US20040025048A1 - Method and system for role-based access control to a collaborative online legal workflow tool - Google Patents

Method and system for role-based access control to a collaborative online legal workflow tool Download PDF

Info

Publication number
US20040025048A1
US20040025048A1 US10/441,941 US44194103A US2004025048A1 US 20040025048 A1 US20040025048 A1 US 20040025048A1 US 44194103 A US44194103 A US 44194103A US 2004025048 A1 US2004025048 A1 US 2004025048A1
Authority
US
United States
Prior art keywords
user
workflow
legal workflow
legal
role
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/441,941
Inventor
Damian Porcari
David Dinsdale
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anaqua Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US10/441,941 priority Critical patent/US20040025048A1/en
Assigned to FORD MOTOR COMPANY reassignment FORD MOTOR COMPANY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DINSDALE, DAVID, PORCARI, DAMIAN O.
Publication of US20040025048A1 publication Critical patent/US20040025048A1/en
Assigned to FORD GLOBAL TECHNOLOGIES, LLC reassignment FORD GLOBAL TECHNOLOGIES, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FORD MOTOR COMPANY
Assigned to BATMARK LIMITED, FORD GLOBAL TECHNOLOGIES, LLC reassignment BATMARK LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FORD GLOBAL TECHNOLOGIES, LLC
Priority to US13/166,040 priority patent/US8429723B2/en
Assigned to ANAQUA, INC. reassignment ANAQUA, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BATMARK LIMITED
Assigned to ANAQUA, INC. reassignment ANAQUA, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BATMARK LIMITED
Assigned to ANAQUA, INC. reassignment ANAQUA, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BATMARK LIMITED
Assigned to ANAQUA, INC. reassignment ANAQUA, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FORD GLOBAL TECHNOLOGIES, LLC, FORD MOTOR COMPANY
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • G06Q50/184Intellectual property management

Definitions

  • This invention relates to a collaborative online legal workflow tool and more particularly, to a method and system for role-based access control to a collaborative online legal workflow tool.
  • a corporate attorney may provide access to one or more external service providers to records stored in the corporate workflow tool for which the external service provider is responsible for managing on a day to day basis.
  • Current portfolio management solutions have security tools which restrict the external service provider's access only to records assigned to the external service provider.
  • the external service provider is unable to access information entered by other service providers which may be related to the matters handled by that individual. This inability to collaborate with other service providers limits the level of service provided to the client and may create additional support burdens for both the corporation and the service provider.
  • Aspen Grove's ipWorkflow Aspen Grove is located at 101 Federal Street, Suite 1900, Boston, Mass. 02110 (www.aspengrove.net). Another example is offered by Vinsoft Solutions located at 1155 West Chestnut Street, Suite 2-C, Union, N.J. 07083 (www.vinsoftsolutions.com). Another example is offered by FoundationIP located at 830 TCF Tower, 121 South 8th Street, Minneapolis, Minn. 55402 (www.foundationip.com). Another example is Inproma offered by Computer Patent Annuities North America LLC located at 225 Reinekers Lane, Suite 400, Alexandria, Va. 22314 (www.cpajersey.com). Another example is offered by iManage located at 950 Tower Lane, Suite 500, Foster City, Calif. 94404 (www.imanage.com).
  • Embodiments and features of the present invention include an alternative to or valuable improvement upon conventional legal workflow applications. Without limiting the scope or applicability of the present invention, one goal of the present invention is to provide a collaborative online legal workflow tool which overcomes the limitations described above. It would also be advantageous to provide a method and system for role-based access control to information in the collaborative online legal workflow tool which provides central administration of legal workflow conducted by a plurality of distributed workflow participants.
  • a computer system and method for distributed legal workflow security allowing role-based access control to a collaborative online workflow tool.
  • the computer system provides central administration of legal workflow conducted by a plurality of distributed workflow participants.
  • the system includes a computer network having one or more computers operably programmed and configured to receive input defining computer system access privileges for a plurality of distributed legal workflow participants.
  • the system receives input associating one or more legal workflow role types defined by users with one or more of the distributed legal workflow participants to define the role-based access.
  • Permission privileges are input and associated with a plurality of legal workflow graphical interface functions based on the one or more legal workflow role types. Based on the permission privileges associated with the role type of the participant, the system provides legal workflow graphical interface functionality to the one or more distributed legal workflow participants.
  • Advantages of the present invention include a reduction in the time, cost and risk associated with conventional distributed/remote management of legal workflow.
  • integrated parties cooperate with real-time knowledge access and visibility to work product and status.
  • business/legal logic By applying business/legal logic to this integrated pool of knowledge, a value-added workflow results.
  • FIGS. 1 and 2 illustrate online legal workflow collaboration between organizations (e.g., brand owners, law firms, law firm clients, brand owner clients, etc.), business processes and information systems in accordance with one embodiment or aspect of the present invention
  • FIG. 3 is a flowchart illustrating a workflow for adding a new user to the system
  • FIG. 4 is an example of a graphical user interface for adding a new user to the system
  • FIG. 5 is a flowchart illustrating a workflow for maintaining user workflow
  • FIG. 6 is an example of a graphical user interface for a user search
  • FIG. 7 is an example of a graphical user interface for displaying user search criteria
  • FIG. 8 is an example of a graphical user interface for amending user details
  • FIG. 9 is an example of a graphical user interface for granting roles to users
  • FIG. 10 is a flowchart illustrating a workflow for defining user preferences
  • FIG. 11 is an example of a graphical user interface displaying user preferences
  • FIG. 12 is a flowchart illustrating a workflow for user login procedures
  • FIG. 13 is an example of a graphical user interface for user login
  • FIG. 14 is an example of a graphical user interface for displaying terms and conditions of user login
  • FIG. 15 is an example of a graphical user interface for changing password features for user login
  • FIG. 16 is a flowchart illustrating a workflow for role maintenance
  • FIG. 17 is an example of a graphical user interface for selecting a user role to maintain
  • FIG. 18 is an example of a graphical user interface for defining attributes of the user interface
  • FIG. 19 is a block diagram illustrating a preferred entity relationship diagram setting forth user roles and access rights
  • FIG. 20 is an example of a graphical user interface for maintaining legal workflow details
  • FIG. 21 is an example of a graphical user interface for trademark application legal workflow details
  • FIG. 22 is an example of a graphical user interface for conflict legal workflow details
  • FIG. 23 is an example of a graphical user interface for defining organizational details
  • FIG. 24 is an example of a graphical user interface for defining contact information.
  • Embodiments of the present invention relate to an online legal workflow collaboration tool and methodology.
  • corporations, institutions and firm clients typically rely on multiple distributed firms and agencies to assist with or independently conduct their legal workflow. It is not uncommon for a single corporation to have several private law firms handling hundreds of co-pending legal matters ranging from basic transactional work to larger projects such as litigation, negotiation, etc.
  • a corporation often relies on outside counsel to independently manage all searches and applications for trademarks, patents etc.
  • Advantages of such an online legal workflow collaboration tool and methodology include a reduction in the time, cost and risk associated with conventional distributed/remote management of legal workflow.
  • integrated parties cooperate with real-time knowledge access and visibility to work product and status.
  • a law engine implements or otherwise applies business/legal logic to this integrated pool of knowledge to produce a value-added workflow.
  • FIG. 1 illustrates an overview of environment 10 in which embodiments of the present invention may operate.
  • a central online leal workflow and knowledge management system 12 operably interfaces or is otherwise in operable communication with a plurality of local or distributed workflow participants (e.g., brand owners 14 , agents/law firms 16 , law firm clients 18 , brand owner clients 20 , etc.). More specifically, and as illustrated in greater detail in FIG. 2, workflow participants (e.g. agent/law firm 22 , legal department 24 , etc.) and associated workflow applications (e.g. document management system 26 , finance system 28 , etc.) productively collaborate with one another via central online leal workflow and knowledge management system 12 . Notably, an unlimited number of participants may collaborate with one another in an unlimited number of different fashions.
  • workflow participants e.g. agent/law firm 22 , legal department 24 , etc.
  • associated workflow applications e.g. document management system 26 , finance system 28 , etc.
  • an unlimited number of participants may collaborate with one another in an unlimited number of different fashions
  • One aspect of the present invention is a system and methodology for controlling user access to the online legal workflow collaboration tool, or portions thereof.
  • the system comprises a computer network including one or more computers operably programmed and configured to allow access to the collaborative online workflow tool.
  • This aspect is easy to manage and a flexible user permissioning model that relies on the definition of generic roles for multiple users.
  • aspects of the present invention may be centrally hosted from one or more web servers to web browsers located at a plurality of local or distributed workflow participant locations. Alternately, aspects of the present invention may be implemented according to a more dedicated/localized client-server architecture over a local or wide area network.
  • Example role types include a Customer User, an External Step (or agent) User, a Customer Client User, a Customer Client User with an anonymous log in, and an Inventor with an anonymous log in.
  • a Customer is a company who is using the system to store and manage their IP data.
  • the agent's users will still be Customer Users as they are essentially fulfilling the role of a Customer User.
  • access to the system may be restricted at levels such as Menu level (e.g. create trademark—main screen, create trademark—based on etc.), and section of a page level (e.g. proprietor details on trademark not visible to External Counsel). While section of a page may be regarded at it's largest as a whole page, at it's smallest as a single data field or button, or somewhere between.
  • Menu level e.g. create trademark—main screen, create trademark—based on etc.
  • section of a page level e.g. proprietor details on trademark not visible to External Counsel
  • section of a page may be regarded at it's largest as a whole page, at it's smallest as a single data field or button, or somewhere between.
  • the business users define the permissionable sections for each page.
  • a pragmatic approach may be taken as to whether it is best to create a complex permissioning scenario for a particular screen, or just create two or more screens. For example, for Trademarks, it may be simple to develop separate Trademark pages for Customer Users and External Counsel Users, than to create a complex permissioning model for a simple page.
  • External Counsel Users and Customer Client Users have the ability to see only the records for which their company has responsibility.
  • a protocol may be followed that allows a user to view (read only) the diary of any other user from the same External Counsel organization and they may re-allocate tasks to other users in their organization.
  • the present invention assumes that people will attempt to hack the computer system or access areas outside their granted level of permission. To prevent this, security principles may be applied. For example, content for which a user is not permissioned may not be returned to the user from the server.
  • all permissionable actions will check (server side) before executing business logic that the user has permission to execute the action. This functionality will prevent hackers from guessing action calls, etc.
  • an e-mail may be sent to a system administrator. The activity may also be logged for further investigation.
  • User Trust Requirements relate to the business process necessary to ensure that the person who is being added to the system has been verified as a valid user of the system for the permissions granted to them.
  • the general principle is that a user with the appropriate permissions may create other users of their own user type (e.g., Customer User, External Step User or Customer Client User, etc.).
  • External Counsel may have the ability to create and maintain their own users. In one embodiment, they will not have the ability to modify the definitions of the roles for which they are permissioned.
  • a Creating User is defined as a user who is logged in and who is creating a new user.
  • Table 1 contains example user types in accordance with the present invention. It is envisioned that an unlimited number of user types may be defined. TABLE 1 User Type 1 Customer User User Type 2 External Step (or agent) User User Type 3 Customer Client User User Type 4 Customer Client User - self-created log in User Type 5 Inventor - self-created log in
  • the Customer User will generally be an employee. Examples include a Counsel/Attorney/Paralegal or other administrative staff. Some companies may have outsourced aspects of the management of their IP or other legal work to External Counsel; hence it is possible that a Customer User is from an External Counsel.
  • External Counsel are those companies instructed to do something by the Customer User in relation to the registration, renewal, maintenance, etc. of one or more of the Customer's records. As a general principle, External Counsel should only be able to access records that are allocated to the company to whom the user belongs.
  • the Customer Client User represents the client of the Customer. This could be an employee of an operating company. Customer Client Users are generally interested in a subset of records that relate to their company only.
  • each page Prior to display, each page checks that the user has the necessary authority to access the main record being displayed. If the record belongs to the Customer Client to whom the user also belongs, the record should be displayed. The Client field on the main record identifies the Customer Client User.
  • a permission database is updated to reflect this automatically.
  • a user can add and remove rights to any particular record.
  • a common menu is provided on each screen.
  • the content of this menu will be specific to a role profile.
  • Main Menu items not permissioned for a particular role are preferably de-activated, hidden, or greyed out.
  • the Add Users and Maintain Roles permissions are maintained at the user level (on the user table).
  • each web page sections may contain one or more data fields and/or buttons etc.
  • the sections for a particular screen are defined in the Workflow Specification for that screen. As each page is processed, the permissions for each section are applied.
  • Table 2 contains example permissions in accordance with one embodiment of the present invention.
  • No View/Execute No View applies to data (text boxes/list boxes, etc.) and sections.
  • No Execute applies to buttons, links, etc.
  • These two permissions have been grouped together as they are effectively the same, i.e., if a No View/Execute permission applies to a section of a web page, then the content of that section shall not be returned to the client at all
  • the section includes executable items (buttons, links, etc.) the system must ensure at the server that these items are not executable (e.g., where a hacker guesses an action from a button on a page).
  • the data must not be allowed to be updated by the system.
  • the system must both disable the user's ability to change the data on the page, and protect from a hacker calling a HTTP get/post action with modified data. No Restrictions
  • the section of the page is fully permissioned.
  • Add The ability to add a record is controlled at either the menu level (2.1.1 above), page level (2.1.2 above) or, if there is an add button on a page, via a No Execute permission on the button.
  • Delete The ability to delete a record is controlled at page level (2.1.2 above) or via a No Execute permission on the Delete button on pages. Grant The ability to grant permissions is controlled by the User Trust Architecture - see below.
  • Permissions may be applied in an optimistic way. E.g., the user is allowed the maximum possible access (all permissions granted) unless a permission exists to restrict access.
  • the present invention may filter data for difference user categories such as those contained in Table 3.
  • TABLE 3 Type of user Filter required Customer User None External Step The ability to see only records allocated to (or agent User) that external counsel.
  • Customer Client The ability to see only records where the User Customer Client is the proprietor.
  • Additional user types may be added to the system requiring some kind of vertical data filtering (e.g., inventors, patent committee members, etc.).
  • each page may check that the user has the necessary authority to access the main IP record being displayed. If the record belongs to the External Step to whom the user also belongs, the record should be displayed. If the record does not belong to External Step to whom the user belongs, the user will be directed to an error page.
  • an External Counsel may access to other records related to their own (e.g., based on, basis for, priority, etc.). External Counsel may subcontract a piece of work to another External Counsel.
  • each page may check that the user has the necessary authority to access the main IP record being displayed. If record belongs to the Customer Client to whom the user also belongs, the record should be displayed. If the record does not belong to the Customer Client to whom the user belongs, the user will be directed to an error page. Certain users may update certain records in a particular territory.
  • Changes to the definition of a role may actioned the next time a user logs in (for permissions held at server or session level) or the next time a user tries to access a capability (for permissions that are dynamically derived from the database).
  • FIG. 3 is a preferred workflow diagram for adding a new user.
  • information about the new user is entered into the user create screen illustrated as FIG. 4.
  • a prerequisite to this process may require that the creating user AND creating user's role have been flagged as having the ability to add new users.
  • any role may be allocated to the new user with the exception that only System Technical Support users may add other System Technical Support users.
  • FIG. 4 is an example user interface for adding a new user.
  • the graphical user interface is generally illustrated as reference numeral 42 .
  • Table 4 defines example attributes for the different aspects of the user interface illustrated in FIG. 4.
  • TABLE 4 Label Table/Field mandatory Type Details and validation All fields are from the User table unless otherwise specified Salutation Salutation Optional Text First Name FirstName Mandatory Text Surname Surname Mandatory Text Job Title JobTitle Mandatory Text Tel No TelephoneNo Mandatory Text Fax No FaxNo Optional Text Mobile Tel No MobileNo Optional Text Role Profile UserRoleID Mandatory Dropdown Default is creating users role profile Dropdown list from role profile table defaulting to creating users role profile. If the user is an External Counsel User, they should only see roles flagged as available to External Step.
  • User Class UserClassID Mandatory Dropdown No Default. Dropdown list from User Class table ((Mandatory) (Attorney, Inventor, Searcher, etc.). This field is used to help searching. Welcome Message None Optional Text A message to the user that will be sent in the welcome e-mail. If the creating user has role System Technical Support, the following fields may be displayed: User Type UserTypeID Mandatory Dropdown Defaults to Customer User'. Pick list of Customer User', ‘External Counsel User’, ‘Customer Client User’ Organization OrganisationID Mandatory Picklist No default.
  • the “Create User” button creates the user according to the following process:
  • Action 1 Value that the e-mail is not already in use. If it is, the Add New Users page is re-displayed (data preserved) with an error message.
  • Action 2 Geneate an initial password for the user.
  • Action 3 Create the user on the system with the allocated role profile and password.
  • the new user will have user type as defined by the User Type field, with the Organization being set to the organization entered from the Organization pock list.
  • the creating user is a Customer User
  • the new user will also be a Customer User and belong to the Customer organization.
  • the creating user is an External Counsel
  • the new user will be an External Counsel User and belong to the same External Counsel organization as the creating user.
  • the creating user is a Customer Client
  • the new user will be a Customer Client User and belong to the same Customer Client organization as the creating user.
  • Example default values for user fields are listed in Table 5.
  • Table 5 Details Label Table/Field Mandatory Type and validation None LockedOut Mandatory Default set to No None BadPWDAttempts Mandatory Default set to 0 None T&CVersionSigned Mandatory Default set to 0 None T&CNameTyped Mandatory Default set to null None ChangePWDNextLogin Mandatory Default set to Yes None LastLoginDate Mandatory Default set to null None UserCanAddUsers Mandatory Default set to No None UserCanAddRoles Mandatory Default set to No
  • Action 4 e-mail—E-mail to the user with the e-mail text set forth below in Table 6.
  • E-mail Specification WSD011-001 To: New User E-mail From: ⁇ Helpdesk e-mail> Cc: None Bcc: None Title: Welcome to the ⁇ Customer Name> System Details: I am pleased to notify you of your login details for the ⁇ Customer Name> System Password: ⁇ Password> You can access the system at the following URL ⁇ System URL> ⁇ Message to the user> Attachments: None
  • step 44 the create user process is completed and the user returned to the user home page.
  • FIG. 5 is a preferred workflow diagram for maintaining user workflow.
  • the user In order to access the user maintain user workflow, the user should be flagged as having permission to the maintain users menu item. On accessing this menu item the user accesses a search page to find the users.
  • a system user enters criteria into a search screen to locate a user to maintain.
  • FIG. 6 is an example user interface 48 for a user search.
  • criteria entered in more than one field are combined with a logical and. Wild cards are allowed. Names may be wild carded without the user knowing. External Counsel users may only find user details of that External Counsel's users. Customer Client users may only find details of that Customer Client's users.
  • the data of the original search should be preserved for the convenience of the user. If the user records are found at step 50 , they should be displayed as a list below the search criteria and buttons, as illustrated generally by reference number 52 , in FIG. 7.
  • FIG. 8 is an example user interface 56 for amending user details.
  • the system will first check whether the user has any chasers allocated to them. If they do, the system will not allow the deletion, returning the user to the modify users page with an error message.
  • the system will physically delete the user and all records from the login history table. The list of roles that is presented should be the list of roles that the currently logged in user is authorized to grant.
  • Table 7 defines example attributes for aspects of the user interface illustrated in FIG. 8. TABLE 7 Label Table/Field Mandatory Type Details and validation All fields are from the User table unless otherwise specified Salutation Salutation Optional Text First Name FirstName Mandatory Text Surname Surname Mandatory Text Job Title JobTitle Mandatory Text E-Mail address EmailAddress Mandatory Text Tel No TelephoneNo Mandatory Text Fax No FaxNo Optional Text Mobile Tel No MobileNo Optional Text Role Profile UserRoleID Mandatory Dropdown Default is creating user's role profile Dropdown list from role profile table defaulting to creating user's role profile. If the user is an External Counsel User, they should only see roles flagged as available to External Step. User Class UserClassID Mandatory Dropdown No default.
  • the ‘Save’ Button saves the changes and returns the user to Step 2 .
  • the ‘Back’ Button returns the user to step 2 .
  • the ‘Cancel’ Button cancels any changes and re-presents the user's record. If the user chooses to ‘Delete’ a user, a follow-up process may be followed.
  • FIG. 9 is an example user interface 60 for granting roles to another user.
  • Table 8 defines example attributes for various aspects of the user interface illustrated in FIG. 9. TABLE 8 Label Table/Field Mandatory Type Details and validation Users e-mail User.
  • Mandatory Text address EmailAddress All Fields from UserRole MayGrant table unless specified User Role UserRoleID Mandatory Readonly User May Grant Optional Checkbox Derived from the UserRole MayGrant table. If a record exists for the User ID/ Role ID combination, then User May Grant is true. If a record does not exist, then User May Grant is false.
  • FIG. 10 is a preferred workflow diagram for defining user preferences, illustrated as 62 .
  • User preferences may include business information, such as telephone number and email address, as well as a secret question and answer, which are used to retrieve secured information.
  • FIG. 11 is an example user interface 64 for defining user preferences. Table 9 defines example attributes for aspects of the user interface illustrated in FIG. 11.
  • the ‘Save’ Button saves the changes and returns the user their home page.
  • the ‘Cancel’ Button cancels any changes and returns the user to their home page.
  • FIG. 12 is a preferred workflow diagram for user login.
  • the user login workflow comprises five primary steps.
  • the user enters a user identification and password into fields on the screen 68 .
  • FIG. 13 is an example user interface for Step 1 of user login.
  • the user identification is the user's email address.
  • Table 10 defines example attributes for aspects of the user interface illustrated in FIG. 13. TABLE 10 Details Label Table/Field Mandatory Type and validation All fields are from the User table unless otherwise specified E-mail Address EmailAddress Mandatory Text Password Password Mandatory Text entered should be displayed as *s
  • the ‘Sign On’ Button proceeds the user to step 2 .
  • the ‘Forgotten Password’ Link redirects to a Forgotten Password Page.
  • the second step of the user login workflow is user validation.
  • the identification and password are checked against stored user information in the workflow tool. If the user identification (ID) exists and the password is incorrect, the following actions will be taken.
  • Action 1 Increment the user's ⁇ failed login attempts> counter by 1
  • Action 2 Error Page—The user is re-directed back to the login page with an error message at the top of the pages.
  • the page may have two buttons;
  • Forgotten Password takes the user to the Forgotten Password page.
  • the user login workflow checks the terms and conditions of the user's account. If the user's account has its ⁇ terms and conditions signed> greater than or equal to the ⁇ current system terms and conditions>, the user may progress to step 4 , referenced by numeral 76 . If the user's account has its ⁇ terms and conditions signed> less than the ⁇ current system terms and conditions>, the user may be redirected or may progress to step 4 .
  • FIG. 14 illustrates an example user interface 74 for displaying terms and conditions for a particular user account.
  • the system upon selecting the “I agree” button, the system will do the following validations:
  • Validation 1 If the name typed does not match the first name and surname of the account, the system will re-display the terms and conditions page with an error message.
  • the fourth step of the user login workflow is change password, illustrated as step 76 . If the user's ⁇ change password on next login> is set to No, the user will proceed to Step 5 , which is the user's system home page 80 .
  • Table 11 defines example attributes for aspects of the user interface illustrated in FIG. 15. TABLE 11 All fields are from the User table unless otherwise specified Label Table/Field Mandatory Type Details and validation Current Password Mandatory Text Text entered should be Password displayed as *s New Password None Mandatory Text Text entered should be displayed as *s Passwords stored in the database should be encrypted so that no-one can view the password. Confirm New None Mandatory Text Text entered should be Password displayed as *s Passwords stored in the database should be encrypted so that no-one can view the password. Secret SecretQuestionID Mandatory Dropdown Dropdown from Question SecretQuestion table Secret SecretQuestionAnswe Mandatory Text Question r Answer
  • the system will check if the length of the New Password less than ⁇ system min password length> or the password does not contain at least one Alpha character (a-z,A-Z) and one number character (0-9), the system will re-display the page with an error message. If the Current Password does not match the password on the user's account, or the New Password does not match the re-entered password, the system will re-display the change password page with an error message, and increment the users ⁇ failed login attempts> by 1.
  • the fifth step of the user login workflow is a successful login, referenced generally as numeral 80 .
  • the system will record the user ID, date and time in the successful login table, record the new password in an encrypted format in the user table, and redirect the user to their system home page.
  • FIG. 16 is a preferred workflow for role maintenance. This workflow comprises two primary steps: Selection of a role to maintain, referenced as numeral 82 , and maintaining the selected user role, referenced as numeral 84 .
  • FIG. 17 is an example user interface 86 for selecting a role to maintain.
  • FIG. 18 is an example user interface 88 for maintaining user roles. Table 12 defines example attributes for aspects of the user interface illustrated in FIGS. 17 and/or 18 .
  • the ‘Save’ Button saves the changes to the role profile and returns the user to step 1 .
  • the ‘Cancel’ Button cancels all changes and returns the user to step 1 .
  • the ‘Delete’ Button only appears if the number of users for this role' dialogue. If they confirm they are sure, the role is deleted.
  • the ‘Copy’ Button will check that a role name has been entered and that it is unique. If both of these conditions are satisfied, a new role is created copying all of the permissions of the original role. There is no link between the new and original roles, unless the user observes some kind of naming convention e.g.
  • Tables 13 and 14 contain example menu level permissions and roles. TABLE 13 Accessible to External Role Details Step Role 1 - System Technical Support No Role 2 - Super User No Role 3 - Customer User - All No Role 4 - Customer User - Trademarks No Role 5 - Customer User - Patents No Role 6 - Customer User - Conflicts No Role 7 - Customer User - Agreements No Role 8 - Not used No Role 9 - External Step - All Yes Role 10 - External Step - Trademarks Yes Role 11 - External Step - Patents Yes Role 12 - Not used No Role 13 - Not used No Role 14 - Customer Client No
  • FIG. 19 is a block diagram 90 illustrating a preferred entity relationship diagram setting forth user roles and access rights.
  • the distributed legal workflow security computer system allows users, through one or more computers, to input system access privileges for one or more legal workflow participants based on one or more legal workflow role types.
  • System users may associate permission privileges for a plurality of legal workflow graphical interface systems functions based on the legal workflow role types. Each system user or participant is allowed access to legal workflow graphical interface functionality according to the permission privileges associated with the participants respective legal workflow role types.
  • a process is defined in which third parties update information on the collaborative legal workflow tool.
  • Third parties are presented with the same collaborative legal workflow product.
  • One difference may be that the permissioning on the screens will vary, as defined by business requirements. There are different types of permissioning that may be applied. For example, certain screens may not be available to certain third parties and/or third party users, and certain fields may be set to ‘Read Only’ or ‘No Execute’.
  • Third party subject areas and functionality in accordance with the present invention include, but is not limited to, trademark applications, trademark searches, conflicts, organizations, time recording, billing, invoicing, agreements, copyrights, domain names, patents, maintenance screen (e.g., brands and marks, territories, organizations, etc.), reporting and the implementation of tasks for third party diaries.
  • FIG. 20 is an example user interface 92 for maintenance of legal workflow in the collaborative online workflow tool of the present invention.
  • a “Maintain TM Details” page is illustrated.
  • the following permissible sections, “Main TM Details” 94 , “Verification” 96 and “Budget Name” 98 are accessible by the users to allow modification of the information stored in those fields. The remainder of the fields are permissioned to “Read Only” access.
  • FIG. 21 illustrates an example user interface 100 for a child window of the trademark workflow record.
  • the child window includes permissioned fields which allow modification of trademark information based on security permissions.
  • the agent instructions 102 and application details 104 sections are set to allow modification of information by the user.
  • FIG. 22 illustrates an example user interface 106 for defining and presenting main conflict details.
  • the conflict umbrella and charges child window menu options are set to ‘No Execute’.
  • the save, delete, edit and law buttons should be set to ‘No Execute’.
  • FIG. 23 illustrates a user interface 108 for defining organizational details.
  • the contact comments section is set to ‘No View’.
  • the following child window menu option should also be set to ‘No Execute’: Law firm specialty, supplier info., verification and umbrella.
  • FIG. 24 illustrates an example user interface 110 for defining contact information.
  • the contact comments and contact comments-add sections are set to ‘No View’.

Abstract

A computer system and method for distributed legal workflow security provides role-based access control to a collaborative online workflow tool. The system includes a computer network having one or more computers operably programmed and configured to receive input defining computer system access privileges for a plurality of distributed legal workflow participants. The system receives input associating one or more legal workflow role types defined by users with one or more of the distributed legal workflow participants to define the role-based access. Permission privileges are input and associated with a plurality of legal workflow graphical interface functions based on the one or more legal workflow role types. Based on the permission privileges associated with the role type of the participant, the system provides legal workflow graphical interface functionality to the one or more distributed legal workflow participants.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims the benefit of U.S. provisional application Serial No. 60/381,841 filed May 20, 2002.[0001]
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention [0002]
  • This invention relates to a collaborative online legal workflow tool and more particularly, to a method and system for role-based access control to a collaborative online legal workflow tool. [0003]
  • 2. Background Art [0004]
  • A variety of legal workflow tools are currently available in the marketplace which allow users to manage an intellectual property portfolio. Typical information managed by these systems include filing and prosecution information for patent and trademark applications filed around the world. Many of these systems are based upon well known client-server architecture and provide limited ability for internal users to collaborate with external service providers without complex hardware and networking architecture. [0005]
  • Recently, developers have modified existing client-server systems to incorporate online collaborative tools, such as web access plugins, to allow a variety of users in various locations to access common information stored in the tool. One of the challenges associated with this collaborative exchange of information is the level of access and control users have to the information stored in the tool. [0006]
  • In today's legal arena, corporations, institutions and firm clients typically rely on multiple distributed firms and agencies to assist with or independently conduct their legal workflow. It is not uncommon for a single corporation to have several private law firms handling hundreds of co-pending legal matters ranging from basic transactional work to larger projects such as litigation, negotiation, etc. In the intellectual property area, for example, a corporation often relies on outside counsel to independently manage all searches and applications for trademarks, patents etc. [0007]
  • For example, a corporate attorney may provide access to one or more external service providers to records stored in the corporate workflow tool for which the external service provider is responsible for managing on a day to day basis. Current portfolio management solutions have security tools which restrict the external service provider's access only to records assigned to the external service provider. The external service provider is unable to access information entered by other service providers which may be related to the matters handled by that individual. This inability to collaborate with other service providers limits the level of service provided to the client and may create additional support burdens for both the corporation and the service provider. [0008]
  • A variety of companies currently offer software applications for managing or otherwise automating workflow in both the legal and non-legal arenas. One example is Aspen Grove's ipWorkflow. Aspen Grove is located at 101 Federal Street, Suite 1900, Boston, Mass. 02110 (www.aspengrove.net). Another example is offered by Vinsoft Solutions located at 1155 West Chestnut Street, Suite 2-C, Union, N.J. 07083 (www.vinsoftsolutions.com). Another example is offered by FoundationIP located at 830 TCF Tower, 121 South 8th Street, Minneapolis, Minn. 55402 (www.foundationip.com). Another example is Inproma offered by Computer Patent Annuities North America LLC located at 225 Reinekers Lane, Suite 400, Alexandria, Va. 22314 (www.cpajersey.com). Another example is offered by iManage located at 950 Tower Lane, Suite 500, Foster City, Calif. 94404 (www.imanage.com). [0009]
  • Embodiments and features of the present invention include an alternative to or valuable improvement upon conventional legal workflow applications. Without limiting the scope or applicability of the present invention, one goal of the present invention is to provide a collaborative online legal workflow tool which overcomes the limitations described above. It would also be advantageous to provide a method and system for role-based access control to information in the collaborative online legal workflow tool which provides central administration of legal workflow conducted by a plurality of distributed workflow participants. [0010]
  • SUMMARY OF THE INVENTION
  • Accordingly, a computer system and method for distributed legal workflow security is disclosed allowing role-based access control to a collaborative online workflow tool. The computer system provides central administration of legal workflow conducted by a plurality of distributed workflow participants. The system includes a computer network having one or more computers operably programmed and configured to receive input defining computer system access privileges for a plurality of distributed legal workflow participants. [0011]
  • The system receives input associating one or more legal workflow role types defined by users with one or more of the distributed legal workflow participants to define the role-based access. Permission privileges are input and associated with a plurality of legal workflow graphical interface functions based on the one or more legal workflow role types. Based on the permission privileges associated with the role type of the participant, the system provides legal workflow graphical interface functionality to the one or more distributed legal workflow participants. [0012]
  • Advantages of the present invention include a reduction in the time, cost and risk associated with conventional distributed/remote management of legal workflow. Via the online collaboration tool, integrated parties cooperate with real-time knowledge access and visibility to work product and status. By applying business/legal logic to this integrated pool of knowledge, a value-added workflow results.[0013]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIGS. 1 and 2 illustrate online legal workflow collaboration between organizations (e.g., brand owners, law firms, law firm clients, brand owner clients, etc.), business processes and information systems in accordance with one embodiment or aspect of the present invention; [0014]
  • FIG. 3 is a flowchart illustrating a workflow for adding a new user to the system; [0015]
  • FIG. 4 is an example of a graphical user interface for adding a new user to the system; [0016]
  • FIG. 5 is a flowchart illustrating a workflow for maintaining user workflow; [0017]
  • FIG. 6 is an example of a graphical user interface for a user search; [0018]
  • FIG. 7 is an example of a graphical user interface for displaying user search criteria; [0019]
  • FIG. 8 is an example of a graphical user interface for amending user details; [0020]
  • FIG. 9 is an example of a graphical user interface for granting roles to users; [0021]
  • FIG. 10 is a flowchart illustrating a workflow for defining user preferences; [0022]
  • FIG. 11 is an example of a graphical user interface displaying user preferences; [0023]
  • FIG. 12 is a flowchart illustrating a workflow for user login procedures; [0024]
  • FIG. 13 is an example of a graphical user interface for user login; [0025]
  • FIG. 14 is an example of a graphical user interface for displaying terms and conditions of user login; [0026]
  • FIG. 15 is an example of a graphical user interface for changing password features for user login; [0027]
  • FIG. 16 is a flowchart illustrating a workflow for role maintenance; [0028]
  • FIG. 17 is an example of a graphical user interface for selecting a user role to maintain; [0029]
  • FIG. 18 is an example of a graphical user interface for defining attributes of the user interface; [0030]
  • FIG. 19 is a block diagram illustrating a preferred entity relationship diagram setting forth user roles and access rights; [0031]
  • FIG. 20 is an example of a graphical user interface for maintaining legal workflow details; [0032]
  • FIG. 21 is an example of a graphical user interface for trademark application legal workflow details; [0033]
  • FIG. 22 is an example of a graphical user interface for conflict legal workflow details; [0034]
  • FIG. 23 is an example of a graphical user interface for defining organizational details; and [0035]
  • FIG. 24 is an example of a graphical user interface for defining contact information.[0036]
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT(S) System Overview
  • Embodiments of the present invention relate to an online legal workflow collaboration tool and methodology. In today's legal arena, corporations, institutions and firm clients typically rely on multiple distributed firms and agencies to assist with or independently conduct their legal workflow. It is not uncommon for a single corporation to have several private law firms handling hundreds of co-pending legal matters ranging from basic transactional work to larger projects such as litigation, negotiation, etc. In the intellectual property area, for example, a corporation often relies on outside counsel to independently manage all searches and applications for trademarks, patents etc. [0037]
  • Advantages of such an online legal workflow collaboration tool and methodology include a reduction in the time, cost and risk associated with conventional distributed/remote management of legal workflow. Via the online collaboration tool, integrated parties cooperate with real-time knowledge access and visibility to work product and status. A law engine implements or otherwise applies business/legal logic to this integrated pool of knowledge to produce a value-added workflow. [0038]
  • FIG. 1 illustrates an overview of [0039] environment 10 in which embodiments of the present invention may operate. A central online leal workflow and knowledge management system 12 operably interfaces or is otherwise in operable communication with a plurality of local or distributed workflow participants (e.g., brand owners 14, agents/law firms 16, law firm clients 18, brand owner clients 20, etc.). More specifically, and as illustrated in greater detail in FIG. 2, workflow participants (e.g. agent/law firm 22, legal department 24, etc.) and associated workflow applications (e.g. document management system 26, finance system 28, etc.) productively collaborate with one another via central online leal workflow and knowledge management system 12. Notably, an unlimited number of participants may collaborate with one another in an unlimited number of different fashions.
  • One aspect of the present invention is a system and methodology for controlling user access to the online legal workflow collaboration tool, or portions thereof. The system comprises a computer network including one or more computers operably programmed and configured to allow access to the collaborative online workflow tool. This aspect is easy to manage and a flexible user permissioning model that relies on the definition of generic roles for multiple users. [0040]
  • As evidenced by the variety and breadth of existing computer architectures hosting or otherwise supporting knowledge and management workflow applications, those of ordinary skill in the art recognize that such applications may be implemented on or over a multitude of different computing platforms and networks. According to one embodiment, functional aspects of the present invention may be centrally hosted from one or more web servers to web browsers located at a plurality of local or distributed workflow participant locations. Alternately, aspects of the present invention may be implemented according to a more dedicated/localized client-server architecture over a local or wide area network. [0041]
  • Example role types include a Customer User, an External Counsel (or agent) User, a Customer Client User, a Customer Client User with an anonymous log in, and an Inventor with an anonymous log in. In one embodiment, a Customer is a company who is using the system to store and manage their IP data. Preferably, where a Customer has subcontracted part of their service provision to an agent, the agent's users will still be Customer Users as they are essentially fulfilling the role of a Customer User. [0042]
  • In addition to a user ID/password, access to the system may be restricted at levels such as Menu level (e.g. create trademark—main screen, create trademark—based on etc.), and section of a page level (e.g. proprietor details on trademark not visible to External Counsel). While section of a page may be regarded at it's largest as a whole page, at it's smallest as a single data field or button, or somewhere between. The business users define the permissionable sections for each page. [0043]
  • A pragmatic approach may be taken as to whether it is best to create a complex permissioning scenario for a particular screen, or just create two or more screens. For example, for Trademarks, it may be simple to develop separate Trademark pages for Customer Users and External Counsel Users, than to create a complex permissioning model for a simple page. [0044]
  • External Counsel Users and Customer Client Users have the ability to see only the records for which their company has responsibility. A protocol may be followed that allows a user to view (read only) the diary of any other user from the same External Counsel organization and they may re-allocate tasks to other users in their organization. [0045]
  • Security Principles
  • The present invention assumes that people will attempt to hack the computer system or access areas outside their granted level of permission. To prevent this, security principles may be applied. For example, content for which a user is not permissioned may not be returned to the user from the server. [0046]
  • In another example, all permissionable actions (menus, pages, buttons, hyperlinks, etc.) will check (server side) before executing business logic that the user has permission to execute the action. This functionality will prevent hackers from guessing action calls, etc. Where appropriate, if the system detects any possible security issue, an e-mail may be sent to a system administrator. The activity may also be logged for further investigation. [0047]
  • User Trust Requirements
  • User Trust Requirements relate to the business process necessary to ensure that the person who is being added to the system has been verified as a valid user of the system for the permissions granted to them. The general principle is that a user with the appropriate permissions may create other users of their own user type (e.g., Customer User, External Counsel User or Customer Client User, etc.). [0048]
  • External Counsel may have the ability to create and maintain their own users. In one embodiment, they will not have the ability to modify the definitions of the roles for which they are permissioned. A Creating User is defined as a user who is logged in and who is creating a new user. [0049]
  • User Types
  • In accordance with a preferred embodiment of the present invention different access rights are provided for different types of users. Table 1 contains example user types in accordance with the present invention. It is envisioned that an unlimited number of user types may be defined. [0050]
    TABLE 1
    User Type 1 Customer User
    User Type
    2 External Counsel (or agent) User
    User Type
    3 Customer Client User
    User Type
    4 Customer Client User - self-created log in
    User Type 5 Inventor - self-created log in
  • The Customer User will generally be an employee. Examples include a Counsel/Attorney/Paralegal or other administrative staff. Some companies may have outsourced aspects of the management of their IP or other legal work to External Counsel; hence it is possible that a Customer User is from an External Counsel. [0051]
  • External Counsel are those companies instructed to do something by the Customer User in relation to the registration, renewal, maintenance, etc. of one or more of the Customer's records. As a general principle, External Counsel should only be able to access records that are allocated to the company to whom the user belongs. [0052]
  • The Customer Client User represents the client of the Customer. This could be an employee of an operating company. Customer Client Users are generally interested in a subset of records that relate to their company only. [0053]
  • Prior to display, each page checks that the user has the necessary authority to access the main record being displayed. If the record belongs to the Customer Client to whom the user also belongs, the record should be displayed. The Client field on the main record identifies the Customer Client User. [0054]
  • Permission Based on Model
  • Once an agent or client has been added to a particular record, a permission database is updated to reflect this automatically. Preferably, a user can add and remove rights to any particular record. [0055]
  • Menu Permissions
  • In a preferred embodiment of the present invention, a common menu is provided on each screen. The content of this menu will be specific to a role profile. Main Menu items not permissioned for a particular role are preferably de-activated, hidden, or greyed out. The Add Users and Maintain Roles permissions are maintained at the user level (on the user table). [0056]
  • Even if a role allocated to a user has been permissioned to add new users/maintain roles, the user setting will override this setting if there is a conflict. I.e., if the role allows access to the Add User capability, but the user account is flagged with the setting ‘Add New User’=No, the user will be prevented from accessing this capability. [0057]
  • By default, if there is not a specific grant of permission for a menu item against a role, the permission to access that menu item is assumed to be no. A check on each page will also check if the user's ,account suspended flag is set to yes. If they are, the user should be shown the account suspended page and logged off the system. Suspended accounts will not be allowed to log onto the system. [0058]
  • Sections of a Web Page Permissions
  • Preferably, each web page sections. These sections may contain one or more data fields and/or buttons etc. The sections for a particular screen are defined in the Workflow Specification for that screen. As each page is processed, the permissions for each section are applied. [0059]
  • Table 2 contains example permissions in accordance with one embodiment of the present invention. [0060]
    TABLE 2
    No View/Execute No View applies to data (text boxes/list boxes, etc.) and
    sections.
    No Execute applies to buttons, links, etc.
    These two permissions have been grouped together as they are
    effectively the same, i.e., if a No View/Execute permission
    applies to a section of a web page, then the content of that
    section shall not be returned to the client at all
    Where the section includes executable items (buttons, links,
    etc.) the system must ensure at the server that these items
    are not executable (e.g., where a hacker guesses an action
    from a button on a page).
    No Update Applies to data. If the permission ‘No Update’ is flagged
    for a particular section, the data must not be allowed to be
    updated by the system. The system must both disable the
    user's ability to change the data on the page, and protect
    from a hacker calling a HTTP get/post action with modified
    data.
    No Restrictions The section of the page is fully permissioned.
    Add The ability to add a record is controlled at either the menu
    level (2.1.1 above), page level (2.1.2 above) or, if there is
    an add button on a page, via a No Execute permission on the
    button.
    Delete The ability to delete a record is controlled at page level
    (2.1.2 above) or via a No Execute permission on the Delete
    button on pages.
    Grant The ability to grant permissions is controlled by the User
    Trust Architecture - see below.
  • Permissions may be applied in an optimistic way. E.g., the user is allowed the maximum possible access (all permissions granted) unless a permission exists to restrict access. [0061]
  • Vertical Data Filtering
  • To prevent users from seeing data that they are not authorized/required to see, the present invention may filter data for difference user categories such as those contained in Table 3. [0062]
    TABLE 3
    Type of user Filter required
    Customer User None
    External Counsel The ability to see only records allocated to
    (or agent User) that external counsel.
    Customer Client The ability to see only records where the
    User Customer Client is the proprietor.
  • Additional user types may be added to the system requiring some kind of vertical data filtering (e.g., inventors, patent committee members, etc.). [0063]
  • Vertical Data Filtering—External Counsel (or Agent) User
  • Prior to display, each page may check that the user has the necessary authority to access the main IP record being displayed. If the record belongs to the External Counsel to whom the user also belongs, the record should be displayed. If the record does not belong to External Counsel to whom the user belongs, the user will be directed to an error page. [0064]
  • In some circumstances, an External Counsel may access to other records related to their own (e.g., based on, basis for, priority, etc.). External Counsel may subcontract a piece of work to another External Counsel. [0065]
  • Vertical Data Filtering—Customer Client User
  • Prior to display, each page may check that the user has the necessary authority to access the main IP record being displayed. If record belongs to the Customer Client to whom the user also belongs, the record should be displayed. If the record does not belong to the Customer Client to whom the user belongs, the user will be directed to an error page. Certain users may update certain records in a particular territory. [0066]
  • How Changes to Permissions and Roles are Implemented
  • Changes to the definition of a role may actioned the next time a user logs in (for permissions held at server or session level) or the next time a user tries to access a capability (for permissions that are dynamically derived from the database). [0067]
  • FIG. 3 is a preferred workflow diagram for adding a new user. At step [0068] 40, information about the new user is entered into the user create screen illustrated as FIG. 4. A prerequisite to this process may require that the creating user AND creating user's role have been flagged as having the ability to add new users. Preferably, any role may be allocated to the new user with the exception that only System Technical Support users may add other System Technical Support users.
  • FIG. 4 is an example user interface for adding a new user. The graphical user interface is generally illustrated as [0069] reference numeral 42. Table 4 defines example attributes for the different aspects of the user interface illustrated in FIG. 4.
    TABLE 4
    Label Table/Field Mandatory Type Details and validation
    All fields are from the User table unless otherwise specified
    Salutation Salutation Optional Text
    First Name FirstName Mandatory Text
    Surname Surname Mandatory Text
    Job Title JobTitle Mandatory Text
    Tel No TelephoneNo Mandatory Text
    Fax No FaxNo Optional Text
    Mobile Tel No MobileNo Optional Text
    Role Profile UserRoleID Mandatory Dropdown Default is creating
    users role profile
    Dropdown list from role
    profile table defaulting
    to creating users role
    profile.
    If the user is an
    External Counsel User,
    they should only see
    roles flagged as
    available to External
    Counsel.
    User Class UserClassID Mandatory Dropdown No Default.
    Dropdown list from User
    Class table ((Mandatory)
    (Attorney, Inventor,
    Searcher, etc.). This
    field is used to help
    searching.
    Welcome Message None Optional Text A message to the user
    that will be sent in the
    welcome e-mail.
    If the creating user has role System Technical Support, the following fields may be
    displayed:
    User Type UserTypeID Mandatory Dropdown Defaults to Customer
    User'.
    Pick list of Customer
    User', ‘External Counsel
    User’, ‘Customer Client
    User’
    Organization OrganisationID Mandatory Picklist No default.
    If User Type = ‘External
    Counsel’, the creating
    user is required to
    enter the External
    Counsel Company from a
    pick list
    If User Type = ‘Customer
    Client’, the creating
    user is required to
    enter the Customer
    Client Company from a
    pick list
    If the user being created is a Customer User
    Users DepartmentID Optional Dropdown No default.
    Department/Team Only for Customer Users.
  • In one embodiment of the present invention, the “Create User” button creates the user according to the following process: [0070]
  • [0071] Action 1—Validate that the e-mail is not already in use. If it is, the Add New Users page is re-displayed (data preserved) with an error message.
  • [0072] Action 2—Generate an initial password for the user.
  • [0073] Action 3—Create the user on the system with the allocated role profile and password.
  • If the creating user has role System Technical Support, the new user will have user type as defined by the User Type field, with the Organization being set to the organization entered from the Organization pock list. [0074]
  • If the creating user is a Customer User, the new user will also be a Customer User and belong to the Customer organization. [0075]
  • If the creating user is an External Counsel, the new user will be an External Counsel User and belong to the same External Counsel organization as the creating user. [0076]
  • If the creating user is a Customer Client, the new user will be a Customer Client User and belong to the same Customer Client organization as the creating user. [0077]
  • Example default values for user fields are listed in Table 5. [0078]
    TABLE 5
    Details
    Label Table/Field Mandatory Type and validation
    None LockedOut Mandatory Default set to No
    None BadPWDAttempts Mandatory Default set to 0
    None T&CVersionSigned Mandatory Default set to 0
    None T&CNameTyped Mandatory Default set to null
    None ChangePWDNextLogin Mandatory Default set to Yes
    None LastLoginDate Mandatory Default set to null
    None UserCanAddUsers Mandatory Default set to No
    None UserCanAddRoles Mandatory Default set to No
  • [0079] Action 4—e-mail—E-mail to the user with the e-mail text set forth below in Table 6.
    TABLE 6
    E-mail Specification WSD011-001
    To: New User E-mail
    From: <Helpdesk e-mail>
    Cc: None
    Bcc: None
    Title: Welcome to the <Customer Name> System
    Details: I am pleased to notify you of your login details
    for the <Customer Name> System
    Password: <Password>
    You can access the system at the following URL
    <System URL>
    <Message to the user>
    Attachments: None
  • At [0080] step 44, the create user process is completed and the user returned to the user home page.
  • FIG. 5 is a preferred workflow diagram for maintaining user workflow. In order to access the user maintain user workflow, the user should be flagged as having permission to the maintain users menu item. On accessing this menu item the user accesses a search page to find the users. At step [0081] 46, a system user enters criteria into a search screen to locate a user to maintain. FIG. 6 is an example user interface 48 for a user search.
  • Preferably, criteria entered in more than one field are combined with a logical and. Wild cards are allowed. Names may be wild carded without the user knowing. External Counsel users may only find user details of that External Counsel's users. Customer Client users may only find details of that Customer Client's users. [0082]
  • The data of the original search should be preserved for the convenience of the user. If the user records are found at step [0083] 50, they should be displayed as a list below the search criteria and buttons, as illustrated generally by reference number 52, in FIG. 7.
  • FIG. 8 is an [0084] example user interface 56 for amending user details. In one embodiment of the present invention, the system will first check whether the user has any chasers allocated to them. If they do, the system will not allow the deletion, returning the user to the modify users page with an error message. Next at step 54, the system will physically delete the user and all records from the login history table. The list of roles that is presented should be the list of roles that the currently logged in user is authorized to grant.
  • Table 7 defines example attributes for aspects of the user interface illustrated in FIG. 8. [0085]
    TABLE 7
    Label Table/Field Mandatory Type Details and validation
    All fields are from the User table unless otherwise specified
    Salutation Salutation Optional Text
    First Name FirstName Mandatory Text
    Surname Surname Mandatory Text
    Job Title JobTitle Mandatory Text
    E-Mail address EmailAddress Mandatory Text
    Tel No TelephoneNo Mandatory Text
    Fax No FaxNo Optional Text
    Mobile Tel No MobileNo Optional Text
    Role Profile UserRoleID Mandatory Dropdown Default is creating
    user's role profile
    Dropdown list from role
    profile table defaulting
    to creating user's role
    profile.
    If the user is an
    External Counsel User,
    they should only see
    roles flagged as
    available to External
    Counsel.
    User Class UserClassID Mandatory Dropdown No default.
    Dropdown list from User
    Class table ((Mandatory)
    (Attorney, Inventor,
    Searcher, etc.)). This
    field is used to help
    searching.
    Suspend User SuspendUserDate Mandatory Date
    Date
    User Is LockedOut Mandatory Dropdown Yes/No
    Suspended
    Failed Login BadPWDAttempts Optional Read Only
    Attempts
    Change Password ChangePWDNextLog Mandatory Dropdown Yes/No
    at next login on
    Show Ts & Cs at NONE Mandatory Calculation If T&CversionSigned <
    next login <current system terms
    and conditions> then Yes
    else No
    T & C version T&CversionSigned Optional
    signed
    Name Typed T&CnameTyped Optional Read only
    when
    T&Cs signed
    Secret Question SecretQuestionID Mandatory Dropdown Dropdown from
    SecretQuestion table
    Secret Question SecretQuestionAn Optional Text
    Answer swer
    Last Login Date LastLoginDate Optional Read Only
    If the modifying user has role System Technical Support, the following fields will be
    displayed:
    User Type UserTypeID Mandatory Dropdown Defaults to ‘Customer
    User’.
    Pick list of ‘Customer
    User’, 'External Counsel
    User’, ‘Customer Client
    User’
    Organization OrganisationID Mandatory Picklist No default
    If User Type = ‘External
    Counsel’, the creating
    user is required to
    enter the External
    Counsel Company from a
    pick list
    If User Type =
    ‘Customer
    Client’, the creating
    user is required to
    enter the Customer
    Client Company from a
    pick list.
    If the user being created is a Customer User
    Users DepartmentID Optional Dropdown No default.
    Department/ Only for Customer
    Team Users.
    If the modifying user can add new users
    User can add UserCanAddUsers Mandatory Checkbox
    new users
    If the modifying user can maintain roles
    Users can UserCanMaintainR Mandatory Checkbox
    maintain roles oles
  • At [0086] step 58, the ‘Save’ Button saves the changes and returns the user to Step 2. The ‘Back’ Button returns the user to step 2. The ‘Cancel’ Button cancels any changes and re-presents the user's record. If the user chooses to ‘Delete’ a user, a follow-up process may be followed.
  • FIG. 9 is an [0087] example user interface 60 for granting roles to another user. Table 8 defines example attributes for various aspects of the user interface illustrated in FIG. 9.
    TABLE 8
    Label Table/Field Mandatory Type Details and validation
    Users e-mail User. Mandatory Text
    address EmailAddress
    All Fields from UserRoleMayGrant table unless specified
    User Role UserRoleID Mandatory Readonly
    User May Grant Optional Checkbox Derived from the
    UserRoleMayGrant table. If a
    record exists for the User ID/
    Role ID combination, then User
    May Grant is true. If a record
    does not exist, then User May
    Grant is false.
  • FIG. 10 is a preferred workflow diagram for defining user preferences, illustrated as [0088] 62. User preferences may include business information, such as telephone number and email address, as well as a secret question and answer, which are used to retrieve secured information. FIG. 11 is an example user interface 64 for defining user preferences. Table 9 defines example attributes for aspects of the user interface illustrated in FIG. 11.
    TABLE 9
    Label Table/Field Mandatory Type Details and validation
    All fields are from the User table unless otherwise specified
    Salutation Salutation Optional Text
    First Name FirstName Mandatory Text
    Surname Surname Mandatory Text
    Job Title JobTitle Mandatory Text
    Tel No TelephoneNo Mandatory Text
    Fax No FaxNo Optional Text
    Mobile Tel No MobileNo Optional Text
    Role Profile UserRoleID Mandatory Read
    only
    User Class UserClassID Mandatory Dropdown Dropdown list from
    User Class table
    ((Mandatory)
    (Attorney, Inventor,
    Searcher, etc.)).
    This field is used to
    help searching.
    Secret Question SecretQuestionID Mandatory Dropdown Dropdown from
    SecretQuestion table
    Secret Question SecretQuestionAnswer Mandatory Text
    Answer
    Organization OrganisationID Mandatory Read
    only
    If the user being created is an Anaqua Customer User
    Users DepartmentID Optional Dropdown No default.
    Department/Team Only for Anagua
    Customer Users
  • In one embodiment of the present invention, the ‘Save’ Button saves the changes and returns the user their home page. The ‘Cancel’ Button cancels any changes and returns the user to their home page. [0089]
  • FIG. 12 is a preferred workflow diagram for user login. The user login workflow comprises five primary steps. At [0090] step 66, the user enters a user identification and password into fields on the screen 68. FIG. 13 is an example user interface for Step 1 of user login. In one preferred aspect of the invention, the user identification is the user's email address. Table 10 defines example attributes for aspects of the user interface illustrated in FIG. 13.
    TABLE 10
    Details
    Label Table/Field Mandatory Type and validation
    All fields are from the User table unless otherwise specified
    E-mail Address EmailAddress Mandatory Text
    Password Password Mandatory Text Text entered should
    be displayed as *s
  • The ‘Sign On’ Button proceeds the user to step [0091] 2. The ‘Forgotten Password’ Link redirects to a Forgotten Password Page.
  • At [0092] number 70, the second step of the user login workflow is user validation. The identification and password are checked against stored user information in the workflow tool. If the user identification (ID) exists and the password is incorrect, the following actions will be taken.
  • [0093] Action 1—Increment the user's <failed login attempts> counter by 1
  • [0094] Action 2—Error Page—The user is re-directed back to the login page with an error message at the top of the pages.
  • If the user's new <failed login attempts> counter is greater than the <system login attempts allowed> system parameter, the user is redirected to a page with the following text: [0095]
  • You have failed to correctly provide your user ID and password several times, so your account has been suspended. Please go to the forgotten password page to re-set your password. [0096]
  • The page may have two buttons; [0097]
  • Cancel—which returns the user to the www.domain.com site. [0098]
  • Forgotten Password—takes the user to the Forgotten Password page. [0099]
  • If the user ID is incorrect, the user is re-directed back to the login page with an error message at the top of the page. [0100]
  • If the User ID and Password are validated, and the user's IP address does not belong to the ‘blocked IP-address’ table, then the user's <failed login attempts> counter shall be set to 0, and the user may progress to step [0101] 3.
  • At [0102] step 72, the user login workflow checks the terms and conditions of the user's account. If the user's account has its <terms and conditions signed> greater than or equal to the <current system terms and conditions>, the user may progress to step 4, referenced by numeral 76. If the user's account has its <terms and conditions signed> less than the <current system terms and conditions>, the user may be redirected or may progress to step 4.
  • Preferably, a page is displayed requiring the user to read the terms and conditions, and give notice of their acceptance. FIG. 14 illustrates an [0103] example user interface 74 for displaying terms and conditions for a particular user account. According to one embodiment of the invention, upon selecting the “I agree” button, the system will do the following validations:
  • [0104] Validation 1—If the name typed does not match the first name and surname of the account, the system will re-display the terms and conditions page with an error message.
  • [0105] Validation 2—If the name typed matches the first name and surname of the account, the system will
  • store the name typed in the <name typed at last terms and conditions acceptance> attribute of the user accounts, [0106]
  • set to <terms and conditions signed> equal to the <current system terms and conditions> for the user account, and [0107]
  • allow the user to progress to [0108] Step 4.
  • The fourth step of the user login workflow is change password, illustrated as [0109] step 76. If the user's <change password on next login> is set to No, the user will proceed to Step 5, which is the user's system home page 80.
  • If the user's <change password on next login> is set to Yes, the system will prevent the example user interface illustrated as numeral [0110] 80 in FIG. 15. Table 11 defines example attributes for aspects of the user interface illustrated in FIG. 15.
    TABLE 11
    All fields are from the User table unless otherwise specified
    Label Table/Field Mandatory Type Details and validation
    Current Password Mandatory Text Text entered should be
    Password displayed as *s
    New Password None Mandatory Text Text entered should be
    displayed as *s
    Passwords stored in the
    database should be
    encrypted so that no-one
    can view the password.
    Confirm New None Mandatory Text Text entered should be
    Password displayed as *s
    Passwords stored in the
    database should be
    encrypted so that no-one
    can view the password.
    Secret SecretQuestionID Mandatory Dropdown Dropdown from
    Question SecretQuestion table
    Secret SecretQuestionAnswe Mandatory Text
    Question r
    Answer
  • If the user presses the Change Password button, the system will check if the length of the New Password less than <system min password length> or the password does not contain at least one Alpha character (a-z,A-Z) and one number character (0-9), the system will re-display the page with an error message. If the Current Password does not match the password on the user's account, or the New Password does not match the re-entered password, the system will re-display the change password page with an error message, and increment the users <failed login attempts> by 1. [0111]
  • If the user's new <failed login attempts> counter is greater than the <system login attempts allowed> system parameter, an error page is displayed. If the Current Password matches the password on the account and the New Password and Re-entered password are the same (but different from the current password), and the new password length is greater than the <system min password length> and the new password contains at least one letter and number, the system will set the user's <change password on next login> to No and the user will progress to Step [0112] 5.
  • The fifth step of the user login workflow is a successful login, referenced generally as [0113] numeral 80. In this step, the system will record the user ID, date and time in the successful login table, record the new password in an encrypted format in the user table, and redirect the user to their system home page.
  • FIG. 16 is a preferred workflow for role maintenance. This workflow comprises two primary steps: Selection of a role to maintain, referenced as [0114] numeral 82, and maintaining the selected user role, referenced as numeral 84. FIG. 17 is an example user interface 86 for selecting a role to maintain. FIG. 18 is an example user interface 88 for maintaining user roles. Table 12 defines example attributes for aspects of the user interface illustrated in FIGS. 17 and/or 18.
    TABLE 12
    Label Table/Field Mandatory Type Details and validation
    All fields are from the UserRoles table unless otherwise specified
    Role Name UserRoleName Mandatory Text Role names must be unique
    Role Available AvailableToExte Mandatory Dropdown Yes/No
    for external rnalCounsel
    counsel
    Number of users None Mandatory Read only The count of the number of
    having this users having this role
    role
    Menu permissions Tab
    All fields are from the RoleMenuPermissions table unless otherwise specified
    Main Menu MenuName Mandatory Read only
    Option
    Sub Menu Option SubMenuName Mandatory Read only
    Permissioned Permissiomed Mandatory Option Yes/No
    Screen Section permissions Tab
    All fields are from the RoleScreenSectionPermissions table unless otherwise specified
    Screen Number ScreenID Mandatory Read only
    Screen Name RoleScreenPermi Mandatory Read only
    ssions.ScreenNa
    me
    Screen Section SectionName Mandatory Read only
    Permissions PermissionID Mandatory Dropdown A dropdown of the
    following
    • No restrictions
    • No Update
    • No View/Execute
    Label Table/Field Mandatory Type Details and validation
    New Role Name UserRoles. Mandatory Text Role names must be unique
    UserRoleName
  • The ‘Save’ Button saves the changes to the role profile and returns the user to step [0115] 1. The ‘Cancel’ Button cancels all changes and returns the user to step 1. The ‘Delete’ Button only appears if the number of users for this role' dialogue. If they confirm they are sure, the role is deleted.
  • The ‘Copy’ Button will check that a role name has been entered and that it is unique. If both of these conditions are satisfied, a new role is created copying all of the permissions of the original role. There is no link between the new and original roles, unless the user observes some kind of naming convention e.g. [0116]
  • Customer User—Trademarks [0117]
  • Customer User—Trademarks—Paralegal [0118]
  • Customer User—Trademarks—Attorney [0119]
  • On completion of the create process, the user is returned to the [0120] Step 2 Maintain Role screen with the new role being the focus.
  • Tables 13 and 14 contain example menu level permissions and roles. [0121]
    TABLE 13
    Accessible to External
    Role Details Counsel
    Role 1 - System Technical Support No
    Role 2 - Super User No
    Role 3 - Customer User - All No
    Role 4 - Customer User - Trademarks No
    Role 5 - Customer User - Patents No
    Role 6 - Customer User - Conflicts No
    Role 7 - Customer User - Agreements No
    Role 8 - Not used No
    Role 9 - External Counsel - All Yes
    Role 10 - External Counsel - Trademarks Yes
    Role 11 - External Counsel - Patents Yes
    Role 12 - Not used No
    Role 13 - Not used No
    Role 14 - Customer Client No
  • [0122]
    TABLE 14
    Main Menu Role Role Role Role Role Role Role
    Item Sub Menu Item 1 2 Role 3 Role 4 Role 5 Role 6 Role 7 Role 8 Role 9 10 11 12 13 14
    Find TM Application
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Patent (phase 3)
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Search
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Domain Name
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Copyright
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Conflict
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Agreement
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Invoice
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Create TM Application
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Patent (Phase 3)
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Search
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Domain Name
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Copyright
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Conflict
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Agreement
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Invoice
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Maintain Brand
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Mark
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Invention (Phase
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    3)
    Agent
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Company
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Territory
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Users
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    User Roles
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Preferences User Preferences
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Edit Favouritas
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Change
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Password
    Add New User
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Add New User
    Figure US20040025048A1-20040205-P00801
    Figure US20040025048A1-20040205-P00801
    Role
  • FIG. 19 is a block diagram [0123] 90 illustrating a preferred entity relationship diagram setting forth user roles and access rights. The distributed legal workflow security computer system allows users, through one or more computers, to input system access privileges for one or more legal workflow participants based on one or more legal workflow role types. System users may associate permission privileges for a plurality of legal workflow graphical interface systems functions based on the legal workflow role types. Each system user or participant is allowed access to legal workflow graphical interface functionality according to the permission privileges associated with the participants respective legal workflow role types.
  • Third Party Interface Workflow
  • In one aspect of the present invention, a process is defined in which third parties update information on the collaborative legal workflow tool. Third parties are presented with the same collaborative legal workflow product. One difference may be that the permissioning on the screens will vary, as defined by business requirements. There are different types of permissioning that may be applied. For example, certain screens may not be available to certain third parties and/or third party users, and certain fields may be set to ‘Read Only’ or ‘No Execute’. [0124]
  • Third party subject areas and functionality in accordance with the present invention include, but is not limited to, trademark applications, trademark searches, conflicts, organizations, time recording, billing, invoicing, agreements, copyrights, domain names, patents, maintenance screen (e.g., brands and marks, territories, organizations, etc.), reporting and the implementation of tasks for third party diaries. [0125]
  • Third party law firms may see records where they have been instructed as an agent. This rule may apply where law firms are browsing through related records; i.e., they may only see related records where they are representing the Customer. [0126]
  • When a trademark is registered, the Registry Office may insist that a trademark is associated with other registered trademarks. This typically means that the same company may own the associated trademarks. However, certain territories do not necessarily associate registrations. Therefore, if a law firm operates in a territory where associations do not apply, then the “associations” drop window option should be set to ‘No Execute’. Law firms may be able to use a diary to raise ad hoc tasks for Customers. In addition to this, law firms may record event history. Law Firms may also receive tasks through the diary. [0127]
  • When a third party wishes to click through an underlying record, they should be able to click through to conflicts (read only) and trademark records where they are representing the customer, and all organizational records (read only). Third parties may not be able to click through invoices, agreements, copyrights, domain names and maintenance functions. Preferably, the screen design clearly shows the user what areas are read only. For the third party interfaces, “create” and “admin” functionality should be disabled. [0128]
  • FIG. 20 is an [0129] example user interface 92 for maintenance of legal workflow in the collaborative online workflow tool of the present invention. For demonstrative purposes, a “Maintain TM Details” page is illustrated. In one embodiment of the present invention, the following permissible sections, “Main TM Details” 94, “Verification” 96 and “Budget Name” 98, are accessible by the users to allow modification of the information stored in those fields. The remainder of the fields are permissioned to “Read Only” access.
  • It is understood that if the security privileges for these fields are set to “Read Only,” a user would be unable to modify any information. Additionally, the “charges” child window option should be set to ‘No Execute’. The save, delete, edit and law buttons for the following child windows should be set to ‘No Execute’: based on, basis for, conv.priority, renewal, use/tax, certificates, image, verification and internationals. It is also understood that the user interface can be modified to manage a variety of intellectual property matters, including patents, financial invoicing, trademarks, conflicts and agreements. [0130]
  • FIG. 21 illustrates an [0131] example user interface 100 for a child window of the trademark workflow record. The child window includes permissioned fields which allow modification of trademark information based on security permissions. In one embodiment of the present invention, the agent instructions 102 and application details 104 sections are set to allow modification of information by the user.
  • FIG. 22 illustrates an [0132] example user interface 106 for defining and presenting main conflict details. Preferably the conflict umbrella and charges child window menu options are set to ‘No Execute’. On all of the windows, the save, delete, edit and law buttons should be set to ‘No Execute’.
  • FIG. 23 illustrates a [0133] user interface 108 for defining organizational details. Preferably, the contact comments section is set to ‘No View’. The following child window menu option should also be set to ‘No Execute’: Law firm specialty, supplier info., verification and umbrella.
  • FIG. 24 illustrates an [0134] example user interface 110 for defining contact information. Preferably, the contact comments and contact comments-add sections are set to ‘No View’.
  • While the best mode for carrying out the invention has been described in detail, those familiar with the art to which this invention relates will recognize various alternative designs and embodiments for practicing the invention as defined by the following claims. [0135]

Claims (21)

What is claimed:
1. A computer system for distributed legal workflow security, the computer system providing central administration of legal workflow conducted by a plurality of distributed workflow participants, the system comprising a computer network including one or more computers operably programmed and configured to:
(i) receive input defining computer system access privileges for a plurality of distributed legal workflow participants;
(ii) receive input associating one or more legal workflow role types with one or more of the distributed legal workflow participants;
(iii) receive input associating permission privileges for a plurality of legal workflow graphical interface functionality with one or more of the legal workflow role types; and
(iv) provide legal workflow graphical interface functionality to the one or more distributed legal workflow participants according to the permission privileges associated with the participants respective legal workflow role types.
2. The system of claim 1 wherein the legal workflow includes intellectual property legal workflow.
3. The system of claim 2 wherein the intellectual property legal workflow includes patent legal workflow.
4. The system of claim 2 wherein the intellectual property legal workflow includes trademark legal workflow.
5. The system of claim 2 wherein the intellectual property legal workflow includes conflict legal workflow.
6. The system of claim 2 wherein the intellectual property legal workflow includes agreement legal workflow.
7. The system of claim 2 wherein the intellectual property legal workflow includes legal financial workflow.
8. The computer system of claim 1 wherein the permission privileges are selected from a group consisting of active, inactive, hidden, greyed, edit, no edit, add, delete and grant.
9. The computer system of claim 1 wherein the graphical interface functionality is selected from a group consisting of text, graphics, hyperlinks, form fields, buttons, drop-down lists, tables, menu items and page sections.
10. The computer system of claim 1 wherein the distributed legal workflow participants are selected from a group consisting of attorneys, support staff, customers, customer clients, internal employees and suppliers.
11. The computer system of claim 1 wherein the one or more computers are additionally programmed and configured to filter data records according to legal workflow role type.
12. The computer system of claim 1 wherein the one or more computers are additionally programmed and configured to filter data records according to distributed legal workflow participant.
13. The computer system of claim 1 wherein the permission privileges are associated based on a geographical location of the distributed legal workflow participants.
14. A method for providing legal workflow security conducted by a plurality of distributed workflow participants, the method comprising:
receiving input defining computer system access privileges for a plurality of distributed legal workflow participants;
receiving input associating one or more legal workflow role types with one or more of the distributed legal workflow participants;
receiving input associating permission privileges for a plurality of legal workflow graphical interface functionality with one or more of the legal workflow role types; and
providing legal workflow graphical interface functionality to the one or more distributed legal workflow participants according to the permission privileges associated with the participants respective legal workflow role types.
15. The method of claim 14 further comprising providing a computer network including one or more computers operably programmed and configured to input user access commands.
16. The method of claim 15 further comprising the step of filtering data records with the one or more computers according to legal work role type.
17. The method of claim 15 further comprising the step of filtering data records with the one or more computers according to distributed legal workflow participant.
18. The method of claim 15 further comprising the step of filtering data records with the one or more computers according based on a geographical location of the distributed legal workflow participants.
19. The method of claim 14 wherein the step of providing legal workflow graphical interface functionality comprises interfaces for intellectual property legal workflow.
20. The method of claim 14 wherein the step of receiving permission privileges further comprises inputting permission privileges selected from a group consisting of active, inactive, hidden, greyed, edit, no edit, add, delete and grant.
21. The method of claim 14 wherein the step of providing graphical interface functionality further comprises generating functionality selected from a group consisting of text, graphics, hyperlinks, form fields, buttons, drop-down lists, tables, menu items and page sections.
US10/441,941 2002-05-20 2003-05-20 Method and system for role-based access control to a collaborative online legal workflow tool Abandoned US20040025048A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US10/441,941 US20040025048A1 (en) 2002-05-20 2003-05-20 Method and system for role-based access control to a collaborative online legal workflow tool
US13/166,040 US8429723B2 (en) 2002-05-20 2011-06-22 Method and system for role-based access control to a collaborative online legal workflow tool

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US38184102P 2002-05-20 2002-05-20
US10/441,941 US20040025048A1 (en) 2002-05-20 2003-05-20 Method and system for role-based access control to a collaborative online legal workflow tool

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/166,040 Continuation US8429723B2 (en) 2002-05-20 2011-06-22 Method and system for role-based access control to a collaborative online legal workflow tool

Publications (1)

Publication Number Publication Date
US20040025048A1 true US20040025048A1 (en) 2004-02-05

Family

ID=31191076

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/441,941 Abandoned US20040025048A1 (en) 2002-05-20 2003-05-20 Method and system for role-based access control to a collaborative online legal workflow tool
US13/166,040 Expired - Lifetime US8429723B2 (en) 2002-05-20 2011-06-22 Method and system for role-based access control to a collaborative online legal workflow tool

Family Applications After (1)

Application Number Title Priority Date Filing Date
US13/166,040 Expired - Lifetime US8429723B2 (en) 2002-05-20 2011-06-22 Method and system for role-based access control to a collaborative online legal workflow tool

Country Status (1)

Country Link
US (2) US20040025048A1 (en)

Cited By (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050015293A1 (en) * 2003-07-16 2005-01-20 International Business Machines Corporation Collaboration enhanced workflow system
US20050027585A1 (en) * 2003-05-07 2005-02-03 Sap Ag End user oriented workflow approach including structured processing of ad hoc workflows with a collaborative process engine
US20050197883A1 (en) * 2004-03-08 2005-09-08 Sap Aktiengesellschaft Method and system for classifying retail products and services using characteristic-based grouping structures
US20050235020A1 (en) * 2004-04-16 2005-10-20 Sap Aktiengesellschaft Allocation table generation from assortment planning
EP1619618A1 (en) * 2004-07-19 2006-01-25 Sap Ag Method, computer system and computer program product for running a business application
US20060059031A1 (en) * 2004-08-06 2006-03-16 Sap Aktiengesellschaft Risk management
US20060136495A1 (en) * 2004-12-16 2006-06-22 Sap Ag Review mechanism for controlling the delegation of tasks in a workflow system
US20060235964A1 (en) * 2005-04-19 2006-10-19 Childress Rhonda L Policy based auditing of workflows
EP1720123A1 (en) * 2005-05-03 2006-11-08 Sap Ag Method and system for automated generation of access control policies in cross-organizational workflows
US20060277542A1 (en) * 2005-05-19 2006-12-07 Novell, Inc. System and method for creating a customized installation on demand
US20070016465A1 (en) * 2005-07-15 2007-01-18 Sap Aktiengesellschaft Mechanism to control delegation and revocation of tasks in workflow system
WO2007019169A2 (en) * 2005-08-05 2007-02-15 Lehman Brothers Inc. Method and system for workflow management of electronic documents
WO2007062523A1 (en) * 2005-12-01 2007-06-07 Sanjeev Kaila Business practice management system
US20070174083A1 (en) * 2004-04-01 2007-07-26 Leo Software, Inc. Method of Presenting Leasing Arrangements
US20070214272A1 (en) * 2006-03-07 2007-09-13 Novell, Inc. Light-weight multi-user browser
US20070261103A1 (en) * 2006-05-02 2007-11-08 Steven Viavant Method and apparatus for imposing quorum-based access control in a computer system
US20080052706A1 (en) * 2006-08-22 2008-02-28 Novell, Inc. System and method for creating a pattern installation by cloning software installed another computer
US20080114810A1 (en) * 2006-11-13 2008-05-15 Microsoft Corporation Declarative data binding and data type propagation in a remote workflow schedule authoring system
US20080178075A1 (en) * 2007-01-22 2008-07-24 Fmr Corp. Configuration Data Store for Overriding a Web Application Configuration Involving Multiple Customers
US20080182555A1 (en) * 2006-12-08 2008-07-31 Rodrigo Madanes Communication system
US20080313716A1 (en) * 2007-06-12 2008-12-18 Park Joon S Role-based access control to computing resources in an inter-organizational community
US20080319770A1 (en) * 2007-06-19 2008-12-25 Sap Ag Replenishment planning management
US7490072B1 (en) 2005-02-16 2009-02-10 Novell, Inc. Providing access controls
US7529756B1 (en) * 1998-07-21 2009-05-05 West Services, Inc. System and method for processing formatted text documents in a database
US20090187453A1 (en) * 2008-01-17 2009-07-23 Stephen Dill Method for evolving shared to-do lists into business processes
US7778954B2 (en) 1998-07-21 2010-08-17 West Publishing Corporation Systems, methods, and software for presenting legal case histories
US20100223557A1 (en) * 2009-02-28 2010-09-02 Adam Kenney Method and system for workflow integration
US20100235268A1 (en) * 2005-09-07 2010-09-16 Sap Ag Focused retrieval of selected data in a call center environment
US20100281512A1 (en) * 2008-06-27 2010-11-04 Bank Of America Corporation Dynamic community generator
CN102034289A (en) * 2010-12-15 2011-04-27 广州致远电子有限公司 Graphical programmable security linkage system
US20120096521A1 (en) * 2010-10-13 2012-04-19 Salesforce.Com, Inc. Methods and systems for provisioning access to customer organization data in a multi-tenant system
US20120110490A1 (en) * 2010-10-29 2012-05-03 Rockwell Automation Technologies, Inc. Dynamic menu for device specific graphical user interface presentations
US20120167178A1 (en) * 2010-12-22 2012-06-28 Alexander Rauh Metadata Container-Based User Interface Flexibility
US8219807B1 (en) 2004-12-17 2012-07-10 Novell, Inc. Fine grained access control for linux services
US8271785B1 (en) 2004-12-20 2012-09-18 Novell, Inc. Synthesized root privileges
US20120239708A1 (en) * 2007-09-28 2012-09-20 Microsoft Corporation Distributed storage for collaboration servers
US8352935B2 (en) 2005-05-19 2013-01-08 Novell, Inc. System for creating a customized software distribution based on user requirements
US20130047090A1 (en) * 2004-10-01 2013-02-21 Salesforce.Com, Inc. Multiple stakeholders for a single business process
US20140215604A1 (en) * 2013-01-31 2014-07-31 International Business Machines Corporation Automated role adjustment in a computer system
US20140278727A1 (en) * 2013-03-15 2014-09-18 Anaqua, Inc. Intellectual asset family creation
US20150227689A1 (en) * 2014-02-07 2015-08-13 Siemens Medical Solutions Usa, Inc. Efficient Framework for Healthcare Order Entry
US20160094414A1 (en) * 2013-05-15 2016-03-31 Client Lifecycle Solutions LLC System, method and computer-implemented algorithm for client lifecycle exchange management
US20170293890A1 (en) * 2014-09-30 2017-10-12 Bizagi Group Contextual workflow management
US20170302679A1 (en) * 2016-02-15 2017-10-19 Luigius Caramico Methods and systems of dual-layer computer-system security
US10178050B2 (en) 2004-05-19 2019-01-08 Salesforce.Com, Inc. Techniques for providing connections to services in a network environment
US10218815B2 (en) * 2013-03-13 2019-02-26 Unify Gmbh & Co. Kg Method, device, and system for communicating a changeability attribute
US10560412B2 (en) * 2016-09-23 2020-02-11 Microsoft Technology Licensing, Llc Recipient verification
WO2020174373A1 (en) * 2019-02-26 2020-09-03 Vanpuymbrouck Darren Methods and systems to facilitate discovery of relevant outside counsel
US20210082066A1 (en) * 2019-09-17 2021-03-18 Legal Facts, LLC Legal matter progress management systems and methods
US10956868B1 (en) * 2020-06-29 2021-03-23 5th Kind LLC Virtual reality collaborative workspace that is dynamically generated from a digital asset management workflow
US11070626B2 (en) 2001-03-30 2021-07-20 Salesforce.Com, Inc. Managing messages sent between services
US20220277107A1 (en) * 2021-03-01 2022-09-01 Fortanix, Inc. Confidential computing workflows

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9111102B2 (en) 2012-09-17 2015-08-18 Microsoft Technology Licensing, Llc Creation of security roles through user walkthrough of business process workflow
US9563617B2 (en) * 2013-09-23 2017-02-07 Oracle International Corporation Custom validation of values for fields of submitted forms
AU2017217235B2 (en) * 2016-02-11 2022-05-26 Global Software Innovation Pty Ltd Systems and methods for securing an entity-relationship system
US11218490B2 (en) 2019-04-04 2022-01-04 Microsoft Technology Licensing, Llc System and method for directory decentralization

Citations (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5175681A (en) * 1985-12-27 1992-12-29 Sony Corporation Computerized system for managing preparation and prosecution of applications in various countries for protection of industrial property rights
US5247661A (en) * 1990-09-10 1993-09-21 International Business Machines Corporation Method and apparatus for automated document distribution in a data processing system
US5276869A (en) * 1990-09-10 1994-01-04 International Business Machines Corporation System for selecting document recipients as determined by technical content of document and for electronically corroborating receipt of document
US5297039A (en) * 1991-01-30 1994-03-22 Mitsubishi Denki Kabushiki Kaisha Text search system for locating on the basis of keyword matching and keyword relationship matching
US5317683A (en) * 1990-09-10 1994-05-31 International Business Machines Corporation Method and apparatus for automated meeting agenda generation in a data processing system
US5329447A (en) * 1992-03-12 1994-07-12 Leedom Jr Charles M High integrity computer implemented docketing system
US5377355A (en) * 1990-09-10 1994-12-27 International Business Machines Corporation Method and apparatus for automated procedure initiation in a data processing system including soliciting an evaluation vote from users automatically determined in response to identification of a functional area associated with a document
US5418802A (en) * 1993-11-12 1995-05-23 Eastman Kodak Company Frequency tunable waveguide extended cavity laser
US5721910A (en) * 1996-06-04 1998-02-24 Exxon Research And Engineering Company Relational database system containing a multidimensional hierachical model of interrelated subject categories with recognition capabilities
US5737395A (en) * 1991-10-28 1998-04-07 Centigram Communications Corporation System and method for integrating voice, facsimile and electronic mail data through a personal computer
US5754840A (en) * 1996-01-23 1998-05-19 Smartpatents, Inc. System, method, and computer program product for developing and maintaining documents which includes analyzing a patent application with regards to the specification and claims
US5758095A (en) * 1995-02-24 1998-05-26 Albaum; David Interactive medication ordering system
US5794236A (en) * 1996-05-29 1998-08-11 Lexis-Nexis Computer-based system for classifying documents into a hierarchy and linking the classifications to the hierarchy
US5875431A (en) * 1996-03-15 1999-02-23 Heckman; Frank Legal strategic analysis planning and evaluation control system and method
US5930788A (en) * 1997-07-17 1999-07-27 Oracle Corporation Disambiguation of themes in a document classification system
US5956687A (en) * 1997-04-04 1999-09-21 Wamsley; Vaughn A. Personal injury claim management system
US5987464A (en) * 1996-07-26 1999-11-16 Schneider; Eric Method and system for periodically updating data records having an expiry time
US5991751A (en) * 1997-06-02 1999-11-23 Smartpatents, Inc. System, method, and computer program product for patent-centric and group-oriented data processing
US6038561A (en) * 1996-10-15 2000-03-14 Manning & Napier Information Services Management and analysis of document information text
US6041303A (en) * 1996-06-07 2000-03-21 Mathews; Edward Henry Method of assisting the conducting of a research project
US6073108A (en) * 1996-06-21 2000-06-06 Paul, Hastings, Janofsky & Walker Task-based classification and analysis system
US6157947A (en) * 1998-02-09 2000-12-05 Fujitsu Limited Method, apparatus, system, and program storage device for distributing intellectual property
US20020035504A1 (en) * 2000-08-16 2002-03-21 Alyssa Dver Lead suspect management
US20020099787A1 (en) * 2001-01-12 2002-07-25 3Com Corporation Distributed configuration management on a network
US6434580B1 (en) * 1997-10-24 2002-08-13 Nec Corporation System, method, and recording medium for drafting and preparing patent specifications
US20020111824A1 (en) * 2000-11-27 2002-08-15 First To File, Inc. Method of defining workflow rules for managing intellectual property
US20020161733A1 (en) * 2000-11-27 2002-10-31 First To File, Inc. Method of creating electronic prosecution experience for patent applicant
US6496853B1 (en) * 1999-07-12 2002-12-17 Micron Technology, Inc. Method and system for managing related electronic messages
US6501950B1 (en) * 1996-03-14 2002-12-31 Bellsouth Intellectual Property Corporation Systems and methods for monitoring data signals on a communications network
US20030009345A1 (en) * 2000-07-17 2003-01-09 Thorpe Kenneth J. System and method for communication and processing of legal document based on geographic area
US20030172020A1 (en) * 2001-11-19 2003-09-11 Davies Nigel Paul Integrated intellectual asset management system and method
US20030212818A1 (en) * 2002-05-08 2003-11-13 Johannes Klein Content based message dispatch
US6745197B2 (en) * 2001-03-19 2004-06-01 Preston Gates Ellis Llp System and method for efficiently processing messages stored in multiple message stores
US6829611B2 (en) * 2000-12-29 2004-12-07 Bellsouth Intellectual Property Corporation Data loader application
US6839707B2 (en) * 2001-01-17 2005-01-04 General Electric Company Web-based system and method for managing legal information
US6912549B2 (en) * 2001-09-05 2005-06-28 Siemens Medical Solutions Health Services Corporation System for processing and consolidating records
US7181488B2 (en) * 2001-06-29 2007-02-20 Claria Corporation System, method and computer program product for presenting information to a user utilizing historical information about the user
US20070168871A1 (en) * 1998-10-16 2007-07-19 Haynes And Boone, L.L.P. Web-enabled transaction and collaborative management system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6963920B1 (en) * 1993-11-19 2005-11-08 Rose Blush Software Llc Intellectual asset protocol for defining data exchange rules and formats for universal intellectual asset documents, and systems, methods, and computer program products related to same

Patent Citations (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5175681A (en) * 1985-12-27 1992-12-29 Sony Corporation Computerized system for managing preparation and prosecution of applications in various countries for protection of industrial property rights
US5377355A (en) * 1990-09-10 1994-12-27 International Business Machines Corporation Method and apparatus for automated procedure initiation in a data processing system including soliciting an evaluation vote from users automatically determined in response to identification of a functional area associated with a document
US5247661A (en) * 1990-09-10 1993-09-21 International Business Machines Corporation Method and apparatus for automated document distribution in a data processing system
US5276869A (en) * 1990-09-10 1994-01-04 International Business Machines Corporation System for selecting document recipients as determined by technical content of document and for electronically corroborating receipt of document
US5317683A (en) * 1990-09-10 1994-05-31 International Business Machines Corporation Method and apparatus for automated meeting agenda generation in a data processing system
US5297039A (en) * 1991-01-30 1994-03-22 Mitsubishi Denki Kabushiki Kaisha Text search system for locating on the basis of keyword matching and keyword relationship matching
US5737395A (en) * 1991-10-28 1998-04-07 Centigram Communications Corporation System and method for integrating voice, facsimile and electronic mail data through a personal computer
US5329447A (en) * 1992-03-12 1994-07-12 Leedom Jr Charles M High integrity computer implemented docketing system
US5418802A (en) * 1993-11-12 1995-05-23 Eastman Kodak Company Frequency tunable waveguide extended cavity laser
US5758095A (en) * 1995-02-24 1998-05-26 Albaum; David Interactive medication ordering system
US5754840A (en) * 1996-01-23 1998-05-19 Smartpatents, Inc. System, method, and computer program product for developing and maintaining documents which includes analyzing a patent application with regards to the specification and claims
US6014663A (en) * 1996-01-23 2000-01-11 Aurigin Systems, Inc. System, method, and computer program product for comparing text portions by reference to index information
US6501950B1 (en) * 1996-03-14 2002-12-31 Bellsouth Intellectual Property Corporation Systems and methods for monitoring data signals on a communications network
US7027809B1 (en) * 1996-03-14 2006-04-11 Bellsouth Intellectual Property Corporation Systems and methods for providing visibility to SS7 integrated on-line networks
US5875431A (en) * 1996-03-15 1999-02-23 Heckman; Frank Legal strategic analysis planning and evaluation control system and method
US5794236A (en) * 1996-05-29 1998-08-11 Lexis-Nexis Computer-based system for classifying documents into a hierarchy and linking the classifications to the hierarchy
US5721910A (en) * 1996-06-04 1998-02-24 Exxon Research And Engineering Company Relational database system containing a multidimensional hierachical model of interrelated subject categories with recognition capabilities
US6041303A (en) * 1996-06-07 2000-03-21 Mathews; Edward Henry Method of assisting the conducting of a research project
US6073108A (en) * 1996-06-21 2000-06-06 Paul, Hastings, Janofsky & Walker Task-based classification and analysis system
US5987464A (en) * 1996-07-26 1999-11-16 Schneider; Eric Method and system for periodically updating data records having an expiry time
US6038561A (en) * 1996-10-15 2000-03-14 Manning & Napier Information Services Management and analysis of document information text
US5956687A (en) * 1997-04-04 1999-09-21 Wamsley; Vaughn A. Personal injury claim management system
US5991751A (en) * 1997-06-02 1999-11-23 Smartpatents, Inc. System, method, and computer program product for patent-centric and group-oriented data processing
US5930788A (en) * 1997-07-17 1999-07-27 Oracle Corporation Disambiguation of themes in a document classification system
US6434580B1 (en) * 1997-10-24 2002-08-13 Nec Corporation System, method, and recording medium for drafting and preparing patent specifications
US6157947A (en) * 1998-02-09 2000-12-05 Fujitsu Limited Method, apparatus, system, and program storage device for distributing intellectual property
US20070168871A1 (en) * 1998-10-16 2007-07-19 Haynes And Boone, L.L.P. Web-enabled transaction and collaborative management system
US6496853B1 (en) * 1999-07-12 2002-12-17 Micron Technology, Inc. Method and system for managing related electronic messages
US20030009345A1 (en) * 2000-07-17 2003-01-09 Thorpe Kenneth J. System and method for communication and processing of legal document based on geographic area
US20020035504A1 (en) * 2000-08-16 2002-03-21 Alyssa Dver Lead suspect management
US20020161733A1 (en) * 2000-11-27 2002-10-31 First To File, Inc. Method of creating electronic prosecution experience for patent applicant
US20020111824A1 (en) * 2000-11-27 2002-08-15 First To File, Inc. Method of defining workflow rules for managing intellectual property
US6829611B2 (en) * 2000-12-29 2004-12-07 Bellsouth Intellectual Property Corporation Data loader application
US20020099787A1 (en) * 2001-01-12 2002-07-25 3Com Corporation Distributed configuration management on a network
US6839707B2 (en) * 2001-01-17 2005-01-04 General Electric Company Web-based system and method for managing legal information
US6745197B2 (en) * 2001-03-19 2004-06-01 Preston Gates Ellis Llp System and method for efficiently processing messages stored in multiple message stores
US7181488B2 (en) * 2001-06-29 2007-02-20 Claria Corporation System, method and computer program product for presenting information to a user utilizing historical information about the user
US6912549B2 (en) * 2001-09-05 2005-06-28 Siemens Medical Solutions Health Services Corporation System for processing and consolidating records
US20030172020A1 (en) * 2001-11-19 2003-09-11 Davies Nigel Paul Integrated intellectual asset management system and method
US20030212818A1 (en) * 2002-05-08 2003-11-13 Johannes Klein Content based message dispatch

Cited By (101)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8600974B2 (en) 1998-07-21 2013-12-03 West Services Inc. System and method for processing formatted text documents in a database
US20100005388A1 (en) * 1998-07-21 2010-01-07 Bob Haschart System and method for processing formatted text documents in a database
US7529756B1 (en) * 1998-07-21 2009-05-05 West Services, Inc. System and method for processing formatted text documents in a database
US7778954B2 (en) 1998-07-21 2010-08-17 West Publishing Corporation Systems, methods, and software for presenting legal case histories
US8661066B2 (en) 1998-07-21 2014-02-25 West Service, Inc. Systems, methods, and software for presenting legal case histories
US8250118B2 (en) 1998-07-21 2012-08-21 West Services, Inc. Systems, methods, and software for presenting legal case histories
US11070626B2 (en) 2001-03-30 2021-07-20 Salesforce.Com, Inc. Managing messages sent between services
US7885847B2 (en) * 2003-05-07 2011-02-08 Sap Ag End user oriented workflow approach including structured processing of ad hoc workflows with a collaborative process engine
US20050027585A1 (en) * 2003-05-07 2005-02-03 Sap Ag End user oriented workflow approach including structured processing of ad hoc workflows with a collaborative process engine
US20050015293A1 (en) * 2003-07-16 2005-01-20 International Business Machines Corporation Collaboration enhanced workflow system
US20050197883A1 (en) * 2004-03-08 2005-09-08 Sap Aktiengesellschaft Method and system for classifying retail products and services using characteristic-based grouping structures
US8788372B2 (en) 2004-03-08 2014-07-22 Sap Aktiengesellschaft Method and system for classifying retail products and services using characteristic-based grouping structures
US8041737B2 (en) * 2004-04-01 2011-10-18 Leo Software, Inc. Method of presenting leasing arrangements
US20070174083A1 (en) * 2004-04-01 2007-07-26 Leo Software, Inc. Method of Presenting Leasing Arrangements
US20050235020A1 (en) * 2004-04-16 2005-10-20 Sap Aktiengesellschaft Allocation table generation from assortment planning
US8655697B2 (en) 2004-04-16 2014-02-18 Sap Aktiengesellschaft Allocation table generation from assortment planning
US11483258B2 (en) 2004-05-19 2022-10-25 Salesforce, Inc. Techniques for providing connections to services in a network environment
US10178050B2 (en) 2004-05-19 2019-01-08 Salesforce.Com, Inc. Techniques for providing connections to services in a network environment
US10778611B2 (en) 2004-05-19 2020-09-15 Salesforce.Com, Inc. Techniques for providing connections to services in a network environment
EP1619618A1 (en) * 2004-07-19 2006-01-25 Sap Ag Method, computer system and computer program product for running a business application
US20060059031A1 (en) * 2004-08-06 2006-03-16 Sap Aktiengesellschaft Risk management
US9792002B2 (en) * 2004-10-01 2017-10-17 Salesforce.Com, Inc. Multiple stakeholders for a single business process
US11042271B2 (en) 2004-10-01 2021-06-22 Salesforce.Com, Inc. Multiple stakeholders for a single business process
US11941230B2 (en) 2004-10-01 2024-03-26 Salesforce, Inc. Multiple stakeholders for a single business process
US9645712B2 (en) 2004-10-01 2017-05-09 Grand Central Communications, Inc. Multiple stakeholders for a single business process
US20130047090A1 (en) * 2004-10-01 2013-02-21 Salesforce.Com, Inc. Multiple stakeholders for a single business process
US7831978B2 (en) 2004-12-16 2010-11-09 Sap Ag Review mechanism for controlling the delegation of tasks in a workflow system
US20060136495A1 (en) * 2004-12-16 2006-06-22 Sap Ag Review mechanism for controlling the delegation of tasks in a workflow system
US8219807B1 (en) 2004-12-17 2012-07-10 Novell, Inc. Fine grained access control for linux services
US8271785B1 (en) 2004-12-20 2012-09-18 Novell, Inc. Synthesized root privileges
US7490072B1 (en) 2005-02-16 2009-02-10 Novell, Inc. Providing access controls
US8214398B1 (en) * 2005-02-16 2012-07-03 Emc Corporation Role based access controls
US7769807B2 (en) * 2005-04-19 2010-08-03 International Business Machines Corporation Policy based auditing of workflows
US9444786B2 (en) 2005-04-19 2016-09-13 Servicenow, Inc. Policy based auditing of workflows
US20090019123A1 (en) * 2005-04-19 2009-01-15 Rhonda L Childress Session Management Enhancements for Instant Messaging Applications
US20060235964A1 (en) * 2005-04-19 2006-10-19 Childress Rhonda L Policy based auditing of workflows
US8230042B2 (en) 2005-04-19 2012-07-24 International Business Machines Corporation Policy based auditing of workflows
EP1720123A1 (en) * 2005-05-03 2006-11-08 Sap Ag Method and system for automated generation of access control policies in cross-organizational workflows
US20060253314A1 (en) * 2005-05-03 2006-11-09 Yevgen Reznichenko Automated generation of access control policies in cross-organizational workflow
US8744892B2 (en) 2005-05-03 2014-06-03 Sap Ag Automated generation of access control policies in cross-organizational workflow
US8352935B2 (en) 2005-05-19 2013-01-08 Novell, Inc. System for creating a customized software distribution based on user requirements
US8074214B2 (en) 2005-05-19 2011-12-06 Oracle International Corporation System for creating a customized software installation on demand
US8468518B2 (en) 2005-05-19 2013-06-18 Oracle International Corporation System and method for creating a customized installation on demand
US20060277542A1 (en) * 2005-05-19 2006-12-07 Novell, Inc. System and method for creating a customized installation on demand
US8620713B2 (en) 2005-07-15 2013-12-31 Sap Ag Mechanism to control delegation and revocation of tasks in workflow system
US20070016465A1 (en) * 2005-07-15 2007-01-18 Sap Aktiengesellschaft Mechanism to control delegation and revocation of tasks in workflow system
WO2007019169A2 (en) * 2005-08-05 2007-02-15 Lehman Brothers Inc. Method and system for workflow management of electronic documents
WO2007019169A3 (en) * 2005-08-05 2007-11-29 Lehman Brothers Inc Method and system for workflow management of electronic documents
US20070088958A1 (en) * 2005-08-05 2007-04-19 Lehman Brothers Inc. Method and system for workflow management of electronic documents
US8068603B2 (en) 2005-09-07 2011-11-29 Sap Ag Focused retrieval of selected data in a call center environment
US20100235268A1 (en) * 2005-09-07 2010-09-16 Sap Ag Focused retrieval of selected data in a call center environment
WO2007062523A1 (en) * 2005-12-01 2007-06-07 Sanjeev Kaila Business practice management system
US8676973B2 (en) 2006-03-07 2014-03-18 Novell Intellectual Property Holdings, Inc. Light-weight multi-user browser
US20070214272A1 (en) * 2006-03-07 2007-09-13 Novell, Inc. Light-weight multi-user browser
US7975288B2 (en) * 2006-05-02 2011-07-05 Oracle International Corporation Method and apparatus for imposing quorum-based access control in a computer system
US20070261103A1 (en) * 2006-05-02 2007-11-08 Steven Viavant Method and apparatus for imposing quorum-based access control in a computer system
US7730480B2 (en) 2006-08-22 2010-06-01 Novell, Inc. System and method for creating a pattern installation by cloning software installed another computer
US20080052706A1 (en) * 2006-08-22 2008-02-28 Novell, Inc. System and method for creating a pattern installation by cloning software installed another computer
US20080115195A1 (en) * 2006-11-13 2008-05-15 Microsoft Corporation Remote workflow schedule authoring
US20080114810A1 (en) * 2006-11-13 2008-05-15 Microsoft Corporation Declarative data binding and data type propagation in a remote workflow schedule authoring system
US8146017B2 (en) 2006-11-13 2012-03-27 Microsoft Corporation Declarative data binding and data type propagation in a remote workflow schedule authoring system
US20080182555A1 (en) * 2006-12-08 2008-07-31 Rodrigo Madanes Communication system
US8667136B2 (en) * 2006-12-08 2014-03-04 Skype Communication system
US20080181199A1 (en) * 2006-12-08 2008-07-31 Rodrigo Madanes Communication system
US20080178075A1 (en) * 2007-01-22 2008-07-24 Fmr Corp. Configuration Data Store for Overriding a Web Application Configuration Involving Multiple Customers
US20080313716A1 (en) * 2007-06-12 2008-12-18 Park Joon S Role-based access control to computing resources in an inter-organizational community
US9769177B2 (en) 2007-06-12 2017-09-19 Syracuse University Role-based access control to computing resources in an inter-organizational community
US20080319770A1 (en) * 2007-06-19 2008-12-25 Sap Ag Replenishment planning management
US8099337B2 (en) 2007-06-19 2012-01-17 Sap Ag Replenishment planning management
US8650216B2 (en) * 2007-09-28 2014-02-11 Microsoft Corporation Distributed storage for collaboration servers
US20120239708A1 (en) * 2007-09-28 2012-09-20 Microsoft Corporation Distributed storage for collaboration servers
US9922295B2 (en) * 2008-01-17 2018-03-20 International Business Machines Corporation Method for evolving shared to-do lists into business processes
US20090187453A1 (en) * 2008-01-17 2009-07-23 Stephen Dill Method for evolving shared to-do lists into business processes
US8316453B2 (en) * 2008-06-27 2012-11-20 Bank Of America Corporation Dynamic community generator
US20100281512A1 (en) * 2008-06-27 2010-11-04 Bank Of America Corporation Dynamic community generator
US20100223557A1 (en) * 2009-02-28 2010-09-02 Adam Kenney Method and system for workflow integration
WO2010098864A3 (en) * 2009-02-28 2013-05-10 Master Data Center, Inc. Method and system for workflow integration
US8949939B2 (en) * 2010-10-13 2015-02-03 Salesforce.Com, Inc. Methods and systems for provisioning access to customer organization data in a multi-tenant system
US20120096521A1 (en) * 2010-10-13 2012-04-19 Salesforce.Com, Inc. Methods and systems for provisioning access to customer organization data in a multi-tenant system
US9596246B2 (en) 2010-10-13 2017-03-14 Salesforce.Com, Inc. Provisioning access to customer organization data in a multi-tenant system
US20120110490A1 (en) * 2010-10-29 2012-05-03 Rockwell Automation Technologies, Inc. Dynamic menu for device specific graphical user interface presentations
CN102034289A (en) * 2010-12-15 2011-04-27 广州致远电子有限公司 Graphical programmable security linkage system
US8707398B2 (en) * 2010-12-22 2014-04-22 Sap Ag Metadata container-based user interface flexibility
US20120167178A1 (en) * 2010-12-22 2012-06-28 Alexander Rauh Metadata Container-Based User Interface Flexibility
US9087148B2 (en) * 2013-01-31 2015-07-21 International Business Machines Corporation Automated role adjustment in a computer system
US20140215604A1 (en) * 2013-01-31 2014-07-31 International Business Machines Corporation Automated role adjustment in a computer system
US10218815B2 (en) * 2013-03-13 2019-02-26 Unify Gmbh & Co. Kg Method, device, and system for communicating a changeability attribute
US11240346B2 (en) 2013-03-13 2022-02-01 Unify Gmbh & Co. Kg Method, device, and system for communicating a changeability attribute
US10068300B2 (en) * 2013-03-15 2018-09-04 Anaqua, Inc. Intellectual asset family creation
US20140278727A1 (en) * 2013-03-15 2014-09-18 Anaqua, Inc. Intellectual asset family creation
US20160094414A1 (en) * 2013-05-15 2016-03-31 Client Lifecycle Solutions LLC System, method and computer-implemented algorithm for client lifecycle exchange management
US20150227689A1 (en) * 2014-02-07 2015-08-13 Siemens Medical Solutions Usa, Inc. Efficient Framework for Healthcare Order Entry
US20170293890A1 (en) * 2014-09-30 2017-10-12 Bizagi Group Contextual workflow management
US11611564B2 (en) * 2016-02-15 2023-03-21 Luigius Caramico Methods and systems of dual-layer computer-system security
US20170302679A1 (en) * 2016-02-15 2017-10-19 Luigius Caramico Methods and systems of dual-layer computer-system security
US10560412B2 (en) * 2016-09-23 2020-02-11 Microsoft Technology Licensing, Llc Recipient verification
WO2020174373A1 (en) * 2019-02-26 2020-09-03 Vanpuymbrouck Darren Methods and systems to facilitate discovery of relevant outside counsel
US20210082066A1 (en) * 2019-09-17 2021-03-18 Legal Facts, LLC Legal matter progress management systems and methods
US10956868B1 (en) * 2020-06-29 2021-03-23 5th Kind LLC Virtual reality collaborative workspace that is dynamically generated from a digital asset management workflow
US20220277107A1 (en) * 2021-03-01 2022-09-01 Fortanix, Inc. Confidential computing workflows
US11481515B2 (en) * 2021-03-01 2022-10-25 Fortanix, Inc. Confidential computing workflows

Also Published As

Publication number Publication date
US8429723B2 (en) 2013-04-23
US20110252333A1 (en) 2011-10-13

Similar Documents

Publication Publication Date Title
US8429723B2 (en) Method and system for role-based access control to a collaborative online legal workflow tool
US9313207B2 (en) Apparatus and method for access validation
US8374944B2 (en) Method and system for enabling collaboration between advisors and clients
JP5671222B2 (en) Inter-company collaboration overlay solution for professional social networks
US6697865B1 (en) Managing relationships of parties interacting on a network
US6886101B2 (en) Privacy service
US10747713B2 (en) Vendor/client information system architecture
US8296200B2 (en) Collaborative financial close portal
US20170132200A1 (en) Method, System, and Medium for Workflow Management of Document Processing
US20160100019A1 (en) Contextual Presence Systems and Methods
US20140012616A1 (en) Systems and methods for new location task completion and enterprise-wide project initiative tracking
US20060041436A1 (en) System, method, service method, and program product for managing entitlement with identity and privacy applications for electronic commerce
US20150026760A1 (en) System and Method for Policy-Based Confidentiality Management
KR20010111786A (en) Telecommunication system capable of digital signature, business management and schedule management, and operating method thereof
US20170103231A1 (en) System and method for distributed, policy-based confidentiality management
US9292890B2 (en) Method and system for providing case update notifications
Stevanovic et al. Data protection impact assessment-an initial guide for communities
US8490182B2 (en) Apparatus and approach for electronic data management, processing and implementation
Determann Determann's field guide to international data privacy law compliance
Stevanovic et al. DNA3. 1-Report on the coordination of accounting data sharing amongst Infrastructures (initial phase)
Page et al. Culture-Minded GDPR Recommendations for an NGO
JP2003157304A (en) Work site supporting method and system
Hemsoth Security policies: The foundation for information protection
US20090063173A1 (en) Subject Matter Management System &#39;SMMS&#39;
Cholewka A prototype design for RBAC in a workflow environment

Legal Events

Date Code Title Description
AS Assignment

Owner name: FORD MOTOR COMPANY, MICHIGAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PORCARI, DAMIAN O.;DINSDALE, DAVID;REEL/FRAME:014020/0120;SIGNING DATES FROM 20030701 TO 20030720

AS Assignment

Owner name: FORD GLOBAL TECHNOLOGIES, LLC, MICHIGAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FORD MOTOR COMPANY;REEL/FRAME:016092/0639

Effective date: 20050418

Owner name: BATMARK LIMITED, UNITED KINGDOM

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FORD GLOBAL TECHNOLOGIES, LLC;REEL/FRAME:016092/0792

Effective date: 20040418

Owner name: FORD GLOBAL TECHNOLOGIES, LLC, MICHIGAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FORD GLOBAL TECHNOLOGIES, LLC;REEL/FRAME:016092/0792

Effective date: 20040418

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION

AS Assignment

Owner name: ANAQUA, INC., MASSACHUSETTS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BATMARK LIMITED;REEL/FRAME:030677/0872

Effective date: 20130611

Owner name: ANAQUA, INC., MASSACHUSETTS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BATMARK LIMITED;REEL/FRAME:030678/0010

Effective date: 20130611

Owner name: ANAQUA, INC., MASSACHUSETTS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BATMARK LIMITED;REEL/FRAME:030677/0409

Effective date: 20130611

AS Assignment

Owner name: ANAQUA, INC., MASSACHUSETTS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FORD GLOBAL TECHNOLOGIES, LLC;FORD MOTOR COMPANY;REEL/FRAME:030745/0694

Effective date: 20130621