Isolated working chamber associated with a secure inter-company collaboration environment
First Claim
1. A system, comprising:
- an inter-company collaboration system comprising;
a first set of one or more utility servers maintained by a first company, a first data storage mechanism associated with the first set of utility servers, a first set of resources residing on the first set of utility servers, a secure network connection between the first set of utility servers and a second company, and a first access control mechanism configured to control access, by the first company and the second company, to the first set of resources and to the secure network connection, wherein access to the first set of resources is limited to specific authorized individuals that are associated with the first company and specific authorized individuals that are associated with the second company; and
an isolated system that is communicatively coupled to the collaboration system, comprising;
a second set of one or more utility servers maintained by the first company;
a second data storage mechanism associated with the second set of utility servers, the second data storage mechanism including a first storage portion that contains data that is shared with the collaboration system, and a second storage portion that contains data that is private to the isolated system; and
a second access control mechanism configured to control access to the second set of utility servers, wherein access to the second set of utility servers is limited to specific authorized individuals that are associated only with the first company.
1 Assignment
0 Petitions
Accused Products
Abstract
A system is described in which multiple companies can securely collaborate on a design or other project, while one company can still protect certain property, such as source code, from the other collaborating companies. The system includes an inter-company collaboration system that includes a set of resources residing on a set of one or more first utility servers maintained by a first company, an access control mechanism for controlling access to the set of resources, a first data storage mechanism, and a secure network connection between the set of utility servers and a second company. The system further includes an isolated system that includes a second set of servers, a second data storage mechanism that includes a first portion that contains data shared with the collaboration system and a second portion that contains data private to the isolated system, and a second access control mechanism to control access to the second set of servers to only individuals associated with one company.
-
Citations
11 Claims
-
1. A system, comprising:
-
an inter-company collaboration system comprising;
a first set of one or more utility servers maintained by a first company, a first data storage mechanism associated with the first set of utility servers, a first set of resources residing on the first set of utility servers, a secure network connection between the first set of utility servers and a second company, and a first access control mechanism configured to control access, by the first company and the second company, to the first set of resources and to the secure network connection, wherein access to the first set of resources is limited to specific authorized individuals that are associated with the first company and specific authorized individuals that are associated with the second company; and
an isolated system that is communicatively coupled to the collaboration system, comprising;
a second set of one or more utility servers maintained by the first company;
a second data storage mechanism associated with the second set of utility servers, the second data storage mechanism including a first storage portion that contains data that is shared with the collaboration system, and a second storage portion that contains data that is private to the isolated system; and
a second access control mechanism configured to control access to the second set of utility servers, wherein access to the second set of utility servers is limited to specific authorized individuals that are associated only with the first company. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for providing a secure system for working in isolation from an associated inter-company collaboration system, the method comprising:
-
controlling access to a first set of one or more utility servers maintained by a first company, wherein access to the first set of utility servers is limited to specific authorized individuals that are associated with the first company;
controlling access to a second set of one or more utility servers maintained by a second company, wherein access to the second set of utility servers is limited to specific authorized individuals that are associated with the second company;
controlling access to a secure network connection between the first and second sets of utility servers, wherein access to the secure network connection is limited to specific authorized individuals that are associated with the first company or the second company;
controlling access to a third set of one or more utility servers maintained by the first company, wherein access to the third set of utility servers is limited to specific authorized individuals that are associated only with the first company;
providing access to shared data to at least the first set of utility servers and the third set of utility servers; and
providing access to private data to only the third set of utility servers. - View Dependent Claims (8, 9, 10)
-
-
11. A system for providing a secure system for working in isolation from an associated inter-company collaboration system, the system comprising:
-
means for controlling access to a first set of one or more utility servers maintained by a first company, wherein access to the first set of utility servers is limited to specific authorized individuals that are associated with the first company;
means for controlling access to a second set of one or more utility servers maintained by a second company, wherein access to the second set of utility servers is limited to specific authorized individuals that are associated with the second company;
means for controlling access to a secure network connection between the first and second sets of utility servers, wherein access to the secure network connection is limited to specific authorized individuals that are associated with the first company or the second company;
means for controlling access to a third set of one or more utility servers maintained by the first company, wherein access to the third set of utility servers is limited to specific authorized individuals that are associated only with the first company;
means for providing access to shared data to at least the first set of utility servers and the third set of utility servers; and
means for providing access to private data to only the third set of utility servers.
-
Specification