Computerized method and system for managing a community facility in a networked secure collaborative exchange environment
-
0Associated
Cases -
0Associated
Defendants -
0Accused
Products -
7Forward
Citations -
0
Petitions -
9
Assignments
First Claim
1. A method for managing a networked secure collaborative computer data exchange environment, the method comprising:
- establishing, by a secure exchange server controlled by an intermediate business entity, a client login data authentication procedure that allows at least one client computing device of a plurality of client computing devices operated by users of a plurality of business entities to access the secure exchange server, wherein communications between the secure exchange server and the plurality of client computing devices is through a communications network;
storing, by the secure exchange server, at least one client login authentication data for each of the plurality of client computing devices;
receiving content from a first of the plurality of client computing devices operated by a user of a first business entity of the plurality of business entities;
by the secure exchange server, permitting access to the received content for a subset of the plurality of client computing devices through an exchange content access facility, wherein the exchange content access facility is managed by at least one business entity of the plurality of business entities;
granting, by the secure exchange server, access to the received content to a second of the plurality of client computing devices operated by a user of a second business entity of the plurality of business entities when the secure exchange server receives from the second of the plurality of client computing devices its client login authentication data provided that the second of the plurality of client computing devices is one of the subset of the plurality of client computing devices; and
providing an exchange community facility where each of a plurality of users operating the plurality of client computing devices is enabled to establish a corresponding informational profile that is made accessible to other users operating the plurality of client computing devices and is enabled to find and interact with the other users based on the informational profile;
the method further comprising;
providing an electronic signature facility for managing a process of signing the received content by a user of at least one of the subset of the plurality of client computing devices, wherein the electronic signature facility provides for secure viewing of the received content as presented to a signing user through a computer display of the signing user'"'"'s client computing device.
9 Assignments
0 Petitions

Accused Products

Abstract
In embodiments of the present invention improved capabilities are described for managing a community facility in a networked secure collaborative computer data exchange environment, including providing an exchange community facility where each of a plurality of users operating a plurality of client computing devices is enabled to establish a corresponding informational profile that is made accessible to other users operating the plurality of client computing devices and is enabled to find and interact with the other users based on the informational profile.
227 Citations
Systems and methods of secure data exchange | ||
Patent #
US 9,613,190 B2
Filed 04/22/2015
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment with customer managed keys | ||
Patent #
US 9,654,450 B2
Filed 06/10/2016
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
Synchronoss Technologies Incorporated
|
Systems and methods of secure data exchange | ||
Patent #
US 9,762,553 B2
Filed 01/12/2017
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
Systems and methods of secure data exchange | ||
Patent #
US 10,033,702 B2
Filed 12/19/2015
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment | ||
Patent #
US 10,142,316 B2
Filed 01/27/2017
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
Litigation support in cloud-hosted file sharing and collaboration | ||
Patent #
US 10,346,937 B2
Filed 10/26/2016
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
Email effectivity facilty in a networked secure collaborative exchange environment | ||
Patent #
US 10,356,095 B2
Filed 12/16/2016
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
SYSTEM AND METHOD FOR DRM CONTENT MANAGEMENT | ||
Patent #
US 20110047080A1
Filed 08/17/2010
|
Current Assignee
Samsung Electronics Co. Ltd.
|
Sponsoring Entity
Samsung Electronics Co. Ltd.
|
Method and Apparatus for Passively Monitoring Online Video Viewing and Viewer Behavior | ||
Patent #
US 20110029666A1
Filed 10/14/2010
|
Current Assignee
Adobe Inc.
|
Sponsoring Entity
Adobe Inc.
|
Federation of email | ||
Patent #
US 20110154506A1
Filed 12/18/2009
|
Current Assignee
International Business Machines Corporation
|
Sponsoring Entity
International Business Machines Corporation
|
LEGAL COMPLIANCE, ELECTRONIC DISCOVERY AND ELECTRONIC DOCUMENT HANDLING OF ONLINE AND OFFLINE COPIES OF DATA | ||
Patent #
US 20110093471A1
Filed 09/07/2010
|
Current Assignee
CommVault Systems Incorporated
|
Sponsoring Entity
CommVault Systems Incorporated
|
Network management system and graphical user interface | ||
Patent #
US 7,966,388 B1
Filed 12/21/1999
|
Current Assignee
Qwest Communications International Incorporated
|
Sponsoring Entity
Qwest Communications International Incorporated
|
SECURE ENCRYPTED EMAIL SERVER | ||
Patent #
US 20110202756A1
Filed 02/15/2010
|
Current Assignee
VISITECH LLC
|
Sponsoring Entity
VISITECH LLC
|
UNIVERSALLY ACCESSIBLE ENCRYPTED INTERNET FILE SYSTEM FOR WIRED AND WIRELESS COMPUTING DEVICES SUPPLANTING SYNCHRONIZATION, BACKUP AND EMAIL FILE ATTACHMENT | ||
Patent #
US 20110184998A1
Filed 01/20/2011
|
Current Assignee
Palahnuk Samuel L., Newman Catherine M.
|
Sponsoring Entity
Palahnuk Samuel L., Newman Catherine M.
|
SECURE EXTRANET SERVER | ||
Patent #
US 20110173443A1
Filed 01/12/2010
|
Current Assignee
Phion AG
|
Sponsoring Entity
Phion AG
|
SOCIAL NETWORK WITH MULTIPLE LOGINS | ||
Patent #
US 20110289574A1
Filed 08/03/2011
|
Current Assignee
Excalibur IP LLC
|
Sponsoring Entity
Excalibur IP LLC
|
ACCELERATOR SYSTEM FOR USE WITH SECURE DATA STORAGE | ||
Patent #
US 20110296440A1
Filed 05/27/2011
|
Current Assignee
Security First Corp
|
Sponsoring Entity
Security First Corp
|
TARGETED ADVERTISING SYSTEM AND METHOD | ||
Patent #
US 20100161424A1
Filed 12/22/2008
|
Current Assignee
RPX Clearinghouse LLC
|
Sponsoring Entity
RPX Clearinghouse LLC
|
CLOUD GATEWAY SYSTEM FOR MANAGING DATA STORAGE TO CLOUD STORAGE SITES | ||
Patent #
US 20100333116A1
Filed 03/31/2010
|
Current Assignee
CommVault Systems Incorporated
|
Sponsoring Entity
CommVault Systems Incorporated
|
TRUSTED CARD SYSTEM USING SECURE EXCHANGE | ||
Patent #
US 20100042846A1
Filed 08/12/2009
|
Current Assignee
SECURE EXCHANGE SOLUTIONS LLC
|
Sponsoring Entity
SECURE EXCHANGE SOLUTIONS LLC
|
Adhoc secure document exchange | ||
Patent #
US 7,752,269 B2
Filed 01/19/2004
|
Current Assignee
Avaya Incorporated
|
Sponsoring Entity
Avaya Incorporated
|
PERSONAL AREA SOCIAL NETWORKING | ||
Patent #
US 20100005520A1
Filed 06/05/2009
|
Current Assignee
MEKEY INC
|
Sponsoring Entity
MEKEY INC
|
Networked chat and media sharing systems and methods | ||
Patent #
US 7,761,507 B2
Filed 05/17/2004
|
Current Assignee
Google LLC
|
Sponsoring Entity
Google Inc.
|
PORTABLE ELECTRONIC DEVICE WITH SPLIT VISION CONTENT SHARING CONTROL AND METHOD | ||
Patent #
US 20100138797A1
Filed 12/01/2008
|
Current Assignee
Sony Ericsson Mobile Communications USA Incorporated
|
Sponsoring Entity
Sony Ericsson Mobile Communications USA Incorporated
|
MAIDSAFE.NET | ||
Patent #
US 20100064354A1
Filed 06/01/2009
|
Current Assignee
David Irvine
|
Sponsoring Entity
David Irvine
|
Systems and Methods for Securely Providing Email | ||
Patent #
US 20100161961A1
Filed 12/16/2009
|
Current Assignee
UBS Business Solutions AG
|
Sponsoring Entity
UBS Business Solutions AG
|
Method, software program, and system for managing access to information and the transfer thereof | ||
Patent #
US 7,814,537 B2
Filed 01/19/2007
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
GESTURE-BASED DOCUMENT SHARING MANIPULATION | ||
Patent #
US 20100306670A1
Filed 05/29/2009
|
Current Assignee
Microsoft Technology Licensing LLC
|
Sponsoring Entity
Microsoft Technology Licensing LLC
|
Network Access Protection | ||
Patent #
US 20100325710A1
Filed 05/20/2010
|
Current Assignee
Cryptosoft Limited
|
Sponsoring Entity
Cryptosoft Limited
|
DYNAMIC DOCUMENT CONTEXT MARK-UP TECHNIQUE IMPLEMENTED OVER A COMPUTER NETWORK | ||
Patent #
US 20090012869A1
Filed 09/17/2008
|
Current Assignee
Amobee Inc.
|
Sponsoring Entity
Amobee Inc.
|
System and method for providing multi-party message-based voice communications | ||
Patent #
US 7,496,353 B2
Filed 11/21/2003
|
Current Assignee
INTELLISIST II INC.
|
Sponsoring Entity
INTELLISIST II INC.
|
Method and apparatus for encrypted communications to a secure server | ||
Patent #
US 7,509,490 B1
Filed 05/26/2000
|
Current Assignee
CA Inc. dba CA Technologies
|
Sponsoring Entity
Symantec Corporation
|
DEVICE, SYSTEM, AND METHOD OF FILE-UTILIZATION MANAGEMENT | ||
Patent #
US 20090100060A1
Filed 10/12/2008
|
Current Assignee
Blackberry Limited
|
Sponsoring Entity
Blackberry Limited
|
Methods and apparatus for categorizing failure messages that result from email messages | ||
Patent #
US 7,536,439 B1
Filed 12/02/2003
|
Current Assignee
Zeta Global Corp.
|
Sponsoring Entity
Acxiom Corporation
|
Generic security infrastructure for COM based systems | ||
Patent #
US 7,552,470 B2
Filed 11/21/2002
|
Current Assignee
Honeywell International Inc.
|
Sponsoring Entity
Honeywell International Inc.
|
SECURE SINGLE-SIGN-ON PORTAL SYSTEM | ||
Patent #
US 20090172795A1
Filed 08/01/2008
|
Current Assignee
Deluxe Corp.
|
Sponsoring Entity
Deluxe Corp.
|
SELECTIVELY OBSCURING THE PRESENTATION OF RESTRICTED DATA ITEMS | ||
Patent #
US 20090204580A1
Filed 06/19/2008
|
Current Assignee
eBay Inc.
|
Sponsoring Entity
eBay Inc.
|
System and methods for managing the distribution of electronic content | ||
Patent #
US 7,580,988 B2
Filed 04/05/2002
|
Current Assignee
Intertrust Technologies Corporation
|
Sponsoring Entity
Intertrust Technologies Corporation
|
Internet Access Server for Isolating the Internal Network from the External Network and A Process Method thereof | ||
Patent #
US 20090222535A1
Filed 01/11/2007
|
Current Assignee
Lin Zhu, Ni Haisheng
|
Sponsoring Entity
Lin Zhu, Ni Haisheng
|
Methods and systems for interchanging documents between a sender computer, a server and a receiver computer | ||
Patent #
US 7,587,504 B2
Filed 11/20/2006
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
Hardware-Bonded Credential Manager Method and System | ||
Patent #
US 20090259838A1
Filed 04/15/2008
|
Current Assignee
Authenex Incorporated
|
Sponsoring Entity
Authenex Incorporated
|
KEY-BASED CONTENT MANAGEMENT AND ACCESS SYSTEMS AND METHODS | ||
Patent #
US 20090327739A1
Filed 06/30/2008
|
Current Assignee
Verizon Patent and Licensing Incorporated
|
Sponsoring Entity
Verizon Patent and Licensing Incorporated
|
Method and system for secure remote storage of electronic media | ||
Patent #
US 20090328171A1
Filed 05/23/2008
|
Current Assignee
S1 Corporation
|
Sponsoring Entity
S1 Corporation
|
SECURE MESSAGE DELIVERY USING A TRUST BROKER | ||
Patent #
US 20090319781A1
Filed 06/23/2008
|
Current Assignee
Microsoft Technology Licensing LLC
|
Sponsoring Entity
Microsoft Technology Licensing LLC
|
Secure pre-caching through local superdistribution and key exchange | ||
Patent #
US 20090327729A1
Filed 03/30/2007
|
Current Assignee
Ricoh Company Limited
|
Sponsoring Entity
Ricoh Company Limited
|
Computer oriented record administration system | ||
Patent #
US 7,328,276 B2
Filed 12/18/2001
|
Current Assignee
CORANET SOLUTIONS INC.
|
Sponsoring Entity
CORANET SOLUTIONS LLC
|
System and Method for Offering a Title for Sale Over the Internet | ||
Patent #
US 20080120196A1
Filed 10/31/2007
|
Current Assignee
INGRAM DV LLC
|
Sponsoring Entity
-
|
REGISTERING AND ACCESSING VIRTUAL SYSTEMS FOR USE IN A MANAGED SYSTEM | ||
Patent #
US 20080134175A1
Filed 11/27/2007
|
Current Assignee
Red Hat Inc.
|
Sponsoring Entity
-
|
Providing A Generic Gateway For Accessing Protected Resources | ||
Patent #
US 20080178278A1
Filed 01/22/2007
|
Current Assignee
BITKOO LLC
|
Sponsoring Entity
-
|
Method and system for reducing the proliferation of electronic messages | ||
Patent #
US 20080196092A1
Filed 11/09/2007
|
Current Assignee
Koninklijke KPN NV
|
Sponsoring Entity
Koninklijke KPN NV
|
Method and System for Managing Metadata | ||
Patent #
US 20080201299A1
Filed 11/29/2004
|
Current Assignee
Nokia Corporation
|
Sponsoring Entity
Nokia Corporation
|
SECURE MANAGEMENT OF DOCUMENT IN A CLIENT-SERVER ENVIRONMENT | ||
Patent #
US 20080294899A1
Filed 01/12/2007
|
Current Assignee
Boardvantage Inc.
|
Sponsoring Entity
Boardvantage Inc.
|
Method and system for managing access to information and the transfer thereof | ||
Patent #
US 7,168,094 B1
Filed 12/28/2001
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
Compliance processing of rights managed data | ||
Patent #
US 20070056046A1
Filed 08/17/2006
|
Current Assignee
Emc IP Holding Company LLC
|
Sponsoring Entity
Emc IP Holding Company LLC
|
METHODS AND SYSTEMS FOR INTERCHANGING DOCUMENTS BETWEEN A SENDER COMPUTER, A SERVER AND A RECEIVER COMPUTER | ||
Patent #
US 20070088846A1
Filed 11/20/2006
|
Current Assignee
Jenkins Richard, Conklin William, Muldoon John, Mark Adams
|
Sponsoring Entity
Jenkins Richard, Conklin William, Muldoon John, Mark Adams
|
Process and apparatus for automatically identifying user of consumer electronics | ||
Patent #
US 20070079137A1
Filed 10/04/2005
|
Current Assignee
Sony Interactive Entertainment Inc.
|
Sponsoring Entity
Sony Interactive Entertainment Inc.
|
METHOD, SOFTWARE PROGRAM, AND SYSTEM FOR MANAGING ACCESS TO INFORMATION AND THE TRANSFER THEREOF | ||
Patent #
US 20070118889A1
Filed 01/19/2007
|
Current Assignee
Fredell Thomas
|
Sponsoring Entity
Fredell Thomas
|
Limited-use browser and security system | ||
Patent #
US 7,225,157 B2
Filed 12/21/2000
|
Current Assignee
Intellectual Ventures Assets 144 LLC
|
Sponsoring Entity
Copyright Clearance Center Inc.
|
System and method for sending a web page via electronic mail | ||
Patent #
US 7,231,426 B1
Filed 05/24/2000
|
Current Assignee
Microsoft Technology Licensing LLC
|
Sponsoring Entity
Microsoft Corporation
|
Computerized method and system for managing the exchange and distribution of confidential documents | ||
Patent #
US 7,233,992 B1
Filed 01/14/2000
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
Fleet National Bank
|
Critical function monitoring and compliance auditing system | ||
Patent #
US 20070136814A1
Filed 12/12/2005
|
Current Assignee
Hatfax Bruce, Wingad Jeffrey, Michael G. Lee
|
Sponsoring Entity
Hatfax Bruce, Wingad Jeffrey, Michael G. Lee
|
Extensible role based authorization for manageable resources | ||
Patent #
US 20070185875A1
Filed 02/09/2006
|
Current Assignee
International Business Machines Corporation
|
Sponsoring Entity
International Business Machines Corporation
|
Home server including a proxy facility, for executing an authentication and an encryption process instead of a user terminal, in an electronic commercial transaction | ||
Patent #
US 7,275,158 B2
Filed 04/10/2001
|
Current Assignee
Fujitsu Limited
|
Sponsoring Entity
Fujitsu Limited
|
Schema-based services for identity-based data access | ||
Patent #
US 7,302,634 B2
Filed 10/22/2001
|
Current Assignee
Microsoft Technology Licensing LLC
|
Sponsoring Entity
Microsoft Corporation
|
Systems and methods for managing email | ||
Patent #
US 7,296,058 B2
Filed 01/30/2002
|
Current Assignee
Swiss Reinsurance Company
|
Sponsoring Entity
WESTPORT INSURANCE CORPORATION
|
Apparatus and method for report sharing within an instant messaging framework | ||
Patent #
US 20070266104A1
Filed 07/17/2006
|
Current Assignee
Business Objects Incorporated
|
Sponsoring Entity
Business Objects Incorporated
|
Electronic document delivery system in which notification of said electronic document is sent to a recipient thereof | ||
Patent #
US 5,790,790 A
Filed 10/24/1996
|
Current Assignee
Axway Incorporated
|
Sponsoring Entity
Silicon Valley Bank
|
Methods and systems for interchanging documents between a sender computer, a server and a receiver computer | ||
Patent #
US 6,898,636 B1
Filed 02/04/2000
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
Universal electronic resource denotation, request and delivery system | ||
Patent #
US 5,764,906 A
Filed 11/07/1995
|
Current Assignee
FRANCAP CORPORATION
|
Sponsoring Entity
NETWORD LLC
|
Extranet architecture | ||
Patent #
US 6,453,348 B1
Filed 11/06/1998
|
Current Assignee
Rakuten Inc.
|
Sponsoring Entity
SBC Properties L.P.
|
System and method for providing anonymous remailing and filtering of electronic mail | ||
Patent #
US 6,591,291 B1
Filed 03/12/1998
|
Current Assignee
WSOU Investments LLC
|
Sponsoring Entity
Alcatel-Lucent USA Inc.
|
Filter for modeling system and method for handling and routing of text-based asynchronous communications | ||
Patent #
US 6,718,367 B1
Filed 06/01/1999
|
Current Assignee
GENERAL INTERACTIVE INC.
|
Sponsoring Entity
GENERAL INTERACTIVE INC.
|
Method and system for securely interacting with managed data from multiple devices | ||
Patent #
US 6,233,608 B1
Filed 06/07/1999
|
Current Assignee
Unwired Planet LLC
|
Sponsoring Entity
Openwave Systems Incorporated
|
Multi-threaded web based user inbox for report management | ||
Patent #
US 6,385,644 B1
Filed 09/24/1998
|
Current Assignee
Verizon Patent and Licensing Incorporated
|
Sponsoring Entity
WorldCom Inc.
|
Transmitting electronic mail by either reference or value at file-replication points to minimize costs | ||
Patent #
US 5,771,355 A
Filed 12/21/1995
|
Current Assignee
Intel Corporation
|
Sponsoring Entity
Intel Corporation
|
Rule based security policy enforcement | ||
Patent #
US 7,140,035 B1
Filed 02/01/2000
|
Current Assignee
Teleran Technologies Inc.
|
Sponsoring Entity
Teleran Technologies Inc.
|
Method and apparatus for authorizing remote internet access | ||
Patent #
US 5,898,780 A
Filed 10/09/1996
|
Current Assignee
Ipass Incorporated
|
Sponsoring Entity
-
|
Method and apparatus for delivering documents over an electronic network | ||
Patent #
US 6,385,655 B1
Filed 10/02/1997
|
Current Assignee
Axway Incorporated
|
Sponsoring Entity
Tumbleweed Communications Corporation
|
Method and system for secure communications | ||
Patent #
US 6,253,326 B1
Filed 05/29/1998
|
Current Assignee
Access Company Limited
|
Sponsoring Entity
Palm Inc.
|
System and method for synchronizing electronic mail between a client site and a central site | ||
Patent #
US 5,961,590 A
Filed 07/22/1997
|
Current Assignee
Good Technology Corporation
|
Sponsoring Entity
-
|
Methods and systems for interchanging documents between a sender computer, a server and a receiver computer | ||
Patent #
US 7,143,175 B2
Filed 04/19/2005
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
Web-based status/issue tracking system based on parameterized definition | ||
Patent #
US 6,370,575 B1
Filed 01/08/1999
|
Current Assignee
Advanced Micro Devices Inc.
|
Sponsoring Entity
Advanced Micro Devices Inc.
|
Contents sale system | ||
Patent #
US 6,889,208 B1
Filed 03/09/2000
|
Current Assignee
Rakuten Inc.
|
Sponsoring Entity
Victor Company of Japan Limited
|
Mobile document paging service | ||
Patent #
US 6,430,601 B1
Filed 03/16/1999
|
Current Assignee
Google LLC
|
Sponsoring Entity
Xerox Corporation
|
System and method for scheduling broadcast of and access to video programs and other data using customer profiles | ||
Patent #
US 6,088,722 A
Filed 12/24/1997
|
Current Assignee
Fred HERZ Patents LLC
|
Sponsoring Entity
iReactor Inc.
|
Private, trackable URLs for directed document delivery | ||
Patent #
US 6,192,407 B1
Filed 04/04/1997
|
Current Assignee
Axway Incorporated
|
Sponsoring Entity
Tumbleweed Communications Corporation
|
Method and apparatus for personal attribute selection having delay management method and apparatus for preference establishment when preferences in a donor device are unavailable | ||
Patent #
US 5,630,159 A
Filed 12/29/1994
|
Current Assignee
Google LLC
|
Sponsoring Entity
Motorola Inc.
|
Methods and systems for interchanging documents between a sender computer, a server and a receiver computer | ||
Patent #
US 20060031412A1
Filed 04/19/2005
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
Debugging applications under different permissions | ||
Patent #
US 20060048099A1
Filed 08/27/2004
|
Current Assignee
Microsoft Technology Licensing LLC
|
Sponsoring Entity
Microsoft Technology Licensing LLC
|
A System and Method to Capture, Filter, and Statistically Analyze Electronic Messages | ||
Patent #
US 20060047752A1
Filed 03/15/2005
|
Current Assignee
RECONDA INTERNATIONAL CORP.
|
Sponsoring Entity
RECONDA INTERNATIONAL CORP.
|
Secure e-mail messaging system | ||
Patent #
US 20060053280A1
Filed 09/02/2005
|
Current Assignee
Donald E. Kittle, Christopher Pape
|
Sponsoring Entity
Donald E. Kittle, Christopher Pape
|
User interface and anti-phishing functions for an anti-spam micropayments system | ||
Patent #
US 20060075028A1
Filed 09/07/2004
|
Current Assignee
Iconix Incorporated
|
Sponsoring Entity
Iconix Incorporated
|
Method and system for search, analysis and display of structured data | ||
Patent #
US 20060136417A1
Filed 12/17/2004
|
Current Assignee
General Electric Company
|
Sponsoring Entity
General Electric Company
|
Document management system and method | ||
Patent #
US 7,146,367 B2
Filed 05/31/2002
|
Current Assignee
Advectis Inc.
|
Sponsoring Entity
Advectis Inc.
|
DOCUMENT SIMILARITY DETECTION AND CLASSIFICATION SYSTEM | ||
Patent #
US 20050060643A1
Filed 08/12/2004
|
Current Assignee
Jeffrey B. Glass
|
Sponsoring Entity
Jeffrey B. Glass
|
Determining strategies for increasing loyalty of a population to an entity | ||
Patent #
US 20050091077A1
Filed 08/25/2004
|
Current Assignee
Tom Reynolds
|
Sponsoring Entity
Tom Reynolds
|
System and method for auditing the security of an enterprise | ||
Patent #
US 20050102534A1
Filed 11/12/2003
|
Current Assignee
Hewlett-Packard Development Company L.P.
|
Sponsoring Entity
Hewlett-Packard Development Company L.P.
|
Object-based access control | ||
Patent #
US 20050114661A1
Filed 11/25/2003
|
Current Assignee
SAP SE
|
Sponsoring Entity
SAP SE
|
System and method for an application provider framework | ||
Patent #
US 6,904,449 B1
Filed 01/14/2000
|
Current Assignee
Accenture Global Services Limited
|
Sponsoring Entity
Accenture LLP
|
Data security system and method with multiple independent levels of security | ||
Patent #
US 20050138110A1
Filed 11/26/2004
|
Current Assignee
Nemzow Martin A., Redlich Ron M.
|
Sponsoring Entity
Nemzow Martin A., Redlich Ron M.
|
Method and system for a virtual safe | ||
Patent #
US 6,941,285 B2
Filed 10/11/2002
|
Current Assignee
Sarcanin Branko
|
Sponsoring Entity
Sarcanin Branko
|
System and method for processing audit records | ||
Patent #
US 20050193043A1
Filed 02/28/2005
|
Current Assignee
Siemens Medical Solutions Health Services Corporation
|
Sponsoring Entity
Siemens Medical Solutions Health Services Corporation
|
System and method for hierarchical data document modification | ||
Patent #
US 20050193009A1
Filed 02/27/2004
|
Current Assignee
SAP SE
|
Sponsoring Entity
SAP SE
|
New document management and access control by document's attributes for document query system | ||
Patent #
US 20050240572A1
Filed 04/26/2004
|
Current Assignee
Taiwan Semiconductor Manufacturing Company Limited
|
Sponsoring Entity
Taiwan Semiconductor Manufacturing Company Limited
|
Electronic document management system | ||
Patent #
US 20050231738A1
Filed 03/10/2005
|
Current Assignee
eLynx Ltd.
|
Sponsoring Entity
eLynx Ltd.
|
Data access control techniques using roles and permissions | ||
Patent #
US 20040006594A1
Filed 11/26/2002
|
Current Assignee
FTF TECHNOLOGIES INC.
|
Sponsoring Entity
FTF TECHNOLOGIES INC.
|
Computerized method and system for communicating and managing information used in task-oriented projects | ||
Patent #
US 6,678,698 B2
Filed 02/14/2001
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
Customized user interface based on user profile information | ||
Patent #
US 20040034646A1
Filed 04/30/2002
|
Current Assignee
Facebook Inc.
|
Sponsoring Entity
Facebook Inc.
|
Management of security objects controlling access to resources | ||
Patent #
US 20040054790A1
Filed 09/12/2002
|
Current Assignee
International Business Machines Corporation
|
Sponsoring Entity
International Business Machines Corporation
|
Data management system, method, and recording medium | ||
Patent #
US 20040049730A1
Filed 03/06/2003
|
Current Assignee
BEACON INFORMATION TECHNOLOGY INC.
|
Sponsoring Entity
BEACON INFORMATION TECHNOLOGY INC.
|
General access system | ||
Patent #
US 6,738,981 B1
Filed 11/28/1997
|
Current Assignee
Telefonaktiebolaget LM Ericsson
|
Sponsoring Entity
Telefonaktiebolaget LM Ericsson
|
System and method for providing distributed access control to secured items | ||
Patent #
US 20040103202A1
Filed 02/12/2002
|
Current Assignee
Intellectual Ventures I LLC
|
Sponsoring Entity
Intellectual Ventures I LLC
|
Method and apparatus for secure instant messaging utilizing server-supervised publication | ||
Patent #
US 20040210772A1
Filed 11/19/2003
|
Current Assignee
Google LLC
|
Sponsoring Entity
-
|
Method and apparatus for encrypted communications to a secure server | ||
Patent #
US 20040230820A1
Filed 02/22/2001
|
Current Assignee
Symantec Corporation
|
Sponsoring Entity
-
|
Control of access to data content for read and/or write operations | ||
Patent #
US 20040221118A1
Filed 01/29/2004
|
Current Assignee
Hewlett-Packard Development Company L.P.
|
Sponsoring Entity
-
|
Mechanism for building access control structures for authoring systems | ||
Patent #
US 6,816,906 B1
Filed 05/08/2000
|
Current Assignee
International Business Machines Corporation
|
Sponsoring Entity
International Business Machines Corporation
|
Resource classification and prioritization system | ||
Patent #
US 20040267762A1
Filed 06/24/2003
|
Current Assignee
Microsoft Technology Licensing LLC
|
Sponsoring Entity
-
|
Defending the name space | ||
Patent #
US 20040255137A1
Filed 01/08/2004
|
Current Assignee
Shuqian Ying
|
Sponsoring Entity
-
|
Graphical user interface for browsing, searching and presenting media items | ||
Patent #
US 20040268451A1
Filed 04/26/2004
|
Current Assignee
Apple Inc.
|
Sponsoring Entity
-
|
Supply chain management system, computer product and method with data exchange means | ||
Patent #
US 20030014270A1
Filed 07/16/2001
|
Current Assignee
LOGITEK TECHNOLOGY LTD.
|
Sponsoring Entity
LOGITEK TECHNOLOGY LTD.
|
Token-based document transactions | ||
Patent #
US 6,515,988 B1
Filed 07/17/1998
|
Current Assignee
Xerox Corporation
|
Sponsoring Entity
Xerox Corporation
|
Private, trackable URLs for directed document delivery | ||
Patent #
US 6,529,956 B1
Filed 03/09/2000
|
Current Assignee
Tumbleweed Communications Corporation
|
Sponsoring Entity
Tumbleweed Communications Corporation
|
Techniques for restoring data based on contents and attributes of the data | ||
Patent #
US 20030046313A1
Filed 08/26/2002
|
Current Assignee
Arkivio
|
Sponsoring Entity
Arkivio
|
Access system interface | ||
Patent #
US 20030074580A1
Filed 03/21/2001
|
Current Assignee
Oracle International Corporation
|
Sponsoring Entity
Oracle International Corporation
|
Methodology for enabling multi-party collaboration across a data network | ||
Patent #
US 20030097410A1
Filed 10/04/2001
|
Current Assignee
LIGHTSURF TECHNOLOGIES INC.
|
Sponsoring Entity
LIGHTSURF TECHNOLOGIES INC.
|
Filter-based attribute value access control | ||
Patent #
US 20030105978A1
Filed 11/13/2001
|
Current Assignee
Oracle America Inc.
|
Sponsoring Entity
Oracle America Inc.
|
Controlling the distribution of information | ||
Patent #
US 20030115481A1
Filed 12/18/2001
|
Current Assignee
Hewlett-Packard Development Company L.P.
|
Sponsoring Entity
-
|
System and device for using attribute information | ||
Patent #
US 20030105764A1
Filed 11/21/2002
|
Current Assignee
Matsushita Electric Industrial Company Limited
|
Sponsoring Entity
-
|
Collaborative file access management system | ||
Patent #
US 20030105734A1
Filed 11/16/2001
|
Current Assignee
CRUCIAN GLOBAL SERVICES INC.
|
Sponsoring Entity
-
|
Self-destructing document and e-mail messaging system | ||
Patent #
US 20030126215A1
Filed 08/12/2002
|
Current Assignee
S Aqua Semiconductor LLC
|
Sponsoring Entity
-
|
Method and system for maintaining secure access to web server services using permissions delegated via electronic messaging systems | ||
Patent #
US 20030172296A1
Filed 03/05/2002
|
Current Assignee
Probaris Technologies Inc.
|
Sponsoring Entity
Probaris Technologies Inc.
|
Systems and methods for providing self-governing online communities | ||
Patent #
US 20030189592A1
Filed 04/05/2002
|
Current Assignee
Dan Peter Boresjo
|
Sponsoring Entity
Dan Peter Boresjo
|
File level security for a metadata controller in a storage area network | ||
Patent #
US 20030221124A1
Filed 05/23/2002
|
Current Assignee
International Business Machines Corporation
|
Sponsoring Entity
International Business Machines Corporation
|
Method and apparatus for performing multi-server threshold password-authenticated key exchange | ||
Patent #
US 20030221102A1
Filed 05/24/2002
|
Current Assignee
Lucent Technologies Inc.
|
Sponsoring Entity
Lucent Technologies Inc.
|
Method in connection with a spreadsheet program | ||
Patent #
US 20030226105A1
Filed 05/29/2003
|
Current Assignee
FRAMTIDSFORUM I M AB
|
Sponsoring Entity
FRAMTIDSFORUM I M AB
|
Self-improving system and method for classifying pages on the world wide web | ||
Patent #
US 20030225763A1
Filed 04/14/2003
|
Current Assignee
Microsoft Technology Licensing LLC
|
Sponsoring Entity
-
|
Method and apparatus for browsing using multiple coordinated device sets | ||
Patent #
US 20030229900A1
Filed 05/08/2003
|
Current Assignee
Convergent Media Solutions LLC
|
Sponsoring Entity
-
|
Method and apparatus for peer-to-peer file sharing | ||
Patent #
US 20030225796A1
Filed 05/31/2002
|
Current Assignee
Hitachi America Limited
|
Sponsoring Entity
-
|
Method for automatic permission management in role-based access control systems | ||
Patent #
US 20020026592A1
Filed 06/14/2001
|
Current Assignee
Vdg Inc.
|
Sponsoring Entity
Vdg Inc.
|
Method for secure distribution of documents over electronic networks | ||
Patent #
US 20020016910A1
Filed 02/09/2001
|
Current Assignee
John A. Macoviak, Robert P. Wright
|
Sponsoring Entity
John A. Macoviak, Robert P. Wright
|
Systems and methods for distributing and viewing electronic documents | ||
Patent #
US 20020035697A1
Filed 07/02/2001
|
Current Assignee
Zinio LLC
|
Sponsoring Entity
Zinio LLC
|
Secure token-based document server | ||
Patent #
US 6,397,261 B1
Filed 03/16/1999
|
Current Assignee
Google LLC
|
Sponsoring Entity
Xerox Corporation
|
Method and apparatus for group action processing between users of a collaboration system | ||
Patent #
US 6,421,678 B2
Filed 10/20/1999
|
Current Assignee
Actioneer Inc., Actioneer Inc. San Francisco CA
|
Sponsoring Entity
Actioneer Inc., Actioneer Inc. San Francisco CA
|
Delegated administration of information in a database directory using attribute permissions | ||
Patent #
US 20020095499A1
Filed 01/16/2001
|
Current Assignee
General Electric Company
|
Sponsoring Entity
General Electric Company
|
Information processing method, apparatus, and system for controlling computer resources, control method therefor, storage medium, and program | ||
Patent #
US 20020099837A1
Filed 11/19/2001
|
Current Assignee
HUMMING HEADS INC.
|
Sponsoring Entity
HUMMING HEADS INC.
|
Methods and apparatus for secure electronic, certified, restricted delivery mail systems | ||
Patent #
US 6,442,571 B1
Filed 10/24/2000
|
Current Assignee
Intellectual Ventures I LLC
|
Sponsoring Entity
HyperSpace Communications Inc.
|
Method and system for targeted content presentation in a communications network | ||
Patent #
US 20020112240A1
Filed 11/20/2001
|
Current Assignee
HBAC Matchmaker Media Incorporated
|
Sponsoring Entity
HBAC Matchmaker Media Incorporated
|
Method of gathering local demand data for entertainment performances | ||
Patent #
US 20020123924A1
Filed 03/04/2002
|
Current Assignee
Benjamin G. Cruz
|
Sponsoring Entity
Benjamin G. Cruz
|
Method and system for providing a secure peer-to peer file delivery network | ||
Patent #
US 20020138744A1
Filed 03/21/2001
|
Current Assignee
Qurio Holdings Incorporated
|
Sponsoring Entity
Qurio Holdings Incorporated
|
Electronic procurement | ||
Patent #
US 20020156695A1
Filed 01/18/2002
|
Current Assignee
GLOBALSERVE COMPUTER SERVICES LTD.
|
Sponsoring Entity
GLOBALSERVE COMPUTER SERVICES LTD.
|
Access right setting device and manager terminal | ||
Patent #
US 20020162005A1
Filed 12/26/2001
|
Current Assignee
Matsushita Electric Industrial Company Limited
|
Sponsoring Entity
Matsushita Electric Industrial Company Limited
|
Secure electronic commerce | ||
Patent #
US 20020162027A1
Filed 02/22/2002
|
Current Assignee
Riavera Corp.
|
Sponsoring Entity
Riavera Corp.
|
Network-access management system and method applied to network and computer program product including computer program recorded on storage medium for creating display data | ||
Patent #
US 6,487,557 B1
Filed 12/22/1998
|
Current Assignee
Intellectual Ventures Fund 81 LLC
|
Sponsoring Entity
Casio Computer Company
|
REPORT SEARCHING IN A MERGER AND ACQUISITION ENVIRONMENT | ||
Patent #
US 20020184191A1
Filed 11/23/1999
|
Current Assignee
Accenture Global Services Limited
|
Sponsoring Entity
Accenture Global Services Limited
|
Standalone device for identifying available document services in a token-enabled operating environment | ||
Patent #
US 6,493,760 B1
Filed 06/28/1999
|
Current Assignee
Xerox Corporation
|
Sponsoring Entity
Xerox Corporation
|
Network based groupware system | ||
Patent #
US 6,223,177 B1
Filed 11/19/1998
|
Current Assignee
Ip Ot Sub Ulc
|
Sponsoring Entity
INVOLV INTERNATIONAL CORPORATION
|
Method for blocking all unwanted e-mail (SPAM) using a header-based password | ||
Patent #
US 6,266,692 B1
Filed 01/04/1999
|
Current Assignee
Trend Micro America Inc.
|
Sponsoring Entity
International Business Machines Corporation
|
Platform-neutral system and method for providing secure remote operations over an insecure computer network | ||
Patent #
US 20010020274A1
Filed 01/12/2001
|
Current Assignee
OL Security LLC
|
Sponsoring Entity
OL Security LLC
|
Method, system, storage medium and server apparatus for controlling workflow | ||
Patent #
US 20010027477A1
Filed 12/27/2000
|
Current Assignee
International Business Machines Corporation
|
Sponsoring Entity
International Business Machines Corporation
|
Computerized method and system for communicating and managing information used in task-oriented projects | ||
Patent #
US 20010028364A1
Filed 02/14/2001
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
Method and apparatus for trading securities electronically | ||
Patent #
US 6,029,146 A
Filed 08/21/1996
|
Current Assignee
Citibank South Dakota NA
|
Sponsoring Entity
CROSSMARK Incorporated
|
Method and system for determining the location for performing file-format conversions of electronics message attachments | ||
Patent #
US 6,092,114 A
Filed 04/17/1998
|
Current Assignee
Unify Inc.
|
Sponsoring Entity
Siemens Information And Communication Networks Inc.
|
Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information | ||
Patent #
US 6,112,181 A
Filed 11/06/1997
|
Current Assignee
Intertrust Technologies Corporation
|
Sponsoring Entity
Intertrust Technologies Corporation
|
Secure database management system for confidential records using separately encrypted identifier and access request | ||
Patent #
US 6,148,342 A
Filed 01/13/1999
|
Current Assignee
Andrew P. Ho
|
Sponsoring Entity
Andrew P. Ho
|
Method and apparatus for transmitting electronic mail attachments with attachment references | ||
Patent #
US 5,903,723 A
Filed 12/21/1995
|
Current Assignee
Incyte Pharmaceuticals Inc.
|
Sponsoring Entity
-
|
Method for providing secure remote command execution over an insecure computer network | ||
Patent #
US 5,923,756 A
Filed 02/12/1997
|
Current Assignee
OL Security LLC
|
Sponsoring Entity
-
|
On-line database updating network system and method | ||
Patent #
US 5,937,405 A
Filed 11/12/1997
|
Current Assignee
Deep9 Corporation
|
Sponsoring Entity
-
|
System for electrically distributing personalized information | ||
Patent #
US 5,721,827 A
Filed 10/02/1996
|
Current Assignee
Personal Audio LLC
|
Sponsoring Entity
James D Logan and Kerry M Logan Family Trust
|
Transmitting electronic mail attachment over a network using a e-mail page | ||
Patent #
US 5,781,901 A
Filed 12/21/1995
|
Current Assignee
Intel Corporation
|
Sponsoring Entity
Intel Corporation
|
System and method for providing trusted brokering services over a distributed network | ||
Patent #
US 5,815,665 A
Filed 04/03/1996
|
Current Assignee
Microsoft Technology Licensing LLC
|
Sponsoring Entity
Microsoft Corporation
|
Apparatus for a host central processor with associated controller to capture a selected one of a number of memory units via path control commands | ||
Patent #
US 5,630,169 A
Filed 03/29/1996
|
Current Assignee
Unisys Corporation
|
Sponsoring Entity
Unisys Corporation
|
On-line database updating network system and method | ||
Patent #
US 5,694,596 A
Filed 05/25/1995
|
Current Assignee
Deep9 Corporation
|
Sponsoring Entity
KANGAROO INC.
|
Method and apparatus for implementing user feedback | ||
Patent #
US 5,537,618 A
Filed 12/22/1994
|
Current Assignee
Timdolir Limited Limited Liability Company
|
Sponsoring Entity
2WAY CORPORATION
|
FLEXIBLE END-POINT COMPLIANCE AND STRONG AUTHENTICATION FOR DISTRIBUTED HYBRID ENTERPRISES | ||
Patent #
US 20110307947A1
Filed 06/14/2010
|
Current Assignee
Microsoft Technology Licensing LLC
|
Sponsoring Entity
Microsoft Technology Licensing LLC
|
METHODS AND SYSTEMS FOR PROVIDING AND CONTROLLING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS UNSECURED NETWORKS BETWEEN A SECURE VIRTUAL TERMINAL AND A REMOTE SYSTEM | ||
Patent #
US 20120084544A1
Filed 05/11/2011
|
Current Assignee
Unisys Corporation
|
Sponsoring Entity
Unisys Corporation
|
METHODS AND SYSTEMS FOR PROVIDING AND CONTROLLING CRYPTOGRAPHIC SECURE COMMUNICATIONS ACROSS UNSECURED NETWORKS | ||
Patent #
US 20120084566A1
Filed 05/11/2011
|
Current Assignee
Hingman Ted, Edward Chin, Robert A Johnson
|
Sponsoring Entity
Hingman Ted, Edward Chin, Robert A Johnson
|
METHOD AND SYSTEM FOR UNIFIED MOBILE CONTENT PROTECTION | ||
Patent #
US 20120144195A1
Filed 02/10/2012
|
Current Assignee
Telefonaktiebolaget LM Ericsson
|
Sponsoring Entity
Telefonaktiebolaget LM Ericsson
|
Encryption key exchange system and method | ||
Patent #
US 20120204032A1
Filed 02/07/2011
|
Current Assignee
SyncUp Corporation
|
Sponsoring Entity
SyncUp Corporation
|
Systems and Methods for Offline Testing of Customer Premise Equipment | ||
Patent #
US 20120226462A1
Filed 02/29/2012
|
Current Assignee
Cox Communications Incorporated
|
Sponsoring Entity
Cox Communications Incorporated
|
METHOD AND APPARATUS FOR MANAGING CONTENT TO BE SHARED AMONG DEVICES | ||
Patent #
US 20120233019A1
Filed 01/12/2012
|
Current Assignee
Samsung Electronics Co. Ltd.
|
Sponsoring Entity
Samsung Electronics Co. Ltd.
|
Collaborative online spreadsheet application | ||
Patent #
US 8,307,119 B2
Filed 03/31/2006
|
Current Assignee
Google LLC
|
Sponsoring Entity
Google Inc.
|
METHOD FOR PLAYING DIGITAL CONTENTS PROTECTED WITH A DRM (DIGITAL RIGHT MANAGEMENT) SCHEME AND CORRESPONDING SYSTEM | ||
Patent #
US 20120284802A1
Filed 05/02/2011
|
Current Assignee
Inside Secure SA
|
Sponsoring Entity
Inside Secure SA
|
Method and apparatus for improved information transactions | ||
Patent #
US 8,311,946 B1
Filed 02/04/2000
|
Current Assignee
EBRARY.COM
|
Sponsoring Entity
EBRARY.COM
|
METHOD AND APPARATUS FOR PROVIDING DRM SERVICE | ||
Patent #
US 20120291142A1
Filed 04/27/2012
|
Current Assignee
Samsung Electronics Co. Ltd.
|
Sponsoring Entity
Samsung Electronics Co. Ltd.
|
TECHNIQUES FOR ACCESSING A BACKUP SYSTEM | ||
Patent #
US 20120297468A1
Filed 05/17/2011
|
Current Assignee
Micro Focus LLC
|
Sponsoring Entity
Micro Focus LLC
|
Method and system for automatic data transfer on a network-connected device | ||
Patent #
US 8,325,625 B2
Filed 03/23/2005
|
Current Assignee
Smith Micro Software Incorporated
|
Sponsoring Entity
Smith Micro Software Incorporated
|
METHOD AND SYSTEM FOR SECURING DOCUMENTS ON A REMOTE SHARED STORAGE RESOURCE | ||
Patent #
US 20120317414A1
Filed 03/30/2012
|
Current Assignee
Workshare Technology Incorporated
|
Sponsoring Entity
Workshare Technology Incorporated
|
NETWORK APPARATUS BASED ON CONTENT NAME AND METHOD FOR PROTECTING CONTENT | ||
Patent #
US 20120317613A1
Filed 06/11/2012
|
Current Assignee
Samsung Electronics Co. Ltd.
|
Sponsoring Entity
Samsung Electronics Co. Ltd.
|
MONITORING STREAMING MEDIA CONTENT | ||
Patent #
US 20130007298A1
Filed 12/30/2011
|
Current Assignee
Nielsen Company US LLC
|
Sponsoring Entity
Nielsen Company US LLC
|
Systems and Methods for Securing Media and Mobile Media Communications with Private Key Encryption and Multi-Factor Authentication | ||
Patent #
US 20130013912A1
Filed 07/06/2012
|
Current Assignee
VEILED TECHNOLOGIES LLC
|
Sponsoring Entity
VEILED TECHNOLOGIES LLC
|
ELECTRONIC FILE SHARING | ||
Patent #
US 20130031155A1
Filed 06/06/2012
|
Current Assignee
Topia Technology Inc.
|
Sponsoring Entity
Topia Technology Inc.
|
SECURE INSTANT MESSAGING SYSTEM | ||
Patent #
US 20130036302A1
Filed 10/05/2012
|
Current Assignee
Google LLC
|
Sponsoring Entity
Google LLC
|
EFFICIENT SECURE DATA MARSHALING THROUGH AT LEAST ONE UNTRUSTED INTERMEDIATE PROCESS | ||
Patent #
US 20130054917A1
Filed 08/30/2011
|
Current Assignee
Microsoft Technology Licensing LLC
|
Sponsoring Entity
Microsoft Technology Licensing LLC
|
System and Method for Providing Offline Access in a Hosted Document Service | ||
Patent #
US 20130054514A1
Filed 07/30/2012
|
Current Assignee
Google LLC
|
Sponsoring Entity
Google LLC
|
MANAGING ACCESS TO DIGITAL CONTENT ITEMS | ||
Patent #
US 20130060661A1
Filed 09/06/2011
|
Current Assignee
Apple Inc.
|
Sponsoring Entity
Apple Inc.
|
CROSS-STORE ELECTRONIC DISCOVERY | ||
Patent #
US 20130117218A1
Filed 11/03/2011
|
Current Assignee
Microsoft Technology Licensing LLC
|
Sponsoring Entity
Microsoft Technology Licensing LLC
|
Virtual single sign-on for certificate-protected resources | ||
Patent #
US 8,549,300 B1
Filed 02/23/2010
|
Current Assignee
Pulse Secure LLC
|
Sponsoring Entity
Juniper Networks Incorporated
|
Shared Resource Watermarking and Management | ||
Patent #
US 20130268677A1
Filed 06/02/2013
|
Current Assignee
AirWatch LLC
|
Sponsoring Entity
AirWatch LLC
|
Credit application status monitor | ||
Patent #
US 8,571,971 B1
Filed 04/19/2002
|
Current Assignee
Wells Fargo Bank NA
|
Sponsoring Entity
Wells Fargo Bank NA
|
PUBLIC KEY ENCRYPTION OF ACCESS CREDENTIALS AND CONTENT DATA CONTAINED IN A MESSAGE | ||
Patent #
US 20130311769A1
Filed 10/04/2011
|
Current Assignee
ELECTRONIC SHIPPING SOLUTIONS LIMITED
|
Sponsoring Entity
ELECTRONIC SHIPPING SOLUTIONS LIMITED
|
COMPUTERIZED METHOD AND SYSTEM FOR MANAGING SECURE CONTENT SHARING IN A NETWORKED SECURE COLLABORATIVE EXCHANGE ENVIRONMENT | ||
Patent #
US 20130318589A1
Filed 08/06/2013
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
PROGRESSIVE LOADING FOR WEB-BASED SPREADSHEET APPLICATIONS | ||
Patent #
US 20130332811A1
Filed 06/07/2012
|
Current Assignee
Microsoft Technology Licensing LLC
|
Sponsoring Entity
Microsoft Technology Licensing LLC
|
Server-Based Data Sharing in Computer Applications Using A Clipboard | ||
Patent #
US 20130346491A1
Filed 08/30/2013
|
Current Assignee
Google Inc.
|
Sponsoring Entity
Google Inc.
|
Systems and methods for secure transaction management and electronic rights protection | ||
Patent #
US 8,639,625 B1
Filed 07/30/2007
|
Current Assignee
Intertrust Technologies Corporation
|
Sponsoring Entity
Intertrust Technologies Corporation
|
COMPUTERIZED METHOD AND SYSTEM FOR MANAGING SECURE MOBILE DEVICE CONTENT VIEWING IN A NETWORKED SECURE COLLABORATIVE EXCHANGE ENVIRONMENT | ||
Patent #
US 20140047560A1
Filed 10/18/2013
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
COMPUTERIZED METHOD AND SYSTEM FOR MANAGING AMENDMENT VOTING IN A NETWORKED SECURE COLLABORATIVE EXCHANGE ENVIRONMENT | ||
Patent #
US 20140143831A1
Filed 04/26/2013
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management | ||
Patent #
US 8,751,793 B2
Filed 12/02/2003
|
Current Assignee
Intertrust Technologies Corporation
|
Sponsoring Entity
Intertrust Technologies Corporation
|
Systems and Methods for Controlling Email Access | ||
Patent #
US 20140165148A1
Filed 12/06/2012
|
Current Assignee
AirWatch LLC
|
Sponsoring Entity
AirWatch LLC
|
Systems and Methods for Controlling Email Access | ||
Patent #
US 20140165213A1
Filed 01/25/2013
|
Current Assignee
AirWatch LLC
|
Sponsoring Entity
AirWatch LLC
|
SPREADSHEET VIEWER FACILITY | ||
Patent #
US 20140189483A1
Filed 03/13/2014
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
EMAIL EFFECTIVITY FACILTY IN A NETWORKED SECURE COLLABORATIVE EXCHANGE ENVIRONMENT | ||
Patent #
US 20140189818A1
Filed 03/13/2014
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
Key-based content management and access systems and methods | ||
Patent #
US 8,787,579 B2
Filed 06/30/2008
|
Current Assignee
Verizon Patent and Licensing Incorporated
|
Sponsoring Entity
Verizon Patent and Licensing Incorporated
|
PERFORMANCE EVALUATION OF SERVICES AND APPLICATIONS ON DEVICES IN LIVE WIRELESS ENVIRONMENTS | ||
Patent #
US 20140235179A1
Filed 02/18/2014
|
Current Assignee
Airometric Wireless Inc.
|
Sponsoring Entity
Airometric Wireless Inc.
|
OFFLINE FILE ACCESS | ||
Patent #
US 20140245015A1
Filed 03/13/2014
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
Systems and Methods for Controlling Email Access | ||
Patent #
US 20140245381A1
Filed 05/07/2014
|
Current Assignee
AirWatch LLC
|
Sponsoring Entity
AirWatch LLC
|
DIGITAL RIGHTS MANAGEMENT THROUGH VIRTUAL CONTAINER PARTITIONING | ||
Patent #
US 20140304836A1
Filed 03/13/2014
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
LITIGATION SUPPORT IN CLOUD-HOSTED FILE SHARING AND COLLABORATION | ||
Patent #
US 20150135300A1
Filed 11/13/2014
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
CUSTOMIZABLE SECURE DATA EXCHANGE ENVIRONMENT | ||
Patent #
US 20150163206A1
Filed 12/10/2014
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
System and method for information delivery based on at least one self-declared user attribute | ||
Patent #
US 9,069,436 B1
Filed 03/31/2006
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
Method and system for securing documents on a remote shared storage resource | ||
Patent #
US 9,070,112 B2
Filed 03/30/2012
|
Current Assignee
Workshare Technology Incorporated
|
Sponsoring Entity
Workshare Technology Incorporated
|
COMPUTERIZED METHOD AND SYSTEM FOR MANAGING SECURE CONTENT SHARING IN A NETWORKED SECURE COLLABORATIVE EXCHANGE ENVIRONMENT WITH CUSTOMER MANAGED KEYS | ||
Patent #
US 20150222625A1
Filed 04/17/2015
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
SYSTEM AND METHOD FOR INFORMATION DELIVERY BASED ON AT LEAST ONE SELF-DECLARED USER ATTRIBUTE WITH AUDIT RECORDS | ||
Patent #
US 20150254360A1
Filed 05/22/2015
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
Computerized method and system for managing amendment voting in a networked secure collaborative exchange environment | ||
Patent #
US 9,148,417 B2
Filed 04/26/2013
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
SYSTEMS AND METHODS OF SECURE DATA EXCHANGE | ||
Patent #
US 20150310188A1
Filed 04/22/2015
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
COMPUTERIZED METHOD AND SYSTEM FOR MANAGING AN EMAIL INPUT FACILITY IN A NETWORKED SECURE COLLABORATIVE EXCHANGE ENVIRONMENT | ||
Patent #
US 20150358308A1
Filed 08/18/2015
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
Computerized method and system for managing secure mobile device content viewing in a networked secure collaborative exchange environment | ||
Patent #
US 9,251,360 B2
Filed 10/18/2013
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment | ||
Patent #
US 9,253,176 B2
Filed 08/06/2013
|
Current Assignee
IntraLinks Incorporated
|
Sponsoring Entity
IntraLinks Incorporated
|
25 Claims
- 1. A method for managing a networked secure collaborative computer data exchange environment, the method comprising:
establishing, by a secure exchange server controlled by an intermediate business entity, a client login data authentication procedure that allows at least one client computing device of a plurality of client computing devices operated by users of a plurality of business entities to access the secure exchange server, wherein communications between the secure exchange server and the plurality of client computing devices is through a communications network; storing, by the secure exchange server, at least one client login authentication data for each of the plurality of client computing devices; receiving content from a first of the plurality of client computing devices operated by a user of a first business entity of the plurality of business entities; by the secure exchange server, permitting access to the received content for a subset of the plurality of client computing devices through an exchange content access facility, wherein the exchange content access facility is managed by at least one business entity of the plurality of business entities; granting, by the secure exchange server, access to the received content to a second of the plurality of client computing devices operated by a user of a second business entity of the plurality of business entities when the secure exchange server receives from the second of the plurality of client computing devices its client login authentication data provided that the second of the plurality of client computing devices is one of the subset of the plurality of client computing devices; and providing an exchange community facility where each of a plurality of users operating the plurality of client computing devices is enabled to establish a corresponding informational profile that is made accessible to other users operating the plurality of client computing devices and is enabled to find and interact with the other users based on the informational profile; the method further comprising; providing an electronic signature facility for managing a process of signing the received content by a user of at least one of the subset of the plurality of client computing devices, wherein the electronic signature facility provides for secure viewing of the received content as presented to a signing user through a computer display of the signing user'"'"'s client computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
- 24. A method for managing a networked secure collaborative computer data exchange environment, the method comprising:
establishing, by a secure exchange server controlled by an intermediate business entity, a user login data authentication procedure that allows at least one of a plurality of users of a plurality of business entities to access the secure exchange server, wherein communications between the secure exchange server and the plurality of users is through a communications network; storing, by the secure exchange server, at least one user login authentication data for each of the plurality of users; receiving content from a first of the plurality of users of a first business entity of the plurality of business entities; by the secure exchange server, permitting access to the received content for a subset of the plurality of users through an exchange content access facility, wherein the exchange content access facility is managed by at least one business entity of the plurality of business entities; granting, by the secure exchange server, access to the received content to a second of the plurality of users of a second business entity of the plurality of business entities when the secure exchange server receives from the second of the plurality of users its user login authentication data provided that the second of the plurality of users is one of the subset of the plurality of users; and providing an exchange community facility where each of the plurality of users is enabled to establish an informational profile that is made accessible to other users of the plurality of users and is enabled to find and interact with other users based on the content of the informational profile; the method further comprising; providing an electronic signature facility for managing a process of signing the received content by a user of at least one of the subset of the plurality of client computing devices, wherein the electronic signature facility provides for secure viewing of the received content as presented to a signing user through a computer display of the signing user'"'"'s client computing device.
- 25. A method for managing a networked secure collaborative computer data exchange environment, the method comprising:
establishing, by a secure exchange server controlled by an intermediate business entity, a client login data authentication procedure that allows at least one client computing device of a plurality of client computing devices operated by users of a plurality of business entities to access the secure exchange server, wherein communications between the secure exchange server and the plurality of client computing devices is through a communications network; storing, by the secure exchange server, at least one client login authentication data for each of the plurality of client computing devices; receiving content from a first of the plurality of client computing devices operated by a user of a first business entity of the plurality of business entities; by the secure exchange server, permitting access to the received content for a subset of the plurality of client computing devices through an exchange content access facility, wherein the exchange content access facility is managed by at least one business entity of the plurality of business entities; granting, by the secure exchange server, access to the received content to a second of the plurality of client computing devices operated by a user of a second business entity of the plurality of business entities when the secure exchange server receives from the second of the plurality of client computing devices its client login authentication data provided that the second of the plurality of client computing devices is one of the subset of the plurality of client computing devices; and providing an exchange community facility where each of a plurality of the users operating the plurality of client computing devices is enabled to establish an informational profile that is made accessible to other users operating the plurality of client computers and is enabled to find and interact with the others based on the content of the informational profile, wherein an interaction between users is executed as an anonymous interaction, where one or more users remains anonymous to one or more other users; the method further comprising; providing an electronic signature facility for managing a process of signing the received content by a user of at least one of the subset of the plurality of client computing devices, wherein the electronic signature facility provides for secure viewing of the received content as presented to a signing user through a computer display of the signing user'"'"'s client computing device.
1 Specification
This application is a continuation application of U.S. patent application Ser. No. 13/871,593, filed on Apr. 26, 2013. U.S. patent application Ser. No. 13/871,593 claims the benefit of the following provisional applications: U.S. Patent Application No. 61/639,576 filed Apr. 27, 2012; U.S. Patent Application No. 61/680,115 filed Aug. 6, 2012; U.S. Patent Application No. 61/702,587 filed Sep. 18, 2012; U.S. Patent Application No. 61/715,989 filed Oct. 19, 2012; U.S. Patent Application No. 61/734,890 filed Dec. 7, 2012, and U.S. Patent Application No. 61/783,868 filed Mar. 14, 2013. Each of the above applications is hereby incorporated by reference in its entirety.
The present invention relates to networked secure content sharing and collaboration.
Despite the availability of the Internet, there is still no entirely satisfactory way for people at different companies or other entities to have the benefits of private network security, such as for collaborative work between enterprises on a daily basis and for ad hoc alliances, i.e., different sets of entities coming together to function as one mega or meta entity, for the duration of some particular project. In such cases, the time and expense of actually wiring a network between two or more companies or other entities and agreeing on one common software package or standard presents a barrier to conventional network solutions. In addition, any new process for the sharing of content has in the past generally required the user to adopt new workflow components, applications, and habits that tend to be disruptive to the user'"'"'s normal day-to-day workflow routine, e.g. when working internal to their enterprise and with personal use. Simply using the Internet remains imperfectly secure for the sharing of confidential information without some pre-arranged secure encryption processes has been cumbersome and unproductive, especially in today'"'"'s increasing use of personal devices being incorporated into the workflow. There is a need for such systems and for users to utilize the systems in such a way that does not force them to adopt new infrastructure, software, and business and personal processes in their daily workflow in order to achieve a shared and potentially secure extended work environment.
Thus, there are still yet-unsolved problems associated with different groups of companies or other entities to sharing securely over an expanding global network environment.
The present invention provides a networked secure collaborative computer data exchange environment, establishing a secure exchange server-based environment between users of at least two business entities, where the secure exchange server environment is managed by an intermediate business entity, and providing at least one of a community facility, an amendment voting facility, an e-signature facility, a dashboard facility, an email-in facility, a viewer facility, and a mobile device viewing interface, providing an improved method for different groups of companies or other entities to sharing securely over an expanding global network environment.
In embodiments, a method for managing a networked secure collaborative computer data exchange environment may be provided, the method including establishing, by a secure exchange server controlled by an intermediate business entity, a client login data authentication procedure that allows at least one client computing device of a plurality of client computing devices operated by users of a plurality of business entities to access the secure exchange server, wherein communications between the secure exchange server and the plurality of client computing devices is through a communications network; storing, by the secure exchange server, at least one client login authentication data for each of the plurality of client computing devices; receiving content from a first of the plurality of client computing devices; by the secure exchange server, permitting access to the content for a subset of the plurality of computing devices through an exchange content access facility, wherein the exchange content access facility is managed by at least one business entity of the plurality of business entities; and granting, by the exchange server, access to the content to a second of the plurality of client computing devices when the secure exchange server receives from the second of the plurality of client computing devices its client login authentication data provided that the second of the plurality of client computing devices is one of the subset of the plurality of computing devices.
In embodiments, methods may provide for an exchange community facility where the users of the plurality of user client computing devices establish an informational profile that is made accessible to other users of the plurality of user client computers and are enabled to interact with one another based on the content of the informational profile.
In embodiments, methods may provide an amendment voting facility for conducting a process of voting when the content relates to a proposed amendment to an agreement wherein the amendment voting facility enables users of the subset of the plurality of computing devices to vote on the proposed amendment.
In embodiments, methods may provide for an electronic signature facility for managing a process of signing the received content by at least one of the subset of the plurality of user computing devices, wherein the electronic signature facility includes a signature viewer interface that restricts viewing of the content for signing.
In embodiments, methods may provide for a dashboard facility to manage user content and exchanges.
In embodiments, methods may provide for a secure email input facility for accepting non-secure email from outside the exchange into the secure collaborative computer data exchange environment, wherein the non-secure email is received and stored as secure email in the secure exchange server.
In embodiments, methods may provide for a secure content viewer facility for the user to securely view the content on the user'"'"'s client computing device, wherein the secure view is provided through a viewing restriction based on a user action.
In embodiments, methods may provide for mobile device viewing interface for interfacing with the networked secure collaborative computer data exchange environment through a mobile device.
These and other systems, methods, objects, features, and advantages of the present invention will be apparent to those skilled in the art from the following detailed description of the preferred embodiment and the drawings. All documents mentioned herein are hereby incorporated in their entirety by reference.
The invention and the following detailed description of certain embodiments thereof may be understood by reference to the following figures:
While the invention has been described in connection with certain preferred embodiments, other embodiments would be understood by one of ordinary skill in the art and are encompassed herein.
All documents referenced herein are hereby incorporated by reference.
The present invention may be used for a secure exchange service (alternatively referred to as an ‘exchange’ or ‘exchange service’ throughout this disclosure) where many types of communications are required between different parties that are associating for a temporary transaction or project, but as competitors or for other reasons are not suitable for a permanent communication network (such as an intranet or enterprise network, such as a LAN or WAN) as might be used for a single government agency, single corporation, or other single enterprise or institution. Transaction projects involving financial transactions and projects involving complex legal agreements (such as mergers, acquisitions, and the like) are situations in the which the methods and systems described herein are particularly suitable; however, these are not necessarily the only sort of projects appropriate, as any project in which parties need to share confidential information across entities, outside the boundaries of the network of a single entity, may benefit from the methods and systems described herein.
In an example, transactions within the banking industry may provide a situation where a secure exchange service may be particularly applicable, where ad hoc syndicates are formed under the leadership of one or more lead banks to permit a number of agent or associate banks to participate in a major loan to a borrower. Such loans have become more common and may involve loans in excess of one billion dollars. Syndication of such large loans is used since any one bank is not prepared to lend such a large amount to a single customer. Conventionally, proposed terms of a loan are negotiated between the borrower and the lead banks, each in consultation with its advisors such as legal counsel, public-relations consultants, accountants and insurance carriers. In some instances, some advisors may be in-house advisors as employees of a given entity and thus constitute an internal team. However, the advisors in many instances may be independently associated with external entities such as law firms or major accounting firms and thus constitute either external teams or combinations of the above. The lead bank(s) negotiates with the borrower to arrive at terms and conditions for the loan, such as the interest rate, repayment schedule, security and the bank'"'"'s fee for processing and syndicating the loan. The lead bank may agree to underwrite the entire loan in which case the lead bank uses syndication to create sub-loans between it and other banks to raise the funds for the loan. All of these transactions require management of voluminous amounts of documentation, most of which is confidential and whose disclosure could result in huge damages to the borrower or lenders. Thus, it would be desirable to provide an exchange as described here which enables secure document transmission between users over a global communication network without requiring the users to communicate in advance to establish an encryption method. In this example, the exchange service may provide a suitable level of security with respect to each of the shared transactions, among companies that commonly may be vigorous competitors, with numerous confidential documents that the companies do not want uncontrollably shared among other members of the loan-project group or accessible by outsiders generally. Substantially secure communications is particularly of the utmost concern to all parties to a syndicated loan transaction: the borrower, the lead bank, and the associate banks. A virtual network system provided through the exchange may readily provide substantial security to ensure that information and communications among all the various parties are secure.
In embodiments, the exchange may enable electronic transmission and reception of confidential documents over a global communication network such as the Internet for distributing electronic documents containing sensitive information or data to selected entities, for notifying intended recipients of the availability of such documents, for tracking access, downloading and uploading of such documents, and the like.
In embodiments, the exchange may only be accessed by authorized computers using an acceptable log-in procedure, including user name and password. Communications within the exchange may establish a communication session based upon a selected security protocol, and thereafter messages are transmitted between using such secure encryption. Communications may be exchanged via a secure encrypted communication session using a selected encryption protocol, and may deny access if a secure session cannot be established at a desired secure level.
In embodiments, the exchange may provide a fully provisioned, turnkey service for users, where once the user'"'"'s enterprise has established an account through the exchange, documents in electronic form may be uploaded to the secure site maintained through the exchange host server, where a variety of secure collaborative communications options may be chosen including document storage, e-mail, video broadcasting, video conferencing, white boarding, and the like, to augment and manage interactive access to the documents, including a user graphical interface for managing user interactions with one or more exchanges.
In embodiments, the exchange may provide a secure site for placing documents and messages to be transmitted over a secure virtual network and allows authorized users to read or edit messages according to their level of authorization. Any documents that are edited may be immediately available on the system so that other persons involved in the exchange has access to the edited or modified documents immediately. In addition, the exchange may provide tracking of each document to allow selected users to see who has had access to the messages and documents and who has modified or edited any of the documents.
In embodiments, the exchange may provide a centralized firewall that may be employed to protect confidential information so that no unauthorized access to such information occurs. A firewall, such as may be effectively used for corporate intranets, may be applied in each exchange. Groups of users, such as on a virtual network, may be treated like a remote corporate office and restricted by firewall protocols from uncontrollable access to the information from other users. In addition, if needed, respective inter-user firewalls may be established to prevent one user from accessing information in the host site of another user. The exchange may be particularly suitable for communication among multiple unrelated groups of users, since a centralized firewall simplifies the logistics of each user having to separately provide access through their own respective local firewalls. In such a centralized architecture, the host server, as opposed to being processed at each respective user, may conveniently process server access security data. Similarly, system backup and recovery may be better handled by a centralized backup and recovery system, as opposed to such recovery tasks being separately handled at a multiplicity of local sites.
As depicted in
In embodiments, the exchange host server 102 may be distributed over a plurality of server computers, and therefore host server 102 should be viewed as an illustrative example of one of such multiple servers. In this way, the server computers may work together to provide essentially seamless access to a large number of users on various platforms with varying communications speeds. The server computers may run under server management software which in turn may be responsible for coordination of services, maintaining state and system status, monitoring, security, and other administrative functions. In embodiments, a user computer having a suitable Web browser may directly access the host server, where the exchange may not need to provide each user with subscriber application software, such as including software modules for access, activation, viewing, communications, and the like, relative to the exchange service.
In embodiments, whenever an exchange of data is initiated, such as by a document being received at the host server 102 connected to a host database 112, the host server may extract the address of the intended recipient and create a notification to the recipient(s) of the existence of the data at the host server. The notification may contain the URL for the host server. However, the recipient may not be able to access the message unless the recipient is authorized to use the system, such as the recipient needing to be a registered user and have an assigned password to access the data, or other repository at the host server where data is stored, such as on a user database 108, 108A, or 108B. If the intended recipient is granted access to the host server, the recipient may then locate the message intended for them by browsing through all messages to which the recipient has been granted access.
While the notification sent to the intended recipient may be sent using standard Internet protocol without encryption, once the user computer contacts the host server, the server may establish a secure encrypted communication session using a selected encryption protocol. The host server may deny access if a secure session cannot be established at a desired secure level, such as 128-bit encryption.
In embodiments, exchange services for different users may utilize separate software structured server databases 108, 108A, 108B. For example, company ‘A’ and company B′ may use the same secure host server 102, but each company'"'"'s data may be maintained in separate databases 108A and 108B, although perhaps in the same physical data storage facility. This feature offers the advantage of allowing the host server to be customized for each company. For example, when the external user accesses the host server, the host server may recognize the user and associate the user with a particular one of the companies A and B. Using this recognition, the host server may present a customized browser interface which makes the host server look like the selected company. To the external user, it may appear that they have been connected directly to the company server rather than the host server. Thus, the present invention may allow a user to securely send data such that the network connection is substantially transparent to the user. Further, the system may provide customization of the remote host server for each of a plurality of different users such that an external user accessing the remote server may appear to be connected to an internal client server.
For example, the distribution facility 222 may allow the host server to electronically distribute data using secure communications among the plurality of users. The usage facility 234 may allow the host server to monitor the usage of the network to permit the users to be billed for the network service. The host server may be set up to manage a plurality of separate virtual networks concurrently, with each such virtual network representing a different client, such as company A and company B. Further, a community facility 202 may provide for users of different companies to be exposed to one other even if the different companies have not had any previous contacts (e.g. through a shared exchange), and a dashboard facility 210 may provide companies to manage exchanges, documents, contacts, communications, preferences, and the like.
The host server may offer a high level of security for all data by employing substantially secure network connections, and by means of security and encryption technologies developed for networks such as may be readily incorporated in the encryption facility 232. Additionally, the host server may provide highly secure access control by way of the user authorization facility 244 that may allow only authorized personnel to access individual messages and related documents and communications. The viewer facility 214 may be able to protect documents from unauthorized viewing, printing, saving, and the like, and a mobile device interface facility 218 may enable secure viewing on a mobile device, such as a personal tablet being used away from an enterprise network. The Email-in facility 212 may provide for the ability to add content to an exchange using regular email, such as that is sent to a designated secure email address.
The host server may give each user the ability to electronically link or be interconnected via a link facility 242 with any number of other users. Although data may be preferably formatted in a particular form, such as may be readily implemented with a commercially available document exchange program, other formats could be optionally accommodated using a suitable format conversion facility 228. The multimedia facility 254 may also be used to process data into a format suitable for presentation to the user in forms other than text, such as audio, still or moving images, and the like.
The virtual-network viewer may also include a multimedia viewer facility configured to, for example, provide: viewing of interactive multimedia or mixed media memoranda through suitable decoders, such as audio decoders, Joint Photographic Experts Group (JPEG) still image decoders, and Moving Pictures Experts Group (MPEG) moving image decoders. The virtual-network viewer may also support various collaborative communications options such as e-mail, video conferencing and white boarding which are enabled for a given transaction pursuant to instructions from the appropriate user. Of course, the range of multimedia capability and the collaborative communications options may vary depending on the various groupware facilities available to the user.
The notarization facility 252 may be provided to electronically certify any electronic data forwarded to users, such as incorporating electronic signature technology, and the like. The network service facility 220 may conveniently be used to display various data in connection with the network service such as additional services that may be available by the network service to the users. The above facilities may work jointly with the email facility 260, the interface facility 224, and the like, to send notices of data for exchange and interface with to securely pass data.
A virtual-network viewer or browser may conveniently provide the end user with an easy-to-use graphical interface to data and other particularly confidential information on the network service'"'"'s virtual-network service. The virtual-network service may provide identification of services available over the virtual network as well as a variety of options for accessing and retrieving data. The virtual-network viewer may include the transaction identification facility 240 that, for example, may enable a user to quickly find and access information. The virtual-network viewer may automatically provide a suitable connection to the user to the virtual-network service through the sign-on facility 230. The viewer may also prompt the user to input one or more passwords or identifications which should be recognized by either the authorized editor facility 250 or the authorized reader facility 248 in order to access information on a database.
For the convenience of the users, some data offered through the virtual-network service may be designed as interactive multimedia documents that will include video, graphics, audio, and other multimedia elements. Multimedia communications may provide the user with a wide variety of information in addition to that provided by more standard text data.
By way of an example, a syndication desk, i.e., one or more individuals authorized to be responsible for the management of a syndicated transaction, of a lead user may be able to broadcast and/or selectively send e-mail messages processed by the syndication facility 238 to associate users and vice-versa. For example, amendment data processed by the amendment voting facility 204 may be used to vote on changes to a transaction document amongst authorized users. The amended document may be conveniently distributed via email using the e-mail facility 260 for providing associate users with up-to-the-minute information about the transaction. Amendments or messages may be appended to the document at the host site of the network service where they may be ordinarily viewed by accessing the virtual-network service that is authorized to access the document. E-mail messages or amendments may also be downloaded for printing or for attachment to local documents. Similarly, comment data in connection with a transaction may be processed through the comment facility 258 for appropriate distribution to authorized users. Transaction documents may also be signed by authorized users through the e-signing facility 208.
Referring to
In embodiments, the community facility 202 may provide for search capabilities through the profile search facility 314, such as starting a new search, saving searches, saving the history of a search, and the like, to begin interacting with the profiles of users. The searcher may be able to search by a particular industry, investors, deal size, deal type, geography, type of profile and the like. The user may begin a search and generate results including the sub-profiles in the system that matched the search criteria. In addition, there may be a variety of visibility levels associated with the searches. For example, a search may return three matches but where one match is a user that is an anonymous user. In this instance, information may be withheld as to specifics, but with the ability to see more general profile attributes, such as a user'"'"'s title. There may also be search indicators associated with previous searches, matches, contacts, and the like, such as with an icon to indicate past communication, and the like. In embodiments, the user may use a filter set to find a group the user wants to multi-select, grab, and move into another list.
Another feature of the community facility may be an ‘activity index’, or similar measure, such as for judging how active a user is on the system. For instance, a user performing M&A activities on the system may provide a qualified view indicating whether they are a current M&A buyer or not, such as showing how active they are. The system may also find information that indicates activity from other sources, and import that information to the system, thus providing a fuller indication of the user'"'"'s activity level within the system, such as how many deals they might be working on.
Another feature of the community facility may enable a user to entice other users who are anonymous to be visible in order to initiate an interaction with them. For instance, a user may contact an anonymous user and add them to an exchange after the invitation to connect has been accepted. The user may ‘click on’ an anonymous user and send an invitation to them. In this instance, the sending user may become more visible to the anonymous user who is being invited. A subject line and a note regarding why the user is interested in contact them may be provided. An ‘invitations list’ may show what invitations have been sent, and the system may provide for a historical thread for the user'"'"'s activity.
In embodiments, the system may keep a user'"'"'s information anonymous until the user accepts an invitation from the inviting user, but where the anonymous user can still interact with the inviting user while still staying anonymous. The system may therefore provide a robust interaction facility at the profile level (email, etc.) without requiring actual acceptance of the invitation, and enable a continued dialog without revealing who they were (e.g., to get additional information, clarification, etc.). As the interaction goes back and forth, the goal may be to wind up in an acceptance state, but the system may also provide a means of blocking communications, such as after the user ‘accepts’ or ‘declines’. The system may support an interaction until the user provides an acceptance, at which time the user'"'"'s contact information may become visible, be provided a download of profile information, include the user in a contacts list, be recommended to an exchange, and the like. Once the user accepts, both parties may become visible to one another, including providing a history of the interaction.
Referring to
The community facility user interface may provide for a plurality of tabs, such as a hub, exchanges, tasks, documents, people, approvals, maintenance, forms, calendar, dashboards, fund data, collaboration, and the like. Referring to
There may be actions the user may take with regard to a search result, such as to make contact, open an invitation, view detail, download a vCard, request to add a user to an exchange, manage a user exchange access, and the like. When a user is anonymous, an indication of such may be provided in place of their name, such as ‘User is Anonymous’, blanks in place of location, phone number, email contact information, company, and the like.
In embodiments, a method for managing a networked secure collaborative computer data exchange environment may be provided, the method including establishing, by a secure exchange server controlled by an intermediate business entity, a client login data authentication procedure that allows at least one client computing device of a plurality of client computing devices operated by users of a plurality of business entities to access the secure exchange server, wherein communications between the secure exchange server and the plurality of client computing devices is through a communications network; storing, by the secure exchange server, at least one client login authentication data for each of the plurality of client computing devices; receiving content from a first of the plurality of client computing devices; by the secure exchange server, permitting access to the content for a subset of the plurality of computing devices through an exchange content access facility, wherein the exchange content access facility is managed by at least one business entity of the plurality of business entities; granting, by the exchange server, access to the content to a second of the plurality of client computing devices when the secure exchange server receives from the second of the plurality of client computing devices its client login authentication data provided that the second of the plurality of client computing devices is one of the subset of the plurality of computing devices; and providing an exchange community facility where the users of the plurality of client computing devices establish an informational profile that is made accessible to other users of the plurality of client computers and are enabled to interact with one another based on the content of the informational profile.
In embodiments, access to the exchange server by client processors may be through a host server controlled by the business entity that controls the client processor. The client computing devices may be at least one of owned and managed by at least one of the plurality of business entities. The client computing devices may be owned by individual users. The secure exchange server may be at least one of a plurality of exchange servers. The content may be at least one of a document, a spreadsheet, a message, data, an image, audio content, video content, multimedia content, and the like. The content may be transferred to the secure exchange server via encrypted data transmission.
In embodiments, the content of the informational profile may include contact information, business association, and the like. The exchange community facility may provide users with facilities for sending an invitation to another user for communication. After the invitation is sent the exchange community facility may provide a status of the invitation related to the invitation being at least one of being sent, received, and read. The informational profile for the sending user may be restricted as anonymous until the receiving user accepts the invitation for communication. The exchange community facility may provide for informational profile viewing control, where the viewing control allows the informational profile to be viewed by other users, by a selected group of users, and the like. The exchange community facility may provide a graphical user interface through which a user manages their informational profile and interactions with other users, where the graphical user interface includes a search engine interface, provides an activity index measure of how active a user is on the exchange community facility, and the like. An informational profile may be categorized by professional activity, such as including a buyer, seller, investor, expert, and the like. The informational profile may include credentials for an individual, an indication of an area of interest (e.g. a type of project in which an individual is interested in participating), and the like.
In embodiments, a method for managing a networked secure collaborative computer data exchange environment may be provided, establishing, by a secure exchange server controlled by an intermediate business entity, an authentication procedure for a client login authentication data that allows at least one of a plurality of user client computing devices operated by users of at least two business entities to access the at least one secure exchange server, wherein communications between the secure exchange server and the plurality of user client computing devices is through a communications network; storing, by the secure exchange server, the at least one client login authentication data for each of the plurality of client computing devices; receiving, from a first of the plurality of user client computing devices, content; associating access, by the secure exchange server, to the content to a subset of the plurality of user computing devices through an exchange content access facility, the exchange content access facility managed by at least one of the plurality of business entities; granting, by the exchange server, access to the content of the secure exchange server to a second of the plurality of user client computing devices when the secure exchange server receives a client login authentication data from the second of the plurality of user client computing devices and dependent upon the second of the plurality of user client computing devices being one of the subset of the plurality of user client computing devices; and providing an exchange community facility where the users of the plurality of client computing devices establish an informational profile that is made accessible to other users of the plurality of client computers and are enabled to interact with one another based on the content of the informational profile, wherein the interaction is executed as an anonymous interaction, where the anonymous interaction provides a subset of content from the informational profile.
Referring to
Referring to
In an example, on a syndicated loan, one agency bank may be in charge and have a number of lenders supporting that loan, often hundreds or even in excess of a thousand such lenders. As proposed modifications or amendments are made, each may need to be disseminated, have users react to it (such as providing information, making selections, and the like), be returned with appropriate documentation to the agency bank, and the like. A typical process is conventionally performed offline, where banks are required to have signing authorities pen-ink sign and re-submit to the agency bank. Further to the example, when a new amendment comes up, the agency bank may create a new transaction exchange environment for the amendment process. Through a data link the lender groups of members of those groups may be pushed into the new exchange environment, such that each of them appears as a participant in the exchange. Data relating to all current positions of the lenders (the amounts of their financial positions with respect to the particular loan or loans) may also be pushed into the exchange, so that it is available for further processing. In embodiments, the current position of a user with respect to the transaction structure may have a bearing on the voting, such as the weight given to a user'"'"'s vote, minimum amounts related to the amendment, and the like. Such amounts may be stored and retrieved for processing by the exchange. For instance, an agency bank may ask lenders to confirm their understanding of their positions in the process, some or all of the data with respect to positions may be pre-populated into the system and carried through into the transaction, and the like.
In embodiments, the amendment voting facility may allow for the naming of an amendment vote, a date for the vote, a vote distribution, inclusion of associated documents, facility for signature providing page submissions, inclusion of instructions to voters, a process of approval, a step for outside counsel to review, and the like. Once the announcement for the vote is sent out, an administrator agent may be able to view the tasks that have gone out, to what individuals and groups, and the status of the voting. Features of the amendment voting facility may include import and export of commitment data, support of amendment vote collection workflow, creation of vote template configurations, configuration of election forms, display of an amendment voting graphical user interface dashboard, configuration of signature pages, access for an administrator to complete tasks, facility for client-specific amendment vote definition, and the like. Import and export may include users ability to populate a deal structure automatically (e.g., from a source file), create a list of lenders groups and tranches commitment information on a new deal exchange, reconcile an existing deal structure, generate reports (e.g. listing commitment amounts for each participant, updating commitments, and the like. Support of amendment vote collection workflow may include support of a plurality of different amendment types and allow users to create process definitions available for run-time execution, and the like, where the different amendment types may include a simple yes-no, a yes-no with signature, consent-no consent, amend and extend, and the like. Amendment vote collection workflow may include specification of due dates and time, collection of election options, distribution of documentation, the ability to edit voting parameters, and the like. Creation of vote template configurations may include support of vote template configuration creation, such as to encapsulate the amendment vote process for document control management, including users setting up owners, monitors, and vote elements once, and reusing for subsequent votes; providing consistent language and instructions and documentation across transactions and votes; setting up vote types that may be adjusted as-needed, and the like. The election form may be configured to allow users to dynamically generate election forms based on group participant relationships (e.g. lenders only having visibility to cases they have access to). Display of an amendment voting dashboard may include view of a list of multiple amendments initiated for a particular transaction, view of details of the process (e.g., list of lenders and their related status such s progress against a task), view of participant contact and additional information, and the like. Configuration of the signature page may include custom text, a logo, and the like, where users may update and maintain their own custom signature pages, such as for all transactions, per transaction, per vote, and the like.
Continuing with the syndicated loan example, a lender may receive an email alert that they are invited into a new amendment task process. They may then be asked to login, where they are brought into the task flow that came from the alert. Tasks may include instructions, document review, election options, and the like. Pre-populated information may also be provided in association with the task. The user may record their vote and save any amendments associated with their elections. Their election and amendments may be printable, where the user may then take that document to the signatory to have it signed. In this instance, all of the information, including instructions may be included in the hard copy for the lender, and where the signing indicates legal consent. In this way, there may be one single entry point of information, where the lender receives the document to be signed, has it signed, and is provided a facility for loading the document back into the system. In embodiments, an e-signature and described herein may also be utilized for signing the document and entry into the system.
In embodiments, a user may be provided the user interface 410 to view the exchanges that are running amendments, to see tasks generated and what state they are in, to view individual tasks for a particular lender, to view signature pages (e.g., where all of the election option information is carried), and the like. Custom fields may also be provided, such as to allow users to change commitments. In embodiments, users may see information as the data is populated, even before signatures are applied. A user may need to perform a calculation, such as to weight each vote to see how close they are to carrying the amendment. The system may enable the user to export data to a document (e.g., a spreadsheet) for performing the calculation separate from the system, and to monitor the amendment process and changes thereto. For instance, and continuing with the loan syndication example, an administrator agent may be most interested in monitoring response levels and challenges to the current commitment levels. For instance, if only three users are seen to have any challenge on their commitment amounts, then the administrator may need to handle those first, which may be a priority if there is a discrepancy. The user may also be interested in those who are planning to take action (e.g., increase their commitment, reduce their commitment, by how much their commitment may change, and the like). Ultimately, the agency bank may have the final say, and so the system may provide them with priority, and so enable them to decide on whether to allow the changes or not.
In embodiments, a method for managing a networked secure collaborative computer data exchange environment, the method including establishing, by a secure exchange server controlled by an intermediate business entity, a client login data authentication procedure that allows at least one client computing device of a plurality of client computing devices operated by users of a plurality of business entities to access the secure exchange server, wherein communications between the secure exchange server and the plurality of client computing devices is through a communications network; storing, by the secure exchange server, at least one client login authentication data for each of the plurality of client computing devices; receiving content from a first of the plurality of client computing devices; by the secure exchange server, permitting access to the content for a subset of the plurality of computing devices through an exchange content access facility, wherein the exchange content access facility is managed by at least one business entity of the plurality of business entities; granting, by the exchange server, access to the content to a second of the plurality of client computing devices when the secure exchange server receives from the second of the plurality of client computing devices its client login authentication data provided that the second of the plurality of client computing devices is one of the subset of the plurality of computing devices; and providing an amendment voting facility for conducting a process of voting when the content relates to a proposed amendment to an agreement wherein the amendment voting facility enables users of the subset of the plurality of computing devices to vote on the proposed amendment.
In embodiments, access to the exchange server by client processors may be through a host server controlled by the business entity that controls the client processor. The client computing devices may be at least one of owned and managed by at least one of the plurality of business entities. The client computing devices may be owned by individual users. The secure exchange server may be at least one of a plurality of exchange servers. The content may be at least one of a document, a spreadsheet, a message, data, an image, audio content, video content, multimedia content, and the like. The content may be transferred to the secure exchange server via encrypted data transmission.
In embodiments, the process of voting on the proposed amendment may be traceable, such as traceability including tracing vote documentation, consent forms, signature pages, digital distribution, vote collection, signature page submission, and the like. The amendment voting facility may provide for the aggregating of vote metrics for tracking the process of voting amongst the users of the subset of the plurality of computing devices, such as aggregating vote metrics utilizing weighted voting calculations for consent percentage and visualization of responses. The amendment voting facility may provide for a vote graphical user interface dashboard to track progress and statistics, such as where the tracking of progress and statistics includes group tracking, reminders, export for vote tally and reporting, and the like. The amendment voting facility may provide for relative weighting of votes amongst the voting users. The amendment voting facility may provide for management of the voting process including a date for the vote, a vote distribution list, inclusion of associated documents, facility for signature-providing page submissions, inclusion of instructions to voters, a process of approval, a step for outside counsel to review, and the like. A vote may be cast as a yes-no vote, a yes-no vote with signature, a consent, and the like. A voting form may be provided, where the voting form is configured to allow users to dynamically generate voting forms, such as where the dynamically generated voting forms are based on user participant relationships. The voting form may include a user customizable text or logo.
Referring to
In embodiments, a method for managing a networked secure collaborative computer data exchange environment may be provided, the method including establishing, by a secure exchange server controlled by an intermediate business entity, a client login data authentication procedure that allows at least one client computing device of a plurality of client computing devices operated by users of a plurality of business entities to access the secure exchange server, wherein communications between the secure exchange server and the plurality of client computing devices is through a communications network; storing, by the secure exchange server, at least one client login authentication data for each of the plurality of client computing devices; receiving content from a first of the plurality of client computing devices; by the secure exchange server, permitting access to the content for a subset of the plurality of computing devices through an exchange content access facility, wherein the exchange content access facility is managed by at least one business entity of the plurality of business entities; granting, by the exchange server, access to the content to a second of the plurality of client computing devices when the secure exchange server receives from the second of the plurality of client computing devices its client login authentication data provided that the second of the plurality of client computing devices is one of the subset of the plurality of computing devices; and providing an electronic signature facility for managing a process of signing the received content by at least one of the subset of the plurality of computing devices, wherein the electronic signature facility includes a signature viewer interface that restricts viewing of the content for signing.
In embodiments, access to the exchange server by client processors may be through a host server controlled by the business entity that controls the client processor. The client computing devices may be at least one of owned and managed by at least one of the plurality of business entities. The client computing devices may be owned by individual users. The secure exchange server may be at least one of a plurality of exchange servers. The content may be at least one of a document, a spreadsheet, a message, data, an image, audio content, video content, multimedia content, and the like. The content may be transferred to the secure exchange server via encrypted data transmission.
In embodiments, the electronic signature facility may include an electronic signature graphical user interface for presenting the content for signing. The restricted viewing may be a signing user being restricted to only those portions of the content that the signing user is authorized to view. The restricted viewing may be a signing user being restricted to only those portions of the content for which the signing applies.
In embodiments, a method for managing a networked secure collaborative computer data exchange environment may be provided, establishing, by a secure exchange server controlled by an intermediate business entity, an authentication procedure for a client login authentication data that allows at least one of a plurality of user client computing devices operated by users of at least two business entities to access the at least one secure exchange server, wherein communications between the secure exchange server and the plurality of user client computing devices is through a communications network; storing, by the secure exchange server, the at least one client login authentication data for each of the plurality of client computing devices; receiving, from a first of the plurality of user client computing devices, content; associating access, by the secure exchange server, to the content to a subset of the plurality of user computing devices through an exchange content access facility, the exchange content access facility managed by at least one of the plurality of business entities; granting, by the exchange server, access to the content of the secure exchange server to a second of the plurality of user client computing devices when the secure exchange server receives a client login authentication data from the second of the plurality of user client computing devices and dependent upon the second of the plurality of user client computing devices being one of the subset of the plurality of user client computing devices; and providing an electronic signature facility for managing a process of signing the received content by at least one of the subset of the plurality of computing devices, wherein the electronic signature facility verifies the identity of the signing user through biometric profiling utilizing previously stored biometric data from the signing user.
In embodiments, a method for managing a networked secure collaborative computer data exchange environment may be provided, establishing, by a secure exchange server controlled by an intermediate business entity, an authentication procedure for a client login authentication data that allows at least one of a plurality of user client computing devices operated by users of at least two business entities to access the at least one secure exchange server, wherein communications between the secure exchange server and the plurality of user client computing devices is through a communications network; storing, by the secure exchange server, the at least one client login authentication data for each of the plurality of client computing devices; receiving, from a first of the plurality of user client computing devices, content; associating access, by the secure exchange server, to the content to a subset of the plurality of user computing devices through an exchange content access facility, the exchange content access facility managed by at least one of the plurality of business entities; granting, by the exchange server, access to the content of the secure exchange server to a second of the plurality of user client computing devices when the secure exchange server receives a client login authentication data from the second of the plurality of user client computing devices and dependent upon the second of the plurality of user client computing devices being one of the subset of the plurality of user client computing devices; and providing an electronic signature facility for managing a process of signing the received content by at least one of the subset of the plurality of computing devices, the electronic signature facility assembling an electronically signed document including signatures from a plurality of users, each of which has had access to only a subset of the content for which they were the signatory.
In embodiments, a method for managing a networked secure collaborative computer data exchange environment may be provided, establishing, by a secure exchange server controlled by an intermediate business entity, an authentication procedure for a client login authentication data that allows at least one of a plurality of user client computing devices operated by users of at least two business entities to access the at least one secure exchange server, wherein communications between the secure exchange server and the plurality of user client computing devices is through a communications network; storing, by the secure exchange server, the at least one client login authentication data for each of the plurality of client computing devices; receiving, from a first of the plurality of user client computing devices, content; associating access, by the secure exchange server, to the content to a subset of the plurality of user computing devices through an exchange content access facility, the exchange content access facility managed by at least one of the plurality of business entities; granting, by the exchange server, access to the content of the secure exchange server to a second of the plurality of user client computing devices when the secure exchange server receives a client login authentication data from the second of the plurality of user client computing devices and dependent upon the second of the plurality of user client computing devices being one of the subset of the plurality of user client computing devices; and providing an electronic signature facility for managing a process of signing the received content by at least one of the subset of the plurality of computing devices, wherein the electronic signature facility provides for secure viewing of the content as presented to a signing user through a computer display of the signing user'"'"'s client computing device, wherein the user'"'"'s client computing device includes an integrated camera for viewing the environment around the signing user and a face detection facility for recognizing the signing user, detecting if the signing user is the only individual present in the viewed environment, and if not, obfuscates the viewing of the content. The obfuscation may be blanking the screen, distorting the viewing of the content, and the like. The detection of the signing user by the face detection facility may be accomplished by comparing an image of a previously stored facial image of the signing user to the face detected in the viewed environment.
Referring to
In an example of setting up a file exchange, an administrator 612 user may place files within an input file directory, where the files may have a nomenclature that tells what widget they will populate. The system may create a configuration, run a process to populate it, ensure it is correct before allowing access, and the like. In this way, data may be considered ‘stage data’ prior to allowing access, and ‘production data’ once approved. Once the user is comfortable with a view, they can proceed and publish the staged data into ‘production’. The system may be able to upload data as CSV file, create permissions files, and the like. In embodiments, a specific user might be provided a view within a dashboard but be given only access to one or more records within the dashboard. For example, the user might only see a particular fund, rather than all funds. If they select that fund, they may be able to see child data associated with that fund. But without permission, the other funds (or child data) would not be displayed. A permissions model may give users access to specific records within the dashboard. In an M&A example, a user may be able to see all the live deals an organization is managing, a certain human resources team might be allowed to see the dashboard, and the like, where specific entities are provided permissions.
The dashboard may have both optional and standard functionality, such as standard filtering options, converting documents to a PDF format, and the like. There may be a widget catalog provided, such as for textual displays, graphs and charts, document tracking, and the like.
The dashboard may enable management of files at a document level, at a record level, and the like, such as to allow a user to add records and manage information. A user may be able to add new content, put in the required information, refresh the screen (e.g., on a per-deal basis), and the like. The user may be able to edit and delete existing records, show a parent-child relationship, and the like. The user might want to choose the parent and find the document within the exchange and link it up to the parent document. The system may have the ability to manage individual records, such as for dashboard data, but also to permissions. The user may be able to take a parent record and provide permission to one of the many users to enable access to those parents. In embodiments, the system may provide for an auditing facility, such as for tracking who is adding records and permissions.
Referring to
Referring to
Use cases for email-in may include submission of analysis documents for review, a method for having a third party review applications (e.g. in order to create accounts while ensuring the third party does not gain control over attachments that contain private information), and the like. In addition, the system may provide for folder permissions in the email folder that can be used to prevent misuse. For compliance, the user may be able to store communications in an archive 714 and track what was done in association with the communications.
In embodiments, any exchange may be set up with email-in as a feature. An administrator or client may go through the process, such as defining where the sender'"'"'s email address is stored in the system, using custom fields for the ‘from’ field, storing the message as an email, cap the maximum emails it can accept, choosing the folder it will be associated with, and the like. A folder location may thus be mapped to an email address (e.g., with the domain pre-defined but the pre-fix available for end user definition). The user may select users to be included for the feature, set alert settings and notification settings (e.g. problem alerts, that something was added), and the like. A white list may be included, such as for who should be able to send emails into the exchange (e.g. could be domains or even addresses). If a user is not on the white list, they may not be able to send emails to the exchange. A black list may be included, where a user may choose users to refuse acceptance onto the exchange.
The email-in facility may create a folder structure within a pre-defined mapped folder, and create a sub-folder for each email that is sent into the exchange, such as with the subject as the title of that folder. Contents of the folders may then include any attached documents. The email-in content may be organized like any exchange, where new emails are added as they come in. The system may be configured to send to a group, or to only one. For instance, a user may send the folder to one person to review but not give the recipient the right to do resend, print, or save the document. Permission may be applied to the documents like any other document as described herein, such as who can review the correspondence, who can modify it, save it, print it, and the like. In embodiments, an event trigger facility 718 may be provided where received email may trigger an event, such as a task, a process, and the like. For instance, if a contract comes in it may trigger a renewal process. In another instance, an amendment process may be triggered with the reception of an email.
In embodiments, the email-in facility may include the collection of emails from various parties into a structured database for later management and processing by a critical information exchange manager, eliminate the learning curve of using a web application to upload document to the cloud, allow specific internal-external parties to post documents into a web folder that may be shared with predefined individuals at various control levels, and the like. Components may include an email address associated with a folder in an exchange, a maximum number of allowed emails in an exchange, a definition of email conversion options, a white list, a black list, notifications on success and/or error, and the like. In an example, client or prospect requests may be processed, such as for an investment firm with a need to submit documents for analysis, a bank looking for a way to have a third part review applications to create new accounts while ensuring that the third party does not gain control over the attachments that contain private information, a bank having compliance needs such as needing to archive all communications they have (e.g. cc'"'"'ing and replying to the system on all correspondences), and the like.
In embodiments, a method for managing a networked secure collaborative computer data exchange environment may be provided, the method including establishing, by a secure exchange server controlled by an intermediate business entity, a client login data authentication procedure that allows at least one client computing device of a plurality of client computing devices operated by users of a plurality of business entities to access the secure exchange server, wherein communications between the secure exchange server and the plurality of client computing devices is through a communications network; storing, by the secure exchange server, at least one client login authentication data for each of the plurality of client computing devices; receiving content from a first of the plurality of client computing devices; by the secure exchange server, permitting access to the content for a subset of the plurality of computing devices through an exchange content access facility, wherein the exchange content access facility is managed by at least one business entity of the plurality of business entities; granting, by the exchange server, access to the content to a second of the plurality of client computing devices when the secure exchange server receives from the second of the plurality of client computing devices its client login authentication data provided that the second of the plurality of client computing devices is one of the subset of the plurality of computing devices; and providing a secure email input facility for accepting non-secure email from outside the exchange into the secure collaborative computer data exchange environment, wherein the non-secure email is received and stored as secure email in the secure exchange server.
In embodiments, access to the exchange server by client processors may be through a host server controlled by the business entity that controls the client processor. The client computing devices may be at least one of owned and managed by at least one of the plurality of business entities. The client computing devices may be owned by individual users. The secure exchange server may be at least one of a plurality of exchange servers. The content may be at least one of a document, a spreadsheet, a message, data, an image, audio content, video content, multimedia content, and the like. The content may be transferred to the secure exchange server via encrypted data transmission.
In embodiments, the acceptance of the non-secure email may be dependent upon a controlled listing stored in the secure exchange server, where the listing is a white listing specifying emails that are allowed, a black listing specifying email that are not allowed, and the like. The reception of a non-secure email may trigger an event, where the triggered event is the initiation of a content amendment process, the initiation of a new exchange, the distribution of the email within the exchange, storage of the email in a secure archive facility, and the like. The email may be automatically associated with an area of content on the exchange based on the sender of the email, the subject line of the email, the destination address of the email within the exchange and the content of the email, and the like.
Referring to
In embodiments, the viewer may be able to detect faces and enhance security based on face detection, such as through utilization of a camera connected to or integrated with the computing device being used to view content. The viewer may also utilize a ‘secure view’, such as where only a portion of a document is made viewable by the person viewing the document. Secure view may implement security measures (e.g. blanking the screen, distorting the screen, putting up a screen) based on eye motion, movement of the face, the presence of a second face, and the like. Viewing time may be monitored and reported, audited, and the like, based on how long the user'"'"'s face has looked at the document, where the monitoring, reporting, auditing, and the like may be provided automatically. Document encryption and decryption may be provided based on document permissions. For instance, if the document can only be opened by a specific number of people, face detection may use the author, or any other permissioned user'"'"'s face to encrypt the document and require the same face to be detected to allow ‘un-locking’ of the document. Encryption of the face may then be ‘recorded’ and used as an electronic signature, thereby tying the face to the user'"'"'s profile. Recording of viewing time may be on a document level, on a per page basis, and the like. Viewing statistics may be mined for business intelligence by sellers in a strategic transaction, such as through a CIO with an enterprise, a marketing analyst, or any such user who may benefit from knowing with content is being read and what content is not being read.
In embodiments, the viewer may provide a search facility to search within a document. The system may allow for highlighting a search result, highlighting a selected portion of the document, and the like. The system may provide facilities for annotating, marking, commenting, and the like, to a document, such as a private annotation for the user, a shared annotation for other users, and the like. The system may provide for a secure document view, where only some portions of the document are viewable. For instance, a user may only want to show another user a selected portion of a document. The secure document view may also allow a user to increase the size of the document view window, which may better ensure that people proximate to you only see the relevant portions of the document. Another feature of the secure document view may include distorting those portions of the document that are not selected for viewing, such as making those sections fuzzy. The secure document view may react to the eye movement of the user, such as scrolling the document as the user'"'"'s eye gaze direction shifts, distorting or blocking the document from view if the user looks away from the viewer, and the like.
The viewing facility may have capabilities for dealing with certain document formats in a standard way. For instance, the system may automatically convert Microsoft Word and PowerPoint documents to a PDF format, open spreadsheets (e.g. Microsoft Excel) in a spreadsheet viewer, and the like. For instance, when an Excel document is opened, it may be rendered on the fly, decrypted on the fly as a user scrolls down, retrieved from the server and encrypted on the fly, and the like.
In embodiments, a method for managing a networked secure collaborative computer data exchange environment may be provided, the method including establishing, by a secure exchange server controlled by an intermediate business entity, a client login data authentication procedure that allows at least one client computing device of a plurality of client computing devices operated by users of a plurality of business entities to access the secure exchange server, wherein communications between the secure exchange server and the plurality of client computing devices is through a communications network; storing, by the secure exchange server, at least one client login authentication data for each of the plurality of client computing devices; receiving content from a first of the plurality of client computing devices; by the secure exchange server, permitting access to the content for a subset of the plurality of computing devices through an exchange content access facility, wherein the exchange content access facility is managed by at least one business entity of the plurality of business entities; granting, by the exchange server, access to the content to a second of the plurality of client computing devices when the secure exchange server receives from the second of the plurality of client computing devices its client login authentication data provided that the second of the plurality of client computing devices is one of the subset of the plurality of computing devices; and providing a secure content viewer facility for the user to securely view the content on the user'"'"'s client computing device, wherein the secure view is provided through a viewing restriction based on a user action.
In embodiments, access to the exchange server by client processors may be through a host server controlled by the business entity that controls the client processor. The client computing devices may be at least one of owned and managed by at least one of the plurality of business entities. The client computing devices may be owned by individual users. The secure exchange server may be at least one of a plurality of exchange servers. The content may be at least one of a document, a spreadsheet, a message, data, an image, audio content, video content, multimedia content, and the like. The content may be transferred to the secure exchange server via encrypted data transmission.
In embodiments, the viewing restriction may be obfuscating the content view when the user action is an attempt to print screen, a security warning when the user action is an attempt to view the document, a water mark being inserted on the content when the action is a user printing the content, and the like. The client computing device may be a mobile client computing device, such as personally owned by the user, and configured for secure content viewing through the business entity.
In embodiments, a method for managing a networked secure collaborative computer data exchange environment may be provided, establishing, by a secure exchange server controlled by an intermediate business entity, an authentication procedure for a client login authentication data that allows at least one of a plurality of user client computing devices operated by users of at least two business entities to access the at least one secure exchange server, wherein communications between the secure exchange server and the plurality of user client computing devices is through a communications network; storing, by the secure exchange server, the at least one client login authentication data for each of the plurality of client computing devices; receiving, from a first of the plurality of user client computing devices, content; associating access, by the secure exchange server, to the content to a subset of the plurality of user computing devices through an exchange content access facility, the exchange content access facility managed by at least one of the plurality of business entities; granting, by the exchange server, access to the content of the secure exchange server to a second of the plurality of user client computing devices when the secure exchange server receives a client login authentication data from the second of the plurality of user client computing devices and dependent upon the second of the plurality of user client computing devices being one of the subset of the plurality of user client computing devices; and providing a secure content viewer facility for the user to securely view the content on the user'"'"'s client computing device, wherein a secure view is provided through a viewing restriction based on a user action, the user action detected through an integrated camera operating in conjunction with face recognition facility on the client computing device and the viewing restriction being an obfuscation of the content view when the user is observed such that viewing of the content by others is at risk. The user may be observed with other people in view of the camera, with an eye-gaze that is away from the client computing device, and the like.
In embodiments, a method for managing a networked secure collaborative computer data exchange environment may be provided, establishing, by a secure exchange server controlled by an intermediate business entity, an authentication procedure for a client login authentication data that allows at least one of a plurality of user client computing devices operated by users of at least two business entities to access the at least one secure exchange server, wherein communications between the secure exchange server and the plurality of user client computing devices is through a communications network; storing, by the secure exchange server, the at least one client login authentication data for each of the plurality of client computing devices; receiving, from a first of the plurality of user client computing devices, content; associating access, by the secure exchange server, to the content to a subset of the plurality of user computing devices through an exchange content access facility, the exchange content access facility managed by at least one of the plurality of business entities; granting, by the exchange server, access to the content of the secure exchange server to a second of the plurality of user client computing devices when the secure exchange server receives a client login authentication data from the second of the plurality of user client computing devices and dependent upon the second of the plurality of user client computing devices being one of the subset of the plurality of user client computing devices; and providing a content viewer monitoring facility for monitoring the user viewing the content on their client computing device, wherein the monitoring is provided through an integrated camera operating in conjunction with a face recognition facility on the client computing device.
In embodiments, a method for managing a networked secure collaborative computer data exchange environment may be provided, establishing, by a secure exchange server controlled by an intermediate business entity, an authentication procedure for a client login authentication data that allows at least one of a plurality of user client computing devices operated by users of at least two business entities to access the at least one secure exchange server, wherein communications between the secure exchange server and the plurality of user client computing devices is through a communications network; storing, by the secure exchange server, the at least one client login authentication data for each of the plurality of client computing devices; receiving, from a first of the plurality of user client computing devices, content; associating access, by the secure exchange server, to the content to a subset of the plurality of user computing devices through an exchange content access facility, the exchange content access facility managed by at least one of the plurality of business entities; granting, by the exchange server, access to the content of the secure exchange server to a second of the plurality of user client computing devices when the secure exchange server receives a client login authentication data from the second of the plurality of user client computing devices and dependent upon the second of the plurality of user client computing devices being one of the subset of the plurality of user client computing devices; and providing a content viewer monitoring facility for monitoring the user viewing the content on their client computing device, wherein a content viewing access report is generated that provides statistics related to the time the user spends viewing portions of the content. The portion of the content may be at a granular level of a page of the content, at a granular level of the entire document, and the like. The content viewing access report may provide for tracking and audit reporting for the user viewing the content. The statistics may be used to develop business intelligence.
In embodiments, a method for managing a networked secure collaborative computer data exchange environment may be provided, establishing, by a secure exchange server controlled by an intermediate business entity, an authentication procedure for a client login authentication data that allows at least one of a plurality of user client computing devices operated by users of at least two business entities to access the at least one secure exchange server, wherein communications between the secure exchange server and the plurality of user client computing devices is through a communications network; storing, by the secure exchange server, the at least one client login authentication data for each of the plurality of client computing devices; receiving, from a first of the plurality of user client computing devices, content; associating access, by the secure exchange server, to the content to a subset of the plurality of user computing devices through an exchange content access facility, the exchange content access facility managed by at least one of the plurality of business entities; granting, by the exchange server, access to the content of the secure exchange server to a second of the plurality of user client computing devices when the secure exchange server receives a client login authentication data from the second of the plurality of user client computing devices and dependent upon the second of the plurality of user client computing devices being one of the subset of the plurality of user client computing devices; and providing a content viewer control facility for user-controlled viewing of the content on their client computing device, wherein the control is at least in part enabled through an integrated camera operating in conjunction with a motion recognition facility on the client computing device. The control may be actualized through monitoring user hand gestures, monitoring user eye movements, through monitoring user head movements, and the like. The control may be enabling the viewing of the content, tuning a page in viewing the content, inserting a signature into the content, closing a viewing session for the content, and the like.
Referring to
In embodiments, the present invention may provide for technology aspects related to architecture, structural components, facilities, data, communications, analytics, reporting, materials, inbound components, processes, algorithms, and the like. Architecture, structural components, and facility may include multi-language support, metadata association, document content processing, document content distribution, distributed geo-storage, and the like. Relationships among components may include CRM integration, sales force connector, HCM integration, ERP integration, ECM integration, e-Learning integration, and the like. Data, communications, analytics, and reporting may include user history reporting, activity reporting, permission reporting access reporting, audit and compliance reporting, configurable dashboards, self-service reporting (e.g. custom, scheduled, ad-hoc), IMAP folder management, exadata integration, and the like.
In embodiments, the present invention may provide for product aspects related to features, attributes, benefits, outputs, functional benefits, security, and the like. Products may include integration from a secure data room, public-private bifurcation in the loan market, secure mobile devices, and the like. Features, attributes, and benefits may include iPad protected documents, bounce-back reporting, branding, channels, alerts, task management, multi-task process management, automatic indexing, migration, automation (e.g. ILIA automation), specialization (e.g. custom fields, custom workflow), very large file support, document management (e.g. review and approve, check-in and out, version control), customizable user interface, unified inbox, and the like. Product features may include custom alerts, buyer utilities, bulk addition of files and folders, dynamically indexing information, advanced and federated search and filtering, custom fields and tags, integration with third-party document formats (e.g. Microsoft Office products), add and management of users and groups, multi-file uploads, commenting, compliant archiving, native-format file viewing, business intelligence based on activity reporting, question and answer components, link mapping, secure viewing without plug-ins, unified communication and collaboration (e.g. presence notification, IM-chat-discussion threads, forums and wikis), administration capability, e-forms, and the like. Security may include on-demand rights management, access and authentication (e.g. document and content level access, multi-factor authentication, single sign-on), data encryption, tracking and audit, intra-structure security (e.g. systems protection, security audits), personnel security, process security, encryption, watermarking, and the like.
In embodiments, the present invention may provide for market aspects related uses, applications, environments of deployment, use scenarios, ecosystems, value chains, system integration, and the like. Applications may include corporate repository, extended team collaboration, managed file transfer, secure extranet, project lifecycle management, board reporting, legal extranet, legal repository, legal collaboration, managed file transfer, regulatory audit and reporting, secure extranet, financial audit management, fundraising, investor communication, contract management, regulatory filings, board of directors'"'"' communication, Compliance feed integration, access gatekeeper, project capital finance, project collaboration, supply chain management, contract manufacturing, and the like. Markets may include finance, loan syndication, M&A (e.g. relationship management and marketing activities, client interactions, sending legal documents and contacts for comment, edit, and signature), alternative investments, commercial banking, investment banking, bankruptcy and restructuring, corporate development, construction, life sciences, pharmaceutical, biotechnology, energy and utilities, utility rate case management, insurance, telecommunications, project life cycle management, information technology, legal services, government, manufacturing, real estate, media and entertainment, and the like. Environments of deployment may include corporate development, corporate repository, corporate finance, corporate legal, engineering, human resources, marketing, general services, research and development, compliance and security, line of business, and the like. Use scenarios may include, bankruptcy & restructuring, board reporting, business development and licensing, clinical site activation, extended team collaboration, fundraising, initial public offerings (IPOs), investor portals, investor reporting, legal extranet, managed file transfer, mergers and acquisitions, private placements, project lifecycle management, regulatory audit and reporting, regulatory case management, safety document distribution, secure extranet, structured finances, syndicated lending, virtual data room, and the like.
While the invention has been described in connection with certain preferred embodiments, other embodiments would be understood by one of ordinary skill in the art and are encompassed herein.
The methods and systems described herein may be deployed in part or in whole through a machine that executes computer software, program codes, and/or instructions on a processor. The present invention may be implemented as a method on the machine, as a system or apparatus as part of or in relation to the machine, or as a computer program product embodied in a computer readable medium executing on one or more of the machines. The processor may be part of a server, client, network infrastructure, mobile computing platform, stationary computing platform, or other computing platform. A processor may be any kind of computational or processing device capable of executing program instructions, codes, binary instructions and the like. The processor may be or include a signal processor, digital processor, embedded processor, microprocessor or any variant such as a co-processor (math co-processor, graphic co-processor, communication co-processor and the like) and the like that may directly or indirectly facilitate execution of program code or program instructions stored thereon. In addition, the processor may enable execution of multiple programs, threads, and codes. The threads may be executed simultaneously to enhance the performance of the processor and to facilitate simultaneous operations of the application. By way of implementation, methods, program codes, program instructions and the like described herein may be implemented in one or more thread. The thread may spawn other threads that may have assigned priorities associated with them; the processor may execute these threads based on priority or any other order based on instructions provided in the program code. The processor may include memory that stores methods, codes, instructions and programs as described herein and elsewhere. The processor may access a storage medium through an interface that may store methods, codes, and instructions as described herein and elsewhere. The storage medium associated with the processor for storing methods, programs, codes, program instructions or other type of instructions capable of being executed by the computing or processing device may include but may not be limited to one or more of a CD-ROM, DVD, memory, hard disk, flash drive, RAM, ROM, cache and the like.
A processor may include one or more cores that may enhance speed and performance of a multiprocessor. In embodiments, the process may be a dual core processor, quad core processors, other chip-level multiprocessor and the like that combine two or more independent cores (called a die).
The methods and systems described herein may be deployed in part or in whole through a machine that executes computer software on a server, client, firewall, gateway, hub, router, or other such computer and/or networking hardware. The software program may be associated with a server that may include a file server, print server, domain server, internet server, intranet server and other variants such as secondary server, host server, distributed server and the like. The server may include one or more of memories, processors, computer readable media, storage media, ports (physical and virtual), communication devices, and interfaces capable of accessing other servers, clients, machines, and devices through a wired or a wireless medium, and the like. The methods, programs or codes as described herein and elsewhere may be executed by the server. In addition, other devices required for execution of methods as described in this application may be considered as a part of the infrastructure associated with the server.
The server may provide an interface to other devices including, without limitation, clients, other servers, printers, database servers, print servers, file servers, communication servers, distributed servers and the like. Additionally, this coupling and/or connection may facilitate remote execution of program across the network. The networking of some or all of these devices may facilitate parallel processing of a program or method at one or more location without deviating from the scope of the invention. In addition, any of the devices attached to the server through an interface may include at least one storage medium capable of storing methods, programs, code and/or instructions. A central repository may provide program instructions to be executed on different devices. In this implementation, the remote repository may act as a storage medium for program code, instructions, and programs.
The software program may be associated with a client that may include a file client, print client, domain client, internet client, intranet client and other variants such as secondary client, host client, distributed client and the like. The client may include one or more of memories, processors, computer readable media, storage media, ports (physical and virtual), communication devices, and interfaces capable of accessing other clients, servers, machines, and devices through a wired or a wireless medium, and the like. The methods, programs or codes as described herein and elsewhere may be executed by the client. In addition, other devices required for execution of methods as described in this application may be considered as a part of the infrastructure associated with the client.
The client may provide an interface to other devices including, without limitation, servers, other clients, printers, database servers, print servers, file servers, communication servers, distributed servers and the like. Additionally, this coupling and/or connection may facilitate remote execution of program across the network. The networking of some or all of these devices may facilitate parallel processing of a program or method at one or more location without deviating from the scope of the invention. In addition, any of the devices attached to the client through an interface may include at least one storage medium capable of storing methods, programs, applications, code and/or instructions. A central repository may provide program instructions to be executed on different devices. In this implementation, the remote repository may act as a storage medium for program code, instructions, and programs.
The methods and systems described herein may be deployed in part or in whole through network infrastructures. The network infrastructure may include elements such as computing devices, servers, routers, hubs, firewalls, clients, personal computers, communication devices, routing devices and other active and passive devices, facilitys and/or components as known in the art. The computing and/or non-computing device(s) associated with the network infrastructure may include, apart from other components, a storage medium such as flash memory, buffer, stack, RAM, ROM and the like. The processes, methods, program codes, instructions described herein and elsewhere may be executed by one or more of the network infrastructural elements.
The methods, program codes, and instructions described herein and elsewhere may be implemented on a cellular network having multiple cells. The cellular network may either be frequency division multiple access (FDMA) network or code division multiple access (CDMA) network. The cellular network may include mobile devices, cell sites, base stations, repeaters, antennas, towers, and the like. The cell network may be a GSM, GPRS, 3G, EVDO, mesh, or other networks types.
The methods, programs codes, and instructions described herein and elsewhere may be implemented on or through mobile devices. The mobile devices may include navigation devices, cell phones, mobile phones, mobile personal digital assistants, laptops, palmtops, netbooks, pagers, electronic books readers, music players and the like. These devices may include, apart from other components, a storage medium such as a flash memory, buffer, RAM, ROM and one or more computing devices. The computing devices associated with mobile devices may be enabled to execute program codes, methods, and instructions stored thereon. Alternatively, the mobile devices may be configured to execute instructions in collaboration with other devices. The mobile devices may communicate with base stations interfaced with servers and configured to execute program codes. The mobile devices may communicate on a peer to peer network, mesh network, or other communications network. The program code may be stored on the storage medium associated with the server and executed by a computing device embedded within the server. The base station may include a computing device and a storage medium. The storage device may store program codes and instructions executed by the computing devices associated with the base station.
The computer software, program codes, and/or instructions may be stored and/or accessed on machine readable media that may include: computer components, devices, and recording media that retain digital data used for computing for some interval of time; semiconductor storage known as random access memory (RAM); mass storage typically for more permanent storage, such as optical discs, forms of magnetic storage like hard disks, tapes, drums, cards and other types; processor registers, cache memory, volatile memory, non-volatile memory; optical storage such as CD, DVD; removable media such as flash memory (e.g. USB sticks or keys), floppy disks, magnetic tape, paper tape, punch cards, standalone RAM disks, Zip drives, removable mass storage, off-line, and the like; other computer memory such as dynamic memory, static memory, read/write storage, mutable storage, read only, random access, sequential access, location addressable, file addressable, content addressable, network attached storage, storage area network, bar codes, magnetic ink, and the like.
The methods and systems described herein may transform physical and/or or intangible items from one state to another. The methods and systems described herein may also transform data representing physical and/or intangible items from one state to another.
The elements described and depicted herein, including in flow charts and block diagrams throughout the figures, imply logical boundaries between the elements. However, according to software or hardware engineering practices, the depicted elements and the functions thereof may be implemented on machines through computer executable media having a processor capable of executing program instructions stored thereon as a monolithic software structure, as standalone software facilities, or as facilities that employ external routines, code, services, and so forth, or any combination of these, and all such implementations may be within the scope of the present disclosure. Examples of such machines may include, but may not be limited to, personal digital assistants, laptops, personal computers, mobile phones, other handheld computing devices, medical equipment, wired or wireless communication devices, transducers, chips, calculators, satellites, tablet PCs, electronic books, gadgets, electronic devices, devices having artificial intelligence, computing devices, networking equipments, servers, routers and the like. Furthermore, the elements depicted in the flow chart and block diagrams or any other logical component may be implemented on a machine capable of executing program instructions. Thus, while the foregoing drawings and descriptions set forth functional aspects of the disclosed systems, no particular arrangement of software for implementing these functional aspects should be inferred from these descriptions unless explicitly stated or otherwise clear from the context. Similarly, it will be appreciated that the various steps identified and described above may be varied, and that the order of steps may be adapted to particular applications of the techniques disclosed herein. All such variations and modifications are intended to fall within the scope of this disclosure. As such, the depiction and/or description of an order for various steps should not be understood to require a particular order of execution for those steps, unless required by a particular application, or explicitly stated or otherwise clear from the context.
The methods and/or processes described above, and steps thereof, may be realized in hardware, software or any combination of hardware and software suitable for a particular application. The hardware may include a general purpose computer and/or dedicated computing device or specific computing device or particular aspect or component of a specific computing device. The processes may be realized in one or more microprocessors, microcontrollers, embedded microcontrollers, programmable digital signal processors or other programmable device, along with internal and/or external memory. The processes may also, or instead, be embodied in an application specific integrated circuit, a programmable gate array, programmable array logic, or any other device or combination of devices that may be configured to process electronic signals. It will further be appreciated that one or more of the processes may be realized as a computer executable code capable of being executed on a machine readable medium.
The computer executable code may be created using a structured programming language such as C, an object oriented programming language such as C++, or any other high-level or low-level programming language (including assembly languages, hardware description languages, and database programming languages and technologies) that may be stored, compiled or interpreted to run on one of the above devices, as well as heterogeneous combinations of processors, processor architectures, or combinations of different hardware and software, or any other machine capable of executing program instructions.
Thus, in one aspect, each method described above and combinations thereof may be embodied in computer executable code that, when executing on one or more computing devices, performs the steps thereof. In another aspect, the methods may be embodied in systems that perform the steps thereof, and may be distributed across devices in a number of ways, or all of the functionality may be integrated into a dedicated, standalone device or other hardware. In another aspect, the means for performing the steps associated with the processes described above may include any of the hardware and/or software described above. All such permutations and combinations are intended to fall within the scope of the present disclosure.
While the invention has been disclosed in connection with the preferred embodiments shown and described in detail, various modifications and improvements thereon will become readily apparent to those skilled in the art. Accordingly, the spirit and scope of the present invention is not to be limited by the foregoing examples, but is to be understood in the broadest sense allowable by law.
All documents referenced herein are hereby incorporated by reference.