Method of enabling access to data structure
First Claim
Patent Images
1. A non-transitory computer readable storage medium including software that is adapted to control a computer to implement a processing method of controlling access to a spreadsheet, said processing method comprising the steps of:
- giving a user access to a single layer of a spreadsheet stored on a server, said single layer having continuous rows and columns and including, a first continuous portion of said single layer and a second continuous portion of said single layer; and
granting network access to said first portion of said single layer of said spreadsheet to a first sub-user at a first remote location from said server and a second sub-user while denying access to said second portion of said single layer of said spreadsheet to said first sub-user and said second sub-user, andgranting access to said second portion of said single layer of said spreadsheet to a third sub-user while denying access to said first portion of said single layer of said spreadsheet to said third sub-user,permitting said user to visually scroll between said first portion of said single layer and said second portion of single layer along said continuous rows or columns,accepting modification of a first cell in said first portion stored on said server by said first sub-user transmitting said modification over said network to said server, andaccepting further modification of a second cell in said first portion stored on said server by said second sub-user transmitting said further modification over said network to said server,reassigning said network access of the third sub-user granted to said second portion of the spreadsheet to another user.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of enabling access to a data structure is provided. The method includes designating e-mail addresses of users with respective sections of the data structure. The method also includes enabling access to the respective sections to users corresponding to the designated e-mail addresses.
-
Citations
14 Claims
-
1. A non-transitory computer readable storage medium including software that is adapted to control a computer to implement a processing method of controlling access to a spreadsheet, said processing method comprising the steps of:
-
giving a user access to a single layer of a spreadsheet stored on a server, said single layer having continuous rows and columns and including, a first continuous portion of said single layer and a second continuous portion of said single layer; and granting network access to said first portion of said single layer of said spreadsheet to a first sub-user at a first remote location from said server and a second sub-user while denying access to said second portion of said single layer of said spreadsheet to said first sub-user and said second sub-user, and granting access to said second portion of said single layer of said spreadsheet to a third sub-user while denying access to said first portion of said single layer of said spreadsheet to said third sub-user, permitting said user to visually scroll between said first portion of said single layer and said second portion of single layer along said continuous rows or columns, accepting modification of a first cell in said first portion stored on said server by said first sub-user transmitting said modification over said network to said server, and accepting further modification of a second cell in said first portion stored on said server by said second sub-user transmitting said further modification over said network to said server, reassigning said network access of the third sub-user granted to said second portion of the spreadsheet to another user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of controlling access to a spreadsheet, said method comprising the steps of:
-
giving a user access to a single layer of a spreadsheet stored on a server, said single layer having continuous rows and columns and including a first continuous portion of said single layer and a second continuous portion of said single layer; and granting network access to said first portion of said single layer of said spreadsheet to a first sub-user at a first remote location from said server and a second sub-user while denying access to said second portion of said single layer of said spreadsheet to said first sub-user and said second sub-user, granting network access to said second portion of said single layer of said spreadsheet to a third sub-user while denying access to said first portion of said single layer of said spreadsheet to said third sub-user, permitting said user to visually scroll between said first portion of said single layer and said second portion of said single layer along said continuous rows or columns, accepting modification of a first cell in said first portion stored on said server by said first sub-user transmitting said modification over said network to said server, and accepting further modification of a second cell in said first portion stored on said server by said second sub-user transmitting said further modification over said network to said server, reassigning said network access of the third sub-user granted to said second portion of the spreadsheet to another user. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification