Document-authorized access to a shared workspace
First Claim
Patent Images
1. A computerized method comprising:
- requesting, by a client initiator to a computer server over a computer network, a shared workspace be instantiated on the computer server for a local instance of an electronic document, the shared workspace being a data repository apart from the electronic document configured to store workflow data comprising data representative of one or more modifications, comments, or combinations thereof to the electronic document;
receiving, by the client initiator from the computer server over the computer network in response to the request, an encryption key to an instantiated shared workspace on the computer server and a Uniform Resource Identifier of a computer network location of the shared workspace, wherein the instantiated shared workspace is indexed by the encryption key in the computer server;
inserting the encryption key and the Uniform Resource Identifier into a metadata or other portion of the electronic document that will not affect a graphical presentation of the electronic document when displayed to a user, the encryption key being an identifier of the electronic document to the shared workspace and being a sole credential for accessing workflow data stored in the shared workspace at the computer network location of the Uniform Resource Identifier, wherein any user in possession of the electronic document including the encryption key authorizes the user access to the workflow data stored in the shared workspace including enabling the user to post data to the shared workspace representative of modifications and/or comments to the electronic document; and
saving the electronic document.
2 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments described herein each provide one or more of systems, methods, software, and data structures that facilitate document-authorized access to a shared workspace. Some of these embodiments provide access to a shared workspace, such as a document review comment repository, through data embedded within a document. Mere possession of a document with a key, or other data element, allows a possessor of the document to participate in a workflow process.
38 Citations
23 Claims
-
1. A computerized method comprising:
-
requesting, by a client initiator to a computer server over a computer network, a shared workspace be instantiated on the computer server for a local instance of an electronic document, the shared workspace being a data repository apart from the electronic document configured to store workflow data comprising data representative of one or more modifications, comments, or combinations thereof to the electronic document; receiving, by the client initiator from the computer server over the computer network in response to the request, an encryption key to an instantiated shared workspace on the computer server and a Uniform Resource Identifier of a computer network location of the shared workspace, wherein the instantiated shared workspace is indexed by the encryption key in the computer server; inserting the encryption key and the Uniform Resource Identifier into a metadata or other portion of the electronic document that will not affect a graphical presentation of the electronic document when displayed to a user, the encryption key being an identifier of the electronic document to the shared workspace and being a sole credential for accessing workflow data stored in the shared workspace at the computer network location of the Uniform Resource Identifier, wherein any user in possession of the electronic document including the encryption key authorizes the user access to the workflow data stored in the shared workspace including enabling the user to post data to the shared workspace representative of modifications and/or comments to the electronic document; and saving the electronic document. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computerized method comprising:
-
accessing a local instance of an electronic document stored in a computer memory; retrieving, from a metadata or other portion of the electronic document that will not affect a graphical presentation of the electronic document when displayed to a user, data comprising a Uniform Resource Identifier identifying a computer network location of a workflow repository on a computer server and a first encryption key, the first encryption key being an identifier of the electronic document to the workflow repository and a sole credential for transmitting workflow information to and from the identified workflow repository, the workflow repository being a data repository apart from the electronic document configured to store workflow information comprising data representative of modifications, comments, or combinations thereof to the electronic document, wherein any user in possession of the electronic document including the encryption key authorizes the user access to the workflow information; receiving input from a user, the input representative of modifications and/or comments to the electronic document; processing the input as a function of the first encryption key to generate workflow information; and uploading the workflow information to the workflow repository identified in the electronic document and indexed by the first encryption key in the server. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computerized method comprising:
-
receiving a workflow initiation request on a computer server from a client initiator over a computer network for an electronic document local to the client initiator; verify the client initiator is identified as an authorized user in a permission database; instantiating a workflow repository on the computer server, the workflow repository configured to store workflow data comprising data representative of modifications, comments, or combinations thereof; issuing a Uniform Resource Identifier and a symmetric encryption key from the computer server to the client initiator over the computer network upon successful verification in the permission database, the Uniform Resource Identifier and symmetric encryption key to be inserted, into a metadata or other portion of the electronic document that will not affect a graphical presentation of the electronic document when displayed to a user, by the client initiator, wherein the symmetric encryption key is a sole credential used to verify an association with the instantiated workflow repository and provide access thereto, to users in possession of the electronic document including the symmetric encryption key; maintaining an electronic record of the symmetric encryption key associated with the workflow repository for indexing; and storing received workflow data representative of modifications and/or comments to the electronic document in the workflow repository responsive to the received workflow data being signed as a function of the symmetric encryption key. - View Dependent Claims (17)
-
-
18. A system comprising:
-
a computer network; and a computer server coupled to the computer network, the computer server comprising instructions stored thereon that, when executed by the computer server, cause the computer server to; receive, over the computer network, a shared workspace instantiation request from a client initiator for an electronic document local to the client initiator; verify the client initiator is authorized to request instantiation of a shared workspace; upon verified authorization of the client initiator, generating a shared workspace, a Uniform Resource Identifier, and an encryption key associated to the shared workspace, the shared workspace being a data repository apart from the electronic document configured to store workflow data comprising data representative of modifications, comments, or combinations thereof to the electronic document; store the encryption key in association to the shared workspace in a key-workspace data structure for indexing the shared workspace; and send, over the computer network, the Uniform Resource Identifier and the encryption key to the client initiator, the Uniform Resource Identifier and the encryption key to be inserted, into a metadata or other portion of the electronic document that will not affect a graphical presentation of the electronic document when displayed to a user, by the client initiator as a sole credential used to verify association with the generated shared workspace and provide access thereto, to users in possession of the electronic document including the encryption key. - View Dependent Claims (19, 20, 21, 22, 23)
-
Specification