Method and system for collaboration
First Claim
1. A method for collaboration, comprising the acts of:
- providing a computer-implemented system that creates a single portal for entity members of said computer-implemented system to a set of software application tools, and that serves as a hub for collaboration amongst the entity members of said computer-implemented system;
said set of software application tools generating computer-implemented system objects, with said computer-implemented system objects providing;
a centralized space for a project that provides a work zone for maintaining information related to said project within said work zone;
an assembling of a distributed workgroup comprised of at least one entity member of said computer-implemented system into said work zone, thereby making said entity member of said computer-implemented system a work zone member, which unifies said work zone member and said project into said work zone to enable said work zone member and said entity member of said computer-implemented system to collaborate.
0 Assignments
0 Petitions
Accused Products
Abstract
A scalable and reliable collaborative software application that provides an information hub that serves as a single portal to using applications in an aggregated, collaborative manner, thereby eliminating the need for constant transmission/reception of information to achieve collaboration, is presented. The present invention creates a portal for all entities, and enables access, storage, sharing, and response to related information from anywhere at anytime on any access unit in a collaborative and collective methodology. The present invention also provides object-based security and object-based threaded discussion sessions for all objects generated by the various applications.
-
Citations
252 Claims
-
1. A method for collaboration, comprising the acts of:
-
providing a computer-implemented system that creates a single portal for entity members of said computer-implemented system to a set of software application tools, and that serves as a hub for collaboration amongst the entity members of said computer-implemented system;
said set of software application tools generating computer-implemented system objects, with said computer-implemented system objects providing;
a centralized space for a project that provides a work zone for maintaining information related to said project within said work zone;
an assembling of a distributed workgroup comprised of at least one entity member of said computer-implemented system into said work zone, thereby making said entity member of said computer-implemented system a work zone member, which unifies said work zone member and said project into said work zone to enable said work zone member and said entity member of said computer-implemented system to collaborate. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 119, 120)
-
2. The method for collaboration as set forth in claim 1, wherein said work zone is a project specific environment that enables authorized access to said set of software application tools, and allows said set of software application tools to function collectively and collaboratively, specific to said project.
-
3. The method for collaboration as set forth in claim 2, wherein each said work zone for each said project has a complete set of software application tools.
-
4. The method for collaboration as set forth in claim 3, wherein said computer-implemented system sorts, organizes, and saves new and altered information of said work zone to said work zone.
-
5. The method for collaboration as set forth in claim 4, wherein said set of software application tools is comprised of front-end module applications and back-end core applications.
-
6. The method for collaboration as set forth in claim 5, wherein said front-end module applications and said back-end core applications are comprised of work zone aware vertical and horizontal software applications.
-
7. The method for collaboration as set forth in claim 6, wherein said front-end module applications are comprised of:
-
a thin client layer for accessing said computer-implemented system through an access units;
a presentation layer for abstracting data for said client layer; and
a controller layer that provides reusable business logic that drives said presentation layer.
-
-
8. The method for collaboration as set forth in claim 7, wherein said front-end module applications reside in said work zone, and are comprised of at least one of a discussion, summary, document, calendar, task, contact, instant messaging, and email module software application.
-
9. The method for collaboration as set forth in claim 8, wherein said work zone is comprised of a set of graphic user interface frames that are dedicated to said set of front-end module applications, and that when selected will initiate any one of said front-end module applications.
-
10. The method for collaboration as set forth in claim 9, wherein said discussion module software applications is comprised of an object-based discussion manager, which generates discussion object that are associated with said computer-implemented system objects to enable discussion forums about said computer-implemented system objects.
-
11. The method for collaboration as set forth in claim 10, wherein said object-based discussion manager is an inherent part of said computer-implemented system, providing an object-based threaded discussion forum functionality for any computer-implemented system object.
-
12. The method for collaboration as set forth in claim 11, wherein security for said object-based threaded discussions is based on object-based security set on a topic of discussion forum.
-
13. The method for collaboration as set forth in claim 12, wherein said summary module software application enables entity members of said computer-implemented system to have access to a summary of all data that are specific to an individual front-end module application, which span across all work zones.
-
14. The method for collaboration as set forth in claim 13, wherein said summary module software application enables said entity members of said computer-implemented system to generate front-end module application objects outside of a context of said work zone.
-
15. The method for collaboration as set forth in claim 14, wherein said document module software application enables entity members of said computer-implemented system to have access to documents, and includes security to prevent uploading of a corrupt document that may corrupt said computer-implemented system.
-
16. The method for collaboration as set forth in claim 15, wherein said calendar module software application enables entity members of said computer-implemented system to have access to calendar objects.
-
17. The method for collaboration as set forth in claim 16, wherein said task module software application enables entity members of said computer-implemented system to have access to task objects.
-
18. The method for collaboration as set forth in claim 17, wherein said contact module software application enables entity members of said computer-implemented system to have access to contact objects.
-
19. The method for collaboration as set forth in claim 18, wherein said contact module software application contains contact information for member entities and non-member entities.
-
20. The method for collaboration as set forth in claim 19, wherein said instant messaging module application enables entity members of said computer-implemented system to have access to instant messaging objects.
-
21. The method for collaboration as set forth in claim 20, wherein said instant messaging module software application is instantiated by said entity member of said computer-implemented system to commence an instant messaging session, and where said computer-implemented system saves said instant messaging session into a work zone selected by said entity member.
-
22. The method for collaboration as set forth in claim 21, wherein said instant messaging module application is instantiated by said work zone member within the context of a particular work zone to commence an instant messaging session, where said computer implemented system saves said instant messaging session into said particular work zone.
-
23. The method for collaboration as set forth in claim 22, wherein said electronic mail module software application enables entity members to have access electronic mail objects.
-
24. The method for collaboration as set forth in claim 23, wherein said work zone includes said electronic mail module software application with at least one work zone aware electronic mail inbox therein, and where incoming electronic mail are directed to said at least one work zone aware inbox.
-
25. The method for collaboration as set forth in claim 24, wherein said entity members are assigned a personalized electronic mail address.
-
26. The method for collaboration as set forth in claim 25, wherein said front-end module applications further includes at least an administration module application, wherein entity members are allowed access to functions related to administration of said computer-implemented system.
-
27. The method for collaboration as set forth in claim 26, wherein said administration module application further includes at least a site manager module application, wherein entity members are allowed access to functions related to site management of an entity member account.
-
28. The method for collaboration as set forth in claim 27, wherein said computer-implemented system supports an offline version of said set of software application tools that integrate with an operating system of said access unit for allowing entity members of said computer-implemented system to function offline.
-
29. The method for collaboration as set forth in claim 28, wherein information generated within said set of software application tools while offline, is replicated and synchronized with said computer-implemented system said entity members reconnect to entity member accounts.
-
30. The method for collaboration as set forth in claim 29, wherein said computer-implemented system provides Internet search functionality integral with said computer-implemented system.
-
31. The method for collaboration as set forth in claim 30, wherein entity members using said Internet search functionality are provided with results and a sponsored search listing, where upon selection of at least one sponsor from said sponsored search listing said entity members are directed to said selected sponsor advertisement web-site outside said computer-implemented system, and where said computer-implemented system is compensated by said selected sponsor for directing said entity member to said selected sponsor advertisement web-site.
-
32. The method for collaboration as set forth in claim 31, wherein said Internet search functionality provides both a local and a global search capability.
-
33. The method for collaboration as set forth in claim 32, wherein said local search capability provides search results with information that are local to a geographic area selected by said entity member.
-
34. The method for collaboration as set forth in claim 33, wherein said back-end core applications are comprised of a data, access, handler, and manager layers, and cross-layer subsystems that include a security subsystem and a utility subsystem.
-
35. The method for collaboration as set forth in claim 34, wherein said data layer is a portion of said back-end core applications that stores data for use by said computer-implemented system.
-
36. The method for collaboration as set forth in claim 35, wherein said data layer is comprised of a first component for sending, receiving, and storing messages, a second component for storing data, and a third component for storing files.
-
37. The method for collaboration as set forth in claim 36, wherein said second component is a relational database system for storing data, and said third component is a file storage system for storing data appropriately saved in file storage systems.
-
38. The method for collaboration as set forth in claim 37, wherein said relational database system is divided into two major sets of foundation and module tables, with said foundation tables including data related to infrastructure of said computer-implemented system and said module tables related to front-end module applications of said computer-implemented system.
-
39. The method for collaboration as set forth in claim 38, wherein said relational database system includes work zone identification data that relates said computer-implemented system objects to a particular work zone object, thereby making said computer-implemented system objects and any associated objects therewith work zone aware.
-
40. The method for collaboration as set forth in claim 39, wherein said access layer provides access layer objects for controlling access to said data layer, and base-functionality for use in other layers.
-
41. The method for collaboration as set forth in claim 40, wherein said access layer is comprised of a first component access for accessing said first component of said data layer, a database access component for accessing said database component of said data layer, a file access component for accessing said file storage component of said data layer, a security access component for accessing a security component of said data layer, and a logging access component for providing a mechanism for reporting errors.
-
42. The method for collaboration as set forth in claim 41, wherein said database access component of said access layer is comprised of initializer objects for resolving seemingly irresolvable conflicts, and destructor objects for handling processes of removing fundamental objects from said foundation tables of said data layer, and for providing a central method to store logic associated therewith.
-
43. The method for collaboration as set forth in claim 42, wherein said handler layer is comprised of handler objects that wrap functionality of said access layer objects, with each said handler layer object using said access layer objects to access a different component of said data layer.
-
44. The method for collaboration as set forth in claim 43, wherein said manager layer is comprised of manager layer objects that provide an interface used by said front-end module applications, and shield the rest of said back-end core applications from improper access.
-
45. The method for collaboration as set forth in claim 44, wherein all requests for connections to said data layer are generated by said manager layer objects, and passed onto said handler layer objects.
-
46. The method for collaboration as set forth in claim 45, wherein said security subsystem provides complete control over said entity members and all computer-implemented system objects, and provide both external and internal security to said computer-implemented system.
-
47. The method for collaboration as set forth in claim 46, wherein said external security controls public interface with said front-end module applications, and is comprised of:
-
an encryption security module for encrypting all communication between said access unit and said server computer to ensure privacy;
a threat detection module that monitors and detects transmissible threats overall all data transmissions; and
an intrusion detection module that does network monitoring to diminish the impact of intruders.
-
-
48. The method for collaboration as set forth in claim 47, wherein said internal security protect the data contained in said back-end core, and is comprised of:
-
an authentication module for authentication of entity members to access said computer-implemented system; and
a permission management module that facilitates an object-based security system for said computer-implemented system, where each said computer-implemented system object and entity member related to said computer-implemented system has the ability to have defined for said computer-implemented system object and said entity member individual user rights.
-
-
49. The method for collaboration as set forth in claim 48, wherein said object-based security system generates security objects, wherein association of said security object with said computer-implemented system objects enables authorized access to said computer-implemented system, and said computer-implemented system objects.
-
50. The method for collaboration as set forth in claim 49, wherein setting security on said computer-implemented system objects using said security objects automatically makes said computer-implemented system objects available to all entitled entity members of said computer-implemented system.
-
51. The method for collaboration as set forth in claim 50, wherein said association of said security objects with each computer-implemented system object is comprised of:
-
a) selecting entity members and groups of entity members to be associated with said computer-implemented system object; and
b) selecting a specific set of permissions for each of said selected entity members and groups of entity members to provide distinct, assign-able access rights to said computer-implemented system object;
whereby said security object enables authorization and a varied level of allowed access rights and privileges to said computer-implemented system object.
-
-
52. The method for collaboration as set forth in claim 51, wherein said object-based security system is an inherent part of said computer-implemented system, providing object-based security objects for any computer-implemented system objects.
-
53. The method for collaboration as set forth in claim 52, wherein every said computer-implemented system object is linked to one security object, and each said security object is linked to one computer-implemented system object.
-
54. The method for collaboration as set forth in claim 53, wherein a plurality of computer implemented system objects are linked to one said security object, sharing analogous authorizations.
-
55. The method for collaboration as set forth in claim 54, wherein each security object enables an entity member to define access rights for each computer-implemented system object.
-
56. The method for collaboration as set forth in claim 55, wherein said computer-implemented system is one of a Web, Internet, Intranet, and Extranet based systems.
-
57. The method for collaboration as set forth in claim 56, wherein said computer-implemented system enables an authorized entity member instant access to up-to-date project related information without a need for synchronization.
-
58. The method for collaboration as set forth in claim 57, wherein access to said computer-implemented system is through a single login into an account of said entity member.
-
59. The method for collaboration as set forth in claim 58, wherein said account set up for said computer-implemented system is comprised of:
-
collecting information about an entity;
selecting a vertical set of software application for said account by said entity;
collection of billing data, and verification of said collected data; and
redirection of said entity to access said account though said single login.
-
-
60. The method for collaboration as set forth in claim 59, wherein said computer-implemented system is comprised of at least one server computer, within which said set of software application tools reside.
-
61. The method for collaboration as set forth in claim 60, wherein said at least one server computer is accessed by said access unit through at least one of a secured and an unsecured communications protocols.
-
62. The method for collaboration as set forth in claim 1, wherein each said work zone for each said project has a complete set of software application tools.
-
63. The method for collaboration as set forth in claim 1, wherein said computer-implemented system sorts, organizes, and saves new and altered information of said work zone to said work zone.
-
64. The method for collaboration as set forth in claim 1, wherein said set of software application tools is comprised of front-end module applications and back-end core applications.
-
65. The method for collaboration as set forth in claim 64, wherein said front-end module applications and said back-end core applications are comprised of work zone aware vertical and horizontal software applications.
-
66. The method for collaboration as set forth in claim 64, wherein said front-end module applications are comprised of:
-
a thin client layer for accessing said computer-implemented system through an access units;
a presentation layer for abstracting data for said client layer; and
a controller layer that provides reusable business logic that drives said presentation layer.
-
-
67. The method for collaboration as set forth in claim 64, wherein said front-end module applications reside in said work zone, and are comprised of at least one of a discussion, summary, document, calendar, task, contact, instant messaging, and email module software application.
-
68. The method for collaboration as set forth in claim 1, wherein said work zone is comprised of a set of graphic user interface frames that are dedicated to said set of front-end module applications, and that when selected will initiate any one of said front-end module applications.
-
69. The method for collaboration as set forth in claim 64, wherein said front-end module applications are comprised of at least a discussion module software applications, which is comprised of an object-based discussion manager, which generates discussion object that are associated with said computer-implemented system objects to enable discussion forums about said computer-implemented system objects.
-
70. The method for collaboration as set forth in claim 69, wherein said object-based discussion manager is an inherent part of said computer-implemented system, providing an object-based threaded discussion forum functionality for any computer-implemented system object.
-
71. The method for collaboration as set forth in claim 69, wherein security for said object-based threaded discussions is based on object-based security set on a topic of discussion forum.
-
72. The method for collaboration as set forth in claim 64, wherein said end-end module applications are comprised of at least a summary module software application, which enables entity members of said computer-implemented system to have access to a summary of all data that are specific to an individual front-end module application, which span across all work zones.
-
73. The method for collaboration as set forth in claim 64, wherein said front-end module applications are comprised of at least a summary module software application, which enables said entity members of said computer-implemented system to generate front-end module application objects outside of a context of said work zone.
-
74. The method for collaboration as set forth in claim 64, wherein said front-end module applications are comprised of at least a document module software application, which enables entity members of said computer-implemented system to have access to documents, and includes security to prevent uploading of a corrupt document that may corrupt said computer-implemented system.
-
75. The method for collaboration as set forth in claim 64, wherein said front-end module applications are comprised of at least a calendar module software application, which enables entity members of said computer-implemented system to have access to calendar objects.
-
76. The method for collaboration as set forth in claim 64, wherein said front-end module applications are comprised of at least a task module software application that enables entity members of said computer-implemented system to have access to task objects.
-
77. The method for collaboration as set forth in claim 64, wherein said front-end module applications are comprised of at least a contact module software application that enables entity members of said computer-implemented system to have access to contact objects.
-
78. The method for collaboration as set forth in claim 77, wherein said contact module software application contains contact information for member entities and non-member entities.
-
79. The method for collaboration as set forth in claim 64, wherein said front-end module applications are comprised of at least an instant messaging module application that enables entity members of said computer-implemented system to have access to instant messaging objects.
-
80. The method for collaboration as set forth in claim 64, wherein said front-end module applications are comprised of at least an instant messaging module software application, which is instantiated by said entity member of said computer-implemented system to commence an instant messaging session, and where said computer-implemented system saves said instant messaging session into said work zone selected by said entity member.
-
81. The method for collaboration as set forth in claim 64, wherein said front-end module applications are comprised of at least an instant messaging module application, which is instantiated by said work zone member within the context of a particular work zone to commence an instant messaging session, where said computer implemented system saves said instant messaging session into said particular work zone.
-
82. The method for collaboration as set forth in claim 64, wherein said front-end module applications are comprised of at least an electronic mail module software application that enables entity members to have access electronic mail objects.
-
83. The method for collaboration as set forth in claim 1, wherein said work zone includes an electronic mail module software application with at least one work zone aware electronic mail inbox therein, and where incoming electronic mail are directed to said at least one work zone aware inbox.
-
84. The method for collaboration as set forth in claim 1, wherein said entity members are assigned a personalized electronic mail address.
-
85. The method for collaboration as set forth in claim 64, wherein said front-end module applications further includes at least an administration module application, wherein entity members are allowed access to functions related to administration of said computer-implemented system.
-
86. The method for collaboration as set forth in claim 85, wherein said administration module application further includes at least a site manager module application, wherein entity members are allowed access to functions related to site management of an entity member account.
-
87. The method for collaboration as set forth in claim 1, wherein said computer-implemented system supports an offline version of said set of software application tools that integrate with an operating system of said access unit for allowing entity members of said computer-implemented system to function offline.
-
88. The method for collaboration as set forth in claim 87, wherein information generated within said set of software application tools while offline, is replicated and synchronized with said computer-implemented system said entity members reconnect to entity member accounts.
-
89. The method for collaboration as set forth in claim 1, wherein said computer-implemented system provides Internet search functionality integral with said computer-implemented system.
-
90. The method for collaboration as set forth in claim 89, wherein entity members using said Internet search functionality are provided with results and a sponsored search listing, where upon selection of at least one sponsor from said sponsored search listing said entity members are directed to said selected sponsor advertisement web-site outside said computer-implemented system, and where said computer-implemented system is compensated by said selected sponsor for directing said entity member to said selected sponsor advertisement web-site.
-
91. The method for collaboration as set forth in claim 89, wherein said Internet search functionality provides both a local and a global search capability.
-
92. The method for collaboration as set forth in claim 91, wherein said local search capability provides search results with information that are local to a geographic area selected by said entity member.
-
93. The method for collaboration as set forth in claim 64, wherein said back-end core applications are comprised of a data, access, handler, and manager layers, and cross-layer subsystems that include a security subsystem and a utility subsystem.
-
94. The method for collaboration as set forth in claim 64, wherein said back-end core applications are comprised of at least a data layer, which is a portion of said back-end core applications that stores data for use by said computer-implemented system.
-
95. The method for collaboration as set forth in claim 94, wherein said data layer is comprised of a first component for sending, receiving, and storing messages, a second component for storing data, and a third component for storing files.
-
96. The method for collaboration as set forth in claim 95, wherein said second component is a relational database system for storing data, and said third component is a file storage system for storing data appropriately saved in file storage systems.
-
97. The method for collaboration as set forth in claim 96, wherein said relational database system is divided into two major sets of foundation and module tables, with said foundation tables including data related to infrastructure of said computer-implemented system and said module tables related to front-end module applications of said computer-implemented system.
-
98. The method for collaboration as set forth in claim 96, wherein said relational database system includes work zone identification data that relates said computer-implemented system objects to a particular work zone object, thereby making said computer-implemented system objects and any associated objects therewith work zone aware.
-
99. The method for collaboration as set forth in claim 93, wherein said access layer provides access layer objects for controlling access to said data layer, and base-functionality for use in other layers.
-
100. The method for collaboration as set forth in claim 93, wherein said access layer is comprised of a first component access for accessing said first component of said data layer, a database access component for accessing said database component of said data layer, a file access component for accessing said file storage component of said data layer, a security access component for accessing a security component of said data layer, and a logging access component for providing a mechanism for reporting errors.
-
101. The method for collaboration as set forth in claim 100, wherein said database access component of said access layer is comprised of initializer objects for resolving seemingly irresolvable conflicts, and destructor objects for handling processes of removing fundamental objects from said foundation tables of said data layer, and for providing a central method to store logic associated therewith.
-
102. The method for collaboration as set forth in claim 93, wherein said handler layer is comprised of handler objects that wrap functionality of said access layer objects, with each said handler layer object using said access layer objects to access a different component of said data layer.
-
103. The method for collaboration as set forth in claim 93, wherein said manager layer is comprised of manager layer objects that provide an interface used by said front-end module applications, and shield the rest of said back-end core applications from improper access.
-
104. The method for collaboration as set forth in claim 103, wherein all requests for connections to said data layer are generated by said manager layer objects, and passed onto said handler layer objects.
-
105. The method for collaboration as set forth in claim 93, wherein said security subsystem provides complete control over said entity members and all computer-implemented system objects, and provide both external and internal security to said computer-implemented system.
-
106. The method for collaboration as set forth in claim 105, wherein said external security controls public interface with said front-end module applications, and is comprised of:
-
an encryption security module for encrypting all communication between said access unit and said server computer to ensure privacy;
a threat detection module that monitors and detects transmissible threats overall all data transmissions; and
an intrusion detection module that does network monitoring to diminish the impact of intruders.
-
-
107. The method for collaboration as set forth in claim 105, wherein said internal security protect the data contained in said back-end core, and is comprised of:
-
an authentication module for authentication of entity members to access said computer-implemented system; and
a permission management module that facilitates an object-based security system for said computer-implemented system, where each said computer-implemented system object and entity member related to said computer-implemented system has the ability to have defined for said computer-implemented system object and said entity member individual user rights.
-
-
108. The method for collaboration as set forth in claim 107, wherein said object-based security system generates security objects, wherein association of said security object with said computer-implemented system objects enables authorized access to said computer-implemented system, and said computer-implemented system objects.
-
109. The method for collaboration as-set forth in claim 107, wherein setting security on said computer-implemented system objects using said security objects automatically makes said computer-implemented system objects available to all entitled entity members of said computer-implemented system.
-
110. The method for collaboration as set forth in claim 107, wherein said association of said security objects with each computer-implemented system object is comprised of:
-
a) selecting entity members and groups of entity members to be associated with said computer-implemented system object; and
b) selecting a specific set of permissions for each of said selected entity members and groups of entity members to provide distinct, assign-able access rights to said computer-implemented system object;
whereby said security object enables authorization and a varied level of allowed access rights and privileges to said computer-implemented system object.
-
-
111. The method for collaboration as set forth in claim 107, wherein said object-based security system is an inherent part of said computer-implemented system, providing object-based security objects for any computer-implemented system objects.
-
112. The method for collaboration as set forth in claim 107, wherein every said computer-implemented system object is linked to one security object, and each said security object is linked to one computer-implemented system object.
-
113. The method for collaboration as set forth in claim 107, wherein a plurality of computer implemented system objects are linked to one said security object, sharing analogous authorizations.
-
114. The method for collaboration as set forth in claim 107, wherein each security object enables an entity member to define access rights for each computer-implemented system object.
-
115. The method for collaboration as set forth in claim 1, wherein said computer-implemented system is one of a Web, Internet, Intranet, and Extranet based systems.
-
116. The method for collaboration as set forth in claim 115, wherein said computer-implemented system enables an authorized entity member instant access to up-to-date project related information without a need for synchronization.
-
117. The method for collaboration as set forth in claim 1, wherein access to said computer-implemented system is through a single login into an account of said entity member.
-
118. The method for collaboration as set forth in claim 117, wherein said account set up for said computer-implemented system is comprised of:
-
collecting information about an entity;
selecting a vertical set of software application for said account by said entity;
collection of billing data, and verification of said collected data; and
redirection of said entity to access said account though said single login.
-
-
119. The method for collaboration as set forth in claim 1, wherein said computer-implemented system is comprised of at least one server computer, within which said set of software application tools reside.
-
120. The method for collaboration as set forth in claim 119, wherein said at least one server computer is accessed by said access unit through at least one of a secured and an unsecured communications protocols.
-
2. The method for collaboration as set forth in claim 1, wherein said work zone is a project specific environment that enables authorized access to said set of software application tools, and allows said set of software application tools to function collectively and collaboratively, specific to said project.
-
-
121. A computer program product for collaboration, the computer program product comprising a computer-readable medium having computer program instructions stored therein for causing a computer to perform operations of:
-
providing a computer-implemented system that creates a single portal for entity members of said computer-implemented system to a set of software application tools, and that serves as a hub for collaboration amongst the entity members of said computer-implemented system;
said set of software application tools generating computer-implemented system objects, with said computer-implemented system objects providing;
a centralized space for a project that provides a work zone for maintaining information related to said project within said work zone;
an assembling of a distributed workgroup comprised of at least one entity member of said computer-implemented system into said work zone, thereby making said entity member of said computer-implemented system a work zone member, which unifies said work zone member and said project into said work zone to enable said work zone member and said entity member of said computer-implemented system to collaborate. - View Dependent Claims (122, 123, 124, 125, 126, 127, 128, 129, 130, 131, 132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145, 146, 147, 148, 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159, 160, 161, 162, 163, 164, 165, 166, 167, 168, 169, 170, 171, 172, 173, 174, 175, 176, 177, 178, 179, 180, 181)
-
122. The computer program product for collaboration as set forth in claim 121, wherein said work zone is a project specific environment that enables authorized access to said set of software application tools, and allows said set of software application tools to function collectively and collaboratively, specific to said project.
-
123. The computer program product for collaboration as set forth in claim 121, wherein each said work zone for each said project has a complete set of software application tools.
-
124. The computer program product for collaboration as set forth in claim 121, wherein said computer-implemented system sorts, organizes, and saves new and altered information of said work zone to said work zone.
-
125. The computer program product for collaboration as set forth in claim 121, wherein said set of software application tools is comprised of front-end module applications and back-end core applications.
-
126. The computer program product for collaboration as set forth in claim 125, wherein said front-end module applications and said back-end core applications are comprised of work zone aware vertical and horizontal software applications.
-
127. The computer program product for collaboration as set forth in claim 125, wherein said front-end module applications are comprised of:
-
a thin client layer for accessing said computer-implemented system through an access units;
a presentation layer for abstracting data for said client layer; and
a controller layer that provides reusable business logic that drives said presentation layer.
-
-
128. The computer program product for collaboration as set forth in claim 125, wherein said front-end module applications reside in said work zone, and are comprised of at least one of a discussion, summary, document, calendar, task, contact, instant messaging, and email module software application.
-
129. The computer program product for collaboration as set forth in claim 121, wherein said work zone is comprised of a set of graphic user interface frames that are dedicated to said set of front-end module applications, and that when selected will initiate any one of said front-end module applications.
-
130. The computer program product for collaboration as set forth in claim 125, wherein said front-end module applications are comprised of at least a discussion module software applications, which is comprised of an object-based discussion manager, which generates discussion object that are associated with said computer-implemented system objects to enable discussion forums about said computer-implemented system objects.
-
131. The computer program product for collaboration as set forth in claim 130, wherein said object-based discussion manager is an inherent part of said computer-implemented system, providing an object-based threaded discussion forum functionality for any computer-implemented system object.
-
132. The computer program product for collaboration as set forth in claim 130, wherein security for said object-based threaded discussions is based on object-based security set on a topic of discussion forum.
-
133. The computer program product for collaboration as set forth in claim 125, wherein said front-end module applications are comprised of at least a summary module software application, which enables entity members of said computer-implemented system to have access to a summary of all data that are specific to an individual front-end module application, which span across all work zones.
-
134. The computer program product for collaboration as set forth in claim 125, wherein said front-end module applications are comprised of at least a summary module software application, which enables said entity members of said computer-implemented system to generate front-end module application objects outside of a context of said work zone.
-
135. The computer program product for collaboration as set forth in claim 125, wherein said front-end module applications are comprised of at least a document module software application, which enables entity members of said computer-implemented system to have access to documents, and includes security to prevent uploading of a corrupt document that may corrupt said computer-implemented system.
-
136. The computer program product for collaboration as set forth in claim 125, wherein said front-end module applications are comprised of at least a calendar module software application, which enables entity members of said computer-implemented system to have access to calendar objects.
-
137. The computer program product for collaboration as set forth in claim 125, wherein said front-end module applications are comprised of at least a task module software application that enables entity members of said computer-implemented system to have access to task objects.
-
138. The computer program product for collaboration as set forth in claim 125, wherein said front-end module applications are comprised of at least a contact module software application that enables entity members of said computer-implemented system to have access to contact objects.
-
139. The computer program product for collaboration as set forth in claim 138, wherein said contact module software application contains contact information for member entities and non-member entities.
-
140. The computer program product for collaboration as set forth in claim 125, wherein said front-end module applications are comprised of at least an instant messaging module application that enables entity members of said computer-implemented system to have access to instant messaging objects.
-
141. The computer program product for collaboration as set forth in claim 125, wherein said front-end module applications are comprised of at least an instant messaging module software application, which is instantiated by said entity member of said computer-implemented system to commence an instant messaging session, and where said computer-implemented system saves said instant messaging session into said work zone selected by said entity member.
-
142. The computer program product for collaboration as set forth in claim 125, wherein said front-end module applications are comprised of at least an instant messaging module application, which is instantiated by said work zone member within the context of a particular work zone to commence an instant messaging session, where said computer implemented system saves said instant messaging session into said particular work zone.
-
143. The computer program product for collaboration as set forth in claim 125, wherein said front-end module applications are comprised of at least an electronic mail module software application that enables entity members to have access electronic mail objects.
-
144. The computer program product for collaboration as set forth in claim 121, wherein said work zone includes an electronic mail module software application with at least one work zone aware electronic mail inbox therein, and where incoming electronic mail are directed to said at least one work zone aware inbox.
-
145. The computer program product for collaboration as set forth in claim 121, wherein said entity members are assigned a personalized electronic mail address.
-
146. The computer program product for collaboration as set forth in claim 125, wherein said front-end module applications further includes at least an administration module application, wherein entity members are allowed access to functions related to administration of said computer-implemented system.
-
147. The computer program product for collaboration as set forth in claim 146, wherein said administration module application further includes at least a site manager module application, wherein entity members are allowed access to functions related to site management of an entity member account.
-
148. The computer program product for collaboration as set forth in claim 121, wherein said computer-implemented system supports an offline version of said set of software application tools that integrate with an operating system of said access unit for allowing entity members of said computer-implemented system to function offline.
-
149. The computer program product for collaboration as set forth in claim 148, wherein information generated within said set of software application tools while offline, is replicated and synchronized with said computer-implemented system said entity members reconnect to entity member accounts.
-
150. The computer program product for collaboration as set forth in claim 121, wherein said computer-implemented system provides Internet search functionality integral with said computer-implemented system.
-
151. The computer program product for collaboration as set forth in claim 150, wherein entity members using said Internet search functionality are provided with results and a sponsored search listing, where upon selection of at least one sponsor from said sponsored search listing said entity members are directed to said selected sponsor advertisement web-site outside said computer-implemented system, and where said computer-implemented system is compensated by said selected sponsor for directing said entity member to said selected sponsor advertisement web-site.
-
152. The computer program product for collaboration as set forth in claim 150, wherein said Internet search functionality provides both a local and a global search capability.
-
153. The computer program product for collaboration as set forth in claim 152, wherein said local search capability provides search results with information that are local to a geographic area selected by said entity member.
-
154. The computer program product for collaboration as set forth in claim 125, wherein said back-end core applications are comprised of a data, access, handler, and manager layers, and cross-layer subsystems that include a security subsystem and a utility subsystem.
-
155. The computer program product for collaboration as set forth in claim 125, wherein said back-end core applications are comprised of at least a data layer, which is a portion of said back-end core applications that stores data for use by said computer-implemented system.
-
156. The computer program product for collaboration as set forth in claim 155, wherein said data layer is comprised of a first component for sending, receiving, and storing messages, a second component for storing data, and a third component for storing files.
-
157. The computer program product for collaboration as set forth in claim 156, wherein said second component is a relational database system for storing data, and said third component is a file storage system for storing data appropriately saved in file storage systems.
-
158. The computer program product for collaboration as set forth in claim 157, wherein said relational database system is divided into two major sets of foundation and module tables, with said foundation tables including data related to infrastructure of said computer-implemented system and said module tables related to front-end module applications of said computer-implemented system.
-
159. The computer program product for collaboration as set forth in claim 157, wherein said relational database system includes work zone identification data that relates said computer-implemented system objects to a particular work zone object, thereby making said computer-implemented system objects and any associated objects therewith work zone aware.
-
160. The computer program product for collaboration as set forth in claim 154, wherein said access layer provides access layer objects for controlling access to said data layer, and base-functionality for use in other layers.
-
161. The computer program product for collaboration as set forth in claim 154, wherein said access layer is comprised of a first component access for accessing said first component of said data layer, a database access component for accessing said database component of said data layer, a file access component for accessing said file storage component of said data layer, a security access component for accessing a security component of said data layer, and a logging access component for providing a mechanism for reporting errors.
-
162. The computer program product for collaboration as set forth in claim 161, wherein said database access component of said access layer is comprised of initializer objects for resolving seemingly irresolvable conflicts, and destructor objects for handling processes of removing fundamental objects from said foundation tables of said data layer, and for providing a central method to store logic associated therewith.
-
163. The computer program product for collaboration as set forth in claim 154, wherein said handler layer is comprised of handler objects that wrap functionality of said access layer objects, with each said handler layer object using said access layer objects to access a different component of said data layer.
-
164. The computer program product for collaboration as set forth in claim 154, wherein said manager layer is comprised of manager layer objects that provide an interface used by said front-end module applications, and shield the rest of said back-end core applications from improper access.
-
165. The computer program product for collaboration as set forth in claim 164, wherein all requests for connections to said data layer are generated by said manager layer objects, and passed onto said handler layer objects.
-
166. The computer program product for collaboration as set forth in claim 154, wherein said security subsystem provides complete control over said entity members and all computer-implemented system objects, and provide both external and internal security to said computer-implemented system.
-
167. The computer program product for collaboration as set forth in claim 166, wherein said external security controls public interface with said front-end module applications, and is comprised of:
-
an encryption security module for encrypting all communication between said access unit and said server computer to ensure privacy;
a threat detection module that monitors and detects transmissible threats overall all data transmissions; and
an intrusion detection module that does network monitoring to diminish the impact of intruders.
-
-
168. The computer program product for collaboration as set forth in claim 166, wherein said internal security protect the data contained in said back-end core, and is comprised of:
-
an authentication module for authentication of entity members to access said computer-implemented system; and
a permission management module that facilitates an object-based security system for said computer-implemented system, where each said computer-implemented system object and entity member related to said computer-implemented system has the ability to have defined for said computer-implemented system object and said entity member individual user rights.
-
-
169. The computer program product for collaboration as set forth in claim 168, wherein said object-based security system generates security objects, wherein association of said security object with said computer-implemented system objects enables authorized access to said computer-implemented system, and said computer-implemented system objects.
-
170. The computer program product for collaboration as set forth in claim 168, wherein setting security on said computer-implemented system objects using said security objects automatically makes said computer-implemented system objects available to all entitled entity members of said computer-implemented system.
-
171. The computer program product for collaboration as set forth in claim 168, wherein said association of said security objects with each computer-implemented system object is comprised of:
-
a) selecting entity members and groups of entity members to be associated with said computer-implemented system object; and
b) selecting a specific set of permissions for each of said selected entity members and groups of entity members to provide distinct, assign-able access rights to said computer-implemented system object;
whereby said security object enables authorization and a varied level of allowed access rights and privileges to said computer-implemented system object.
-
-
172. The computer program product for collaboration as set forth in claim 168, wherein said object-based security system is an inherent part of said computer-implemented system, providing object-based security objects for any computer-implemented system objects.
-
173. The computer program product for collaboration as set forth in claim 168, wherein every said computer-implemented system object is linked to one security object, and each said security object is linked to one computer-implemented-system object.
-
174. The computer program product for collaboration as set forth in claim 168, wherein a plurality of computer implemented system objects are linked to one said security object, sharing analogous authorizations.
-
175. The computer program product for collaboration as set forth in claim 168, wherein each security object enables an entity member to define access rights for each computer-implemented system object.
-
176. The computer program product for collaboration as set forth in claim 121, wherein said computer-implemented system is one of a Web, Internet, Intranet, and Extranet based systems.
-
177. The computer program product for collaboration as set forth in claim 176, wherein said computer-implemented system enables an authorized entity member instant access to up-to-date project related information without a need for synchronization.
-
178. The computer program product for collaboration as set forth in claim 121, wherein access to said computer-implemented system is through a single login into an account of said entity member.
-
179. The computer program product for collaboration as set forth in claim 178, wherein said account set up for said computer-implemented system is comprised of:
-
collecting information about an entity;
selecting a vertical set of software application for said account by said entity;
collection of billing data, and verification of said collected data; and
redirection of said entity to access said account though said single login.
-
-
180. The computer program product for collaboration as set forth in claim 121, wherein said computer-implemented system is comprised of at least one server computer, within which said set of software application tools reside.
-
181. The computer program product for collaboration as set forth in claim 180, wherein said at least one server computer is accessed by said access unit through at least one of a secured and an unsecured communications protocols.
-
122. The computer program product for collaboration as set forth in claim 121, wherein said work zone is a project specific environment that enables authorized access to said set of software application tools, and allows said set of software application tools to function collectively and collaboratively, specific to said project.
-
-
182. A computer-implemented system for collaboration, comprising:
-
a single portal for entity members of said computer-implemented system to a set of software application tools that serves as a hub for collaboration amongst the entity members of said computer-implemented system;
said set of software application tools generating computer-implemented system objects, with said computer-implemented system objects providing;
a centralized space for a project that provides a work zone for maintaining information related to said project within said work zone;
an assembling of a distributed workgroup comprised of at least one entity member of said computer-implemented system into said work zone, thereby making said entity member of said computer-implemented system a work zone member, which unifies said work zone member and said project into said work zone to enable said work zone member and said entity member of said computer-implemented system to collaborate. - View Dependent Claims (183, 184, 185, 186, 187, 188, 189, 190, 191, 192, 193, 194, 195, 196, 197, 198, 199, 200, 201, 202, 203, 204, 205, 206, 207, 208, 209, 210, 211, 212, 213, 214, 215, 216, 217, 218, 219, 220, 221, 222, 223, 224, 225, 226, 227, 228, 229, 230, 231, 232, 233, 234, 235, 236, 237, 238, 239, 240, 241, 242)
-
183. The computer-implemented system for collaboration as set forth in claim 182, wherein said work zone is a project specific environment that enables authorized access to said set of software application tools, and allows said set of software application tools to function collectively and collaboratively, specific to said project.
-
184. The computer-implemented system for collaboration as set forth in claim 182, wherein each said work zone for each said project has a complete set of software application tools.
-
185. The computer-implemented system for collaboration as set forth in claim 182, wherein said computer-implemented system sorts, organizes, and saves new and altered information of said work zone to said work zone.
-
186. The computer-implemented system for collaboration as set forth in claim 182, wherein said set of software application tools is comprised of front-end module applications and back-end core applications.
-
187. The computer-implemented system for collaboration as set forth in claim 186, wherein said front-end module applications and said back-end core applications are comprised of work zone aware vertical and horizontal software applications.
-
188. The computer-implemented system for collaboration as set forth in claim 186, wherein said front-end module applications are comprised of:
-
a thin client layer for accessing said computer-implemented system through an access units;
a presentation layer for abstracting data for said client layer; and
a controller layer that provides reusable business logic that drives said presentation layer.
-
-
189. The computer-implemented system for collaboration as set forth in claim 186, wherein said front-end module applications reside in said work zone, and are comprised of at least one of a discussion, summary, document, calendar, task, contact, instant messaging, and email module software application.
-
190. The computer-implemented system for collaboration as set forth in claim 182, wherein said work zone is comprised of a set of graphic user interface frames that are dedicated to said set of front-end module applications, and that when selected will initiate any one of said front-end module applications.
-
191. The computer-implemented system for collaboration as set forth in claim 186, wherein said front-end module applications are comprised of at least a discussion module software applications, which is comprised of an object-based discussion manager, which generates discussion object that are associated with said computer-implemented system objects to enable discussion forums about said computer-implemented system objects.
-
192. The computer-implemented system for collaboration as set forth in claim 191, wherein said object-based discussion manager is an inherent part of said computer-implemented system, providing an object-based threaded discussion forum functionality for any computer-implemented system object.
-
193. The computer-implemented system for collaboration as set forth in claim 191, wherein security for said object-based threaded discussions is based on object-based security set on a topic of discussion forum.
-
194. The computer-implemented system for collaboration as set forth in claim 186, wherein said front-end module applications are comprised of at least a summary module software application, which enables entity members of said computer-implemented system to have access to a summary of all data that are specific to an individual front-end module application, which span across all work zones.
-
195. The computer-implemented system for collaboration as set forth in claim 186, wherein said front-end module applications are comprised of at least a summary module software application, which enables said entity members of said computer-implemented system to generate front-end module application objects outside of a context of said work zone.
-
196. The computer-implemented system for collaboration as set forth in claim 186, wherein said front-end module applications are comprised of at least a document module software application, which enables entity members of said computer-implemented system to have access to documents, and includes security to prevent uploading of a corrupt document that may corrupt said computer-implemented system.
-
197. The computer-implemented system for collaboration as set forth in claim 186, wherein said front-end module applications are comprised of at least a calendar module software application, which enables entity members of said computer-implemented system to have access to calendar objects.
-
198. The computer-implemented system for collaboration as set forth in claim 186, wherein said front-end module applications are comprised of at least a task module software application that enables entity members of said computer-implemented system to have access to task objects.
-
199. The computer-implemented system for collaboration as set forth in claim 186, wherein said front-end module applications are comprised of at least a contact module software application that enables entity members of said computer-implemented system to have access to contact objects.
-
200. The computer-implemented system for collaboration as set forth in claim 199, wherein said contact module software application contains contact information for member entities and non-member entities.
-
201. The computer-implemented system for collaboration as set forth in claim 186, wherein said front-end module applications are comprised of at least an instant messaging module application that enables entity members of said computer-implemented system to have access to instant messaging objects.
-
202. The computer-implemented system for collaboration as set forth in claim 186, wherein said front-end module applications are comprised of at least an instant messaging module software application, which is instantiated by said entity member of said computer-implemented system to commence an instant messaging session, and where said computer-implemented system saves said instant messaging session into said work zone selected by said entity member.
-
203. The computer-implemented system for collaboration as set forth in claim 186, wherein said front-end module applications are comprised of at least an instant messaging module application, which is instantiated by said work zone member within the context of a particular work zone to commence an instant messaging session, where said computer implemented system saves said instant messaging session into said particular work zone.
-
204. The computer-implemented system for collaboration as set forth in claim 186, wherein said front-end module applications are comprised of at least an electronic mail module software application that enables entity members to have access electronic mail objects.
-
205. The computer-implemented system for collaboration as set forth in claim 182, wherein said work zone includes an electronic mail module software application with at least one work zone aware electronic mail inbox therein, and where incoming electronic mail are directed to said at least one work zone aware inbox.
-
206. The computer-implemented system for collaboration as set forth in claim 182, wherein said entity members are assigned a personalized electronic mail address.
-
207. The computer-implemented system for collaboration as set forth in claim 186, wherein said front-end module applications further includes at least an administration module application, wherein entity members are allowed access to functions related to administration of said computer-implemented system.
-
208. The computer-implemented system for collaboration as set forth in claim 207, wherein said administration module application further includes at least a site manager module application, wherein entity members are allowed access to functions related to site management of an entity member account.
-
209. The computer-implemented system for collaboration as set forth in claim 182, wherein said computer-implemented system supports an offline version of said set of software application tools that integrate with an operating system of said access unit for allowing entity members of said computer-implemented system to function offline.
-
210. The computer-implemented system for collaboration as set forth in claim 209, wherein information generated within said set of software application tools while offline, is replicated and synchronized with said computer-implemented system said entity members reconnect to entity member accounts.
-
211. The computer-implemented system for collaboration as set forth in claim 182, wherein said computer-implemented system provides Internet search functionality integral with said computer-implemented system.
-
212. The computer-implemented system for collaboration as set forth in claim 211, wherein entity members using said Internet search functionality are provided with results and a sponsored search listing, where upon selection of at least one sponsor from said sponsored search listing said entity members are directed to said selected sponsor advertisement web-site outside said computer-implemented system, and where said computer-implemented system is compensated by said selected sponsor for directing said entity member to said selected sponsor advertisement web-site.
-
213. The computer-implemented system for collaboration as set forth in claim 211, wherein said Internet search functionality provides both a local and a global search capability.
-
214. The computer-implemented system for collaboration as set forth in claim 213, wherein said local search capability provides search results with information that are local to a geographic area selected by said entity member.
-
215. The computer-implemented system for collaboration as set forth in claim 186, wherein said back-end core applications are comprised of a data, access, handler, and manager layers, and cross-layer subsystems that include a security subsystem and a utility subsystem.
-
216. The computer-implemented system for collaboration as set forth in claim 186, wherein said back-end core applications are comprised of at least a data layer, which is a portion of said back-end core applications that stores data for use by said computer-implemented system.
-
217. The computer-implemented system for collaboration as set forth in claim 216, wherein said data layer is comprised of a first component for sending, receiving, and storing messages, a second component for storing data, and a third component for storing files.
-
218. The computer-implemented system for collaboration as set forth in claim 217, wherein said second component is a relational database system for storing data, and said third component is a file storage system for storing data appropriately saved in file storage systems.
-
219. The computer-implemented system for collaboration as set forth in claim 218, wherein said relational database system is divided into two major sets of foundation and module tables, with said foundation tables including data related to infrastructure of said computer-implemented system and said module tables related to front-end module applications of said computer-implemented system.
-
220. The computer-implemented system for collaboration as set forth in claim 218, wherein said relational database system includes work zone identification data that relates said computer-implemented system objects to a particular work zone object, thereby making said computer-implemented system objects and any associated objects therewith work zone aware.
-
221. The computer-implemented system for collaboration as set forth in claim 215, wherein said access layer provides access layer objects for controlling access to said data layer, and base-functionality for use in other layers.
-
222. The computer-implemented system for collaboration as set forth in claim 215, wherein said access layer is comprised of a first component access for accessing said first component of said data layer, a database access component for accessing said database component of said data layer, a file access component for accessing said file storage component of said data layer, a security access component for accessing a security component of said data layer, and a logging access component for providing a mechanism for reporting errors.
-
223. The computer-implemented system for collaboration as set forth in claim 222, wherein said database access component of said access layer is comprised of initializer objects for resolving seemingly irresolvable conflicts, and destructor objects for handling processes of removing fundamental objects from said foundation tables of said data layer, and for providing a central method to store logic associated therewith.
-
224. The computer-implemented system for collaboration as set forth in claim 215, wherein said handler layer is comprised of handler objects that wrap functionality of said access layer objects, with each said handler layer object using said access layer objects to access a different component of said data layer.
-
225. The computer-implemented system for collaboration as set forth in claim 215, wherein said manager layer is comprised of manager layer objects that provide an interface used by said front-end module applications, and shield the rest of said back-end core applications from improper access.
-
226. The computer-implemented system for collaboration as set forth in claim 225, wherein all requests for connections to said data layer are generated by said manager layer objects, and passed onto said handler layer objects.
-
227. The computer-implemented system for collaboration as set forth in claim 215, wherein said security subsystem provides complete control over said entity members and all computer-implemented system objects, and provide both external and internal security to said computer-implemented system.
-
228. The computer-implemented system for collaboration as set forth in claim 227, wherein said external security controls public interface with said front-end module applications, and is comprised of:
-
an encryption security module for encrypting all communication between said access unit and said server computer to ensure privacy;
a threat detection module that monitors and detects transmissible threats overall all data transmissions; and
an intrusion detection module that does network monitoring to diminish the impact of intruders.
-
-
229. The computer-implemented system for collaboration as set forth in claim 227, wherein said internal security protect the data contained in said back-end core, and is comprised of:
-
an authentication module for authentication of entity members to access said computer-implemented system; and
a permission management module that facilitates an object-based security system for said computer-implemented system, where each said computer-implemented system object and entity member related to said computer-implemented system has the ability to have defined for said computer-implemented system object and said entity member individual user rights.
-
-
230. The computer-implemented system for collaboration as set forth in claim 229, wherein said object-based security system generates security objects, wherein association of said security object with said computer-implemented system objects enables authorized access to said computer-implemented system, and said computer-implemented system objects.
-
231. The computer-implemented system for collaboration as set forth in claim 229, wherein setting security on said computer-implemented system objects using said security objects automatically makes said computer-implemented system objects available to all entitled entity members of said computer-implemented system.
-
232. The computer-implemented system for collaboration as set forth in claim 229, wherein said association of said security objects with each computer-implemented system object is comprised of:
-
a) selecting entity members and groups of entity members to be associated with said computer-implemented system object; and
b) selecting a specific set of permissions for each of said selected entity members and groups of entity members to provide distinct, assign-able access rights to said computer-implemented system object;
whereby said security object enables authorization and a varied level of allowed access rights and privileges to said computer-implemented system object.
-
-
233. The computer-implemented system for collaboration as set forth in claim 229, wherein said object-based security system is an inherent part of said computer-implemented system, providing object-based security objects for any computer-implemented system objects.
-
234. The computer-implemented system for collaboration as set forth in claim 229, wherein every said computer-implemented system object is linked to one security object, and each said security object is linked to one computer-implemented system object.
-
235. The computer-implemented system for collaboration as set forth in claim 229, wherein a plurality of computer implemented system objects are linked to one said security object, sharing analogous authorizations.
-
236. The computer-implemented system for collaboration as set forth in claim 229, wherein each security object enables an entity member to define access rights for each computer-implemented system object.
-
237. The computer-implemented system for collaboration as set forth in claim 182, wherein said computer-implemented system is one of a Web, Internet, Intranet, and Extranet based systems.
-
238. The computer-implemented system for collaboration as set forth in claim 237, wherein said computer-implemented system enables an authorized entity member instant access to up-to-date project related information without a need for synchronization.
-
239. The computer-implemented system for collaboration as set forth in claim 182, wherein access to said computer-implemented system is through a single login into an account of said entity member.
-
240. The computer-implemented system for collaboration as set forth in claim 239, wherein said account set up for said computer-implemented system is comprised of:
-
collecting information about an entity;
selecting a vertical set of software application for said account by said entity;
collection of billing data, and verification of said collected data; and
redirection of said entity to access said account though said single login.
-
-
241. The computer-implemented system for collaboration as set forth in claim 182, wherein said computer-implemented system is comprised of at least one server computer, within which said set of software application tools reside.
-
242. The computer-implemented system for collaboration as set forth in claim 241, wherein said at least one server computer is accessed by said access unit through at least one of a secured and an unsecured communications protocols.
-
183. The computer-implemented system for collaboration as set forth in claim 182, wherein said work zone is a project specific environment that enables authorized access to said set of software application tools, and allows said set of software application tools to function collectively and collaboratively, specific to said project.
-
-
243. A method for providing security for accessing computer-implemented system objects, comprising the act of:
providing a permission management module that facilitates an object-based security system for said computer-implemented system objects, where each said computer-implemented system object has the ability to have defined for said computer-implemented system object individual user rights. - View Dependent Claims (244, 245, 246, 247, 248, 249, 250)
-
244. The method for providing security for accessing computer-implemented system objects as set forth in claim 243, wherein said object-based security system generates security objects, wherein association of said security object with said computer-implemented system objects enables authorized access to said computer-implemented system, and said computer-implemented system objects.
-
245. The method for providing security for accessing computer-implemented system objects as-set forth in claim 244, wherein setting security on said computer-implemented system objects using said security objects automatically makes said computer-implemented system objects available to all entitled users of said computer-implemented system.
-
246. The method for providing security for accessing computer-implemented system objects as set forth in claim 244, wherein said association of said security objects with each computer-implemented system object is comprised of:
-
a) selecting users and groups of users to be associated with said computer-implemented system object; and
b) selecting a specific set of permissions for each of said selected users and groups of users to provide distinct, assign-able access rights to said computer-implemented system object;
whereby said security object enables authorization and a varied level of allowed access rights and privileges to said computer-implemented system object.
-
-
247. The method for providing security for accessing computer-implemented system objects as set forth in claim 243, wherein said object-based security system is an inherent part of said computer-implemented system, providing object-based security objects for any computer-implemented system objects.
-
248. The method for providing security for accessing computer-implemented system objects as set forth in claim 243, wherein every said computer-implemented system object is linked to one security object, and each said security object is linked to one computer-implemented system object.
-
249. The method for providing security for accessing computer-implemented system objects as set forth in claim 243, wherein a plurality of computer implemented system objects are linked to one said security object, sharing analogous authorizations.
-
250. The method for providing security for accessing computer-implemented system objects as set forth in claim 243, wherein each security object enables an entity member to define access rights for each computer-implemented system object.
-
244. The method for providing security for accessing computer-implemented system objects as set forth in claim 243, wherein said object-based security system generates security objects, wherein association of said security object with said computer-implemented system objects enables authorized access to said computer-implemented system, and said computer-implemented system objects.
-
251. A method for providing discussions for a computer-implemented system, comprising the acts of:
providing a discussion module software application that is comprised of an object-based discussion manager, which generates discussion objects that are associated with computer-implemented system objects to enable discussion forums about said computer-implemented system objects. - View Dependent Claims (252)
-
252. The method for collaboration as set forth in claim 251, wherein said object-based discussion manager is an inherent part of said computer-implemented system, providing an object-based threaded discussion forum functionality for any computer-implemented system object.
-
252. The method for collaboration as set forth in claim 251, wherein said object-based discussion manager is an inherent part of said computer-implemented system, providing an object-based threaded discussion forum functionality for any computer-implemented system object.
Specification
- Resources
-
Current AssigneeJean-Pierre Etsuo Poveda, O'Shea, Daniel Peter, Richard Lusk
-
Original AssigneeJean-Pierre Etsuo Poveda, O'Shea, Daniel Peter, Richard Lusk
-
InventorsPoveda, Jean-Pierre Etsuo, O'Shea, Daniel Peter, Lusk, Richard
-
Application NumberUS10/980,763Publication NumberTime in Patent OfficeDaysField of SearchUS Class Current715/758CPC Class CodesG06Q 10/10 Office automation; Time man...