo et al, “Electronic Decision System,” Patent Abstracts of Japan, Publication No. 06-231143, Application No. 05-034404 (Aug. 1994).
“Fujitsu IFOS-SV/UUser's Guide,” 88-96 (Sep. 1993). This article relates to an electronic check approval system and discloses a screen for selecting a person from whom delegation is given.
“Fujitsu IFOS-SV/U V02 User's Guide,” 23-26, 105-109 (Aug. 1995). This article relates to an electronic check approval system and discloses allowing a delegated person to approve all the checks of persons from whom delegation is given.
“Fuji Technical Report,” vol. 71, No. 12, 673-676 (1998). This article describes ExchangeUSE workflow. The workflow has functions of approval, progress management, and delegation. This article also discloses allowing the description of a workflow route definition.
“Lotus Notes Magazine,” vol. 20, 51-56 (1998). This article describes the I-NetJ workflow engine. It discloses a workflow template and a front-end database. The I-NetJ workflow database also includes a rolebase, conditional rolebase, organization database, and runtime definition.
“Lotus Solutions 99,” Windows NT World, vols. 4 and 8, 268-269 (Aug. 1999). This article describes ISOlogy for Domino. The described features include approval by manager, fixed route, etc.
“Nikkei Open System,” vol. 54, 340-345 (Sep. 1997). This article describes how to construct an intranet using Lotus Notes Domino. In particular, this article describes a manager approval route and fixed approval route.
Mitsuo et al, “Electronic Decision System,” Patent Abstracts of Japan, Publication No. 06-231143, Application No. 05-034404 (Aug. 1994). This application is directed to an electronic decision system capable of deciding an application even if a decider is absent for a long period or a short period. A database 1 connected to a host computer stores application data 3, decision waiting data 5, and decision route data 7.
When an operator inputs an ID number and a password from terminal equipment, the computer checks the inputted contents (12), and if the password is valid, retrieves the existence of an application to the computer itself, the application applied to the computer as a substitute, or the application applied to the computer as approval after an allowable prescribed period by using the ID number as key (13). When the application concerned exists, the contents of the application are read out (14) and displayed on a display in the terminal equipment (15). In the case of submitting the application, the operator writes the decision history through a keyboard.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Acquiring a form using a proxy applicant and delegation data does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Acquiring a form using a proxy applicant and delegation data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Acquiring a form using a proxy applicant and delegation data will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3831332

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.