Document controlled workflow systems and methods

Electrical computers and digital processing systems: multicomput – Computer-to-computer data routing – Alternate path routing

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C717S104000

Reexamination Certificate

active

07120699

ABSTRACT:
The document controlled workflow techniques are provided that can be represented by refinable Petri nets. A document may contain a control code that indicates to the document controlled workflow system to implement specified operations (i.e., functions) at a refinable place. The operations implemented at the refinable place are determined by the control code in the document. An author of the document can customize a document controlled workflow system of the present invention by entering a control code into a document that triggers the implementation of operations customized to that particular document at a refinable place in the document workflow system. The operations specified by a control code in a document can be represented by a refinement network.

REFERENCES:
patent: 4068214 (1978-01-01), Patil
patent: RE31287 (1983-06-01), Patil
patent: 4644461 (1987-02-01), Jennings
patent: 4700187 (1987-10-01), Furtek
patent: 4866605 (1989-09-01), Nakano et al.
patent: 5029080 (1991-07-01), Otsuki
patent: 5181162 (1993-01-01), Smith et al.
patent: 5257363 (1993-10-01), Shapiro et al.
patent: 5283896 (1994-02-01), Temmyo et al.
patent: 5291427 (1994-03-01), Loyer et al.
patent: 5481668 (1996-01-01), Marcus
patent: 5515490 (1996-05-01), Buchanan et al.
patent: 5524241 (1996-06-01), Ghoneimy et al.
patent: 5548506 (1996-08-01), Srinivasan
patent: 5555179 (1996-09-01), Koyama et al.
patent: 5581691 (1996-12-01), Hsu et al.
patent: 5721959 (1998-02-01), Nakamura et al.
patent: 5742283 (1998-04-01), Kim
patent: 5774661 (1998-06-01), Chatterjee et al.
patent: 5826020 (1998-10-01), Randell
patent: 5890130 (1999-03-01), Cox et al.
patent: 5893074 (1999-04-01), Hughes et al.
patent: 5974392 (1999-10-01), Endo
patent: 5983016 (1999-11-01), Brodsky et al.
patent: 5999911 (1999-12-01), Berg et al.
patent: 6002850 (1999-12-01), Sumino et al.
patent: 6011830 (2000-01-01), Sasin et al.
patent: 6038541 (2000-03-01), Tokuda et al.
patent: 6067357 (2000-05-01), Kishinsky et al.
patent: 6178239 (2001-01-01), Kishinsky et al.
patent: 6225998 (2001-05-01), Okita et al.
patent: 6256598 (2001-07-01), Park et al.
patent: 6725428 (2004-04-01), Pareschi et al.
patent: 2002/0059089 (2002-05-01), Suzuki et al.
patent: 2003/0144974 (2003-07-01), Chang et al.
patent: 2004/0093585 (2004-05-01), Christodoulou et al
patent: 4301391 (1994-08-01), None
patent: 19621062 (1997-11-01), None
patent: 7160773 (1995-06-01), None
patent: 10049206 (1998-02-01), None
patent: 10058288 (1998-03-01), None
patent: 10124110 (1998-05-01), None
patent: 10240714 (1998-09-01), None
patent: 11328259 (1999-11-01), None
Aceto, L., and Hennessy, M., “Adding Action Refinement to a Finite Process Algebra*,” Information and Computation, 115, pp. 179-247 (1994).
Anonymous, “Petri net approach to checking software structural change correctness in operation—using changed region analysis to identify parts still needing further checking using set of linear expressions in logic relationship,” RD 348009 A, p. 225, (Apr. 10, 1993).
Bai, Yue-Bin, Liu, Yi, Ma, Jian-She, and Zheng, Shou-Qi, “Research and implementation of Distributed Security Administration System for Remote Access Based on NAS,” Mini-Micro Systems, vol. 21, No. 11, pp. 1197-2000 (Nov. 2000) English abstract only.
Bauderon, M. and Courcelle, B. “Graph Expressions and Graph Rewriting,” Mathematical Systems Theory, vol. 20, pp. 83-127, (1987).
Chun, Yang, “Application and Research of a User Name and Password Authentication Based on SOCKS V5,” Journal of University of Electronic Science and Technology of China, vol. 30, No. 2, pp. 162-165 (Apr. 2001) English abtract only.
Doyle, E.M., Taveres, S.E., and Meijer, H., “Computer Analysis of Cryptographic Protocols Using Colored Petri Nets,” 18th Bienniel Symposium on Communication Symposium Proceedings, pp. 194-199 (Jun. 1996).
El-Hadidi, M.T., Hebazi, N.H., and Aslan, H.K., “Implementation of a Hybrid Encryption Scheme for Ethernet,” Proceedings of IEEE Symposium on Computers and Communications, Alexandria, Egypt, pp. 150-156 (Jun. 1995).
Genrich, H.J., and Lautenbach, K., “System Modelling With High-Level Petri Nets,” Theoretical Computer Science, 13, pp. 109-136, (1981).
Juszczyszyn, K., “Secure Information Flow Model for Corporate Network,” Information Systems Architecture and Technology ISAT 2000, pp. 272-279, (2000).
Karri, R., “A Security Imbedded Authentication Protocol,” IEEE INFOCOM '88—The Conference on Computer Communications Proceedings, pp. 1105-1109 (Mar. 1988).
Kramer, B., “Rule-Enhanced Petri Nets for Software Process Modeling,” SEKE ' 94—The 6th International Conference on Software Engineering and Knowledge Engineering, pp. 493-500 (Jun. 1994).
Milner, R., “Communicating and Mobile Systems: The π—Calculus,” Cambridge University Press, Cambridge, UK, pp. 1-161, (1999).
Mirsky, E., and Dehon, A., “Matrix: A Reconfigurable Computing Architecture with Configurable Instruction Distribution and Deployable Resources,” Proceedings of IEEE Workship of FPGAs for Custom Computing Machines, pp. 157-166, (1996).
Murata, T., “Petri nets: Properties, Analysis and Applications,” Proceedings of the IEEE, vol. 77, No. 4, pp. 541-580, (Apr. 1989).
Morton, C.M., Robart, L.C., and Tavares, S.E., “Decomposition Techniques for Cryptographic Protocol Analysis,” 1994 Canadian Conference on Electrical and Computer Engineering, pp. 335-339, (Sep. 1994).
Ohta, A., Ohba, T., and Hisamura, T., “On Liveness of Subclasses of Petri Nets with Permission or Inhibitor Arcs,” Trans. of the Society of Instrument and Control Engineers, vol. 31, No. 10, pp. 1722-1729 (1995).
Schmidt, H.W., “Prototyping and Analysis of Non-Sequential Systems Using Predicate-Event Nets,” Journal Systems Software, vol. 15, pp. 43-62, (1991).
Valette, R., “Analysis of Petri Nets By Stepwise Refinements,” Journal of Computer and System Sciences, vol. 18, No. 1, pp. 35-46, (1979).
Van Der Aalst, Wil M.P., “Interorganizational Workflows: An approach based on message sequence charts and Petri Nets,” website address: http://tmitwww.tm.tue.nl/staff/wvdaalst/Publications/p70.pdf, from In Proceedings of PROLAMAT'98, IFIP Transactions, Trento, pp. 1-43, (1998).
Van Der Aalst, Wil M.P., “Interorganizational Workflows: An approach based on message sequence charts and Petri Nets,” Systems Analysis—Modelling—Stimulation (SAMS), vol. 34, pp. 335-367, (1999).
Van Der Aalst, Wil M.P., Woflan: a Petri-Net-Based Workflow Analyzer, vol. 35, No. 3, pp. 345-357, (1999).
Van Der Aalst, Wil M.P., “Three Good Reasons for Using a Petri-Net-Based Workflow Management System,” Information and Process Integration in Enterprises: Rethinking Documents, Kluwer Academic Publishers, Norwell, MA, pp. 161-182 (1998).
Van Glabbeek, R., and Goltz, U., “Refinement of Actions in Causality Based Models,” Proceedings of the Rex Workshop—Stepwise Refinement of Distributed System Models, Formalisms, Correctness, Mook, The Netherlands, pp. 267-300, (May 29-Jun. 2, 1989).
Van Glabbeek, and R., Weijland, P., “Branching Time and Abstraction in Bisimulation Semantics,” Journal of the ACM, vol. 43, No. 3, pp. 555-600 (May 1996).
Weitz, W., “SGML Nets: Integrating Document and Workflow Modeling,” Proceedings of the 31st Annual Hawaii International Conference on System Sciences, IEEE, pp. 185-194 (1998).
Brauer et al., “Survey of Behaviour and Equivalence Preserving Refinement of Petri Nets,” Grzegorz Rozenberg, eds., in Advances in Petri Nets 1990, No. 483, in Lecture Notes in Computer Science (LNCS), pp. 1-46.
Genrich et al., “Predicate / Transition Nets,” fromLecture Notes in Computer Science, Goos and Hartmanis eds., vol. 254, Petri Nets: Central Models and Their Properties, Brauer et al., eds., pp. 208-247, Springer-Verla

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Document controlled workflow systems and methods does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Document controlled workflow systems and methods, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Document controlled workflow systems and methods will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3642340

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.