Dashboard interface, platform, and environment for automated negotiation, benchmarking, compliance, and auditing

ABSTRACT

In an illustrative embodiment, an automated system provides for automatic negotiation, benchmarking, compliance, and auditing. The system may include computing systems and devices for receiving a request for transmitting a message to a remote party, and in response, providing a customization user interface including a message template with editable and non-editable input fields as well as a document selection interface for linking documents to the message. Message recipients associated with the remote party may be identified as having security access permissions corresponding to access parameters for the linked documents. In response to receiving inputs for the editable input fields, the message template may be converted to a message transmission format for transmitting the message with the one or more linked documents and transmitted to the remote party. The message and linked documents may be stored in at least one portion of a data repository.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation-in-part of and claims priority to thefollowing prior patent application: U.S. patent application Ser. No.15/198,797, entitled “Dashboard Interface, Platform, and Environment forAutomated Negotiation, Benchmarking, Compliance, and Auditing,” filedJun. 30, 2016, which is related to and claims priority to U.S.Provisional Patent Application Ser. No. 62/262,880 filed Dec. 3, 2015.The above identified applications are hereby incorporated by referencein their entireties.

BACKGROUND

Insurance brokers act as intermediaries for their clients, which may beentities seeking insurance coverage for certain risks. Insurance brokersbring clients together with insurance providers (known as “insurancecarriers”) who may be willing and able to provide the desired insurancecoverage on beneficial terms for the client.

Reinsurance negotiation practice involves discrete provision of quoterequest, modification, and acceptance or declination during a life cycleinvolving parameter adjustments, contract document additions, and otherinformation handling that is largely manually entered and shared betweenparties to a negotiation. This process is slow, laborious, and prone toloss of information important to transaction auditing. Additionally, theprocess makes benchmarking of negotiation metrics cumbersome anddifficult.

SUMMARY OF ILLUSTRATIVE EMBODIMENTS

The forgoing general description of the illustrative implementations andthe following detailed description thereof are merely exemplary aspectsof the teachings of this disclosure, and are not restrictive.

The present application describes dashboard user interfaces, methods,systems, and transactional environments for automated transactionnegotiation, benchmarking, compliance, and auditing. During theautomated process, in some embodiments, a quote template engine aids theuser (e.g., broker) in customizing quote requests and follow-on quoteinformation based upon learned parameters used in past negotiations. Forexample, data derived from completed transactions may be used toautomatically identify preferred quote parameters based upon producttype, geography, vendor, customer, or other common parameters. Areal-time notification engine may alert parties (e.g., clients,customers, brokers and/or vendors) to the negotiation when newinformation is available and/or automatically present updatinginformation for user review. This allows faster exchange of informationleading to prompt completion of transactions. Information, in anotherexample, may be created once and selectively shared with multipleparties. For example, depending upon negotiation partner, a party to thenegotiation may select to share certain standard contracts or otherdocuments (e.g., product details, warranties, etc.) uploaded andsecurely stored in the negotiation environment. During negotiations, anaudit trail management engine tracks information shared and stores thesteps of the negotiation for later audit review. The audit trail mayautomatically support financial market compliance requirements such thatparties are reassured as to compliance without needing to individuallymanage and store compliance documentation. Additionally, parties to thenegotiation may have the ability to review modifications to theagreement throughout the course of the negotiation. Further, a datamining engine may analyze the audit trail information to identifynegotiation metrics related to the parties participating in thetransactional environment. The negotiation metrics may be presented inreport format to gain greater understanding of vendor appetites, trendsin pricing, transaction volume, and other information around the globe.The information may be presented based on a number of negotiationvariables including, in some examples, product type, geography, market,vendor, and deal size.

In certain embodiments, an automated system provides for automaticnegotiation, benchmarking, compliance, and auditing. The system mayinclude computing systems and devices for receiving a request fortransmitting a transaction message to a vendor, and in response,providing a customization user interface including a transaction messagetemplate with editable and non-editable input fields as well as adocument selection interface for linking transaction documents to thetransaction message. Message recipients associated with the vendor maybe identified that have security access permissions corresponding toaccess parameters for the linked transaction documents. In response toreceiving inputs for the editable input fields, the transaction messagetemplate may be converted to a message transmission format fortransmitting the transaction message with the one or more linkedtransaction documents and transmitted to the vendor. The transactionmessage and linked documents are stored in at least one portion of adata repository.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute apart of the specification, illustrate one or more embodiments and,together with the description, explain these embodiments. Theaccompanying drawings have not necessarily been drawn to scale. Anyvalues dimensions illustrated in the accompanying graphs and figures arefor illustration purposes only and may or may not represent actual orpreferred values or dimensions. Where applicable, some or all featuresmay not be illustrated to assist in the description of underlyingfeatures. In the drawings:

FIG. 1 is a block diagram of an example environment for automatedtransaction negotiation, benchmarking, compliance, and auditing;

FIGS. 2A and 2B are a swim lane diagram illustrating an example methodfor negotiating a quote through a platform for automated transactionnegotiation, benchmarking, compliance, and auditing;

FIGS. 3A through 3F are example screen shots of a user interface forautomated negotiation of reinsurance quotes;

FIG. 4 is an example screen shot of an automated notification regardinga pending negotiation;

FIG. 5A illustrates an example quote template data field architecture;

FIG. 5B illustrates an example quote template creation dialogue;

FIG. 5C is a swim lane diagram illustrating example communication flows;

FIGS. 6A through 6E are example quote development stages in negotiatinga quote through a platform for automated transaction negotiation,benchmarking, compliance, and auditing;

FIG. 7 illustrates an example response received by a broker for apreviously submitted quote;

FIGS. 8A and 8B illustrate various aspects of an exemplary architectureimplementing a platform for automated transaction negotiation,benchmarking, compliance, and auditing;

FIGS. 8C and 8D illustrate an example server interface for connectinguser computing devices within a platform for automated transactionnegotiation, benchmarking, compliance, and auditing;

FIGS. 9A-9C illustrate exemplary user interface screens utilized by abroker when preparing a quote to be sent to vendors in various marketsfor a transaction negotiation;

FIGS. 10A-10B are a swim lane diagram illustrating an example method forcapturing audit trail data during transaction negotiation;

FIG. 11 illustrates an exemplary organizational structure for a savingaudit trail data in a data repository;

FIGS. 12A-12B provide an illustrative example of user interface screensfor boundary layer template customization for vendors

FIGS. 13A-13B illustrate exemplary dashboard interface screens utilizedby a broker when preparing a message associated with a transactionnegotiation to be sent to vendors;

FIGS. 14A-14I illustrate various dashboard interface screens formanaging vendor security access;

FIG. 15 illustrates a flow diagram of a process for managing delegateassignments to underwriters;

FIGS. 16A-16B illustrate products and lines of business associated withdifferent types of quote templates; and

FIGS. 17-18 illustrate entity relationship diagrams for an automatedtransaction negotiation system.

DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS

The description set forth below in connection with the appended drawingsis intended to be a description of various, illustrative embodiments ofthe disclosed subject matter. Specific features and functionalities aredescribed in connection with each illustrative embodiment; however, itwill be apparent to those skilled in the art that the disclosedembodiments may be practiced without each of those specific features andfunctionalities.

Reference throughout the specification to “one embodiment” or “anembodiment” means that a particular feature, structure, orcharacteristic described in connection with an embodiment is included inat least one embodiment of the subject matter disclosed. Thus, theappearance of the phrases “in one embodiment” or “in an embodiment” invarious places throughout the specification is not necessarily referringto the same embodiment. Further, the particular features, structures orcharacteristics may be combined in any suitable manner in one or moreembodiments. Further, it is intended that embodiments of the disclosedsubject matter cover modifications and variations thereof.

It must be noted that, as used in the specification and the appendedclaims, the singular forms “a,” “an,” and “the” include plural referentsunless the context expressly dictates otherwise. That is, unlessexpressly specified otherwise, as used herein the words “a,” “an,”“the,” and the like carry the meaning of “one or more.” Additionally, itis to be understood that terms such as “left,” “right,” “top,” “bottom,”“front,” “rear,” “side,” “height,” “length,” “width,” “upper,” “lower,”“interior,” “exterior,” “inner,” “outer,” and the like that may be usedherein merely describe points of reference and do not necessarily limitembodiments of the present disclosure to any particular orientation orconfiguration. Furthermore, terms such as “first,” “second,” “third,”etc., merely identify one of a number of portions, components, steps,operations, functions, and/or points of reference as disclosed herein,and likewise do not necessarily limit embodiments of the presentdisclosure to any particular configuration or orientation.

Furthermore, the terms “approximately,” “about,” “proximate,” “minorvariation,” and similar terms generally refer to ranges that include theidentified value within a margin of 20%, 10% or preferably 5% in certainembodiments, and any values therebetween.

All of the functionalities described in connection with one embodimentare intended to be applicable to the additional embodiments describedbelow except where expressly stated or where the feature or function isincompatible with the additional embodiments. For example, where a givenfeature or function is expressly described in connection with oneembodiment but not expressly mentioned in connection with an alternativeembodiment, it should be understood that the inventors intend that thatfeature or function may be deployed, utilized or implemented inconnection with the alternative embodiment unless the feature orfunction is incompatible with the alternative embodiment.

The present disclosure describes a dashboard interface, methods,systems, platforms, and transactional environments for automatedtransaction negotiation, benchmarking, compliance, and auditing. Thetransaction, for example, may include reinsurance quote negotiation.Turning to FIG. 1, an example environment 100 includes a number ofvendor (e.g., reinsurance carrier) computing systems 104, a number ofbroker computing systems 102 (e.g., individual computing devices,servers, and/or organizational computing systems), and at least oneauditor computing system 106 in communication with a network-basedsystem 108 providing a variety of software engines 130 through 148 forsupporting a platform for automated transaction negotiation,benchmarking, compliance, and auditing. The system 108 managestransaction data in a transaction data repository 110, audit trailinformation in an audit trail repository 114, and transactionaldocuments (e.g., contracts, agreements, etc. created and uploaded by thebrokers 102 and/or vendors 104) in a document repository 112.

In some implementations, the system 108 authenticates users connectingthrough the vendor computing systems 104 and broker computing systems102 through a user management engine 130. The user management engine130, for example, may authenticate users and/or computing systems 102,104 based upon information stored within broker data 118 and vendor data116. In some examples, user passwords, valid computing system addresses,dashboard activity data, etc. may be maintained for individualreinsurers (via vendor data 116) and/or brokers (via broker data 118)connecting to the system 108.

A broker connected to the system 108, in some implementations, canprepare a reusable quote template, via a quote template engine 140, torequest a transactional quote from one or more of the vendorsrepresented by the vendor computing systems 104. The quote templateengine 140, for example, may supply stock transactional data elementsfor selection in preparing a quote template specific to a particularcustomer, groups of customers, product type, market, geographic region,etc. The broker may store one or more quote templates 120 in thetransactional data repository 110. In some implementations, each quotetemplate 120 may have an associated notification template 121 that maybe used by the negotiation automation engine 142 in preparing quoterequests and other types of messages and notifications associated with atransaction negotiation (e.g., final order, final lines) to be sent dothe vendors 104.

After preparing the quote template 120, the broker 102 can select one ormore vendors (e.g., reinsurance carriers) from the vendors managed bythe user management engine 130 through a negotiation automation engine142, and customize the quote template for the vendor(s). A dashboard GUIengine 134, in some embodiments, provides the broker computing systems102 with an interface for quote template creation and negotiationmanagement. The brokers, in some embodiments, may select individualreinsurers for quote preparation based upon vendor data 116 maintainedin the transactional data repository 110. The vendor data 116, in someexamples, may include information regarding markets, regions, riskappetite, etc. for each reinsurer within the environment 100. In someimplementations, the vendor data 116 may also include bound layerinformation indicating deductible tier preferences for each of thevendors 104. For example, some vendors 116 may have preferencesregarding deductible amounts and tiers of deductibles established by thebound layers of a provided quote.

In some implementations, when customizing the quote request, the brokerincludes a document 126. In some examples, the broker uploads adocument, such as a contract agreement, via a document management engine138. The document management engine 138 may store the uploaded documentin the document repository 112. In some embodiments, an audit trailmanagement engine 144 correlates the uploaded document 126 with theinitiated transaction.

Upon submission of a quote request by the broker via the negotiationautomation engine 142, in some implementations, an audit trailmanagement engine 144 logs audit trail information 128 regarding thequote request in an audit trail repository 114. The audit trailmanagement engine 144, for example, may track messages exchanged betweenparties in a negotiation including exact verbiage communicated to theparties, negotiation terms, and shared documents throughout atransaction for future audit purposes (e.g., by the auditor computingsystem 106 and/or internally by the broker computing systems 102 andvendor computing systems 104). For example, audit and/or legalrequirements may dictate that brokers maintain copies of any documentsor messages exchanged between parties (e.g., brokers 102 and vendors104) in a reinsurance negotiation. Rather than rely on manual compliancefiling of emails and documentation by brokers, which can lead to gaps,oversight, and inconsistencies in audits, the audit trail managementengine 144 may automatically manage the filing and tracking of audittrail data 128 without any manual interaction from the brokers 102. Insome implementations, the audit trail management engine 144 may use datamirroring to automatically generate copies of messages and otherdocumentation that may be stored within access-controlled compliancefolders within the audit trail repository 114 and/or document repository112. In some examples, the audit trail management engine 144 mayautomatically generate, organize, and maintain theauditor/legal-mandated documentation without the brokers 102 having tomanually generate, track, organize, and store the documents, which cangreatly reduce errors in maintaining a proper audit trail data 128.Additionally, the automatic saving of email messages by the audit trailmanagement engine 144 without any manual interaction by the brokers 102may provide an additional layer of assurance that information within theemail messages has not been tampered with, which improves auditintegrity.

In some implementations, in addition to auto-filing the audit trail data128 including messages, responses, and associated with a negotiation,the audit trail management engine 144 may also assign various tags andattributes to the audit trail data 128, such as reportable attributesthat are mandated by auditors, as the documents are filed withincompliance folders in the audit trail repository 114. In some examples,the assigned tags and attributes may be stored in the audit trailrepository as tag data 150. For any outgoing communications to vendors104, the tag data 150 may include vendor information data (e.g., marketnames, contact names, email addresses), compliance filings data (e.g.,document types, privacy settings, security configurations related to whocan access the file after it is saved within the audit trail repository114), data and time stamps for outgoing messages, and interaction dataindicating how a vendor 106 receiving the message has interacted withthe message and/or attached documentation. For example, the emailmessages transmitted by the system 108 from the brokers 102 to thevendors 104 may include a link 924 (FIG. 9B) that allows messagerecipients to access the documents associated with the message such thatthe audit trail management engine 144 may track when a message andassociated documentation is accessed and/or downloaded by a vendor 104.For example, selection of the link 924 by the vendors 104, may cause thesystem to present a document access user interface screen to the vendors104 that allows the vendors 104 to access the documents. The automatictagging of the audit trail data 128 by the audit trail management engine144 may also ensure that the compliance tracking of the data received,output, and processed by the system 108 is managed as a consistentglobal process rather than at the discretion of the brokers 102.

After the broker submits the quote request, targeted reinsurers canaccess and review quote information prepared by an account managementengine 146 and presented by the dashboard GUI engine 134. In anotherexample, a real-time notification engine 148 may identify one or morerecipients (e.g., individual users and/or users identified in aparticular user group) for real-time notification regarding submissionof the quote request. The real-time notification, in some examples, mayinclude a mobile device app notification, a SMS message notification, anemail notification, or an automated voice mail notification. The type ofnotification, in some embodiments, may be based in part upon userpreferences managed by the user management engine 130. Further, if thereinsurer is reviewing information supplied by the system 108 presentedby the dashboard GUI engine 134, in some embodiments, the dashboard GUIengine 134 may refresh the dashboard interface to supply real-timenotification via the reinsurer dashboard.

The reinsurer, in some implementations, prepares a response to the quoterequest, for example via the dashboard GUI engine 134. The audit trailmanagement engine 144 may track the response supplied by the reinsureras part of the audit trail information 128 for this particulartransaction. Further details regarding the negotiation process isprovided in the following figures, below.

In some implementations, a data mining engine 136 statistically analyzesinformation regarding the various transactions supported by the system108. The data mining engine 136 may compile terms of quotes from bothaccepted and declined quotes. Based on the terms and the accept/declinerates, the data mining engine 136 may generate metrics 124 associatedwith the terms of the quotes, which may be stored in the transactiondata repository 110. In certain embodiments, the quote template engine140 may provide recommendations to users in populating the quotetemplate 120, for example based upon metrics 124 or other commonfeatures of past templates and/or stored templates (e.g., in audit traildata 128 or quote templates 120).

In some implementations, the data mining engine 136 may also gather dataand automatically generate metrics 124 associated with which data fieldsof quote templates are most frequently modified and customized and themost frequent types of changes that are made to the quote templates overpredetermined periods of time. In addition, the data mining engine 136may also compare the template modifications to the responses receivedfrom the vendors 104 to the quotes having the modified templates todetermine which quote template versions were transmitted most often towhich quote template versions were responded to most often. In someexamples, the quote template engine 140 may periodically and/orautomatically update a base or default template for various producttypes and/or lines of business to reflect a most commonly used and/ormost commonly responded to template for each product/line of businesscombination. In one example, the default quote template for eachproduct/line of business combination may be updated based on a previoustwelve months of data gathered by the data mining engine 136, and may beupdated at a frequency of two to three months, which may coincide withpolicy renewal periods.

FIGS. 16A-16B represent exemplary product types and lines of businessthat have default templates that may be maintained by the quote templateengine 140. For example, FIG. 16A shows a diagram 1600 of types ofproducts 1604 in product categories 1602, which may include proportionaland excess of loss (XOL) product categories. In addition, FIG. 16B showsa diagram of lines of business 1606 that may be associated with each ofthe types of products 1604 to generate default quote templates.

Returning to FIG. 1, for each product/line of business combination, thedata mining engine 136 may also determine metrics 124 associated withpremium amounts initially offered to the vendors 104 and differencesbetween the initially offered premium amounts and accepted premiumamounts. In addition, the data mining engine 136 may also track theresponse rate for different types of quote request templates, which mayinclude how many vendors 104 accepted the offer on the first round ofnegotiations versus subsequent rounds as well as whether a vendor 104accepted any offer, which may be stored in the transaction datarepository 110 by product/line of business as negotiation data 123. Thenegotiation data 123 allows a rate on line (ROL) to be calculated, whichcan be used by the quote template engine 140 to prompt brokers 102during quote preparation with the ROL for that type of quote. Forexample, if a broker 102 is preparing a quote template for a contractthat starts June 1, the quote template engine 140 may output a ROL trendline for the product the broker 102 is working on based on collectednegotiation data 123 from January 1 and April 1.

In some examples, the system 108 may include a security managementengine 152 that manages the ability of vendors 104 to locally controlaccess by employees of the vendors (e.g., underwriters, managers,administrators, delegates) to the system 108 and may perform systemaccess updates to reflect changes access permission changes made by thevendors 104. For example, the vendors 104 and brokers 102 may havemultiple contracts and/or transaction negotiations ongoing at any onetime, and each contract or transaction may have one or more assignedvendor employees who have designated roles with respect to the contractor transaction that have different document access control requirements.

In some implementations, the security management engine 152 may causeone or more dashboard interface screens to be presented to the vendors104 that allow the vendors 104 to assign, reassign, or remove accesscontrol permissions to the vendor employees based on employment and/orstructural changes that may be made within the vendor company withoutany interaction by the brokers 102. In addition, the security managementengine 152 may modify access to data stored in the data repositories110, 112, 114 based on security access modifications made by the vendors104. For example, access to the documents 126 stored in the documentdata repository 126 may granted to a vendor employee who is added as adelegate for an assigned contract underwriter for the vendor 104.Details regarding the functionality of the security management engine152 are discussed further herein.

In some implementations, a sales management engine 132 generatesmanagement and underwriter level placement progress reports. A “quoteanalysis” report, in some embodiments, may present the brokers real-timestatistics related to the outcomes of quotes, captured along thetimeline from request to bind. For example, the dashboard GUI engine 134may update the dashboard interface of the brokers to present a graphicalanalysis of vendor declination reasons. The dashboard may displaydetailed analysis of entity declination reasons and entity acceptancereasons. Further, the sales management engine 132 may present thebrokers with an analysis of percentage submissions quoted by each of anumber of vendors, such as the percentage submission-to-quote presentedfor each of the top five vendors. The top five reinsurance carriers, insome examples, may be identified as the top five performing vendorswithin the dashboard environment, the five vendors determined to be mostsimilar to the present vendor, and/or the top five vendors for the typemetrics presently presented, etc. The sales management engine 132 mayallow the brokers, via the dashboard interface, to review percentages ofquotes submitted based upon deductible type. Similarly, the brokers mayreview percentages of quotes submitted based upon deductible ranges.

Turning to a “product types and industry analysis” report, in someembodiments, the sales management engine 132 may provide statisticsregarding product types offered via the dashboard environment andpurchasing trends across industry sectors. The dashboard interface forthe brokers may present top product types by aggregate premiums.Furthermore, the information may be filtered by geography and/or byindustry sectors. Further, the analysis may be broken down to illustratetop reinsurers for each of top product types and/or top industrysectors.

In some implementations, the sales management engine 132 may providereports relating to analysis of trade volume and aggregate premiumsacross reinsurance carriers participating in the dashboard environment.For example, the analysis report may include the aggregate numbers oftrades by a reinsurance carrier over a given period of time. The reportmay additionally include identification of a bound premium associatedwith the aggregate trades. The bound trades statistics and aggregatepremium statistics may further be filtered by geography and/or byindustry. Additional filtering options and combinations are possible,such as reinsurance carriers by premium and by geography.

Turning to FIGS. 2A and 2B, a flow diagram illustrates communicationflows between a broker 202, a platform 204, and a vendor 206 during anexample transaction process 200. The transaction process 200, forexample, may be supported by the environment 100 of FIG. 1, where theplatform 204 represents the system 108, the broker 202 represents thebroker computing systems 102, and the vendor 206 represents the vendorcomputing systems 104.

In some implementations, the transaction process 200 begins with theplatform 204 supplying a quote request template user interface (208) tothe broker 202. The quote request template user interface, for example,may be provided by the dashboard GUI engine 124 of FIG. 1. The quoterequest template may be based upon a number of selectable term options,product types, markets, geographical regions, and/or preferred vendors(e.g., quote variables).

Turning to FIG. 5A, in some implementations, the user builds a quotetemplate 550. The quote template 550, as illustrated, includes a numberof contract sections 552, each contract section 552 including a numberof fields 554 (e.g., occurrence limit, per person limit, booked validatecurrency identifier, brokerage rate, margin dollars, and “thru” date forresponse deadline to the quote request). Certain terms, in someembodiments, (e.g., occurrence limit and per person limit, asillustrated) may be deemed editable 556 by the user when preparing thequote template. The editable field 556, when activated, may allow thenegotiating party (e.g., vendor such as a reinsurer) to modify aproposed term presented by the initiating party (e.g., broker).

FIG. 5A also includes an entity relationship diagram superimposed ontothe quote template 550 that illustrates relationships between the fieldsof the template 550 that may be stored within tables of a datarepository, such as the transaction data repository 110 (FIG. 1). Forexample, a quote contract section 552 of a template may be populatedbased on relationships between a quote contract section base entity 514,market entity 512, quote entity 518, and quote detail entity 520.

Returning to FIG. 2A, in some implementations, the broker 202 respondsby providing one or more quote request template parameter settings (210)to the platform 204. The quote request template parameter settings, forexample, may include those terms selected by the broker 202 in preparingthe quote template, such as the quote template 550 described in relationto FIG. 5A.

In some implementations, the broker 202 uses a quote customization userinterface to provide the quote request template parameter setting(s).Turning to FIG. 5B, an example quote customization user interface 560provides a mechanism for a user to select fields representing varioustemplate parameter settings. The user may enter the quote customizationuser interface 560, for example, from the quote edit user interface 330of FIG. 3C. The user is presented with a menu containing availablefields 562 from which to populate a second menu of selected templatefields 564. The fields 562, for example, may be highlighted singularlyor in groups and transferred into the second menu of selected templatefields 564 using a set of movement controls 570. The fields in theselected template fields 564, further, may be rearranged by the user ina presentation order (e.g., using arrows 572). The fields 562 populatingthe selected template fields 564, for example, may be used to highlightfeatures of a particular deal in a particular way.

In some implementations, a user has the option to create reusabletemplates, eliminating the need recreating field selections upon eachquote. As illustrated, the present template has been named “TreatyReinsurance/Excess Property & Casualty” in a name entry field 566.Further, the user may be provided the ability to edit a saved template.In this manner, for example, the user may adjust previously usedtemplates to better fit a current scenario. The previously storedtemplate may be selected, for example, through a template drop-down menu568. Additionally or alternatively, as noted in a warning message 574 atthe bottom of the quote customization user interface 560, the user mayalter an existing template. The alteration, for example, may cause achange to the template in all sections using the template.Alternatively, the user may customize any section, or layer of coverage,within the template.

Returning to FIG. 2A, the platform 204, in some implementations, storesthe quote request template parameter settings (212). For example, asillustrated in FIG. 1, the quote template engine 140 of the system 108may store the quote request template parameter settings as quotetemplate information 120 in the transaction data repository 110.

In some implementations, the platform 204 prepares and supplies, forpresentation to the broker 202, a reinsurer selection user interface(214). The broker 202, through the reinsurer selection user interface,may select one or more reinsurers for sharing a quote request based uponthe quote request template. The reinsurers, in some embodiments, may befiltered by the platform 204 and/or the broker 202 to aid in selectionof one or more reinsurers. In some examples, the reinsurers may befiltered by the market(s) identified within the quote template,reinsurers having a past relationship with the broker 202, product typesidentified within the quote template, business segments identifiedwithin the quote template, reinsurers satisfaction ratings, and/orreinsurers providing services within a particular geographic region.

In some implementations, the broker 202 selects one or more reinsurersthrough the reinsurer selection user interface, and prepares a quoterequest, using the quote request template, specifically geared tonegotiations with the selected reinsurer(s). For example, the broker 202may supply one or more deadlines 216 associated with negotiations withthe one or more reinsurers. Further, the broker 202, in someimplementations, provides contract layer settings 218 specific toparticular sections of the quote request being prepared for negotiation.The contract layer settings 218, in some examples, may include termvalues, term editing settings, and/or layer visibility settings. Thecontract layer settings 218, in some embodiments, may vary in part basedupon different reinsurers selected through the reinsurer selection userinterface. For example, a first contract layer may be made visible bythe broker 202 to a first reinsurer but not a second reinsurer.

Turning to FIG. 6A, for example, a quote request 600, based upon thequote template 550 of FIG. 5A, includes two layers 604 a, 604 b incontract section 602. Each layer 604 a, 604 b includes values associatedwith at least a portion of the terms. Additionally, each layer includesa deadline 606 a, 606 b of Dec. 31, 2015.

Returning to FIG. 2A, in some implementations, the platform 204 storesthe reinsurer selections, deadlines, and contract layer settings (220).For example, as illustrated in FIG. 1, the quote template engine 140 ofthe system 108 may store the deadline(s), reinsurer selection(s) andcontract layer settings as active quote data 122 in the transaction datarepository 110.

In some implementations, the platform 204 prepares a document uploaduser interface (222) for presentation to the broker 202. The documentupload user interface, for example, may provide the broker 202 with theopportunity to upload one or more documents and associate thedocument(s) with the quote request. The documents, in some examples, mayinclude contracts, contract addendums, electronic signatures, termagreements, client information (e.g., financial, structural, etc.),and/or broker information. In some embodiments, the document upload userinterface allows the broker 202 to select a type of document. The type,for example, may be provided for audit trail purposes (e.g., contractproposal, contract addendum, executed contract, etc.). Additionally, thedocument upload user interface may allow the broker 202 to applyvisibility settings associated with each document. For example, thebroker 202 may elect to make the document visible to only one reinsurerassociated with the quote request. In some embodiments, the broker 202may later opt to “unshare” a particular document with one or morereinsurers. Further, in some embodiments, the broker 202 may applyread/write access controls to the document. Alternatively, documents maybe read-only when supplied to the platform 204, for example to maintaincontent control for auditing purposes.

In some implementations, the broker 202 supplies, via the documentupload user interface to the platform 204, one or more documents anddocument access control settings (224). For example, as illustrated inFIG. 1, the broker computing system 102 may supply the document(s) andaccess control setting(s) to the system 108 through the dashboard GUIengine 134.

In some implementations, the platform 204 stores the broker document(s)226. For example, the document management engine 138 of the system 108of FIG. 1 may store the broker documents and settings as document data126 in the document repository 112.

FIGS. 9A-9C illustrate exemplary dashboard interface screens utilized bya broker 202 when preparing a quote to be sent to vendors 206 in variousmarkets for a transaction negotiation. The user interface screensprovide indications regarding how the processing engines of the platform204 function to automatically transmit communications related tocontract negotiation to the vendors as well as track, tag, file, andcontrol access to the audit trail data 128. For example, FIG. 9Aillustrates a status user interface (UI) screen 900 that provides asummary view of which terms, layers, data points, and documentation of acontract have been shared with the vendors 206. In one example, for aparticular quote 902, the UI screen 900 may indicate statuses of variousdocuments, such as document 904, that have been prepared or are in theprocess of being prepared to send to the vendors. The UI screen 900 mayalso include a document type indicator 906 as well as indicators forwhether various tasks associated with preparing the quote have beenaccomplished, such as a market (vendor) identification indicator 908that indicates whether the vendors 104 who will receive the quote havebeen identified, a privacy indicator 910 indicating whether or notprivacy or security settings have been configured, and a notificationindicator 912 indicating whether the vendors 206 have received a messageor other type of communication from the brokers 202 with the quote. Whena market notification selection 914 on the UI screen is selected, thebroker 202 is presented with the notification UI screens 916 for thequote 902 shown in FIGS. 9B and 9C.

For example, FIG. 9B illustrates a review and edit template UI screen916 a that allows a broker to modify a notification template prepared bythe negotiation automation engine 142. The review and edit template UIscreen 916 a may also be utilized to prepare other types of messagesexchanged between the brokers 202 and the vendors 206, such as firmorder terms and client final lines. In some implementations, each quotetemplate 120 stored in the transaction repository 110 may have anassociated notification template 121 that may be used by the negotiationautomation engine 142 in preparing quote requests to be sent do thevendors 206. In one example, the UI screen 916 a may present a quoterequest message to the broker 202 in an email message format that mayinclude a combination of editable and/or non-editable fields. Forexample, the quote request message may include a non-editable subjectline 918, non-editable fields 920, and editable field 922 where thebroker can add a customized signature. In other examples, the fields 918and 920 may also be editable fields.

The quote request message shown in the UI screen 916 a may also includea non-editable document link 924 that allows message recipients toaccess and interact with the documentation associated with the messagewithin the platform environment of the platform 204. As the documentsare accessed by clicking the link 924 within the quote message, theaudit trail management engine 144 may track which users for a vendor 206have performed various assigned tasks associated with the documentsalong with dates and times when the assigned tasks were performed. Forexample, assigned tasks may include access/view, download, partiallyedit, edit completed, or reply message with completed documentstransmitted. A document status, including performed tasks withassociated dates and times may be stored by the audit trail managementengine 144 as audit trail data 128 with corresponding tag data 150.

FIG. 9C illustrates a recipient selection UI screen 916 b that allows abroker 102 to select message recipients of the quote request messagedisplayed in the UI screen 916 a as well as view roles andresponsibilities of each message recipient associated with vendors 104.The recipient selection UI screen 916 b may also be utilized to prepareother types of messages exchanged between the brokers 202 and thevendors 206, such as firm order terms and client final lines. In someimplementations, the UI screen 916 b may include delivery optionselections 926 in which the broker 102 can select whether to BCCrecipients or send messages individually to the message recipients aswell as whether to notify other internal brokers 102 associated with acontract or negotiation. In some examples, the negotiation automationengine 142, cooperation with the security management engine 152, maypopulate the UI screen 916 b with names and contact information formessage recipients 929 associated with markets 928 (e.g., vendors 206)who have access and/or assigned tasks associated with the documentsincluded as part of the quote request message and may exclude any userswho do not have access rights and/or assigned tasks associated with thedocuments included in the quote request message. In someimplementations, the security management engine 152 may determine themessage recipients 929 associated with the vendors that are displayed onthe UI screen 916 b based on document security access levels for one ormore users associated with the vendors 106.

The UI screen 916 b may also include security roles/responsibilities 934for each of the users associated with a market 928, which may includeunderwriters, delegates with either read only or edit permissions,managers, or administrators. Each role/responsibility 934 for each ofthe users may have the ability to at least view the linked documentsincluded as part of the quote request message. In the case of the role934 b in which the message recipient has not yet registered with theplatform 204, the UI screen 916 b may provide an indication (e.g., anasterisk) that the message recipient will also be sent a registrationemail in conjunction with the quote request message to gain access tothe platform 204.

In some implementations, the UI screen 916 b may also include fieldsindicating a last download date 930 and a first notified date 932associated with each of the markets 928. The last download date 930and/or first notified date 932 may be provided by the audit trailmanagement engine 144, which tracks when and how users interact withvarious documents associated with a contract negotiation. For example,the UI screen 916 b indicates that at least one of the users associatedwith market 928 a interacted with the platform 204 to download aprovided document on May 6, 2016. The UI screen 916 b also indicatesthat none of the users have downloaded the provided document but weresent a message notification on May 22, 2017.

In some implementations, the platform 204 provides a quote requestavailable notification and/or quote entry user interface (228) forpresentation to the vendor 206. The notification/user interface, forexample, may be provided in response to the broker 202 releasing thequote request for sharing with the reinsurer(s). For example, thedocument upload user interface may include a quote release.Alternatively, the broker 202 may release the quote request for sharingwith the vendor 206 via a separate user interface (e.g., via thereinsurer selection user interface or other quote preparation userinterface).

In the event of a quote request available notification, one or moreusers associated with the vendor 206, in some implementations, receivean automated notification via a personal computing device, such as amobile device app notification or an email notification through an emailapplication. Turning to FIG. 4, a mobile app notification interface 400alerts the user regarding a new quote proposal and invites the user toview the proposal through selection of a “view proposal” control 402.The quote request available notification, for example, may be preparedand issued by the real-time notification engine 148 of the system 108,as illustrate din FIG. 1. Other examples of real-time notificationsinclude SMS message, a dashboard alert (e.g., supplied by the dashboardGUI engine 134 of the system 108), and an automated voicemail message.

In the event of a quote entry user interface, in some implementations,the vendor 206 may be presented with a reinsurer dashboard interface300, as illustrated in FIG. 3A. Turning to FIG. 3A, the dashboardinterface 300 includes a listing of clients 302 by placement year. Year2015 and client “Sample Insurance Company” are selected within thelisting of clients 302, causing presentation of a listing of placements304 related to client “Sample Insurance Company”. Each placement 306 inthe listing of placements 304 includes an effective date 308 (e.g., thedate the broker released the quote request to the reinsurer), a documentindicator 310 (e.g., indicating whether any documents are available), aquote indicator 312 (e.g., indicating whether the quote request is openfor editing), and a firm order terms (FOT)/authorization indicator 314(e.g., indicating whether the quote request is open for authorization).As illustrated, a new quote request 316 a (dated Dec. 18, 2015 with aquote indicator 312 designated an unlocked state) is available forreinsurer selection.

Upon selection of the new quote request 316 a, in some implementations,the reinsurer is presented with a quote edit user interface 330, asillustrated in FIG. 3C. Turning to FIG. 3C, the quote edit userinterface includes a listing of contract layers 332, each including arespective effective date 334. As illustrated, a first layer 332 a isselected, and layer details 336 are presented to the reinsurer forreview and editing via a quote interface 338 a. The layer details 336,for example, correspond to the visible quote request terms as designatedin the quote contract section 602 of the quote request 600 of FIG. 6A.Turning to FIG. 6A, as illustrated, a displayed section 608 correspondsgenerally to the terms illustrated in the layer details 336. At thispoint in the negotiation, the reinsurer has not submitted the quote.Turning to FIG. 6B, a quote process diagram 610 illustrates that theterm values of Quote A are “Not Submitted”, a set of editable terms 612being available for reinsurer modification, including a layer 1occurrence limit term 612 a, a layer 1 per person limit term 612 b, alayer 2 occurrence limit term 612 c, and a layer 2 per person limit term612 d (presently blank). Turning to FIG. 6C, a quote process diagram 620illustrates that the layer 2 per person limit term 612 d has beenmodified by the reinsurer with the addition of the value 5000. Returningto the quote edit user interface of FIG. 3C, the reinsurer mayoptionally modify the editable quote terms of the pending quote.Alternatively, the reinsurer may opt to wait for a firm order from thebroker 338 b or decline quoting 338 c.

As part of reviewing the quote request provided by the broker 202, thevendor 206 may review one or more documents uploaded by the broker 202.Turning to FIG. 3B, a document review user interface 320 presents anumber of document listings 326 of documents made available by a firstparty 324 a, 324 b to the negotiation for review and download 327 by auser of a second party 324 a, 324 b to the negotiation. For example, afirst party 324 a may correspond to the broker 202 of FIG. 2A, while asecond party 324 b may correspond to the vendor 206 of FIG. 2A. The userinterface 320, in some embodiments, is accessible to the second party324 b via the reinsurer dashboard interface 300 of FIG. 3A (e.g., asevidenced by document indicator 310).

The document listings 326 of the document review user interface 320, insome implementations, are arranged by category 323 (e.g., new/revised,analytics, proposal) so the user may quickly identify relevantdocuments. In a particular example, a new/revised category 323 a maydraw attention to any documents added and/or revised since the user'slast access to the user interface 320. Alternatively or in addition tothe new/revised category 323 a, one or more document listings 326 may beassociated with a status indicator 325 (e.g., *NEW* as illustrated),demonstrating a present status of the associated document listing 326.

In some implementations, the document review user interface 320 mayinclude one or more dates 328 associated with the document listings 326,such as a last downloaded date 328 a, indicating the date the documentwas most recently accessed by the user (or, alternatively, another userassociated with the reinsurer 324 b) and an access granted data 328 b,indicating the date the user was granted access to the correspondingdocument. If the document has previously been accessed by the secondparty 324 b, in the illustrated example, an access by indicator 329 mayidentify a particular user of the second party 324 b who most recentlyaccessed the corresponding document of the particular document listing326.

Although not illustrated, in some embodiments, one or more documents mayinclude access rights identifying whether the second party may edit orotherwise modify (e.g., rename, append comments to, etc.) a particulardocument identified within the document listing 326.

Turning to FIG. 2A, upon editing one or more quote terms, the vendor 206provides customized quote details (230) to the platform 204. Thecustomized quote details, for example, may be entered via the dashboardGUI engine 134 of the system 108 of FIG. 1 and provided to thenegotiation automation engine 142.

In some implementations, the platform 204 stores the reinsurer quotedetails (232). For example, the quote details may be stored to theactive quotes data 122 in the transaction data repository 110 by thesystem 108, as illustrated in FIG. 1. Further, the present state of thenegotiation may be updated in the audit trail data 128 of the audit datarepository 114 by the audit trail management engine 144.

Turning to FIG. 2B to continue the transaction process 200 of FIG. 2A,in some implementations, the platform 204 provides a quote availablenotification and/or quote review user interface (234) to the broker 202.The notification/user interface, for example, may be provided inresponse to the broker 202 releasing the quote request for sharing withthe reinsurer(s). For example, the document upload user interface mayinclude a quote release. Alternatively, the broker 202 may release thequote request for sharing with the vendor 206 via a separate userinterface (e.g., via the reinsurer selection user interface or otherquote preparation user interface).

In the event of a quote available notification, one or more usersassociated with the broker 202, in some implementations, receive anautomated notification via a personal computing device, such as a mobiledevice app notification, as described in relation to the automatednotification process described in step 228. The quote availablenotification, for example, may be prepared and issued by the real-timenotification engine 148 of the system 108, as illustrated in FIG. 1.Other examples of real-time notifications include SMS message, adashboard alert (e.g., supplied by the dashboard GUI engine 134 of thesystem 108), and an automated voicemail message.

In the event of a quote review user interface, in some implementations,the broker 202 may be presented with the present terms of the quote,including the modification made by the vendor 206. For example, as shownin FIG. 6D, a quote process diagram 630 illustrates the terms associatedwith the pending quote, including the terms 612 editable by thereinsurer. The broker 202 may review these terms and determine, with theclient, whether to accept the reinsurer's quote.

If the client agrees to the quote supplied by the vendor 206, in someimplementations, the broker 202 issues a client firm order (236) to theplatform 204. The firm order may either validate the terms of the quoteas adjusted by the vendor 206 or reinstate the initial terms as suppliedby the broker 202 in the quote request. The firm order, in someembodiments, may be placed via a firm order user interface 350 asillustrated in FIG. 3F.

Turning to FIG. 3F, the firm order user interface 350 may include alisting of one or more pending transactions 352. Each pendingtransaction may be associated with an authorization deadline 366. Eachpending transaction may include a transaction name or identifier 354,one or more layer identifiers 356, an effective date 358, and/or a limitand retention value 360. To modify the terms of the quote, a user mayselect a markets edit control 362 and/or a terms and fields edit control364.

Upon selection of the markets edit control 362, in some implementations,the user may limit data access of particular markets. A selected market,for example, may be allowed to edit data, such as authorization percent,comments, and subjectivities. Additionally or alternatively, the usermay grant read-only access to remaining markets using the markets editcontrol 362. While the quote enters a read-only state after submission,designated brokers within the selected market may utilize the control tounlock the read-only state and enter/edit data. The market edit control362 may improve data quality and process management.

Upon selection of the terms and fields edit control 364, in someimplementations, the user is presented with a graphical user interfacefor adding, removing, and/or exchanging present fields included in thepending quote as well as to adjust values associated with each of theterms represented by those fields. The user interface, for example, maybe similar to the layer details illustrated in the graphical userinterfaces of FIGS. 3D and 3E.

In some implementations, upon completion of validating, adjusting, orreinstating the terms of a particular transaction 354, the user may optto publish the firm order (e.g., share with the associated reinsurer)via a publication control 368.

Once the firm order terms are established, these options are provided bythe broker 202 to the platform 204, in some implementations, as clientfirm order terms (236).

In some implementations, the platform 204 stores the client firm orderterms (238). For example, the firm order terms may be stored to theactive quotes data 122 in the transaction data repository 110 by thesystem 108, as illustrated in FIG. 1. The firm order terms, for example,may be an adjustment validation or a term reinstatement. Further, thepresent state of the negotiation may be updated in the audit trail data128 of the audit data repository 114 by the audit trail managementengine 144.

In some implementations, the platform 204 provides, for presentation tothe vendor 206, a firm order notification and/or firm order review userinterface (240). The notification/user interface, for example, may beprovided in real-time in response to the broker 202 providing the clientfirm order terms (236).

In the event of a firm order notification, one or more users associatedwith the vendor 206, in some implementations, receive an automatednotification via a personal computing device, such as a mobile deviceapp notification, as described in relation to the automated notificationprocess described in step 228. The firm order notification, for example,may be prepared and issued by the real-time notification engine 148 ofthe system 108, as illustrate din FIG. 1. Other examples of real-timenotifications include SMS message, a dashboard alert (e.g., supplied bythe dashboard GUI engine 134 of the system 108), and an automatedvoicemail message.

In the event of a firm order review user interface, in someimplementations, the vendor 206 is presented with the current terms ofthe quote, including any reinstatement made by the broker 202. Forexample, as shown in a layer authorization user interface 340 of FIG.3D, the vendor 206 may elect to authorize 342 or decline 344 eachindividual layer 332 of the quote. In the event of authorization, thereinsurer is presented with a set of controls 346 for enteringauthorization details. In particular, the authorization controls 346, asillustrated, include an authorized percentage data entry field 346 a forauthorizing the quote up to a percentage difference from the presentproposed values, an authorized amount data entry field 346 b forauthorizing the quote up to a monetary difference from the presentproposed values, an authorization expiration data entry field 346 c forentering a deadline for client acceptance of the authorization, and areinsurer reference number data entry field 346 d for entering areinsurer-specific identifier related to the pending quote. Further, theauthorization controls 346, as illustrated include a subjectivity textentry region 346 e providing a text field for clarification and/orexpansion on the meaning and scope of various quote terms and a commentstext entry region 346 f for adding any quote-specific information notcaptured by the remaining data entry fields 346.

Alternatively, if the reinsurer declines authorization of one or more ofthe layers 332, the reinsurer may enter comments into a text entryregion of a declination dialogue box 348. For example, the reinsurer maysupply reasons for declining authorization to the pending quote.

In some implementations, if the reinsurer declines authorization of oneor more of the layers 332, the data mining engine 136 may generatemetrics 124 associated with the reinsurer's risk appetite by comparingthe terms of the declined layers and the terms accepted by the existingmarket. The generated metrics 124 may be stored in the transaction datarepository 110.

FIG. 3E shows another exemplary screen shot of the layer authorizationuser interface 340 when the reinsurer selects a second layer 332 b. Insome embodiments, the vendor 206 may elect to authorize 342 or decline344 the second layer 332 b. In the event of authorization, the reinsureris presented with a set of controls 346 for entering authorizationdetails. In particular, the authorization controls 346, as illustrated,include an authorized percentage data entry field 346 a for authorizingthe quote up to a percentage difference from the present proposedvalues, an authorized amount data entry field 346 b for authorizing thequote up to a monetary difference from the present proposed values, anauthorization expiration data entry field 346 c for entering a deadlinefor client acceptance of the authorization, and a reinsurer referencenumber data entry field 346 d for entering a reinsurer-specificidentifier related to the pending quote. Further, the authorizationcontrols 346, as illustrated include a subjectivity text entry region346 e providing a text field for clarification and/or expansion on themeaning and scope of various quote terms and a comments text entryregion 346 f for adding any quote-specific information not captured bythe remaining data entry fields 346.

Alternatively, if the reinsurer declines authorization of the secondlayer 332 b, the reinsurer may enter comments into a text entry regionof a declination dialogue box, such as the text entry region of thedeclination dialogue box 348 shown in FIG. 3C. For example, thereinsurer may supply reasons for declining authorization to the pendingquote.

Upon authorization and/or declination, in some implementations, thevendor 206 provides the authorization and/or declination information(242) to the platform 204. The information may additionally include oneor more documents supplied by the vendor 206. For example, the reinsurermay include a contractual agreement, detailed proposal, or otherinformation related to the transaction as a separate document.

In some implementations, the platform 204 stores the reinsurerauthorization information (244). For example, the information enteredinto the data fields 346 or declination reasons entered via dialogue box348 may be stored to the active quotes data 122 in the transaction datarepository 110 by the system 108, as illustrated in FIG. 1. Theauthorization information, for example, may be a quote validation.Further, the present state of the negotiation may be updated in theaudit trail data 128 of the audit data repository 114 by the audit trailmanagement engine 144.

In some implementations, the platform 204 provides a marketing resultsnotification and/or quote review user interface (246) to the broker 202.The notification/user interface, for example, may be provided inresponse to the vendor 206 submitting the authorization and/ordeclination information for sharing with the broker 202.

In the event of a marketing results notification, one or more usersassociated with the broker 202, in some implementations, receive anautomated notification via a personal computing device, such as a mobiledevice app notification, as described in relation to the automatednotification process described in step 228. The marketing resultsnotification, for example, may be prepared and issued by the real-timenotification engine 148 of the system 108, as illustrate din FIG. 1.Other examples of real-time notifications include SMS message, adashboard alert (e.g., supplied by the dashboard GUI engine 134 of thesystem 108), and an automated voicemail message.

In the event of a marketing results user interface, in someimplementations, the broker 202 may be presented with the present termsof the quote, including the authorization information and/or declinationcomments submitted by the vendor 206. For example, as shown in FIG. 6E,a quote process diagram 640 illustrates the terms associated with thepending quote, including the terms 612 authorized by the reinsurer. Thebroker 202 may review these terms and share with the client. In someimplementations, the broker 202 provides client final lines (248)regarding the finalized transaction terms to the platform 204. In someembodiments, the final lines include terms/contracts/details containedin one or more documents for sharing with the vendor 206. This confirmsthe agreement reached. In some embodiments, rather than including simplyan automated collection of the agreed upon terms, the brokerrepresentative submitting information through the broker 202 has theopportunity to enhance or customize the final lines information withadditional information. In some examples, the broker representative mayadd a personalized note, such as a thank you or a request for feedback,or other brokerage-specific information, Further, in some embodiments,the broker 202 may be invited to acknowledge and confirm the content ofthe final lines. In response to receiving the client final lines, insome implementations, the platform 204 stores the client final lines(250). For example, the client final lines information may be stored tothe active quotes data 122 in the transaction data repository 110 by thesystem 108, as illustrated in FIG. 1. Further, the present state of thenegotiation may be updated in the audit trail data 128 of the audit datarepository 114 by the audit trail management engine 144. The details, insome embodiments, may be released to the data mining engine 136 of FIG.1 for developing metrics data. The data mining engine 136, for example,may combine the present transaction data with other historicaltransaction data in developing metrics data 124, stored in thetransaction data repository 110.

In some implementations where transaction negotiation documents aretransmitted to multiple vendors 206 with different layer settings andpreferences, the platform 204 can customize the layers within anegotiation template based on the layer settings and preferences forindividual vendors 206. The layer customization allows the brokers 202to control which vendors 206 are notified of bound lines for a quote orsigned lines and which bound lines are presented to which of the vendors206. For example, FIGS. 12A-12B provide an illustrative example ofboundary layer template customization for vendors. FIG. 12A represents aportion of a dashboard interface screen 1200 that allows brokers 202 toprovide customized final lines notifications within a final linestemplate to vendors 206 based on the layer settings and preferences. Insome implementations, for a given transaction negotiation for a contract1202, the brokers 202 may transmit final lines notifications to multiplevendors 206 having different layer settings and preferences 1204 foreach section of the contract 1202. In one example, the layer settingsand preferences 1204 presented on the dashboard interface screen 1200may include a deductible range and/or classification code 1206 a, 1206b, 1206 c associated with each section of the contract that correspondsto stored preferences for a particular vendor, such as the informationincluded in the vendor data 116 (FIG. 1). In some aspects, thedeductible range and/or classification code 1206 may includecorresponding verbiage associated with a specific region of the vendor206 receiving the notification, such as Sarbanes-Oxley (SOX) compliancenotifications that are used in the United States, or verbiage that isspecific to a product or vendor. In some implementations, the platform204 may automatically make one or more of the deductible rangeselections 1208 based on the stored preferences for a vendor 206. Inaddition, a broker 202 may be able to manually select or deselect theselections 1208 instead of or in addition to the automatic selectionsmade by the platform 204.

FIG. 12B represents another portion of a dashboard interface screen 1210that allows brokers 202 to provide customized transaction notificationsto vendors 206, such as final lines notifications, based on the layersettings and preferences. In some implementations, a privacy layerselection 1212 may allow brokers 202 to select, on a layer-by-layerbasis, which message recipients can view a particular layer or sectionof the final lines notification. For example, each contact associatedwith a vendor 1214 may have an assigned privacy or security level thatcorresponds to a highest level of privacy of a final lines notificationor other type of message or document that the contact may be permittedto view. In the example of FIG. 12B, each section of a quote may have acorresponding privacy level of external, internal, or privileged inwhich “external” may indicate a lowest level of privacy and “privileged”may indicate a highest level of security. In some examples, for each ofthe vendors 1214, the dashboard interface screen 1210 may also includean icon 1216 indicating whether or not privacy levels have been assignedto one or more of the contacts associated with a vendor 1214. Forexample, icon 1216 a may indicate that contact privacy levels have beenassigned, while icon 1216 b may indicate that contact privacy levelshave not been assigned.

FIGS. 13A-13B illustrate an example of user interface screens utilizedby a broker 202 when preparing a message associated with a transactionnegotiation to be sent to vendors 206 in various markets. For example,FIG. 13A illustrates a review and edit template UI screen 1300 a thatallows a broker to modify a final lines notification message templateprepared by the negotiation automation engine 142, and FIG. 13Brepresents a runtime final lines notification message 1300 b that ispopulated with customized template details associated with one or moremessage recipients shown in the review and edit template UI screen 1300a.

Referring to FIG. 13A, the review and edit template UI screen 1300 a maybe similar to the UI screen 916 a (FIG. 9B) that is used by the brokers202 to prepare a quote request message. In some implementations, eachquote template 120 (FIG. 1) stored in the transaction repository 110 mayhave an associated notification template 121 that may be used by anegotiation automation engine of the platform 204 in preparing finallines notifications to be sent do the vendors 206. In one example, theUI screen 1300 a may present a final lines notification message to thebroker 202 in an email message format that may include a combination ofeditable and/or non-editable fields. For example, the final linesnotification message may include a non-editable subject line 1302,non-editable placeholder fields 1304, and editable fields thatcorrespond to any fields within the template that are not non-editableplaceholder fields 1304. In the example illustrated in FIG. 13A, thefinal lines notification message template may include non-editableplaceholder fields for a message date 1304 a, name and addressinformation 1304 b, greeting name 1304 c, vendor and contractinformation 1304 d, contract layer table 1304 e, and vendor name 1304 f.

FIG. 13B represents a runtime final lines notification message 1300 bthat is populated with customized template details associated with oneor more message recipients shown in the review and edit template UIscreen 1300 a. In some implementations, the final lines notificationmessage 1300 b includes data fields that correspond to the placeholderfields presented in the review and edit template UI screen 1300 a. Insome examples, the subject line 1308 corresponds to the non-editablefield 1302, and data fields 1306 correspond to each of the non-editableplaceholder fields 1304. For example, at runtime when the final linesnotification message 1300 b is transmitted to the vendors 206, theplatform 204 may populate each of placeholder fields 1304 withcustomized final lines information that corresponds to a particularvendor and transaction negotiation, such as a message date 1306 a, nameand address information 1306 b, greeting name 1306 c, vendor andcontract information 1306 d, contract layer table 1306 e, and vendorname 1306 f. In addition, the final lines notification message 1300 bmay include message recipients 1310 based on selections made by thebrokers 202 at a recipient selection UI screen, such as the UI screen916 b (FIG. 9C). When a “send” selection 1312 is made, the final linesnotification is sent to the vendors 206, and copies of the final linesnotification and any corresponding documentation may be automaticallycopied, tagged, and stored as audit trail data in one or more datarepositories by the platform 204.

Returning to FIG. 2B, in some implementations, the platform 204 providesa final lines review user interface (252) to the vendor 206 for reviewof the finalized information. For example, the reinsurer may access thecompleted transaction information via a dashboard interface.

In some implementations, the platform 204 prepares and stores the audittrail regarding the finalized transaction (254). Rather than updatingthe audit trail at each stage of the transaction, for example, audittrail information may be collected and stored after the transaction isfinalized (or, alternatively, canceled at a prior step within thetransaction process 200).

In some embodiments, with proper authorization, the auditor system 106,the vendor computing systems 104, or the brokers computing systems 102may access the audit trail information 128 in the audit data repository114 to search for misplaced information relating to current or pastquotes. For example, in the event of a catastrophic system failurerelating to a repository system relating to the vendor computing systems104, the reinsurer may access the audit data repository 114 to retrievedocuments relating to the state of negotiation.

In certain implementations, various departments within the organizationmanaging the system 108 may access the audit data repository 114, thetransaction data repository 110, and/or the document repository 112. Forexample, a legal department within the organization may access the audittrail information 128 for internal auditing in order to satisfy localand federal government compliance. A marketing department may utilizestored information to generate marketing data and develop marketingstrategy.

Continuing the discussion relating to FIG. 1, in some exemplaryembodiments, an information technology department within theorganization may monitor the audit trail information 128 stored in theaudit data repository 114 to assess the performance and functionality ofthe system 108, and the repositories 110, 112, 114. Alternatively, aninformation technology (IT) department may rely on data collected fromthe audit trail information 128 to assess the overall health of theenvironment 100.

In some embodiments, the accounting department within the organizationmay use the audit trail information 128 to generate reports detailingthe financial state of the organization and sanity check transactions.The accounting department may compile statistical data relating to riskappetite, market trend, etc.

If, for example, disputes relating to the quotes arise during or afterthe completion of a transaction, internal and/or external audit teamsmay access the audit trail information 128 in the audit data repository114 for proof of a binding contact including stated terms andconditions. External accounting agencies may similarly access the audittrail information 128 for independent auditing and/or settling possibledispute.

In certain embodiments, the audit trail information 128 may include bothcontent data and metadata. The metadata may indicate a useridentification number of a broker, a user identification number of areinsurer and timestamp for a transaction. The metadata may be availableto the internal/external auditors.

Although illustrated as a single entity “platform 204”, the platform 204may include a number of interoperating systems, such as areinsurer-interfacing system, a broker-interfacing system, and an audittrail management system. Similarly, the broker 202 and/or vendor 206 mayrepresent a number of computing devices and/or system. For example, afirst broker user or computing device may supply the quote requesttemplate parameter settings (210), while a different broker user orcomputing device applies the contract layer settings (218).

Although illustrated in a particular series of events, in otherimplementations, the steps of the transaction process 200 may beperformed in a different order. For example, the broker may iteratebetween setting template parameter settings (210), deadline(s) (216)and/or contract layer settings (218) while setting up a quote requestfor a reinsurer. Additionally, in other embodiments, the transactionprocess may include more or fewer steps while remaining within the scopeand spirit of the transaction process 200.

FIG. 7 illustrates an example response received by a broker for apreviously submitted quote. An authorization confirmation table 700includes, for example, four contract layers 710 from up to fourdifferent reinsurers. Each layer may include an authorize response 720,an authorization expiration 730, a subjectivity 740, and comments 750.In some implementations, the broker may receive the authorizationconfirmation from four reinsurers, with each reinsurer responding to adifferent layer. Reinsurer 1 may respond to layer 1 710 a with anauthorize response 720 a of 15.000000%, an authorization expiration date730 a of Mar. 10, 2016, and a subjectivity 1 740 a. The authorizeresponse 720 a includes an authorized percentage difference from thepresent proposed values included in the quote. The authorizationexpiration 730 a indicates the date of expiration for the authorizationconfirmation for layer 1 710 a provided by Reinsurer 1. The subjectivityfield 740 a may include additional terms and conditions for thecontract.

In certain embodiments, Reinsurer 2 may enter a comment 750 a for layer2 710 b with response for adding any quote-specific information notcaptured by the remaining data entry fields. Reinsurer 4 for layer 4 710d may choose to decline the submitted quote in the authorize response720 b, and provide a reason for declination in a comment field 750 b.

In some implementations, the authorization confirmation table 700 shownin FIG. 7 may be presented in a dashboard interface similar to thoseshown in FIGS. 3A-3E. The dashboard interface may be provided to thebroker computing system 102 by the dashboard GUI engine 134. Thedashboard GUI engine 134 may routinely update dashboard interface on thebroker computing system 102 as reinsurers for different layers submittheir responses separately. Alternatively, the dashboard GUI engine 134may wait for responses from all reinsurers before sending theauthorization confirmation table 700 to the broker computing system 102.

FIG. 5C is a flow diagram illustrating communication flows between afirst, second, and third brokers 202, vendor 206, negotiation automationengine 142, transaction data repository 110, and quote template engine140 during example transaction processes 580. The transaction processes580, for example, may be supported by the environment 100 of FIG. 1,where the brokers 202 represent the broker computing systems 102 and thevendor 206 represents the vendor computing systems 104.

In some implementations, a first broker 202 a customizes (582) a quotetemplate “Quote Template A” using fields X, Y, Z, and Q via the quotetemplate engine 140. The quote template, for example, may be built usingthe user interface 580 described in relation to FIG. 5B. The firstbroker 202 a may reside or do business in a first geographic region(e.g., country, province, continent, etc.). The first broker 202 a mayor may not have a preexisting business relationship with vendor 206.

In some implementations, the first broker 202 a issues (584) a requestfor a quote via the negotiation automation engine 142. The request, forexample, may be submitted by the first broker 202 a via the quoterequest interface itself or via an additional user interface includingselection of the preexisting quote template. The request, for example,may identify vendor 206 as a particular (targeted) reinsurer or as oneof a list of reinsurers identified by the user. The reinsurer, in aparticular example, may be selected by the first broker 202 a via areinsurer selection interface. The quote request, in another example,may be entered via a quote request interface such as the quote request600 illustrated in FIG. 6A.

In some implementations, the negotiation automation engine 142 issues(586) the quote request to vendor 206. Issuance may be based uponselection of vendor 206 by the first broker 202 a. Alternatively, thenegotiation automation engine 142 may identify vendor 206 as anappropriate candidate for the quote request based upon the informationprovided by the first broker 202 a. In transmitting the quote request,in some examples, the negotiation automation engine 142 may provide thevendor 206 with access to review quote information via a dashboardinterface, or the negotiation automation engine 142 may issue areal-time notification regarding submission of the quote request by thefirst broker 202 a.

In some implementations, the negotiation automation engine 142associates (588) the fields selected in Quote Template A (X, Y, Z, Q)with the vendor 206 in the repository 110. The repository 110, forexample, may include a collection of quote templates prepared via thequote template engine arranged in a database associating each quotetemplate with contextual parameters such as, in some examples, creatorof the quote request (e.g., broker), receiver(s) of the quote request(e.g., reinsurers), business segment, geography, deal size, date,product, client, etc.

Although illustrated as occurring after step 586 of issuing the quoterequest, in other embodiments, step 688 of associating the fields ofQuote Template A may occur prior to or simultaneous with step 586.Additionally, although customizing the quote template is illustrated asbeing handled by the quote template engine 140, while issuance of thequote request is illustrated as being handled by the negotiationautomation engine 142, each of these steps may be part of what the firstbroker 202 a perceives as a single graphical user interface-guidedprocess, for example managed by the dashboard GUI engine 134 of FIG. 1.Other modifications are possible while remaining within the scope andintent of the example transaction processes 580.

At a later time, a second broker 202 b initiates a similar transactionprocess. In some implementations, the second broker 202 b customizes(590) a quote template using fields X, Y, Z, and D via the quotetemplate engine 140. The quote template, for example, may be built in asimilar manner as described above in relation to step 582. The secondbroker 202 b may reside or do business in a second geographic regiondifferent than the first geographic region. The second broker 202 b,similar to the first broker 202 a, may or may not have a preexistingbusiness relationship with vendor 206.

In some implementations, the second broker 202 b issues (591) a requestfor a quote via the negotiation automation engine 142. The request, forexample, may be submitted by the second broker 202 b in a similar manneras described above in relation to step 584.

In some implementations, the negotiation automation engine 142associates (592) the fields selected in Quote Template B (X, Y, Z, D)with the vendor 206 in the repository 110. Association may be conductedin a manner similar as described above in relation to step 588.

In some implementations, the negotiation automation engine 142 issues(593) the quote request to vendor 206. Issuance may be implemented in amanner similar as described above in relation to step 586.

At a later time, a third broker 202 c accesses (594) the quote requestuser interface via the quote template engine 140 to request a quote fromat least vendor 206 (and, optionally, one or more additionalreinsurers). The third broker 202 c may reside or do business in a thirdgeographic region (e.g., country, province, continent, etc.). The thirdbroker 202 c may or may not have a preexisting business relationshipwith vendor 206.

To aid in template development, in some implementations, the quotetemplate engine 140 accesses (595) previously stored templatesassociated with vendor 206 from the repository 110 and analyzes (596)the previously stored templates to determine a recommended template. Thepreviously stored templates, in some embodiments, may all be associatedwith vendor 206. The quote template engine 140, in some examples, mayidentify Template A and Template B as sharing certain contextualparameters with the quote request being developed by the third broker202 c such as, in some examples, creator of the quote request (e.g.,broker), receiver(s) of the quote request (e.g., reinsurers), businesssegment, geography, deal size, date, etc. Further, the quote templateengine 140 may consider the recency and frequency of use of each of thepreviously stored templates.

In some implementations, the quote template engine 140 presents (598)the recommended template fields X, Y, Z, Q, and D to the third broker202 c via the quote request user interface. For example, the recommendedtemplate fields X, Y, Z, Q, and D may be automatically populated in themenu 564 of the quote customization user interface 560 of FIG. 5B. Inanother example, the available fields in the menu 562 of the quotecustomization user interface 560 may be rearranged such that therecommended template fields X, Y, Z, Q, and D are presented at the topof the list.

These types of processes may continue, with the repository 110 buildinginformation regarding templates frequently used and fields mostfrequently desired by a number of brokers, and the quote template engine140 may continue, based upon the increasing information, to refinerecommendations based upon quote templates used in similar circumstancesto those presented by a current requestor. In some implementations, thequote template engine 140 may track a usage history of each template fora requestor. The quote template engine 140 may also record a number oftimes a requestor uses a suggested template.

Turning to FIG. 10A-10B, a flow diagram illustrates communication flowsbetween a broker 1002, a platform 1004, and a vendor 1006 during anexample transaction process 1000 that illustrates an example of howaudit trail data 128 is captured by the platform 1004 during thetransaction negotiation. The transaction process 1000, for example, maybe supported by the environment 100 of FIG. 1, where the platform 1004represents the system 108, the broker 1002 represents the brokercomputing systems 102, and the vendor 1006 represents the vendorcomputing systems 104. The transaction process 1000 shown in FIGS.10A-10B represents a condensed version of the transaction of the flowdiagram of FIGS. 2A-2B and may not illustrate the multiple interactionsshown in FIGS. 2A-2B that may occur between the user 1002 or vendor 1006and the platform 1004 related to preparation and presentation of userinterface screens and templates during the course of the transaction.For example, quote request preparation (1008) may include steps 208-226of the flow diagram shown in FIG. 2A.

As shown in FIG. 10A, in some implementations, the transaction process1000 begins with the broker 1002 using the platform 1004 to prepare aquote request to provide to one or more vendors 1006 (1008). Forexample, as discussed above, the broker 1002 may interact with theplatform 1004 through various user interface screens to provide quotetemplate parameter settings, select vendors, deadlines, and contractsettings, and upload documentation associated with a quote request. Insome examples, a prepared quote and any associated documentation may betransmitted by the platform 1004 to contacts associated with anyselected vendors 1006 with a security access level that allows therecipient to at least view the quote request (1010). In some examples,the quote request may be transmitted to the vendors 1006 via an emailmessage.

In some implementations, transmission of the quote request message tothe vendors 1006 may trigger the platform 1004 to automatically copy,tag, and store the quote request and associated documents as audit traildata in storage locations based on security/access controls for thequote request (1012). For example, the quote request tags may includetags such as vendor names, contact names and email addresses for each ofthe vendors, document types, privacy/access settings for the message andeach associated document, and date and time stamp indicating when themessage was sent. In some examples, the storage locations for the quoterequest message and associated documents may be determined by theplatform 1004 based on the assigned tags. In some aspects, the copying,tagging, and storing of the audit trail data may be performed in realtime in response to transmitting the quote request message.

FIG. 11 provides an illustrative example of how a document repository1100 for the platform 1004 may be organized for the filing of audittrail data associated with a transaction, and the folders illustratedand described in FIG. 11 represent an organizational structure for thedata repository 1100 that can be used to efficiently compile compliancedata and audit trail reports and manage privacy/security controls forthe documents stored in the data repository 1100. For example, eachfolder at each level of the organizational structure of the datarepository 1100 may have individualized access control settings based onvendor, department, employee position, etc. to ensure that properdocument security is maintained.

In some implementations, the audit trail data may be organized intovendor folders 1102 representing each of the vendors 1006 that haveentered into transaction negotiations with the brokers 1002 and/or haveregistered accounts with the platform 1004. In some implementations,each vendor folder 1102 may include employee division/department folders1104 representing each division/department within a vendor company towhich a vendor contact may be assigned (e.g., client services, contractsteam, sales). Each of the folders 1104 may drill further down into jobtitle and even individual employee folders so that document access canbe controlled down to an individual person accessing the platform 1004.In some examples, the platform may copy/mirror multiple versions of thesame document into multiple folders based on the access controlsassociated with each of the folders.

In some embodiments, each of the employee division/department folders1104 may include a contracts folder 1106 that retains files associatedwith transaction negotiations, such as those described herein. In someexamples, the contracts folder 1106 may be organized chronologically,such as by year. In addition, each contracts folder 1106 may include aseparate transaction folder 1108 for each negotiation that may occurwith a particular vendor 1006. In some examples, a transaction folder1108 may be established by the platform 1004 when a quote requestmessage is transmitted to a vendor 1006. Each transaction folder 1108may be organized into individual tag folders 1110 associated with eachtag assigned to any of the documents for a transaction negotiation.

FIG. 18 illustrates a portion of an entity relationship diagram (ERD)1800 that allows for maintaining document access security within thedata repository 1100 of the platform 1004. In some implementations, whena broker 1002 transmits a message (e.g., quote request, firm order,final lines) to one or more vendors 1006 including one or more documentsassociated with the transaction negotiation, the platform 1004 is ableto ensure that only those vendors 1006 and brokers 1002 associated withthe negotiation are able to access the shared messages and documentationbased on the relationships delineated in the ERD 1800. In addition, therelationships shown in the ERD 1800 allow specific vendors 1006 (e.g.,underwriters) to access, download, and/or edit documents that have beenthe proper access permissions associated with the vendors 1006. Theentity relationships established by the ERD 1800 may also allow thevendors 1006 to access documents that they have uploaded to the platform1004 themselves. In some examples, when a user (e.g., broker 1002,vendor 1006) logs into the platform 1004 to access documents associatedwith a particular transaction negotiation, only those documents uploadedby the user or those documents that the user has been given access toare presented for selection on one or more graphical user interfacescreens of the platform 1004.

For example, a placement validation block 1802 may ensure that aplatform user associated with a broker 1002 or vendor 1006 (alsoreferred to as a reinsurer or market) may be provided access todocuments (images) associated with a transaction negotiation (placement)that the platform user is involved with. In addition, image market block1804 may provide relationship information to the placement validationblock 1802 regarding which vendors 1006 particular documents areassociated with, which may also be provided to image identification 1820and insurance entity contact 1824 blocks. Further, a document storedwithin the data repository 1100 of the platform 1004 may be identifiedat the image identification block 1820 based on referenced entities inthe image market block 1804, image reinsurer (user) block 1814, vendordocument identification block 1816, document placement identificationblock 1818, and document access identification block 1822.

In some examples, a validate folder type block 1806 allows a documentstored within a folder of the data repository 1100 to be categorizedbased on an associated transaction negotiation, and the informationprovided by the validate folder type block 1806 may be referenced at theimage placement block 1818 and the image reinsurer block 1814, which mayinclude reinsurer identification information provided in a reinsureridentification block 1812. In addition, a validate document type block1826 may allow a particular document type to be categorized based on afolder in which the document is stored as indicated by the validatefolder type block 1806 and document identification information providedby the image identification block 1820. Further, the ERD 1800 alsoprovides for identifying a particular transaction negotiation(placement) at a placement identification block 1808, which can be usedto identify associated vendors provided at the market identificationblock 1810 and the documents associated with the transaction negotiationprovided at the document placement identification block 1818.

Returning to FIG. 10A, in some examples, the vendors 1006 may access thequote request and any associated documents at the platform 1004 byselecting a link provided in the quote request message (1014), such asthe link 924 (FIG. 9B). In some implementations, when any of the vendorcontacts who received the quote request message access the quote requestat the platform 1004, the platform 1004 may update interaction tags forthe quote request in real time that indicate date/time stamps associatedwith a particular type of interaction, which may include viewing,downloading, or editing (1016).

In certain embodiments, one or more of the vendors 1006 receiving thequote request may provide a quote request response indicating updatedterms reflective of a current status of a negotiation throughinteractions with one or more UI screens provided by the platform 1004(1018). In response, in some implementations, the platform 1004 mayprovide a quote response notification message to the brokers 1002indicating that a quote response from a vendor 1006 is available forreview (1020).

In some examples, transmission of the quote response notification to thebrokers 1002 may trigger the platform 1004 to automatically copy, tag,and store the quote response notification and associated documents asaudit trail data in storage locations based on security/access controlsfor the quote request (1022). For example, the quote request tags mayinclude tags such as a date/time stamp for the quote responsetransmission, vendor name and contact information for the user providingthe quote response, document types, privacy/access settings for thenotification message and each associated document, and tags thatindicate how any of the quote terms have been modified from the terms ofan original quote request. In some examples, the storage locations forthe quote request message and associated documents may be determined bythe platform 1004 based on the assigned tags. In some aspects, thecopying, tagging, and storing of the audit trail data may be performedin real time in response to transmitting the quote responsenotification.

If the client agrees to the quote response supplied by the vendor 1006,in some implementations, the broker 1002 may issue a client firm orderto the platform 1004 (1024). The firm order may either validate theterms of the quote as adjusted by the vendor 1006 or reinstate theinitial terms as supplied by the broker 1002 in the quote request. Thefirm order, in some embodiments, may be placed via a firm order userinterface 350 as discussed above (FIG. 3F). In some examples, a firmorder notification and any associated documentation may be transmittedby the platform 1004 to contacts associated with the vendor 1006 with asecurity access level that allows the recipient to at least view thefirm order (1026). In some examples, the firm order notification may betransmitted to the vendors 1006 via an email message.

In some implementations, transmission of the firm order notificationmessage to the vendor 1006 may trigger the platform 1004 toautomatically copy, tag, and store the firm order and associateddocuments as audit trail data in storage locations based onsecurity/access controls for the firm order (1028). For example, thefirm order tags may include tags such as vendor name associated with thefirm order, contact names and email addresses for the vendor, documenttypes, privacy/access settings for the message and each associateddocument, and date and time stamp indicating when the notificationmessage was transmitted to the vendor 1006. In some examples, thestorage locations for the firm order notification message and associateddocuments may be determined by the platform 1004 based on the assignedtags. In some aspects, the copying, tagging, and storing of the audittrail data may be performed in real time in response to transmitting thefirm order notification message.

In some examples, the vendors 1006 may access the firm order and anyassociated documents at the platform 1004 by selecting a link providedin the firm order notification message (1030). In some implementations,when any of the vendor contacts who received the firm order notificationmessage access the firm order at the platform 1004, the platform 1004may update interaction tags for the firm order in real time thatindicate date/time stamps associated with a particular type ofinteraction, which may include viewing, downloading, or editing (1032).

Turning to FIG. 10B, in certain embodiments, the vendor 1006 receivingthe firm order notification may transmit authorization and/ordeclination information via UI screens to the platform 1004 along withassociated documents indicating agreement with the terms stated in thefirm order and/or reasons for a declination of any of the terms (1034).In response, in some implementations, the platform 1004 may provide aresults notification message to the brokers 1002 indicating thatauthorization/declination information from a vendor 1006 is availablefor review (1036).

In some examples, transmission of the results notification to thebrokers 1002 may trigger the platform 1004 to automatically copy, tag,and store the results notification and associated documents as audittrail data in storage locations based on security/access controls forthe quote request (1038). For example, the results tags may include tagssuch as a date/time stamp for the results notification transmission,vendor name and contact information for the user providing theauthorization/declination information, document types, privacy/accesssettings for the results notification message and each associateddocument, and tags that indicate whether particular terms of thenegotiation were authorized and/or declined. In some examples, thestorage locations for the results notification message and associateddocuments may be determined by the platform 1004 based on the assignedtags. In some aspects, the copying, tagging, and storing of the audittrail data may be performed in real time in response to transmitting theresults notification.

In some implementations, the broker 1002 may provide client final linesto the platform 1004 indicating finalized transaction terms (1040). Insome embodiments, the final lines may include terms/contracts/detailscontained in one or more documents for sharing with the vendor 1006,which confirms the agreement was reached. In some examples, in responseto receiving the client final lines, the platform 1004 may transmit afinal lines review notification and any associated documentation tocontacts associated with the vendor 1006 with a security access levelthat allows the recipient to at least view the firm order (1042). Insome examples, the final lines review notification may be transmitted tothe vendors 1006 via an email message.

In some implementations, transmission of the final lines reviewnotification message to the vendor 1006 may trigger the platform 1004 toautomatically copy, tag, and store the firm order and associateddocuments as audit trail data in storage locations based onsecurity/access controls for the final lines review notification (1044).For example, the final lines tags may include tags such as vendor nameassociated with the final lines, contact names and email addresses forthe vendor, document types, privacy/access settings for the message andeach associated document, and date and time stamp indicating when thenotification message was transmitted to the vendor 1006. In someexamples, the storage locations for the final lines notification messageand associated documents may be determined by the platform 1004 based onthe assigned tags. In some aspects, the copying, tagging, and storing ofthe audit trail data may be performed in real time in response totransmitting the final lines review notification message.

In some examples, the vendors 1006 may access a final lines review UIscreen and any associated documents at the platform 1004 by selecting alink provided in the final lines review notification message (1046). Insome implementations, when any of the vendor contacts who received thefinal lines review notification message access the final lines review UIscreen at the platform 1004, the platform 1004 may update interactiontags for the final lines in real time that indicate date/time stampsassociated with a particular type of interaction, which may includeviewing, downloading, or editing (1048).

Although illustrated in a particular series of events, in otherimplementations, the steps of the transaction process 1000 may beperformed in a different order. For example, the copying, tagging, andstoring of documents and other audit trail data (1012, 1022, 1028, 1038,1044) may be performed before, after, or simultaneously with thetransmission of a corresponding notification message to the brokers 1002or vendors 1006. Additionally, in other embodiments, the transactionprocess may include more or fewer steps while remaining within the scopeand spirit of the transaction process 1000.

Turning to FIGS. 14A-14I, various dashboard interface screens formanaging vendor security access for the system 108 are illustrated. Insome implementations, each vendor 104 in the environment (FIG. 1) maycontrol system access for individual users from their respectivecompanies to take a processing and management burden off the brokers 102through interaction with the dashboard interface screens that arepresented to the vendors 104 by the security management engine 152. Insome examples, the security management engine 152 may process securitymodification requests from the vendors 104 to automatically determinewhether any requested security updates may result in a documentmanagement gap for any transaction documents, update folder securitysettings for the audit trail data 128, and generate fraud detectionreports based on the requested security updates.

FIG. 14A represents a dashboard interface screen 1400 for managingunderwriters and delegates for a vendor. In some implementations, thedashboard interface screen 1400 includes a list view of underwriters1406 associated with a particular vendor, contact information 1408(e.g., email address) for each of the underwriters 1406, and assignedplacements 1410 (e.g., contracts, transactions) for each of theunderwriters 1406. In some examples, the dashboard interface screen 1400may also include selections to manage 1404 or reassign 1402 one or moreof the placements 1410 assigned to an underwriter 1406. For example, inresponse to receiving a reassign selection 1402, the security managementengine 152 may present a series of user interface screens to the vendor104 that allow the vendor 104 to reassign one or more of the placements1410 to another underwriter. In response to receiving a manage selection1404, the security management engine 152 may cause one or more userinterface screens to be presented to the vendor 104 that allow thevendor 104 to add and/or remove delegates to act on behalf of anunderwriter 1406.

For example, FIGS. 14B-C illustrate dashboard interface screens 1412 forreassigning an underwriter 1406 when the reassign selection 1402 isreceived from the interface screen 1400 at the security managementengine 152. In some implementations, underwriter reassignment may beperformed when an underwriter employee leaves the vendor reinsurancecompany, and the tasks previously assigned to the underwriter areassigned to another underwriter within the company. For example, FIG.14B shows dashboard interface screen 1412 a when a selection 1414 a ismade to reassign all placements 1416 for one underwriter 1421 to anotherunderwriter that is selected from dropdown menu 1420. In some examples,the dropdown menu 1420 may include a list of the underwriters for thevendor. In one example, the list of underwriters in the dropdown list1420 may include only those underwriters that have the same securityaccess and editing permissions as the underwriter 1421. FIG. 14C showsdashboard interface screen 1412 when a selection 1414 b is made toreassign each placement 1416 for the underwriter 1421 to differentunderwriters. In some examples, when the selection 1414 b is made,dropdown menus 1418 may be displayed on the interface screen 1412 b nextto each placement 1416 that allows different underwriters to be selectedfrom each of the placements 1416. Just as with the dropdown menu 1420,the dropdown menus 1418 may include a list of the underwriters for thevendor or only those underwriters that have the same security access andediting permissions as the underwriter 1421.

FIGS. 14D-14I illustrate dashboard interface screens 1412 for managingdelegates for an underwriter 1406 when the manage selection 1404 isreceived from the interface screen 1400 at the security managementengine 152. In some implementations, delegates may be assigned on behalfof one or more underwriters to carry out one or more differentiatedtasks. For example, FIG. 14D represents an overview delegate managementdashboard interface screen, FIGS. 14E-14H show a series of dashboardinterface screens associated with adding a delegate for an underwriter1406, and FIG. 14I shows a dashboard interface screen associated withremoving a delegate or reducing access levels for a delegate associatedwith an underwriter 1406.

FIG. 14D represents an overview dashboard interface screen 1422 formanaging delegates for an underwriter assigned to and/or employed by avendor. In some implementations, the dashboard interface screen 1422includes a list view of delegates 1424 associated with underwriter 1421,contact information 1426 (e.g., email address) for each of the delegates1424, and placement permissions 1434 for each of the delegates 1424. Insome examples, the dashboard interface screen 1422 may also includeselections to add 1428 or remove 1430 one or more of the delegates 1424assigned to the underwriter 1421. The dashboard interface screen 1422may also include a selection 1432 to manage permissions for individualplacements associated with each delegate 1424. In some examples, thedelegate 1424 may have the same permissions for all placements assignedto an underwriter 1421, or the delegate may have permissions that arespecific to each placement. In some implementations, in response toreceiving an add delegate selection 1428, the security management engine152 may present a series of user interface screens (FIGS. 14E-14H) tothe vendor 104 that allow the vendor 104 to link an existing or newdelegate to the underwriter 1421. In response to receiving a removedelegate selection 1430, the security management engine 152 may presenta user interface screen (FIG. 14I) to the vendor 104 that allow thevendor 104 to remove the delegate from a particular placement or fromthe system altogether.

FIG. 14E shows an add delegate dashboard interface screen 1436 that ispresented to a vendor in response to receiving the add delegateselection 1428 from the overview dashboard interface screen 1422. Insome implementations, the dashboard interface screen 1436 allows foraddition of an existing delegate 1438 who has already been registered inthe system 108. To add a delegate who has not yet been registered in thesystem 108, selection 1440 may be made. When selection 1438 is made toadd an existing contact as a delegate for the underwriter, dashboardinterface screen 1442 is displayed, which allows vendors to selectplacement permissions for the newly added delegate.

For example, FIG. 14F shows an example of a dashboard interface screen1442 a where a selection 1444 a is made to assign all placements for theunderwriter to the newly added delegate 1446 along with a correspondingpermission level 1448 for the delegate 1446. In some examples, thepermission level may correspond to allowed tasks the delegate mayperform with respect to one or more documents associated with aplacement, such as read and edit, read only, document only, or noaccess. FIG. 14G shows an example of a dashboard interface screen 1442 bwhere a selection 1444 b is made to individually assign permissionlevels 1448 to each placement for the delegate 1446 at individualdropdown menus 1450.

When selection 1440 is made at the delegate dashboard interface screen1436 to add an unregistered delegate to the system, dashboard interfacescreen 1452 shown in FIG. 14H is displayed, which allows vendors toinput contact information for the unregistered delegate. When thecontact information input fields are filled in and submitted byselecting a “send request” selection 1454, the security managementengine 152 of the system 108 adds the contact information for thedelegate to the vendor data 116 for the vendor. In addition, thedelegate may be linked to one or more folders of the data repository1100 (FIG. 11) to provide access to transaction documents based on theassigned permission levels. Also, a new contact tag may be assigned tothe newly added contact for compliance monitoring. For example, newlyadded contacts may be monitored and cross-referenced to detect fraudsituations based on how many contacts have been added by a user andwhich placements and documents the contacts have access to view and/oredit. In some examples, the security management engine 152 may alsoperform contact duplication checks for the contact name and/or emailaddress to determine whether the delegate has already been registeredwith the vendor in the system 108. If a match is detected, then thesecurity management engine 152 may output a contact suggestionnotification to determine whether the matched contact corresponds to thecontact information input at the dashboard interface screen 1452.

FIG. 14I shows a remove delegate dashboard interface screen 1456 that ispresented to a vendor in response to receiving the remove delegateselection 1430 from the overview dashboard interface screen 1422. Insome implementations, the vendor may select at least one delegateassociated with an underwriter and indicate whether to remove thedelegate from being assigned to the underwriter 1458 or to remove thedelegate from all system associations 1460. If selection 1460 is made toremove the delegate from all system associations, then the delegate maybe unlinked from all assigned placements, tasks, and permissions, whichmay include unlinking the delegate from one or more assigned folders ofthe data repository 1100 (FIG. 11) so that the delegate is unable toaccess any previously-accessible information. In addition, any delegatewho is removed completely may not be viewed or externally selected byany underwriter or other user who is accessing the system.

In some examples, when the selection 1460 is made, the securitymanagement engine 152 may perform a check to determine whether thedelegate is assigned to any contracts, lawsuits, or other work inprogress. If the delegate is assigned to any other work currently inprogress, then the status of the delegate may be modified to “inactive”so that the delegate is still able to perform tasks associated with theother work. In some implementations where a change in a delegate statusmay require manual system intervention, the security management engine152 may flag the delegate with an “other” status. For example, adelegate who has a name and/or address change may be flagged with an“other” status to indicate to a system administrator to verify whetheror not a merge of delegate records occurred properly. In anotherexample, if a first vendor company is purchased by a second vendorcompany, then the security management engine 152 may flag all employeesof the first vendor company with an “other” status to indicate that theemail extensions for the employees of the first vendor company may needto be updated to reflect the purchase by the second vendor company.

FIG. 17 illustrates a portion of an entity relationship diagram (ERD)1700 that allows for maintaining proper security access controls fordelegates assigned to a particular underwriter as described above withrespect to FIGS. 14A-14I. In some implementations, the relationshipswithin the ERD 1700 may be updated and/or modified based on delegatereassignments, additions, or removals that are made to the system 108 bya system administrator for a particular vendor company. For example, auser that has been added to the system 108 as a delegate can beidentified based on a delegate identification block 1702, which mayreference a delegate validation key block 1706, an application roleidentification block 1704, and an insurance entity contactidentification block 1708. In addition, the delegate can be furtheridentified based on an external account identification block 1712 and anexternal account insurance entity contact information block 1710.

FIG. 15 illustrates a flowchart of a method 1500 for managing delegateassignment and access on behalf of underwriters to a transactionnegotiation system. In some implementations, the method begins withreceiving a delegate management request (1502) from a vendor to add orremove delegates from an underwriter or modify placement permissions fora delegate. For example, the delegate management request may besubmitted at the overview dashboard interface screen 1422 for managingdelegates for an underwriter (FIG. 14D), where the vendor can makeselections to add a delegate 1428, remove a delegate 1430, and/or managepermissions for delegates assigned to an underwriter 1432.

In certain embodiments, if the received request is not associated withremoving a delegate (1504) and not associated with adding a delegate(1506), then the request may be associated with modifying accesspermission levels for a delegate. In some examples, the system mayupdate stored delegate permission levels based on the submittedmodification, which may include modifying the delegate permission levelfor one or more insurance placements to one of read and edit, read only,document only, or no access (1508). In some implementations, if thereceived request is associated with adding a delegate to a particularunderwriter (1506), and the contact is an existing contact who isalready registered in the system (1510), then the system may update thedelegate permission levels based on the indicated permission levelsincluded in the delegate management request. For example, the system mayupdate the permission levels based on permission selections 1448 made atthe dashboard interface screen 1442 (FIGS. 14F-14G).

If, however, the added delegate is a new contact who is not yetregistered in the system (1510), then in some implementations, thesubmitted contact information for the delegate, such as at dashboardinterface screen 1452 (FIG. 14H), is compared to stored contactinformation to determine whether the new contact may already beregistered in the system (1512). If the comparison indicates thatduplicate contact information may have been submitted, then in someembodiments, a duplicate suggestion notification may be output to thevendor (1514) to confirm whether the detected duplicate contact is thesame contact or not. Based on the received response to the duplicatesuggestion notification, in some examples, the system may update thecontact information for the newly added delegate (1516).

In some examples, a new contact tag may be assigned to the newly addedcontact for compliance monitoring (1518). For example, newly addedcontacts may be monitored and cross-referenced to detect fraudsituations based on how many contacts have been added by a user andwhich placements and documents the contacts have access to view and/oredit. In addition, in some implementations, the delegate may be linkedto one or more folders of a data repository, such as data repository1100 (FIG. 11), to provide access to transaction documents based on theassigned permission levels (1520).

If the received delegate management request is a delegate removalrequest (1504), then in some implementations, if the removal request isto remove the delegate from being assigned to one or more underwritersand not to completely remove from the system (1508), then the delegatemay be unlinked from the underwriter (1522). If the removal requestincludes completely removing the delegate from the system (1508), and acheck to determine whether the delegate has any other assigned work inthe system (1524) indicates that the delegate has no other assigned workin progress (e.g., contracts, law suits), then in some examples, astatus of the delegate in the system may be updated to be inactive(1528). If, however, the delegate is assigned to any other workcurrently that is currently in progress 1524, then, in some examples,the status of the delegate may be modified so that the delegate is stillable to perform tasks associated with the other work (1526). In someimplementations, access permissions to corresponding folders in the datarepository may be removed for the delegate (1530) to reflect the updateddelegate status.

Although illustrated in a particular series of events, in otherimplementations, the steps of the delegate management process 1500 maybe performed in a different order. For example, the tagging of the newcontact data for the newly added delegate (1518) may be performedbefore, after, or simultaneously with the updating of the accesspermissions at the data repository (1520). Additionally, in otherembodiments, the transaction process may include more or fewer stepswhile remaining within the scope and spirit of the delegate managementprocess 1500.

FIGS. 8A and 8B illustrate various aspects of an exemplary architectureimplementing a platform 800 for automated transaction negotiation,benchmarking, compliance, and auditing. The high-level architectureincludes both hardware and software applications, as well as variousdata communications channels for communicating data between the varioushardware and software components. The platform 800 may be roughlydivided into front-end components 802 and back-end components 804. Thefront-end components 802 are primarily disposed within a client network810 including one or more clients 812. The clients 812 may be located,by way of example rather than limitation, in separate geographiclocations from each other, including different areas of the same city,different cities, different states, or even different countries. Thefront-end components 802 may include a number of workstations 828. Theworkstations 828, for example, can be local computers located in thevarious locations 812 throughout the network 810 and executing variousapplications for automated transaction negotiation, benchmarking,compliance, and auditing.

Web-enabled devices 814 (e.g., personal computers, tablets, cellularphones, smart phones, web-enabled televisions, etc.) may becommunicatively connected to locations 812 and the system 840 through adigital network 830 or a wireless router 2831, as described below.

Referring now to FIG. 8A, the front-end components 802, in someembodiments, include a number of facility servers 826 disposed at thenumber of locations 812 instead of, or in addition to, a number ofworkstations 828. Each of the locations 812 may include one or morefacility servers 826 that may facilitate communications between theweb-enabled devices 814 and the back-end components 804 via a digitalnetwork 830, described below, and between the terminals 828, 828A of thelocations 812 via the digital network 830, and may store information fora number of customers/employees/accounts/etc. associated with eachfacility. Of course, a local digital network 884 may also operativelyconnect each of the workstations 828 to the facility server 826. Unlessotherwise indicated, any discussion of the workstations 828 also refersto the facility servers 826, and vice versa. Moreover, environmentsother than the locations 812, such as the kiosks, call centers, andInternet interface terminals may employ the workstations 828, theweb-enabled devices 814, and the servers 826. As used herein, the term“location” refers to any of these points of contact (e.g., call centers,kiosks, Internet interface terminals, etc.) in addition to the locations812, etc. described above.

The front-end components 802 communicate with the back-end components804 via the digital network 830. One or more of the front-end components802 may be excluded from communication with the back-end components 804by configuration or by limiting access due to security concerns. Forexample, the web enabled devices 814 may be excluded from direct accessto the back-end components 804. In some embodiments, the locations 812may communicate with the back-end components via the digital network830. In other embodiments, the locations 812 and web-enabled devices 814may communicate with the back-end components 804 via the same digitalnetwork 830, but digital access rights, IP masking, and other networkconfigurations may deny access of the web-enabled devices 814. Theweb-enabled devices may also connect to the network 830 via theencrypted, wireless router 831.

The digital network 830 may be a proprietary network, a secure publicInternet, a virtual private network or some other type of network, suchas dedicated access lines, plain ordinary telephone lines, satellitelinks, combinations of these, etc. Where the digital network 830includes the Internet, data communication may take place over thedigital network 830 via an Internet communication protocol. In additionto one or more web servers 890 (described below), the back-endcomponents 804 may include a central processing system 840 within acentral processing facility. Of course, the locations 812 may becommunicatively connected to different back-end components 804 havingone or more functions or capabilities that are similar to the centralprocessing system 840. The central processing system 840 may includeprocessing circuitry (e.g., one or more computer processors) 862 adaptedand configured to execute various software applications and componentsof the platform 800, in addition to other software applications, such asa medication management system.

The central processing system 840, in some embodiments, further includesa database 846 (which may include one or more databases). The database846 can be adapted to store data related to the operation of theplatform 800. The central processing system 840 may access data storedin the database 846 when executing various functions and tasksassociated with the operation of the platform 800.

Although the platform 800 is shown to include a central processingsystem 840 in communication with three locations 812, and variousweb-enabled devices 814 it should be understood that different numbersof processing systems, locations, and devices may be utilized. Forexample, the digital network 830 (or other digital networks, not shown)may interconnect the platform 800 to a number of included centralprocessing systems 840, hundreds of locations 812, and thousands ofweb-enabled devices 814. According to the disclosed example, thisconfiguration may provide several advantages, such as, for example,enabling near real-time uploads and downloads of information as well asperiodic uploads and downloads of information. This provides for aprimary backup of all the information generated in the wireless datatransfer process. Alternatively, some of the locations 812 may storedata locally on the facility server 826 and/or the workstations 828.

FIG. 8A also depicts one possible embodiment of the central processingsystem 840. The central processing system 840 may have a controller 855operatively connected to the database 846 via a link 856 connected to aninput/output (I/O) circuit 866. It should be noted that, while notshown, additional databases may be linked to the controller 855 in aknown manner.

The controller 855 includes a program memory 860, the processingcircuitry 862 (may be called a microcontroller or a microprocessor), arandom-access memory (RAM) 864, and the input/output (I/O) circuit 866,all of which are interconnected via an address/data bus 865. It shouldbe appreciated that although only one microprocessor 862 is shown, thecontroller 855 may include multiple microprocessors 862. Similarly, thememory of the controller 855 may include multiple RAMs 864 and multipleprogram memories 860. Although the I/O circuit 866 is shown as a singleblock, it should be appreciated that the I/O circuit 866 may include anumber of different types of I/O circuits. The RAM(s) 864 and theprogram memories 860 may be implemented as semiconductor memories,magnetically readable memories, and/or optically readable memories, forexample. A link 835 may operatively connect the controller 855 to thedigital network 830 through the I/O circuit 866.

FIG. 8B depicts one possible embodiment of the front-end components 102[check number] located in one or more of the locations 812 from FIG. 8A.Although the following description addresses the design of the locations812, it should be understood that the design of one or more of thelocations 812 may be different from the design of others of thelocations 812. Also, each of the locations 812 may have variousdifferent structures and methods of operation. It should also beunderstood that while the embodiment shown in FIG. 8B illustrates someof the components and data connections that may be present in a location812, it does not illustrate all of the data connections that may bepresent in a location 812. For exemplary purposes, one design of alocation is described below, but it should be understood that numerousother designs may be utilized.

Each of the locations 812, as illustrated, has one or more portablecomputing devices 833 (e.g., notebook computers, tablet computers, smartphones, personal data assistants, etc.) and/or a facility server 826.The digital network 884 and wireless router 831 operatively connect thefacility server 826 to the number of portable computing devices 833and/or to other web-enabled devices 814 and workstations 828. Thedigital network 830 may be a wide area network (WAN), a local areanetwork (LAN), or any other type of digital network readily known tothose persons skilled in the art. The digital network 830 mayoperatively connect the facility server 826, the portable computingdevices 833, the workstations 828, and/or the other web-enabled devices814 to the central processing system 840.

Each portable computing device 833, workstation 828, client deviceterminal 2828 a, or facility server 826 includes a controller 870, asdepicted in FIG. 8B in relation to the server 826. Similar to thecontroller 855 from FIG. 8A, the controller 870 includes a programmemory 872, processing circuitry (e.g., one or more microcontrollers ormicroprocessors) 874, a random-access memory (RAM) 876, and aninput/output (I/O) circuit 880, all of which are interconnected via anaddress/data bus 878. In some embodiments, the controller 870 may alsoinclude, or otherwise be communicatively connected to, a database 882.The database 882 (and/or the database 846 of FIG. 8A) includes data suchas client records, broker, records, reinsurer information records, quotetemplate data, and other rules and miscellaneous information. Asdiscussed with reference to the controller 855, it should be appreciatedthat although FIG. 8B depicts only one microprocessor 874, thecontroller 870 may include multiple microprocessors 874. Similarly, thememory of the controller 870 may include multiple RAMs 876 and multipleprogram memories 872. Although the FIG. 8B depicts the I/O circuit 880as a single block, the I/O circuit 880 may include a number of differenttypes of I/O circuits. The controller 870 may implement the RAM(s) 876and the program memories 872 as semiconductor memories, magneticallyreadable memories, and/or optically readable memories, for example.

Either or both of the program memories 860 (FIG. 8A) and 872 may alsocontain machine-readable instructions (i.e., software) 871, forexecution within the processing circuitry 862 (FIG. 8A) and 874,respectively. The software 871 may perform the various tasks associatedwith operation of the location or locations, and may be a single module871 or a number of modules 871 a, 871 b. While the software 871 isdepicted in FIGS. 8A and 8B as including two modules, 871 a and 871 b,the software 871 may include any number of modules accomplishing tasksrelated to location operation.

In addition to the controller 870, the portable computing devices 833,the workstations 828 and the other web-enabled devices 814 may furtherinclude a display and a keyboard as well as a variety of otherinput/output devices (not shown) such as a scanner, printer, mouse,touch screen, track pad, track ball, isopoint, voice recognition system,digital camera, bar code scanner, RFID reader, etc. A location employeemay sign on and occupy each portable computing device 833, workstation828 or client device terminal 828 a to assist the employee in performinghis or her duties. Employees may sign onto the portable computing device833, workstation 828 or the client device terminal 828 a using anyavailable technique, such as entering a user name and password. If anemployee signs on to the system using a portable computing device 833,the network 884 communicates this information to the facility server826, so that the controller 870 may identify which employees are signedonto the platform 800 and which portable computing device 833,workstation 828 or client device terminal 828 a the employee is signedonto.

Various software applications resident in the front-end components 802and the back-end components 804 implement functions related to locationoperation, and provide various user interface means to allow users(e.g., brokers) to access the platform 800. One or more of the front-endcomponents 802 and/or the back-end components 804 may include auser-interface application 811 for allowing a user to input and viewdata associated with the platform 800, and to interact with the platformdescribed herein. In one embodiment, the user interface application 811is a web browser client, and the facility server 826 or the centralprocessing system 840 implements a server application 813 for providingdata to the user interface application 811. However, the user interfaceapplication 811 may be any type of interface, including a proprietaryinterface, and may communicate with the facility server 826 or thecentral processing system 840 using any type of protocol including, butnot limited to, file transfer protocol (FTP), telnet, hypertext-transferprotocol (HTTP), etc. Moreover, some embodiments may include the userinterface application 811 running on one of the web-enabled devices 814,while other embodiments may include the application 811 running on theportable computing device 833 in a location 812. The central processingsystem 840 and/or the facility server 826 may implement any knownprotocol compatible with the user-interface application 811 running onthe portable computing devices 833, the workstations 828 and theweb-enabled devices 814 and adapted to the purpose of receiving andproviding the necessary information during the data transfer process.

For purposes of implementing the platform 800, the user interacts withlocation systems (e.g., the central processing system 840) via a numberof web pages. FIG. 8C depicts a web server 890 connected via the network830 to a number of portable computing devices 833 and other web-enableddevices through which a user 892 may initiate and interact with theplatform 800. The web enabled devices may include, by way of example, asmart-phone 894 a, a web-enabled cell phone 894 b, a tablet computer833, a personal digital assistant (PDA) 894 c, a laptop computer 894 d,a desktop computer 894 e, a portable media player (not shown), etc. Ofcourse, any web-enabled device appropriately configured may interactwith the platform 800. The web-enabled devices 833 and 894 need notnecessarily communicate with the network 830 via a wired connection. Insome instances, the web enabled devices 833 and 894 may communicate withthe network 830 via wireless signals 896 and, in some instances, maycommunicate with the network 830 via an intervening wireless or wireddevice 831, which may be a wireless router, a wireless repeater, a basetransceiver station of a mobile telephony provider, etc. Each of theweb-enabled devices 833 and 894 may interact with the web server 890 toreceive web pages, such as the web page 898 depicted in FIG. 8C, fordisplay on a display associated with the web-enabled device 833 and 894.It will be appreciated that although only one web server 890 is depictedin FIG. 8C, multiple web servers 890 may be provided for the purpose ofdistributing server load, serving different web pages, implementingdifferent portions of the location web interface, etc.

Turning now to FIG. 8D, the web server 890, like the facility server826, includes a controller 806. Similar to the controllers 855 and 870,the controller 806 includes a program memory 808, processing circuitry(e.g., one or more microcontrollers or microprocessors) 816, arandom-access memory (RAM) 818, and an input/output (I/O) circuit 820,all of which are interconnected via an address/data bus 822. In someembodiments, the controller 806 may also include, or otherwise becommunicatively connected to, a database 824 or other data storagemechanism (e.g., one or more hard disk drives, optical storage drives,solid state storage devices, etc.). The database 824 may include datasuch as customer web profiles, product data, web page templates and/orweb pages, and other data necessary to interact with the user 892through the network 830. As discussed with reference to the controllers855 and 870, it should be appreciated that although FIG. 8D depicts onlyone microprocessor 816, the controller may include multiplemicroprocessors 816. Similarly, the memory of the controller 806 mayinclude multiple RAMs 818 and multiple program memories 808. Althoughthe FIG. 8D depicts the I/O circuit 820 as a single block, the I/Ocircuit 820 may include a number of different types of I/O circuits. Thecontroller 806 may implement the RAM(s) 818 and the program memories 808as semiconductor memories, magnetically readable memories, and/oroptically readable memories, for example.

In addition to being connected through the network 830 to the userdevices 833 and 1694, as depicted in FIG. 8C, FIG. 8D illustrates thatthe web server 890 may also be connected through the network 830 to thecentral processing system 840 and/or one or more facility servers 826.As described below, connection to the central processing system 840and/or to the one or more facility servers 826 facilitates the platform800.

The program memory 808 and/or the RAM 818 may store various applicationsfor execution by the processing circuitry 816. For example, anapplication 832 may provide a user interface to the server, which userinterface may, for example, allow a network administrator to configure,troubleshoot, or test various aspects of the server's operation, orotherwise to access information thereon. A server application 834operates to populate and transmit web pages to the web-enabled devices894, receive information from the user 892 transmitted back to theserver 890, and forward appropriate data to the central processingsystem 840 and the facility servers 826, as described below. Like thesoftware 871, the server application 834 may be a single module 834 or anumber of modules 834 a, 834 b. While the server application 834 isdepicted in FIG. 8D as including two modules, 834 a and 834 b, theserver application 834 may include any number of modules accomplishingtasks related to implantation of the web server 890. By way of example,the module 834 a may populate and transmit the web pages and/or mayreceive and evaluate inputs from the user 892 to facilitate in thewireless transfer of data from a first tablet to a second tablet, whilethe module 834 b may communicate with one or more of the back endcomponents to provide the requested data.

Typically, a user may launch or instantiate a user interface application(e.g., a web browser or other client application) from a web-enableddevice, such as the web-enabled devices 833 and 894, to access the webserver 890 cooperating with the system 840 to implement the platform800.

One or more processors can be utilized to implement any functions and/oralgorithms described herein, unless explicitly stated otherwise.Additionally, any functions and/or algorithms described herein, unlessexplicitly stated otherwise, can be performed upon virtual processingcircuitry (e.g., one or more virtual processors, for example on one ormore physical computing systems such as a computer farm or a clouddrive).

Reference has been made to flowchart illustrations and block diagrams ofmethods, systems and computer program products according toimplementations of this disclosure. Aspects thereof are implemented bycomputer program instructions. These computer program instructions maybe provided to processing circuitry of a general purpose computer,special purpose computer, or other programmable data processingapparatus to produce a machine, such that the instructions, whichexecute via the processing circuitry of the computer or otherprogrammable data processing apparatus, create means for implementingthe functions/acts specified in the flowchart and/or block diagram blockor blocks.

These computer program instructions may also be stored in acomputer-readable medium that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablemedium produce an article of manufacture including instruction meanswhich implement the function/act specified in the flowchart and/or blockdiagram block or blocks.

While certain embodiments have been described, these embodiments havebeen presented by way of example only, and are not intended to limit thescope of the present disclosures. Indeed, the novel methods, apparatusesand systems described herein can be embodied in a variety of otherforms; furthermore, various omissions, substitutions and changes in theform of the methods, apparatuses and systems described herein can bemade without departing from the spirit of the present disclosures. Theaccompanying claims and their equivalents are intended to cover suchforms or modifications as would fall within the scope and spirit of thepresent disclosures.

What is claimed is:
 1. A system comprising: processing circuitry; a non-transitory database storage region; and a non-transitory computer readable memory coupled to the processing circuitry, the memory storing machine-executable instructions, wherein the machine-executable instructions, when executed on the processing circuitry, cause the processing circuitry to receive, from a remote computing device of a first party via a network, a message request for preparing a message to be transmitted to at least one other party, provide, in a user interface configured for display on the remote computing device, a message customization user interface including a message template having at least one non-editable input field and at least one editable input field for allowing customization of the message by a user of the remote computing device, wherein the customization user interface includes a document selection portion for presenting one or more documents linked to the message, identify, based on the one or more documents linked to the message, one or more message recipients of each party of the at least one other party, wherein the one or more message recipients are identified as having security access permissions corresponding to security access parameters for the one or more documents, receive, from the remote computing device responsive to providing the message customization user interface, inputs for the at least one editable input field of the message template, convert, responsive to receiving the inputs for the at least one editable input field, the message template into a message transmission format for transmitting the message with the one or more linked documents to at least one remote computing device associated with each party of the at least one other party, transmit, to the at least one remote computing device associated with each party of the at least one other party, the message in the message format including the one or more documents, automatically generate, in real time responsive to detecting interactions with at least one of the message or a first portion of the one or more linked documents, audit trail data for each of the detected interactions, wherein the audit trail data includes one or more data tags associated with legal audit compliance information, and wherein generating the audit trail data includes generating copies of a second portion of the one or more linked documents, store the audit trail data and the copies of the second portion of the one or more documents in one or more locations of the non-transitory database storage region based on the one or more data tags, and output, in real time responsive to receiving a request from a remote computing device of the first party, a summarization of the interactions with the at least one of the message or the first portion of the one or more documents based on respective portions of the generated audit trail data.
 2. The system of claim 1, wherein the machine-executable instructions, when executed on the processing circuitry, further cause the processing circuitry to assign a portion of the one or more data tags to at least one of the message or the one or more linked documents, wherein the portion of the one or more data tags are assigned based on a plurality of attributes of both the message and the one or more linked documents that are associated with the legal compliance information.
 3. The system of claim 2, wherein the one or more data tags include at least one of vendor information tags associated with a particular vendor of the at least one other party, or vendor interaction tags associated with the particular vendor of the at least one other party.
 4. The system of claim 2, wherein each of the one or more locations of the non-transitory database storage region is associated with at least one of the one or more data tags.
 5. The system of claim 4, wherein the machine-executable instructions, when executed on the processing circuitry, further cause the processing circuitry to control access by the user to the one or more location of the non-transitory data storage region based on the at least one associated data tag and a security access level of the user.
 6. The system of claim 1, wherein the machine-executable instructions, when executed on the processing circuitry, further cause the processing circuitry to provide, within the message, a direct link to the one or more linked documents to provide for direct access of the one or more linked documents by each party of the at least one other party at the at least one remote computing device.
 7. The system of claim 6, wherein the machine-executable instructions, when executed on the processing circuitry, further cause the processing circuitry to present, responsive to selection of the direct link to the one or more linked documents within the message at a particular remote computing device, at the at least one remote computing device a document access user interface screen to provide interaction by the at least one user with the one or more linked documents.
 8. The system of claim 7, wherein the machine-executable instructions, when executed on the processing circuitry, further cause the processing circuitry to provide, at the document access user interface screen presented at the particular remote computing device, at least one type of interaction with the one or more linked documents based on the security access parameters.
 9. The system of claim 8, wherein the at least one type of interaction with the one or more linked documents includes at least one of editing or downloading the one or more linked documents.
 10. The system of claim 7, wherein the machine-executable instructions, when executed on the processing circuitry, further cause the processing circuitry to update, responsive to detecting interaction with the one or more linked documents, one or more assigned data tags for the one or more linked documents.
 11. The system of claim 1, wherein the machine-executable instructions, when executed on the processing circuitry, further cause the processing circuitry to populate each of the at least one non-editable input field with corresponding vendor information or transaction information, wherein the vendor information relates to a particular party of the at least one other party.
 12. A method comprising: receiving, via a network from a remote computing device of a first party, a message request for preparing a message to be transmitted to at least one other party; providing, in a user interface configured for display on a remote computing device of the first party, a message customization user interface including a message template having at least one non-editable input field and at least one editable input field for allowing customization of the message by a user of the remote computing device, wherein the customization user interface includes a document selection portion for presenting one or more documents linked to the message; identifying, based on the one or more documents linked to the message, one or more message recipients from the at least one other party, wherein the one or more message recipients are identified as having security access permissions corresponding to security access parameters for the one or more documents; receiving, from the remote computing device responsive to providing the message customization user interface, inputs for the at least one editable input field of the message template; converting, responsive to receiving the inputs for the at least one editable input field, the message template into a message transmission format for transmitting the message with the one or more linked documents to at least one remote computing device associated with each party of the at least one other party; transmitting, to the at least one remote computing device associated with each party of the at least one other party, the transaction message in the message format including the one or more documents; automatically generating, in real time responsive to detecting interactions with at least one of the message or a first portion of the one or more linked documents, audit trail data for each of the detected interactions, wherein the audit trail data includes one or more audit trail tags associated with attributes of the message and the one or more linked documents associated with legal compliance information, and wherein generating the audit trail data includes generating copies of a second portion of the one or more linked documents; storing the audit trail data and the copies of the second portion of the one or more documents in one or more portions of a non-transitory database storage region based on the one or more audit trail tags; and outputting, in real time responsive to receiving a request from a remote computing device of the first party, a summarization of the interactions with the at least one of the message or the first portion of the one or more documents based on respective portions of the generated audit trail data.
 13. The method of claim 12, wherein each portion of the one or more portions of the non-transitory database storage region is associated with at least one of the one or more audit trail tags.
 14. The method of claim 12, further comprising controlling access by the user to the one or more portions of the non-transitory data storage region based on the at least one associated audit trail tag and a security access level of the user.
 15. The method of claim 12, wherein the one or more audit trail tags include at least one of vendor information tags associated with a particular vendor of the at least one other party, or vendor interaction tags associated with the particular vendor of the at least one other party.
 16. The method of claim 12, further comprising providing, within the message, a direct link to the one or more linked documents to provide for direct access of the one or more linked documents by each party of the at least one other party at the at least one remote computing device.
 17. The method of claim 16, further comprising presenting, responsive to selection of the direct link to the one or more linked documents within the message at a particular remote computing device of the at least one remote computing device, a document access user interface screen to provide interaction by the at least one user with the one or more linked documents.
 18. The method of claim 17, further comprising providing, at the document access user interface screen presented at the particular remote computing device, at least one type of interaction with the one or more linked documents based on the security access parameters.
 19. The method of claim 17, further comprising updating, responsive to detecting interaction with the one or more linked documents, one or more assigned audit trail tags for the one or more linked documents. 