Device configured to manage secure ingestion of documents into an information system, and methods for operating such a device
First Claim
1. A computer implemented method for managing ingestion of documents into an information system, the method including:
- receiving, from an ingestion source, via an input coupled to the ingestion source, data indicative of a document;
storing the document in a memory location isolated from the information system;
processing the document based on a predefined security protocol thereby to determine an ingestion procedure for the document;
executing the ingestion procedure;
subject to the execution of the ingestion procedure, selectively releasing a modified version of the document to the information system, andobtaining approval from a plurality of users prior to the document being released into the information system;
wherein obtaining approval from a plurality of users prior to the document being released into the information system includes;
(i) a first user, who is electronically authenticated based on authentication data uniquely associated with the first user, providing input representing approval by the first user; and
(ii) a second user, who is electronically authenticated based on authentication data uniquely associated with the second user, providing input representing approval by the second user.
1 Assignment
0 Petitions
Accused Products
Abstract
Described herein are systems and methods for managing electronic documents. In particular, embodiments of the present invention are focussed on managing ingestion of documents into an information system, such as ingestion of documents generated by a device having scanning functionality. Embodiments include devices, software (defined by computer executable code), carrier media, and methodologies. In overview, a document is received from an ingestion source, such as a Multi Function Device (MFD) having a scanner. For example, the document is a scanned into an electronic form from a paper form. This electronic form is subjected to additional processing thereby to implement a predefined security protocol prior to the document (or a modified version thereof) being released into an information system.
31 Citations
28 Claims
-
1. A computer implemented method for managing ingestion of documents into an information system, the method including:
-
receiving, from an ingestion source, via an input coupled to the ingestion source, data indicative of a document; storing the document in a memory location isolated from the information system; processing the document based on a predefined security protocol thereby to determine an ingestion procedure for the document; executing the ingestion procedure; subject to the execution of the ingestion procedure, selectively releasing a modified version of the document to the information system, and obtaining approval from a plurality of users prior to the document being released into the information system; wherein obtaining approval from a plurality of users prior to the document being released into the information system includes; (i) a first user, who is electronically authenticated based on authentication data uniquely associated with the first user, providing input representing approval by the first user; and (ii) a second user, who is electronically authenticated based on authentication data uniquely associated with the second user, providing input representing approval by the second user. - View Dependent Claims (2, 3, 4, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
5. A method according to 3 wherein the one or more alert artefacts include non-textual artefacts.
-
21. A device including:
-
an input configured to couple the device to a distinct device including an ingestion source; an output configured to enable release of a document to an information system; a processor; a memory module containing computer executable code that, when executed via the processor, configured the device to perform a method including; receiving, from an ingestion source, via an input coupled to the ingestion source, data indicative of a document; storing the document in a memory location isolated from the information system; processing the document based on a predefined security protocol thereby to determine an ingestion procedure for the document; executing the ingestion procedure; subject to the execution of the ingestion procedure, selectively releasing a modified version of the document to the information system; and obtaining approval from a plurality of users prior to the document being released into the information system; wherein obtaining approval from a plurality of users prior to the document being released into the information system includes; (i) a first user, who is electronically authenticated based on authentication data uniquely associated with the first user, providing input representing approval by the first user; and (ii) a second user, who is electronically authenticated based on authentication data uniquely associated with the second user, providing input representing approval by the second user. - View Dependent Claims (22, 23, 24)
-
-
25. A device including:
-
an ingestion source; an output configured to enable release of a document to an information system; a processor; a memory module containing computer executable code that, when executed via the processor, configured the device to perform a method including; receiving, from an ingestion source, via an input coupled to the ingestion source, data indicative of a document; storing the document in a memory location isolated from the information system; processing the document based on a predefined security protocol thereby to determine an ingestion procedure for the document; executing the ingestion procedure; subject to the execution of the ingestion procedure, selectively releasing a modified version of the document to the information system; and obtaining approval from a plurality of users prior to the document being released into the information system; wherein obtaining approval from a plurality of users prior to the document being released into the information system includes; (i) a first user, who is electronically authenticated based on authentication data uniquely associated with the first user, providing input representing approval by the first user; and (ii) a second user, who is electronically authenticated based on authentication data uniquely associated with the second user, providing input representing approval by the second user. - View Dependent Claims (26, 27, 28)
-
Specification