The present disclosure relates generally to data processing and, more specifically, to secure sharing of documents via a content management repository.
In the past, users exchanged documents in many ways, e.g., by attaching the documents to emails or by other means. This resulted in loss of control because after sending a document, the document owner usually does not know what recipients of the document do with the document, whom the documents is shares with, or what happens with the document in general. Moreover, a security issue may arise if the document has sensitive information/content that the document owner does not want to share. With conventional document sharing approaches, it is difficult to control versions and access rights related to documents.
Desktop and SaaS hosted content creation software applications, such as Microsoft 365, allow users to create new files and collaboratively manipulate them. These applications typically offer simple file-level read and/or write access restrictions to users in an enterprise. However, the existing solutions do not offer dynamic access control based on various business rules. Even though users may not be able to edit or delete documents, they can see the same content as the users with higher levels of access, which is a fundamental problem.
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
Embodiments of the present disclosure are directed to systems and methods for secure sharing of documents via a content management repository. According to an example embodiment, a system for secure sharing of documents via a content management repository is provided. The system may include a content management unit, a filtering unit, a graphical user interface, and a memory communicatively coupled to the content management unit. The content management unit may be configured to receive content restriction rules for content stored in the content management repository. The content management unit may be further configured to inject the content restriction rules into policy rules. The content management unit may be configured to intercept an Application Programming Interface (API) call for the content from a user. The filtering unit may be configured to dynamically filter the content based on the content restriction rules. The graphical user interface may be configured to render the filtered content to display the filtered content to the user.
According to another example embodiment, a method for secure sharing of documents via a content management repository is provided. The method may commence with receiving, by a content management unit, content restriction rules for content stored in the content management repository. Upon receiving the content restriction rules, the content restriction rules may be injected by the content management unit into policy rules. The method may further include intercepting, by the content management unit, an API call for the content from a user. Upon intercepting the API call, the content may be dynamically filtered by a filtering unit, based on the content restriction rules. Upon filtering the content, the filtered content may be rendered via a graphical user interface and displayed to the user.
Additional objects, advantages, and novel features will be set forth in part in the detailed description section of this disclosure, which follows, and in part will become apparent to those skilled in the art upon examination of this specification and the accompanying drawings or may be learned by production or operation of the example embodiments. The objects and advantages of the concepts may be realized and attained by means of the methodologies, instrumentalities, and combinations particularly pointed out in the appended claims.
Embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements.
The following detailed description includes references to the accompanying drawings, which form a part of the detailed description. The drawings show illustrations in accordance with example embodiments. These example embodiments, which are also referred to herein as “examples,” are described in enough detail to enable those skilled in the art to practice the present subject matter. The embodiments can be combined, other embodiments can be utilized, or structural, logical, and electrical changes can be made without departing from the scope of what is claimed. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope is defined by the appended claims and their equivalents.
In this document, the terms “a” or “an” are used, as is common in patent documents, to include one or more than one. In this document, the term “or” is used to refer to a nonexclusive “or,” such that “A or B” includes “A but not B,” “B but not A,” and “A and B,” unless otherwise indicated. Furthermore, all publications, patents, and patent documents referred to in this document are incorporated by reference herein in their entirety, as though individually incorporated by reference. In the event of inconsistent usages between this document and those documents so incorporated by reference, the usage in the incorporated reference(s) should be considered supplementary to that of this document; for irreconcilable inconsistencies, the usage in this document controls.
In general, the present disclosure relates to systems and methods for secure sharing of documents via a content management repository. A system for secure sharing of documents via a content management repository is also referred to herein as a content management system or just a system. The system allows content managers to secure sharing of content by archiving the content from within an originating application, configuring content restriction rules that apply to all or a subset of documents in a content management system, and automatically applying redaction, retention, and other rules dynamically when the content is shared through the content management system. For example, the system can restrict printing, sharing, changing metadata of a document, redacting documents based on the permissions associated with the user that accesses a document, and so forth. The system further allows adding capabilities to a document collaboration system in which users can collaborate on the same documents, such as, for example, Google Docs®, Dropbox®, and so forth. The system can provide a policy-based redaction of documents by specifying what metadata of the document the user can see. This approach provides a fine-graded control over the access to the document or portions of the document. By using the system of the present disclosure, organizations are able to set complex restrictions on the content applied without the need for continuous supervision. Upon applying these restrictions, the content can be safely and securely shared by end users.
The system may include a content management unit configured to receive content restriction rules for content stored in the content management repository. The content management unit may inject the content restriction rules into policy rules. When a user requests access to the content, the content management unit may intercept an API call for the content from a user. The system may include a filtering unit configured to dynamically filter the content based on the content restriction rules. The system may further have a graphical user interface configured to render the filtered content to the user.
Secure content sharing embodies the automated enforcement of dynamic access restrictions to content when shared between users of a content management system. This can be implemented through an integration of the content management system into a content creation system, ingestion of new content into a content management repository of the content management system, and calculating and applying rule sets to such content when the content is shared with other users.
The content management system can be configured with a set of content restriction rules. The content restriction rules can include assignment of users and user groups to content categories with a flag that designates access to content as granted or blocked. Redaction policies can automatically hide designated content when displayed to an end user. Users and user groups can be assigned to content categories with a flag which designates that access to unredacted content as granted or blocked. The content restriction rules can also allow comparing against content categories to determine whether access is granted or denied.
The system of the present disclosure can be integrated into existing content management solutions for content creation and storage. For example, the system can be integrated into a content creation system, such as Microsoft 365® or Google Docs®, as an extension or add-in to facilitate archiving of content into a content management repository of a content management system.
A user can create content (e.g., a document) and click a button that triggers an add-in associated with the system of the present disclosure to save the content to the content management repository. The user may be prompted to fill in any required fields of information concerning the content as configured by an administrator of the content management system. Once the information received from the user is captured, the content management repository may categorize the content either automatically, based on predetermined configurations, or based on a user input at the time of archivation.
The user can be presented with a panel or window displaying information about the archive, including a fully formed HyperText Transfer Protocol (HTTP) Uniform Resource Locator (URL) referencing the archive as a resource within the content management repository. When the user wants to share the content with other users, the user may share the URL generated by the system for the content.
Users who open the URL in their web browsers can be navigated to a graphical user interface of the content management system. The content management system may require the users to log in to identify themselves with the content management system. The system uses the identity of the user to determine the visibility of the content and access to the content granted to the users. The user may be identified by the content management system as a member of one or more groups or to have roles identified as having access granted or restricted to a category of the content. The user may be identified as a member of a group, with the access level allowing seeing redacted versions of the content only.
A set of policy rules can be executed on the content and content metadata to determine whether access can be granted to the user. If the system determines that the user cannot be granted any access to the content, the user can be presented, via the graphical user interface of the content management repository, with a message and won't be able to proceed further. The message may inform that the access to the content is not granted.
If the system determines that the user is granted access to a redacted version of the content only, the content management system may render, e.g., in an embedded document viewer in the graphical user interface, a redacted version of the document and display the redacted version of the document. The user may not be capable of seeing any unredacted content.
If the system determines that the user is granted full view of the content, and the content is set to be redacted, the system renders the embedded document viewer in the graphical user interface and displays a redacted version of the document. A button or an indication may be shown on the graphical user interface informing the user that the user may see the unredacted version of the document. The user may click the button or the indication to see the unredacted version of the document.
If the user is granted full view of the content, and there are no other restrictions on the content, the system renders the embedded document viewer in the graphical user interface and displays the content in the form the content was originally archived.
In the existing content management systems such as Office 365®, a user may have access to the content and may start sharing one piece of the content, but the editing of the content may be restricted to the user. In the system of the present disclosure, elements of protection with action may be added to the content management system by making at least a part of content unavailable to a user.
The system may set retention rules, according to which, even if there is a change in the content, a history of change may be stored in the history logs, but records may not necessarily be implemented in the last version approved. The content-related management rules can be put into the content management repository to be applied and made available to external systems outside of the content management repository.
Referring now to the drawings,
The client device 120 may have a graphical user interface (GUI) shown as a graphical user interface 130 associated with the system 200. Furthermore, a web browser 140 may be running on the client device 120 and displayed using the graphical user interface 130. The web browser 140 may communicate with the system 200 via the data network 110.
The data network 110 may include the Internet or any other network capable of communicating data between devices. Suitable networks may include or interface with any one or more of, for instance, a local intranet, a corporate data network, a data center network, a home data network, a Personal Area Network, a Local Area Network (LAN), a Wide Area Network (WAN), a Metropolitan Area Network, a virtual private network, a storage area network, a frame relay connection, an Advanced Intelligent Network connection, a synchronous optical network connection, a digital T1, T3, E1 or E3 line, Digital Data Service connection, Digital Subscriber Line connection, an Ethernet connection, an Integrated Services Digital Network line, a dial-up port such as a V.90, V.34 or V.34bis analog modem connection, a cable modem, an Asynchronous Transfer Mode connection, or a Fiber Distributed Data Interface or Copper Distributed Data Interface connection. Furthermore, communications may also include links to any of a variety of wireless networks, including Wireless Application Protocol, General Packet Radio Service, Global System for Mobile Communication, Code Division Multiple Access or Time Division Multiple Access, cellular phone networks, Global Positioning System, cellular digital packet data, Research in Motion, Limited duplex paging network, Bluetooth radio, or an IEEE 802.11-based radio frequency network. The data network can further include or interface with any one or more of a Recommended Standard 232 (RS-232) serial connection, an IEEE-1394 (FireWire) connection, a Fiber Channel connection, an IrDA (infrared) port, a Small Computer Systems Interface connection, a Universal Serial Bus (USB) connection or other wired or wireless, digital or analog interface or connection, mesh or Digi® networking.
The system 200 can receive content restriction rules 155 for content 165 stored in the content management repository 190 and inject the content restriction rules 155 into policy rules 185. The system 200 may intercept an API call 160 for content 165 from the end user(s) 105. Upon intercepting the API call 160, the system 200 may dynamically filter the content 165 based on the content restriction rules 155.
The web browser 140 can establish a communication channel with the system 200 and generate and render virtual screens based on data received from the system 200. Specifically, the web browser 140 can render the filtered content 170 via the graphical user interface 130 to display the filtered content 170 to the end user(s) 105 on a screen 150 of the client device 120.
The method 300 may commence with receiving, by a content management unit, content restriction rules for content stored in the content management repository at operation 305. In an example embodiment, the content restriction rules may be associated with retention of the content, redaction of the content and granting access to a redacted version of the content, blocking the access to the content, granting the access to the content, and so forth.
Upon receiving the content restriction rules, the content restriction rules may be injected, by the content management unit, into policy rules at operation 310. The method 300 may further include intercepting, by the content management unit, an API call for the content from a user at operation 315. In an example embodiment, the interception of the API call for the content may include receiving an URL associated with the content in the content management repository. In some embodiments, the URL associated with the content may be shared with the user by a further user.
Upon intercepting the API call, the content may be dynamically filtered, by a filtering unit, based on the content restriction rules at operation 320. In an example embodiment, the filtering may include determining access privileges of the user based on the content restriction rules and redacting the content based the access privileges. The determination of the access privileges may include associating the user with a group of users. The group of users may be associated with content categories based on content metadata. The content metadata may be prefilled for the content using fields of information concerning the content.
In an example embodiment, the content restriction rules may include specifying expiration of the content (e.g., an expiration date, an expiration term, and so forth) for the group of users. More specifically, the content can be stored in the content management system (e.g., in a content management repository 190 shown in
In an example embodiment, the user 405 can store a link to a document 415 in the system 200. Storing the link to the document 415 in the system 200 may include sending the link to any of users via any communication channels within the system 200, such as an email, a text message, and so forth. When the link is activated by any of users (e.g., by the user 410), the system 200 can determine and apply permissions that are specific to the user 410 that requested to open the link. The system 200 can determine the permissions based on access privileges 420 set for the user 410. The access privileges 420 may include permissions 425 set for the user 410 based on a role 430 (e.g., a position in a company, such as a manager) of the user 410. Access privileges may be set for each user independently or for groups of users.
The user 405 that sent the link to the document 415 to the user 410 may have different access privileges 422 than the access privileges 420 of the user 410. The user 405 may have a different role 432 (e.g., a director) than the role 430 of the user 410. Permissions 427 set for the user 405 based on the role 432 of the user 405 may be different from the permissions 425 set for the user 410. Therefore, the access privileges 422 for the user 405 may differ from the access privileges 420 for the user 410.
The document 415 may have content, such as a client name, a client contact information, a client payment information, contract terms, a contract value, and the like. The access privileges 422 for the user 405 may allow the user 405 to access all portions of the content of the document 415. Therefore, when the user 405 opens the document 415, all portions of the content of the document 415 may be rendered to the user 405.
The access privileges 420 for the user 410 may not allow the user 410 to access some portions of the content of the document 415. For example, the client contact information, the client payment information, and the contract value may be not allowed to be accessed by the user 410. Thus, as the user 410 is only allowed to see some portions or pages of the document 415, when the user 410 accesses the document 415, the content of the document 415 is filtered based on the access privileges 420. The user 410 is presented with filtered content 417 of the document 415. Specifically, only the portions or pages of the document 415 allowed for the user 410 to be accessed are rendered and displayed to the user 410 in form of the filtered content 417 of the document 415. For example, as the user 410 may be not allowed to see the client contact information, the client payment information, and the contract value, the filtered content 417 may include a redacted version of the document 415 in which the client contact information, the client payment information, and the contract value are removed or hidden and, hence, not displayed to the user 410. Thus, the system 200 can hide any information that is not pertinent to the role of the user 410.
Thus, when two different users (e.g., the user 405 and the user 410) receive a link associated with the content (e.g., the document 415), one user 405 can see the whole content because the user 405 has a role (e.g., a director) that allows to see the whole content, but another user 410 can only see some portion of the content, for example, a client name and contract terms, because the user 410 has a role (e.g., a manager) that does allows to see the whole content. Thus, different criteria and content restriction rules can be applied based on a role and permissions of the users accessing the document.
Upon uploading the document 505 into the content management repository 190 or any time later, the end user 105 can open content metadata 510 of the document 505. In some embodiments, the end user 105 may be prompted to fill in the content metadata 510 upon a request of the end user 105 to upload the document 505 into the content management repository 190. The content metadata 510 may include fields of information concerning the document 505.
The end user 105 may fill in any required fields of the content metadata 510 concerning the document 505 by selecting users, groups of users, or roles that are not allowed to perform actions with respect to the document 505, such as to download copies, print random copies, forward the document to users who should not have access, read portions of the document, and any other actions with respect to the document 505. Once the information filled in by the user in the content metadata 510 is captured, the content management repository 190 may store the content metadata 510. The content management repository 190 may categorize the document 505 based on the content metadata 510 entered by the end user 105. Categorizing of the document 505 may include setting permissions for users or groups of users to perform actions with respect to the document 505 based on the content metadata 510.
The components shown in
The mass data storage 630, which can be implemented with a magnetic disk drive, solid state drive, or an optical disk drive, is a non-volatile storage device for storing data and instructions for use by the processor unit 610. The mass data storage 630 stores the system software for implementing embodiments of the present disclosure for purposes of loading that software into the main memory 620.
The portable storage device 640 operates in conjunction with a portable non-volatile storage medium, such as a flash drive, floppy disk, compact disk, digital video disc, or Universal Serial Bus storage device, to input and output data and code to and from the computer system 600 of
The user input devices 660 can provide a portion of a user interface. The user input devices 660 may include one or more microphones; an alphanumeric keypad, such as a keyboard, for inputting alphanumeric and other information; or a pointing device, such as a mouse, a trackball, stylus, or cursor direction keys. The user input devices 660 can also include a touchscreen. Additionally, the computer system 600 as shown in
The graphics display system 670 can include a liquid crystal display or other suitable display device. The graphics display system 670 is configurable to receive textual and graphical information and process the information for output to the display device.
The peripheral devices 680 may include any type of computer support device to add additional functionality to the computer system.
The components provided in the computer system 600 of
The processing for various embodiments may be implemented in software that is cloud-based. In some embodiments, the computer system 600 is implemented as a cloud-based computing environment, such as a virtual machine operating within a computing cloud. In other embodiments, the computer system 600 may itself include a cloud-based computing environment, where the functionalities of the computer system 600 are executed in a distributed fashion. Thus, the computer system 600, when configured as a computing cloud, may include pluralities of computing devices in various forms, as will be described in greater detail below.
In general, a cloud-based computing environment is a resource that typically combines the computational power of a large grouping of processors (such as within web servers) and/or that combines the storage capacity of a large grouping of computer memories or storage devices. Systems that provide cloud-based resources may be utilized exclusively by their owners or such systems may be accessible to outside users who deploy applications within the computing infrastructure to obtain the benefit of large computational or storage resources.
The cloud may be formed, for example, by a network of web servers that comprise a plurality of computing devices, such as the computer system 600, with each server (or at least a plurality thereof) providing processor and/or storage resources. These servers may manage workloads provided by multiple users (e.g., cloud resource customers or other users). Typically, each user places workload demands upon the cloud that vary in real-time, sometimes dramatically. The nature and extent of these variations typically depends on the type of business associated with the user.
Thus, various embodiments of systems and methods for secure sharing of documents via a content management repository have been described. Although embodiments have been described with reference to specific example embodiments, it will be evident that various modifications and changes can be made to these example embodiments without departing from the broader spirit and scope of the present application. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense. There are many alternative ways of implementing the present technology. The disclosed examples are illustrative and not restrictive.
The present application claims priority of U.S. Provisional Patent Application No. 63/091,129 filed on Oct. 13, 2020, entitled “Secure Sharing of Documents Created in a Software System via a Content Management Repository,” which is incorporated herein by reference in its entirety for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
5321610 | Breslin | Jun 1994 | A |
5528263 | Platzker et al. | Jun 1996 | A |
5742285 | Ueda | Apr 1998 | A |
6069957 | Richards | May 2000 | A |
6208345 | Sheard et al. | Mar 2001 | B1 |
6331855 | Schauser | Dec 2001 | B1 |
6427140 | Ginter | Jul 2002 | B1 |
6574321 | Cox et al. | Jun 2003 | B1 |
6597363 | Duluk | Jul 2003 | B1 |
6950825 | Chang et al. | Sep 2005 | B2 |
7073164 | Knowles | Jul 2006 | B1 |
7185192 | Kahn | Feb 2007 | B1 |
7359076 | Uchino | Apr 2008 | B2 |
7937665 | Vazquez et al. | May 2011 | B1 |
8078731 | Bruder et al. | Dec 2011 | B1 |
8667456 | Czymontek | Mar 2014 | B1 |
8745011 | Kishi | Jun 2014 | B2 |
9032076 | Buehler et al. | May 2015 | B2 |
9053295 | Wick et al. | Jun 2015 | B1 |
9213707 | Conner | Dec 2015 | B2 |
9232491 | Mahaffey | Jan 2016 | B2 |
9430330 | Bardhan | Aug 2016 | B1 |
9483537 | Peters et al. | Nov 2016 | B1 |
9621428 | Lev et al. | Apr 2017 | B1 |
9785518 | Kanteti | Oct 2017 | B2 |
9910655 | Ranganathan et al. | Mar 2018 | B1 |
10162624 | Moturu et al. | Dec 2018 | B1 |
10181059 | Brewton et al. | Jan 2019 | B1 |
10355864 | Konduru | Feb 2019 | B2 |
10318762 | Buckingham et al. | Jun 2019 | B1 |
10348505 | Crawforth et al. | Jul 2019 | B1 |
10812611 | Bennet et al. | Oct 2020 | B2 |
10877740 | Bennet et al. | Dec 2020 | B2 |
10942991 | Kidd | Mar 2021 | B1 |
11055067 | Thangaraj et al. | Jul 2021 | B2 |
11057500 | Aragón et al. | Jul 2021 | B2 |
11086751 | Moresmau et al. | Aug 2021 | B2 |
11172042 | Bennet et al. | Nov 2021 | B2 |
11269660 | Yueh | Mar 2022 | B2 |
20020099952 | Lambert et al. | Jul 2002 | A1 |
20020103731 | Barnard et al. | Aug 2002 | A1 |
20020184610 | Chong et al. | Dec 2002 | A1 |
20020196277 | Bushey et al. | Dec 2002 | A1 |
20030046401 | Abbott et al. | Mar 2003 | A1 |
20030079052 | Kushnirskiy | Apr 2003 | A1 |
20040003119 | Munir et al. | Jan 2004 | A1 |
20040003371 | Coulthard et al. | Jan 2004 | A1 |
20040078373 | Ghoneimy et al. | Apr 2004 | A1 |
20040128001 | Levin et al. | Jul 2004 | A1 |
20040153994 | Bates et al. | Aug 2004 | A1 |
20040177323 | Kaasila et al. | Sep 2004 | A1 |
20040267749 | Bhat et al. | Dec 2004 | A1 |
20050038764 | Minsky et al. | Feb 2005 | A1 |
20050065845 | DeAngelis | Mar 2005 | A1 |
20050235258 | Wason | Oct 2005 | A1 |
20050278695 | Synovic | Dec 2005 | A1 |
20060026591 | Backhouse | Feb 2006 | A1 |
20060031854 | Godwin | Feb 2006 | A1 |
20060036448 | Haynie et al. | Feb 2006 | A1 |
20060036941 | Neil | Feb 2006 | A1 |
20060039466 | Emerson et al. | Feb 2006 | A1 |
20060111888 | Hiew et al. | May 2006 | A1 |
20060184925 | Ficatier et al. | Aug 2006 | A1 |
20060251047 | Shenfield et al. | Nov 2006 | A1 |
20060265719 | Asti | Nov 2006 | A1 |
20060271528 | Gorelik | Nov 2006 | A1 |
20060294151 | Wong | Dec 2006 | A1 |
20070016624 | Powers et al. | Jan 2007 | A1 |
20070028286 | Greene et al. | Feb 2007 | A1 |
20070033637 | Yami et al. | Feb 2007 | A1 |
20070073671 | McVeigh et al. | Mar 2007 | A1 |
20070094594 | Matichuk | Apr 2007 | A1 |
20070135936 | Dumas | Jun 2007 | A1 |
20070156764 | O'Connell et al. | Jul 2007 | A1 |
20070180367 | Chiang | Aug 2007 | A1 |
20070180444 | Hoover et al. | Aug 2007 | A1 |
20070198450 | Khalsa | Aug 2007 | A1 |
20070208685 | Blumenau | Sep 2007 | A1 |
20070266394 | Odent et al. | Nov 2007 | A1 |
20070294406 | Suer et al. | Dec 2007 | A1 |
20080109292 | Moore | May 2008 | A1 |
20080126932 | Elad et al. | May 2008 | A1 |
20080141141 | Moore | Jun 2008 | A1 |
20080189617 | Covell et al. | Aug 2008 | A1 |
20080209390 | Dutta et al. | Aug 2008 | A1 |
20080229303 | Carteri et al. | Sep 2008 | A1 |
20080281727 | Moss | Nov 2008 | A1 |
20090024589 | Sood | Jan 2009 | A1 |
20090024660 | Borgsmidt et al. | Jan 2009 | A1 |
20090025063 | Thomas | Jan 2009 | A1 |
20090083306 | Sichi et al. | Mar 2009 | A1 |
20090094112 | Cesarini et al. | Apr 2009 | A1 |
20090124387 | Perlman et al. | May 2009 | A1 |
20090249290 | Jenkins et al. | Oct 2009 | A1 |
20090249446 | Jenkins et al. | Oct 2009 | A1 |
20100088317 | Bone | Apr 2010 | A1 |
20100106560 | Li et al. | Apr 2010 | A1 |
20100114628 | Adler et al. | May 2010 | A1 |
20100131857 | Prigge | May 2010 | A1 |
20100153866 | Sharoni | Jun 2010 | A1 |
20100169265 | Ristock et al. | Jul 2010 | A1 |
20100225658 | Coleman | Sep 2010 | A1 |
20100226441 | Tung et al. | Sep 2010 | A1 |
20100231599 | Tung et al. | Sep 2010 | A1 |
20100245563 | Golovchinsky et al. | Sep 2010 | A1 |
20100250497 | Redlich et al. | Sep 2010 | A1 |
20100274815 | Vanasco | Oct 2010 | A1 |
20110004564 | Rolia et al. | Jan 2011 | A1 |
20110029947 | Markovic | Feb 2011 | A1 |
20110078708 | Dokovski et al. | Mar 2011 | A1 |
20110107298 | Sebastian | May 2011 | A1 |
20110107309 | Baron | May 2011 | A1 |
20110107313 | Baron | May 2011 | A1 |
20110246904 | Pinto et al. | Oct 2011 | A1 |
20110276636 | Cheng et al. | Nov 2011 | A1 |
20120072509 | Booth | Mar 2012 | A1 |
20120075333 | Chen et al. | Mar 2012 | A1 |
20120130906 | Klinker | May 2012 | A1 |
20120310381 | Karaffa | Dec 2012 | A1 |
20120310875 | Prahlad et al. | Dec 2012 | A1 |
20120324358 | Jooste | Dec 2012 | A1 |
20120331527 | Walters et al. | Dec 2012 | A1 |
20130031158 | Salsburg | Jan 2013 | A1 |
20130117662 | Shan et al. | May 2013 | A1 |
20130144901 | Ho | Jun 2013 | A1 |
20130151557 | Shanken et al. | Jun 2013 | A1 |
20130174028 | Grossman et al. | Jul 2013 | A1 |
20130177662 | Msika | Jul 2013 | A1 |
20130275475 | Ahlborn | Oct 2013 | A1 |
20130332423 | Puri et al. | Dec 2013 | A1 |
20130339872 | Shuster | Dec 2013 | A1 |
20140026113 | Farooqi | Jan 2014 | A1 |
20140032875 | Butler | Jan 2014 | A1 |
20140047011 | Lahav et al. | Feb 2014 | A1 |
20140047413 | Sheive et al. | Feb 2014 | A1 |
20140075407 | Donis et al. | Mar 2014 | A1 |
20140089388 | Curry et al. | Mar 2014 | A1 |
20140114907 | Kozina et al. | Apr 2014 | A1 |
20140114962 | Rosenburg et al. | Apr 2014 | A1 |
20140123237 | Gaudet | May 2014 | A1 |
20140207575 | Freed-Finnegan et al. | Jul 2014 | A1 |
20140245199 | Belotti et al. | Aug 2014 | A1 |
20140282453 | O'Rourke et al. | Sep 2014 | A1 |
20140288923 | Marian et al. | Sep 2014 | A1 |
20140288945 | Boerner et al. | Sep 2014 | A1 |
20140317049 | DeRoller | Oct 2014 | A1 |
20140380105 | Michel et al. | Dec 2014 | A1 |
20150006543 | Jin et al. | Jan 2015 | A1 |
20150012478 | Mohammad et al. | Jan 2015 | A1 |
20150046930 | Phadke | Feb 2015 | A1 |
20150088933 | Schofield et al. | Mar 2015 | A1 |
20150127660 | Zilberberg et al. | May 2015 | A1 |
20150128105 | Sethi et al. | May 2015 | A1 |
20150248280 | Pillay | Sep 2015 | A1 |
20150293764 | Visvanathan | Oct 2015 | A1 |
20150379303 | LaFever et al. | Dec 2015 | A1 |
20160026968 | Fan et al. | Jan 2016 | A1 |
20160034260 | Ristock et al. | Feb 2016 | A1 |
20160034571 | Setayesh et al. | Feb 2016 | A1 |
20160044380 | Barrett | Feb 2016 | A1 |
20160070541 | Lee et al. | Mar 2016 | A1 |
20160070812 | Murphy | Mar 2016 | A1 |
20160117159 | Balko | Apr 2016 | A1 |
20160140204 | Brown et al. | May 2016 | A1 |
20160253340 | Barth et al. | Sep 2016 | A1 |
20160267060 | Skirpa et al. | Sep 2016 | A1 |
20160267082 | Wong et al. | Sep 2016 | A1 |
20160275439 | Avats | Sep 2016 | A1 |
20160283200 | Standley et al. | Sep 2016 | A1 |
20160299933 | Filipi et al. | Oct 2016 | A1 |
20160321469 | Bhogal | Nov 2016 | A1 |
20160359711 | Deen et al. | Dec 2016 | A1 |
20170034306 | Thangeswaran | Feb 2017 | A1 |
20170039041 | Bommireddi | Feb 2017 | A1 |
20170068395 | Massoudi | Mar 2017 | A1 |
20170118284 | Chen et al. | Apr 2017 | A1 |
20170123751 | Sigurǒsson et al. | May 2017 | A1 |
20170154026 | Gong et al. | Jun 2017 | A1 |
20170180284 | Smullen et al. | Jun 2017 | A1 |
20170199936 | Steelberg et al. | Jul 2017 | A1 |
20170228119 | Hosbettu et al. | Aug 2017 | A1 |
20170269972 | Hosabettu et al. | Sep 2017 | A1 |
20170270022 | Moresmau et al. | Sep 2017 | A1 |
20170339564 | Momchilov et al. | Nov 2017 | A1 |
20170344227 | Stoicov et al. | Nov 2017 | A1 |
20170357814 | Mahaffey et al. | Dec 2017 | A1 |
20170372442 | Mejias | Dec 2017 | A1 |
20180089005 | Green | Mar 2018 | A1 |
20180121841 | Harris | May 2018 | A1 |
20180129497 | Biddle et al. | May 2018 | A1 |
20180152460 | Lin et al. | May 2018 | A1 |
20180167426 | Sigurdsson et al. | Jun 2018 | A1 |
20180174104 | Schikora et al. | Jun 2018 | A1 |
20180191761 | Lee et al. | Jul 2018 | A1 |
20180197123 | Parimelazhagan et al. | Jul 2018 | A1 |
20180322396 | Ahuja-Cogny et al. | Nov 2018 | A1 |
20180367506 | Ford et al. | Dec 2018 | A1 |
20190081935 | Broussard et al. | Mar 2019 | A1 |
20190129734 | Yang et al. | May 2019 | A1 |
20190158630 | Aragón et al. | May 2019 | A1 |
20190196793 | Jaiprakash | Jun 2019 | A1 |
20190205111 | Bennet et al. | Jul 2019 | A1 |
20190207929 | Koorapati | Jul 2019 | A1 |
20190208031 | Bennet et al. | Jul 2019 | A1 |
20190238467 | Guan et al. | Aug 2019 | A1 |
20190238688 | Bermundo et al. | Aug 2019 | A1 |
20190243742 | Natari | Aug 2019 | A1 |
20190294707 | Ramaswamy | Sep 2019 | A1 |
20190332357 | Reddy | Oct 2019 | A1 |
20190342404 | Kundu et al. | Nov 2019 | A1 |
20190369969 | Donohoe et al. | Dec 2019 | A1 |
20200026735 | Przada | Jan 2020 | A1 |
20200042648 | Rao | Feb 2020 | A1 |
20200050983 | Balasubramanian et al. | Feb 2020 | A1 |
20200110902 | Zakour | Apr 2020 | A1 |
20200133982 | Thangeswaran et al. | Apr 2020 | A1 |
20200259865 | Raff | Aug 2020 | A1 |
20200301917 | Niu | Sep 2020 | A1 |
20200348964 | Anand et al. | Nov 2020 | A1 |
20200356365 | Pezaris | Nov 2020 | A1 |
20200409665 | Swaminathan et al. | Dec 2020 | A1 |
20210004711 | Gupta et al. | Jan 2021 | A1 |
20210019574 | Voicu | Jan 2021 | A1 |
20210037110 | Bennet et al. | Feb 2021 | A1 |
20210092154 | Kumar et al. | Mar 2021 | A1 |
20210107164 | Singh et al. | Apr 2021 | A1 |
20210109503 | Singh et al. | Apr 2021 | A1 |
20210109742 | Bennet et al. | Apr 2021 | A1 |
20210110345 | Iyer et al. | Apr 2021 | A1 |
20210117162 | Thangaraj et al. | Apr 2021 | A1 |
20210117210 | Yueh | Apr 2021 | A1 |
20210117302 | Kadakia et al. | Apr 2021 | A1 |
20210117394 | Moresmau et al. | Apr 2021 | A1 |
20210117517 | Bregman et al. | Apr 2021 | A1 |
20210117562 | Balan et al. | Apr 2021 | A1 |
20210117563 | Moresmau et al. | Apr 2021 | A1 |
20210117895 | Tondevold et al. | Apr 2021 | A1 |
20210120044 | Balan et al. | Apr 2021 | A1 |
20210141920 | Khurana | May 2021 | A1 |
20210194994 | Aragón et al. | Jun 2021 | A1 |
20210286597 | Thangaraj et al. | Sep 2021 | A1 |
20210303528 | Meister | Sep 2021 | A1 |
20210357503 | Moresmau et al. | Nov 2021 | A1 |
20220060558 | Bennet et al. | Feb 2022 | A1 |
20220116787 | Balan et al. | Apr 2022 | A1 |
Number | Date | Country |
---|---|---|
3430529 | Jan 2019 | EP |
3714604 | Sep 2020 | EP |
3732566 | Nov 2020 | EP |
3732582 | Nov 2020 | EP |
WO2008003593 | Jan 2008 | WO |
WO2015139119 | Sep 2015 | WO |
WO2015154133 | Oct 2015 | WO |
WO2017147694 | Sep 2017 | WO |
WO2017160831 | Sep 2017 | WO |
WO2019099140 | May 2019 | WO |
WO2019133208 | Jul 2019 | WO |
WO2019133209 | Jul 2019 | WO |
WO2020263573 | Dec 2020 | WO |
WO2021076310 | Apr 2021 | WO |
WO2021076311 | Apr 2021 | WO |
WO2021076312 | Apr 2021 | WO |
WO2021076324 | Apr 2021 | WO |
WO2021076520 | Apr 2021 | WO |
WO2021076521 | Apr 2021 | WO |
WO2021076791 | Apr 2021 | WO |
WO2021076921 | Apr 2021 | WO |
Entry |
---|
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2017/022295, Jun. 1, 2017, 9 pages. |
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2018/056196, Dec. 26, 2018, 8 pages. |
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2018/064127, Feb. 11, 2019, 6 pages. |
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2018/064122, Mar. 18, 2019, 8 pages. |
“Extended European Search Report” and “Written Opinion”, European Application No. 17767331.6, Nov. 14, 2019, 6 pages. |
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2020/037028, Aug. 28, 2020, 13 pages. |
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2020/053141, Jan. 12, 2021, 8 pages. |
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2020/053419, Jan. 14, 2021, 14 pages. |
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2020/053138, Jan. 12, 2021, 8 pages. |
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2020/053139, Jan. 11, 2021, 8 pages. |
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2020/056026, Jan. 19, 2021, 16 pages. |
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2020/055829, Jan. 19, 2021, 18 pages. |
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2020/055418, Jan. 28, 2021, 8 pages. |
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2020/055420, Feb. 1, 2021, 8 pages. |
Bourgouin et al., “Towards a Process Analysis Approach to Adopt Robotic Process Automation”, IEEE, 2018, 8 pages. |
“Extended European Search Report” and “Written Opinion”, European Application No. 18879227.9, Mar. 15, 2021, 9 pages. |
“Extended European Search Report” and “Written Opinion”, European Application No. 18895108.1, Aug. 19, 2021, 8 pages. |
“Extended European Search Report” and “Written Opinion”, European Application No. 18895245.1, Aug. 25, 2021, 8 pages. |
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2021/054415, Jan. 19, 2022, 8 pages. |
Kuligowski, Kiely; “What Is a Document Repository?” business.com. [Retrieved on Dec. 12, 2021]; <URL: https://www.business.com/articles/what-is-document-repository/> , Jun. 25, 2020, 10 pages. |
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2021/054416, Jan. 19, 2022, 9 pages. |
Choudhri et al., “PatientService: Electronic Patient Record Redaction and Delivery in Pervasive Environments.” Proceedings 5th International Workshop on Enterprise Networking and Computing in Healthcare Industry (HealthCom), IEEE, Jul. 2003, 7 pages. |
Extended European Search Report for European Pat. Appl. No. 21880848.3, Sep. 10, 2024, 8 pages. |
Number | Date | Country | |
---|---|---|---|
20220114267 A1 | Apr 2022 | US |
Number | Date | Country | |
---|---|---|---|
63091129 | Oct 2020 | US |