Abstract

This publication discloses methods and systems for validated runtime extension of executing multi-step processes with structural safety guarantees. In one embodiment, when a proposed extension comprising additional process steps and their dependencies is submitted for incorporation into an executing process, the system evaluates the proposed extension against a set of structural validation predicates before any modification to the executing process is permitted. The structural validation predicates are deterministic checks that verify structural integrity properties of the proposed extension relative to the current process structure, including termination verification (confirming that the extended structure preserves finite completion), data flow compatibility checking (confirming that declared output commitments satisfy declared input requirements across proposed dependency relationships), and authorization path verification (confirming that execution paths through elevated-authority steps include required authorization checkpoints). In one embodiment, if all structural validation predicates pass, the proposed extension is atomically incorporated into the executing process, producing a sealed decision record for the extension decision. If any predicate fails, the system produces a fail-safe rejection with structured predicate-specific feedback identifying the failing condition, enabling iterative refinement of the proposed extension. The extension decision is modelled as a decision within the same framework that governs the process itself, subject to the same structural principles. The structural validation boundary is non- bypassable — no proposer, regardless of trust designation, is exempt from structural validation. The disclosed validation approach is analogous to admission control mechanisms in container orchestration systems (e.g., Kubernetes admission controllers) that intercept and validate resource modifications before commitment, applied here to executing business process graphs rather than infrastructure resource state. The disclosed approaches enable ad-hoc process flexibility and dynamic workflow modification while maintaining structural validation of process changes at runtime rather than relying solely on design-time verification of complete process models.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.

Share

COinS