DOCUMENT-AUTHORIZED ACCESS TO A SHARED WORKSPACE
First Claim
Patent Images
1. A computerized method comprising:
- requesting, over a network, a shared workspace be instantiated on a server for a local instance of a document, the shared workspace to store workflow data related to the document;
receiving, over the network, a key to an instantiated shared workspace on the server and a Uniform Resource Identifier of a network location of the shared workspace;
inserting the key and the Uniform Resource Identifier into the document, the key providing an association of the document to the shared workspace and being a sole credential for accessing data stored in the shared workspace at the network location of the Uniform Resource Identifier, wherein any user in possession of the document including the key authorizes the user access to the data stored in the shared workspace; and
saving the document.
2 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments described herein each provide one or more of systems, methods, software, and data structures that facilitate document-authorized access to a shared workspace. Some of these embodiments provide access to a shared workspace, such as a document review comment repository, through data embedded within a document. Mere possession of a document with a key, or other data element, allows a possessor of the document to participate in a workflow process.
53 Citations
29 Claims
-
1. A computerized method comprising:
-
requesting, over a network, a shared workspace be instantiated on a server for a local instance of a document, the shared workspace to store workflow data related to the document; receiving, over the network, a key to an instantiated shared workspace on the server and a Uniform Resource Identifier of a network location of the shared workspace; inserting the key and the Uniform Resource Identifier into the document, the key providing an association of the document to the shared workspace and being a sole credential for accessing data stored in the shared workspace at the network location of the Uniform Resource Identifier, wherein any user in possession of the document including the key authorizes the user access to the data stored in the shared workspace; and saving the document. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. (canceled)
-
9. A computerized method comprising:
-
accessing a document; retrieving data identifying a network location of a workflow repository and a first key from the document, the first key being a credential for utilizing the identified workflow repository; receiving input from a user, the input relating to the document; processing the input as a function of the first key to generate workflow information; and uploading the workflow information to the workflow repository identified in the document. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computerized method comprising:
-
receiving a workflow initiation request from an initiator over a network; verify the initiator is identified as an authorized user in a permission database; instantiating a workflow repository; issuing a symmetric encryption key to the initiator over the network upon successful verification in the permission database, the symmetric encryption key to be inserted into a document by the initiator as a sole credential to allow interaction with the instantiated workflow repository by users in possession of the document including the symmetric encryption key; maintaining an electronic record of the symmetric encryption key associated with the workflow repository; and storing received workflow data in the workflow repository responsive to the received workflow data being signed as a function of the symmetric encryption key. - View Dependent Claims (20)
-
-
21-23. -23. (canceled)
-
24. A system comprising:
-
a network; a server coupled to the network, the server operable to; receive, over the network, a shared workspace instantiation request from an initiator; verify the initiator is authorized to request instantiation of a shared workspace; upon verified authorization of the initiator, generating a shared workspace and a key associated to the shared workspace; storing the key in association to the shared workspace in a key-workspace data structure; sending, over the network, the key to the initiator, the key to be inserted into a document by the initiator as a sole credential to allow interaction with the generated shared workspace by users in possession of the document including the key. - View Dependent Claims (25, 26, 27, 28, 29)
-
Specification