Web-Hosted Self-Managed Virtual Systems With Complex Rule-Based Content Access
First Claim
Patent Images
1. A method, comprising:
- providing, from a service provider system, a user interface;
receiving, at the service provider system, one or more vault identifiers from a first source;
receiving, at the service provider system, one or more lock-box identifiers from the first source;
associating, at the service provider system, each of the one or more lock-box identifiers with a first one of the one or more vault identifiers;
receiving, at the service provider system, a plurality of content items from the first source;
receiving, at the service provider system, a vault designation for each of the plurality of content items;
receiving, at the service provider system, a lock-box designation for one or more of the plurality of content items; and
receiving, at the service provider system, access control instructions from the first source;
wherein the access control instructions determine the information required to be received by the service provider system prior to granting access one or more content items by a designated recipient.
0 Assignments
0 Petitions
Accused Products
Abstract
A computer-based service provides methods and apparatus for a user to manage a collection of information that the user wishes to share with, or distribute to, one or more designated recipients, typically at a future time, where the user controls the contents of the collection, and the times and rules under which the collection, or portions of the collection, may be accessed by, or delivered to, the one or more designated recipients; and where the resources for storing, retrieving, processing and communicating the collection of information is logically centralized and remote from the user.
-
Citations
23 Claims
-
1. A method, comprising:
-
providing, from a service provider system, a user interface; receiving, at the service provider system, one or more vault identifiers from a first source; receiving, at the service provider system, one or more lock-box identifiers from the first source; associating, at the service provider system, each of the one or more lock-box identifiers with a first one of the one or more vault identifiers; receiving, at the service provider system, a plurality of content items from the first source; receiving, at the service provider system, a vault designation for each of the plurality of content items; receiving, at the service provider system, a lock-box designation for one or more of the plurality of content items; and receiving, at the service provider system, access control instructions from the first source; wherein the access control instructions determine the information required to be received by the service provider system prior to granting access one or more content items by a designated recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of operating a service provider system, comprising:
-
receiving, at the service provider system, a plurality of content items; receiving, at the service provider system, a vault designation for each of the plurality of content items; receiving, at the service provider system, a lock-box designation for one or more of the plurality of content items; receiving, at the service provider system, a first set of vault access control instructions from a first source, the first set of vault access control instructions defining the process for granting access to the vault for at least a first designated recipient and a second designated recipient; receiving, at the service provider system, a first set of lock-box access control instructions from the first source, the first set of lock-box access control instructions defining the process for granting access to the lock-box for at least a first designated recipient and a second designated recipient; receiving, at the service provider system, a first set of content item access control instructions from a first source, the first set of content items access control instructions defining the process for granting access to the content items for at least a first designated recipient and a second designated recipient; receiving, at the service provider system, at least one access request from at least one source, the at least one source being one of the first and the second designated recipients; and determining, at the service provider system, whether to grant the at least one access request. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of operating a service provider system, comprising:
-
(a) receiving, at the service provider system, a plurality of content items from a user system, each of the plurality of content items having a vault designation associated therewith; (b) receiving, at the service provider system, a first set of vault access control instructions from a user system, the first set of vault access control instructions defining the process for granting access to the vault and its contents for at least a first designated recipient and a second designated recipient; (c) receiving, at the service provider system, a first communication from the first designated recipient; (d) determining, at the service provider system, whether the first designated recipient is required to have a physical security key; (e) transmitting, from the service provider system if the determination of (d) is affirmative, a query for information from the physical security key, the query addressed to the first designated recipient; (f) receiving, at the service provider system, a response to the query for information from the physical security key from the first designated recipient; (g) determining, at the service provider system, whether the physical security key is valid; (h) transmitting, from the service provider system if the determination of (g) is affirmative, data indicating that the service provider will accept an access request for processing (i) receiving, at the service provider system, the access request from the first designated recipient; and (j) determining, at the service provider system, whether to grant the access request. - View Dependent Claims (21, 22, 23)
-
Specification