SECURE WORKFLOW AND DATA MANAGEMENT FACILITY
7 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a computer program that provides a secure workflow environment through a cloud computing facility, wherein the secure workflow environment may be adapted to (1) provide a plurality of users with a workspace adaptable to provide secure document management and secure communications management, wherein the users comprise at least two classes of user, including a participant and a subscriber, the subscriber having control authority within the workspace that exceeds that of the participant and the participant having control over at least some of the participants own interactions with the workspace, (2) maintain a secure instance of each communication provided by each of the users such that each communication can be managed, (3) maintain a secure instance of each document interaction provided by each user such that each interaction can be managed; and extending the secure workflow environment to the users through a secure network connection.
27 Citations
29 Claims
-
1-3. -3. (canceled)
-
4. A system for securely sharing information between a subscriber user and a guest user, comprising:
-
a subscriber package operating on a subscriber computing device used by the subscriber user and in secure communication with a server, and a guest package operating on a guest computing device used by the guest user and in secure communication with the server, wherein the server is configured;
(1) to accept from the subscriber user through the subscriber package the information to be shared with the guest user and a restriction on the guest user'"'"'s interaction with the information, and (2) to fully and exclusively control the guest user'"'"'s interaction with the information through the guest package based on the restriction. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12, 13, 24, 26, 28)
-
-
14. A system for securely sharing information between a sender and a recipient user, comprising:
-
a sender package operating on a sender computing device used by the sender and in secure communication with a server, and a recipient package operating on a recipient computing device used by the recipient and in secure communication with the server, wherein the server is configured;
(1) to accept from the sender through the sender package the information to be shared with the recipient and a restriction on the recipient'"'"'s interaction with the information, and (2) to fully and exclusively control the recipient'"'"'s interaction with the information through the recipient package based on the restriction. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 25, 27, 29)
-
Specification