SECURE FILE TRANSFER SYSTEMS AND METHODS
First Claim
1. A secure file transfer system, comprising:
- processing resources including at least one processor and a memory; and
a non-transitory data store;
wherein the processing resources are configured to;
receive requests from customers to establish top-level accounts with the secure file transfer system,in response to received requests;
allocate portions of the non-transitory data store for the customers making the respective requests, andcreate a dedicated portal for each said top-level account, andfacilitate transfers of computer-storable assets to and/or from users associated with the respective top-level accounts through downloads and/or uploads of such assets through the respective dedicated portals and using the respective allocated portions of the non-transitory data store; and
wherein desired top-level account configuration details, including procedural approaches to be used in transferring computer-storable assets, whether client devices involved in transferences of computer-storable assets are internal and/or external to the respective customers, and aspects of how the top-level account will be managed in terms of user roles, are not known to the secure file transfer system prior to being deployed by the top-level account customers themselves.
2 Assignments
0 Petitions
Accused Products
Abstract
Certain example embodiments relate to file transfer systems and/or methods that enable a single provider to offer to different customers customizable file transfer solutions that are secure, scalable to handle enterprise-level amounts of data, and able to meet customer-specific needs even though such needs are not necessarily known in advance. Once initially set up, the file transfer solution of certain example embodiments delegates management of the customer-specific instances of the solution, optionally in a sub-delegatable manner and, thus, the single provider need not be consulted after specific initial instance deployment time (e.g., for security management and/or other routine maintenance issues).
-
Citations
34 Claims
-
1. A secure file transfer system, comprising:
-
processing resources including at least one processor and a memory; and a non-transitory data store; wherein the processing resources are configured to; receive requests from customers to establish top-level accounts with the secure file transfer system, in response to received requests; allocate portions of the non-transitory data store for the customers making the respective requests, and create a dedicated portal for each said top-level account, and facilitate transfers of computer-storable assets to and/or from users associated with the respective top-level accounts through downloads and/or uploads of such assets through the respective dedicated portals and using the respective allocated portions of the non-transitory data store; and wherein desired top-level account configuration details, including procedural approaches to be used in transferring computer-storable assets, whether client devices involved in transferences of computer-storable assets are internal and/or external to the respective customers, and aspects of how the top-level account will be managed in terms of user roles, are not known to the secure file transfer system prior to being deployed by the top-level account customers themselves. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 32)
-
-
20. A method of operating a secure file transfer system having processing resources including at least one processor and a memory, as well as a non-transitory data store, the method comprising:
-
receiving requests from customers to establish top-level accounts with the secure file transfer system; in response to a received request to establish a top-level account; allocating a portion of the non-transitory data store for the customer making the respective request, and creating a dedicated portal for the respective top-level account; and facilitating transfers of computer-storable assets to and/or from users associated with the respective top-level accounts through downloads and/or uploads of such assets through respective dedicated portals and using respective allocated portions of the non-transitory data store; and wherein desired top-level account configuration details, including procedural approaches to be used in transferring computer-storable assets, whether client devices involved in transferences of computer-storable assets are internal and/or external to the respective customers, and aspects of how the top-level account will be managed in terms of user roles, are not known to the secure file transfer system prior to being deployed by the top-level account customers themselves. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 33)
-
-
29. At least one non-transitory computer readable storage medium tangibly storing instructions that, when performed by processing resources including at least one processor of a secure file transfer system, at least:
-
process requests received from customers to establish top-level accounts with the secure file transfer system; in response to a received request to establish a top-level account; allocate a portion of a non-transitory data store of the secure file transfer system for the customer making the respective request, and create a dedicated portal for each said top-level account; and facilitate transfers of computer-storable assets to and/or from users associated with the respective top-level accounts through downloads and/or uploads of such assets through the respective dedicated portals and using the respective allocated portions of the non-transitory data store; and wherein desired top-level account configuration details, including procedural approaches to be used in transferring computer-storable assets, whether client devices involved in transferences of computer-storable assets are internal and/or external to the respective customers, and aspects of how the top-level account will be managed in terms of user roles, are not known to the secure file transfer system prior to being deployed by the top-level account customers themselves. - View Dependent Claims (34)
-
-
30. The at least one non-transitory computer readable storage medium, wherein:
-
each said top-level account is scalable to accommodate enterprise levels of data throughput and storage, as well as enterprise levels of user numbers, even though a need for corresponding scalability is not necessarily known to the secure file transfer system prior to being triggered by actual usage of the secure file transfer system; procedural approaches to be used in transferring computer-storable assets indicate whether each said customer anticipates transferring assets with;
(a) one or more other customers;
(b) one or more users who are not customers but have one or more respective portals set up for them by the respective customer;
(c) one or more users who are not customers and do not have any portals set up for them; and
/or (d) one or more users using an API that communicates with the secure file transfer system;at least some client devices involved in transferences of computer-storable assets are external to the respective customers and have sub-accounts created by those customers wishing to exchange files with them; and further instructions are provided to at least enable; assignment to exactly one user of each said account a top-level account owner user role, delegation to each said customer the ability to assign hierarchical user roles to users associated with the respective top-level account, the assignable hierarchical user roles being below the level of the top-level account owner user role, emailing, using the processing resources, first notifications to users letting them know that assets are ready to be downloaded, and emailing, using the processing resources, second notifications, requesting that assets be uploaded, and wherein the first and second notifications include links to portals facilitating the downloading and/or uploading of assets.
-
-
31. A file transfer system, comprising:
-
processing resources including at least one processor; and a non-transitory data store; wherein the processing resources are configured to; maintain a plurality of file transfer system instances, each said file transfer system instance being scalable to accommodate a number of users expected for an enterprise-wide operation and an amount of data suitable for an enterprise, regardless of how many users actually use, and how much data is actually stored to the non-transitory data store in connection with, the respective file transfer system instance; generate new file transfer system instances upon receipt of corresponding verified user requests; for each said file transfer system instance, provide a sub-delegable delegation of authority to exactly one administrator of the respective file transfer system instance that at least enables specification of an approach to be used in sharing data storable to the non-transitory data store among and/or between users who, directly or indirectly, use the respective file transfer system instance; and for each said file transfer system instance, facilitate the sharing of data, using the non-transitory data store and the respective specified approach to be used in sharing data, and in accordance with the respective sub-delegable delegation of authority, among and/or between the users who, directly or indirectly, use the respective file transfer system instance; and wherein, for each said file transfer system instance, (a) how the respective approach to be used in sharing data will be specified, (b) whether and how the respective sub-delegable delegation of authority will be distributed, (c) the identities of users, other than the one administrator, who will actually use the respective file transfer system instance, and (d) the amount of data that actually will be stored in connection with the respective file transfer system instance, are at least initially not known to the file transfer system and thereafter can be influenced by users in accordance with the respective sub-delegable delegation of authority in ways not knowable to the file transfer system in advance.
-
Specification