Method and systems for lockbox secured file transmission
First Claim
1. A transparent method for secure file transmission from a first computing device of a sender to a second computing device of at least one recipient, the method comprising the steps of:
- selecting a group comprising a set of recipients and a file from the first computing device, wherein each recipient from the set of recipients has at least one recipient computing device and wherein the file is to be transmitted from the first computing device to at least one recipient computing device;
selecting a lockbox option at the first computing device to securely transmit the file to a lockbox situated at the at least one recipient computing device;
iteratively selecting a destination location on the at least one recipient computing device where the file is to be dispatched by performing a set of lockbox content version control operations at the first computing device until a valid location on the at least one recipient computing device is selected, wherein the set of lockbox content version control operations comprises determining whether a duplicate file exists at the destination location on each of the at least one recipient computing device, such that the name of the file that the sender at the first computing device is intending to dispatch is identical to the name of the file already present at the destination location on the at least one recipient computing device by performing the following operations;
prompting the sender at the first computing device to select a second location on the at least one recipient computing device if the duplicate file exists at the destination location on the at least one recipient computing device,designating the valid location to null,designating the second location as the valid location if the duplicate file does not exist at the second location, anditeratively prompting the sender to select the subsequent location, and designating the subsequent location as the valid location if the duplicate file does not exist at the subsequent location until the valid location or until the sender aborts the file dispatch;
dispatching the file at the valid location and presenting an indication at the at least one recipient computing device that the file is dispatched with the lockbox option; and
displaying the file in response to at least one recipient selecting a view lockbox content option at the at least one recipient computing device.
3 Assignments
0 Petitions
Accused Products
Abstract
A transparent method, and systems, for secure file transmission from a first computing device of a sender to a recipient computing device, comprising the steps of: selecting a group, at least one recipient having a recipient computing device and a file from the first computing device; selecting a lockbox option at the first computing device to securely transmit the file to a lockbox situated at the at least one recipient computing device; iteratively selecting a location on at least one recipient computing device where the file is to be dispatched by performing a set of lockbox content version control operations at the first computing device until a valid location on the at least one recipient computing device is selected; dispatching the file at the valid location and presenting an indication that the file is dispatched with the lockbox option; and displaying the file.
37 Citations
20 Claims
-
1. A transparent method for secure file transmission from a first computing device of a sender to a second computing device of at least one recipient, the method comprising the steps of:
-
selecting a group comprising a set of recipients and a file from the first computing device, wherein each recipient from the set of recipients has at least one recipient computing device and wherein the file is to be transmitted from the first computing device to at least one recipient computing device; selecting a lockbox option at the first computing device to securely transmit the file to a lockbox situated at the at least one recipient computing device; iteratively selecting a destination location on the at least one recipient computing device where the file is to be dispatched by performing a set of lockbox content version control operations at the first computing device until a valid location on the at least one recipient computing device is selected, wherein the set of lockbox content version control operations comprises determining whether a duplicate file exists at the destination location on each of the at least one recipient computing device, such that the name of the file that the sender at the first computing device is intending to dispatch is identical to the name of the file already present at the destination location on the at least one recipient computing device by performing the following operations; prompting the sender at the first computing device to select a second location on the at least one recipient computing device if the duplicate file exists at the destination location on the at least one recipient computing device, designating the valid location to null, designating the second location as the valid location if the duplicate file does not exist at the second location, and iteratively prompting the sender to select the subsequent location, and designating the subsequent location as the valid location if the duplicate file does not exist at the subsequent location until the valid location or until the sender aborts the file dispatch; dispatching the file at the valid location and presenting an indication at the at least one recipient computing device that the file is dispatched with the lockbox option; and displaying the file in response to at least one recipient selecting a view lockbox content option at the at least one recipient computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A transparent file transmission system establishing a secure communication link from a first computing device of a sender to at least one recipient computing device of at least one recipient, the system comprising:
a hardware processor configured to perform the following operations; display a selection interface to select a group, recipient comprising a set of recipients and a file from the first computing device, wherein each recipient from the set of recipients has at least one recipient computing device, and wherein the file is to be transmitted from the first computing device to the at least one recipient computing device; display a lockbox interface to select a lockbox option at the first computing device to securely transmit the file to a lockbox situated at the at least one recipient computing device to provide lockbox contents of at least one file; display a version control interface to iteratively select a destination location on the at least one recipient computing device by performing a set of lockbox content version control operations at the first computing device until a valid location is selected, wherein the destination location is situated on the at least one recipient computing device where the file is to be dispatched, wherein the set of lockbox content version control operations are configured to; determine whether a duplicate file exists at the destination location on the at least one recipient computing device, such that the name of the file the sender is intending to dispatch is identical to the name of the file already present at the destination location on the at least one recipient computing device, and prompt the sender to select a second location on the at least one recipient computing device if the duplicate file exists at the destination location on the at least one recipient computing device; display a dispatch notification interface to present an indication at each of the at least one recipient computing device that the file is dispatched with the lockbox option after dispatching the file at the valid location at the at least one recipient computing device; and display a lockbox content interface to display the file in response to the recipient selecting a view lockbox content option at the at least one recipient computing device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
20. A transparent method for secure file transmission from a first computing device of a sender to a second computing device of at least one recipient, the method comprising the steps of:
-
selecting a group, at least one recipient and a file from the first computing device, wherein the at least one recipients has a set of recipient computing device and the at least one recipients is a member of the group, and wherein the file is to be transmitted from the first computing device to the at least one recipient computing device; selecting a specific computing device from the set of recipient computing device;
selecting a mode of communication for the specific computing device;
selecting a lockbox option at the first computing device to securely transmit the file to a lockbox situated at the specific computing device;iteratively selecting a destination location where the file is to be dispatched on the specific computing device by performing a set of lockbox content version control operations at the first computing device until a valid location on the specific computing device is selected, wherein the set of lockbox content version control operations comprises determining whether a duplicate file exists at the destination location on each of the at least one recipient computing device, such that the name of the file that the sender at the first computing device is intending to dispatch is identical to the name of the file already present at the destination location on the at least one recipient computing device by performing the following operations; prompting the sender at the first computing device to select a second location on the at least one recipient computing device if the duplicate file exists at the destination location on the at least one recipient computing device, designating the valid location to null, designating the second location as the valid location if the duplicate file does not exist at the second location, and iteratively prompting the sender to select the subsequent location, and designating the subsequent location as the valid location if the duplicate file does not exist at the subsequent location until the valid location or until the sender aborts the file dispatch; dispatching the file at the valid location via the selected mode of communication and presenting an indication at the specific computing device that the file is dispatched with the lockbox option; and displaying the file in response to at least one recipient selecting a view lockbox content option at the at least one recipient computing device.
-
Specification