Method and system for automated document registration
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-017/30
출원번호
US-0638268
(2009-12-15)
등록번호
US-8341141
(2012-12-25)
발명자
/ 주소
Krislov, Clinton A.
출원인 / 주소
Krislov, Clinton A.
대리인 / 주소
Lesavich High-Tech Law Group, P.C.
인용정보
피인용 횟수 :
21인용 특허 :
76
초록▼
A method and system for automated document registration. The method and system provide an automatic document registration system that creates a secure transformed electronic document with an unalterable time and date stamp. Multiple third-parties are provided an ability to view a given original docu
A method and system for automated document registration. The method and system provide an automatic document registration system that creates a secure transformed electronic document with an unalterable time and date stamp. Multiple third-parties are provided an ability to view a given original document in secure transformed electronic document format and each original individual document is provided with a unique set of approved third-party viewer/receivers/auditors via a virtual matrixed file system.
대표청구항▼
1. A method for automatic registration of electronic documents, comprising: receiving an original electronic document via a first application stored in a non-transitory computer readable medium on a target network device with one or more processors;automatically applying via the first application a
1. A method for automatic registration of electronic documents, comprising: receiving an original electronic document via a first application stored in a non-transitory computer readable medium on a target network device with one or more processors;automatically applying via the first application a first set of electronic document registration rules to the original electronic document, wherein the first set of electronic document registration rules include document registration rules applied to all electronic document being registered via an automatic document registration system, thereby creating a first level modified electronic document;automatically applying via the first application a second set of electronic document registration rules to the first level modified electronic document thereby creating a second level modified electronic document, wherein the second set of electronic document registration rules include local document registration rules applied only via the application on the target network device;automatically transforming via the first application the second level modified electronic document into a secure electronic document storage format using a pre-determined set of electronic document transformation rules thereby creating a secure transformed electronic document;automatically generating via the first application a plurality of electronic document registration codes for the secure transformed electronic document, wherein the plurality of electronic document registration codes includes an unalterable date and time stamp, an identification code and one or more encryption codes; andsecurely transferring the secure transformed electronic document via the first application from the target network device via a communications network to a server network device with one or more processors, one or more databases and a second application executing in a second non-transitory computer readable medium on the sever network device, wherein the secure transformed electronic document is stored in the one or more databases and can be viewed via other target devices via the communications network without the ability to tamper with the information within the secure transformed electronic document thereby providing an automatic secure electronic document registration system. 2. The method of claim 1 wherein the secure transformed electronic document format includes an un-viewable encrypted, hashed, message digested format. 3. The method of claim 1 wherein the secure transformed electronic document format includes a read-only view format. 4. The method of claim 1 further comprising: securely transferring the original electronic document from the target network device to the server network device for secure storage. 5. The method of claim 1 further comprising: storing the secure transformed electronic document in the one or more databases using a centralized data model, wherein the secure transformed electronic document is stored and accessed using Lightweight Directory Access Protocol (LDAP). 6. The method of claim 5 wherein storing and accessing the secure transformed electronic document using LDAP includes securely storing and accessing the secure transformed electronic document via the X.509 security protocol. 7. The method of claim 1 further comprising: storing the secure transformed electronic document in the one or more databases using one or more of a plurality of pre-determined virtual file associations for secure transformed electronic document documents in a pre-determined hierarchical structure of security groups and security sub-groups for storing, sharing and retrieving secure transformed electronic documents, wherein a single secure transformed electronic document can reside in a plurality of pre-determined virtual file associations and a plurality of pre-determined security groups and security sub-groups at a same time. 8. The method of claim 1 wherein a copy of the unalterable date and time stamp is encrypted and included in the secure transformed electronic document or a biometric collected from a user of the target network device is encrypted and included in the secure transformed electronic document. 9. The method of claim 1 wherein the secure transformed electronic document includes an original legal electronic document or an original non-legal document. 10. The method of claim 1 wherein the one or more databases include a virtual file system that creates a virtual matrixed directory structure by establishing file accesses based on assigning a files to any number of security groups and security sub-groups instead of designating the files to directories and subdirectories in the virtual file system. 11. The method of claim 10 wherein the virtual file system allows the virtual matrixed directory structure to be overlaid to a plurality of other viewers who have permission to view the secure transformed electronic document. 12. The method of claim 1 further comprising: receiving a request from the first application in the first non-transitory computer readable medium on the target network device with the one or more processors via the communications network on the second application in the second non-transitory computer readable medium on the server network device with the one or more processors to view a selected secure transformed electronic document stored in the one or more databases associated with the server network device;verifying on the second application on the server network device the first application on the target network device is allowed to view the requested secure transformed electronic file;retrieving securely on the second application on the server network device a copy of the requested secure transformed electronic document from the one or more databases; andsecurely transferring the requested secure transformed electronic document to the first application on the target network device from the second application on the server network device via the communications network for secure viewing on the first application. 13. The method of claim 12 wherein the secure transformed electronic document is stored in the one or more databases using a centralized data model, wherein the secure transformed electronic document is stored and accessed using Lightweight Directory Access Protocol (LDAP) and wherein storing and accessing the secure transformed electronic document using LDAP includes securely storing and accessing the secure transformed electronic document via the X.509 security protocol. 14. The method of claim 12, wherein secure transformed electronic document includes a plurality of electronic document registration codes comprising an unalterable date and time stamp, an identification code and one or more encryption codes. 15. The method of claim 12, wherein secure transformed electronic document includes an encrypted copy of the unalterable date and time stamp or an encrypted copy of a biometric collected from a user of the target network device. 16. The method of claim 12 wherein the secure transformed electronic document format includes a non-viewable encrypted, hashed, message digested storage format. 17. A non-transitory computer readable medium having stored therein a plurality of instructions for causing one or more processors on one or more network devices to execute the steps of: receiving an original electronic document via a first application stored in a non-transitory computer readable medium on a target network device with one or more processors;automatically applying via the first application a first set of electronic document registration rules to the original electronic document, wherein the first set of electronic document registration rules include document registration rules applied to all electronic document being registered via an automatic document registration system, thereby creating a first level modified electronic document;automatically applying via the first application a second set of electronic document registration rules to the first level modified electronic document thereby creating a second level modified electronic document, wherein the second set of electronic document registration rules include local document registration rules applied only via the application on the target network device;automatically transforming via the first application the second level modified electronic document into a secure electronic document storage format using a pre-determined set of electronic document transformation rules thereby creating a secure transformed electronic document;automatically generating via the first application a plurality of electronic document registration codes for the secure transformed electronic document, wherein the plurality of electronic document registration codes includes an unalterable date and time stamp, an identification code and one or more encryption codes; andsecurely transferring the secure transformed electronic document via the first application from the target network device via a communications network to a server network device with one or more processors, one or more databases and a second application executing in a second non-transitory computer readable medium on the sever network device, wherein the secure transformed electronic document is stored in the one or more databases and can be viewed via other target devices via the communications network without the ability to tamper with the information within the secure transformed electronic document thereby providing an automatic secure electronic document registration system. 18. A system for automatic registration of electronic documents, comprising in combination for: receiving an original electronic document via a first application stored in a non-transitory computer readable medium on a target network device with one or more processors;automatically applying via the first application a first set of electronic document registration rules to the original electronic document, wherein the first set of electronic document registration rules include document registration rules applied to all electronic document being registered via an automatic document registration system, thereby creating a first level modified electronic document and for automatically applying via the first application a second set of electronic document registration rules to the first level modified electronic document thereby creating a second level modified electronic document, wherein the second set of electronic document registration rules include local document registration rules applied only via the application on the target network device;automatically transforming via the first application the second level modified electronic document into a secure electronic document storage format using a pre-determined set of electronic document transformation rules thereby creating a secure transformed electronic document;automatically generating via the first application a plurality of electronic document registration codes for the secure transformed electronic document, wherein the plurality of electronic document registration codes includes an unalterable date and time stamp, an identification code and one or more encryption codes;securely transferring the secure transformed electronic document via the first application from the target network device via a communications network to a server network device with one or more processors, one or more databases and a second application executing in a second non-transitory computer readable medium on the server network device, wherein the secure transformed electronic document is stored in the one or more databases and can be viewed via other target devices via the communications network without the ability to tamper with the information within the secure transformed electronic document thereby providing an automatic secure electronic document registration system;receiving a request from the first application in the first non-transitory computer readable medium on the target network device via the communications network on the second application in the second non-transitory computer readable medium on the server network device with one or more processors to view a selected secure transformed electronic document stored in the one or more databases associated with the server network device, for verifying on the second application on the server network device the first application on the target network device is allowed to view the requested secure transformed electronic file, for retrieving securely on the second application on the server network device a copy of the requested secure transformed electronic document from the one or more databases, and for securely transferring the requested secure transformed electronic document to first application on the target network device from the second application on the server network device via the communications network.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (76)
Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
Stefik Mark J. (Woodside CA) Russell Daniel M. (Palo Alto CA) Bobrow Daniel G. (Palo Alto CA) Henderson ; Jr. D. Austin (La Honda CA), Document processing system utilizing document service cards to provide document processing services.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
Mitty Todd Jay ; Shoupp Douglas Scott ; Prabhu Ajit Mathias ; Cantone Michael Robert, Secure electronic transactions using a trusted intermediary to perform electronic services.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Stephen F. Bisbee ; Jack J. Moskowitz ; Michael W. White, System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Billing usage in a virtual computing infrastructure.
Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Building a cloud computing environment using a seed device in a virtual computing infrastructure.
Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Defining an authorizer in a virtual computing infrastructure.
Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Granting access to a cloud computing environment using names in a virtual computing infrastructure.
Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Launching an instance in a virtual computing infrastructure.
Lesavich, Stephen; Lesavich, Zachary C., Method and system for electronic content storage and retrieval with galois fields on cloud computing networks.
Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Networking in a virtual computing infrastructure.
Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Objects in a virtual computing infrastructure.
Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Organizing data in a virtual computing infrastructure.
Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Organizing data in a virtual computing infrastructure.
Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Organizing permission associated with a cloud customer in a virtual computing infrastructure.
Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Virtualization layer in a virtual computing infrastructure.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.