Secure workflow and data management facility
First Claim
1. A system for securely sharing information between a subscriber user and a guest user, comprising:
- a subscriber package operating on a subscriber computing device used by the subscriber user and in secure communication with a server, anda guest package operating on a guest computing device used by the guest user and in secure communication with the server,wherein the server is configured;
(1) to accept from the subscriber user through the subscriber package the information to be shared with the guest user and a restriction on the guest user'"'"'s interaction with the information, and (2) to fully and exclusively control the guest user'"'"'s interaction with the information through the guest package based on the restriction, andwherein the subscriber user and the guest user are end users, andwherein the guest package maintains a secure environment on the guest computing device and is configured to prevent the information from being accessed by the guest computing device or a third party outside of the guest package.
7 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a computer program that provides a secure workflow environment through a cloud computing facility, wherein the secure workflow environment may be adapted to (1) provide a plurality of users with a workspace adaptable to provide secure document management and secure communications management, wherein the users comprise at least two classes of user, including a participant and a subscriber, the subscriber having control authority within the workspace that exceeds that of the participant and the participant having control over at least some of the participants own interactions with the workspace, (2) maintain a secure instance of each communication provided by each of the users such that each communication can be managed, (3) maintain a secure instance of each document interaction provided by each user such that each interaction can be managed; and extending the secure workflow environment to the users through a secure network connection.
-
Citations
24 Claims
-
1. A system for securely sharing information between a subscriber user and a guest user, comprising:
-
a subscriber package operating on a subscriber computing device used by the subscriber user and in secure communication with a server, and a guest package operating on a guest computing device used by the guest user and in secure communication with the server, wherein the server is configured;
(1) to accept from the subscriber user through the subscriber package the information to be shared with the guest user and a restriction on the guest user'"'"'s interaction with the information, and (2) to fully and exclusively control the guest user'"'"'s interaction with the information through the guest package based on the restriction, andwherein the subscriber user and the guest user are end users, and wherein the guest package maintains a secure environment on the guest computing device and is configured to prevent the information from being accessed by the guest computing device or a third party outside of the guest package. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for securely sharing information between a sender and a recipient user, comprising:
-
a sender package operating on a sender computing device used by the sender and in secure communication with a server, and a recipient package operating on a recipient computing device used by the recipient and in secure communication with the server, wherein the server is configured;
(1) to accept from the sender through the sender package the information to be shared with the recipient and a restriction on the recipient'"'"'s interaction with the information, and (2) to fully and exclusively control the recipient'"'"'s interaction with the information through the recipient package based on the restriction, andwherein the sender and the recipient are end users, and wherein the recipient package maintains a secure environment on the recipient computing device and is configured to prevent the information from being accessed by the recipient computing device or a third party outside of the recipient package. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification