System and method for securely synchronizing multiple copies of a workspace element in a network
DCFirst Claim
1. A computer-based method comprising the steps of:
- (a) generating first examination results from first version information which indicates whether a first workspace element stored at a first store within a firewall has been modified;
(b) generating second examination results from second version information which indicates whether an independently-modifiable copy of the first workspace element has been modified, the copy being stored at a second store outside the firewall;
(c) initiating steps (a) and (b) from within the firewall when predetermined criteria have been satisfied;
(d) generating a preferred version from the first workspace element and from the copy based on the first and second examination results; and
(e) storing the preferred version at the first store and at the second store.
10 Assignments
Litigations
0 Petitions
Reexaminations
Accused Products
Abstract
A system includes a general synchronization module at the client site for operating within a first firewall and for examining first version information to determine whether a first workspace element has been modified. The system further includes a synchronization agent at a global server for operating outside the first firewall and for forwarding to the general synchronization module second version information which indicates whether an independently-modifiable copy of the first workspace element has been modified. A synchronization-start module is maintained at the client site for operating within the first firewall and for securely initiating the general synchronization module and the synchronization agent when predetermined criteria have been satisfied. The system further includes means for generating a preferred version from the first workspace element and from the copy by comparing the first version information and the second version information, and means for storing the preferred version at the first store and at the second store.
505 Citations
25 Claims
-
1. A computer-based method comprising the steps of:
-
(a) generating first examination results from first version information which indicates whether a first workspace element stored at a first store within a firewall has been modified; (b) generating second examination results from second version information which indicates whether an independently-modifiable copy of the first workspace element has been modified, the copy being stored at a second store outside the firewall; (c) initiating steps (a) and (b) from within the firewall when predetermined criteria have been satisfied; (d) generating a preferred version from the first workspace element and from the copy based on the first and second examination results; and (e) storing the preferred version at the first store and at the second store. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
a general synchronization module for operating within a first firewall and for examining first version information to determine whether a first workspace element has been modified; a synchronization agent for operating outside the first firewall and for forwarding to the general synchronization module second version information which indicates whether an independently modifiable copy of the first workspace element has been modified; a synchronization-start module for operating within the first firewall and for initiating the general synchronization module and the synchronization agent when predetermined criteria have been satisfied; means for generating a preferred version from the first workspace element and from the copy by comparing the first version information and the second version information; and means for storing the preferred version at the first store and at the second store. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system comprising:
-
first means for generating first examination results from first version information which indicates whether a first workspace element stored at a first store within a firewall has been modified; second means for generating second examination results from second version information which indicates whether an independently-modifiable copy of the first workspace element has been modified, the copy being stored at a second store outside the firewall; means for initiating the first and second means from within the firewall when predetermined criteria have been satisfied; means for generating a preferred version from the first workspace element and from the copy based on the first and second examination results; and means for storing the preferred version at the first store and at the second store.
-
-
22. A computer-readable storage medium storing program code for causing a computer to perform the steps of:
-
(a) generating first examination results from first version information which indicates whether a first workspace element stored at a first store within a firewall has been modified; (b) generating second examination results from second version information which indicates whether an independently-modifiable copy of the first workspace element has been modified, the copy being stored at a second store outside the firewall; (c) initiating steps (a) and (b) from within the firewall when predetermined criteria have been satisfied; (d) generating a preferred version from the first workspace element and from the copy based on the first and second examination results; and (e) storing the preferred version at the first store and at the second store.
-
-
23. A computer-based method comprising the steps of:
-
(a) generating first examination results from first version information which indicates whether a first workspace element stored at a first store within a firewall has been modified; (b) generating second examination results from second version information which indicates whether an independently-modifiable copy of the first workspace element has been modified, the copy being stored at a second store outside the firewall; (c) initiating steps (a) and (b) from within the firewall when predetermined criteria have been satisfied; (d) determining based on the first and second examination results that both the first workspace element and the copy have been modified; and (e) storing both the first workspace element and the copy at the first store and at the second store.
-
-
24. A system comprising:
-
first means for generating first examination results from first version information which indicates whether a first workspace element stored at a first store within a firewall has been modified; second means for generating second examination results from second version information which indicates whether an independently-modifiable copy of the first workspace element has been modified, the copy being stored at a second store outside the firewall; means for initiating the first and second means from within the firewall when predetermined criteria have been satisfied; means for determining based on the first and second examination results that both the first workspace element and the copy have been modified; and means for storing both the first file and the copy at the first store and at the second store.
-
-
25. A system comprising:
-
a global server for operating outside a firewall and including memory for storing first workspace data and corresponding first version information; and a synchronization agent for managing the first workspace data and the corresponding first version information and for communicating with remote clients; and a remote client for operating within the firewall and including memory for storing second workspace data and corresponding second version information; means for cooperating with the synchronization agent to synchronize the first workspace data with the second workspace data by examining the first version information and the second version information; and a synchronization-start module for initiating workspace data synchronization between the global server and the remote client.
-
Specification