WO2016115009A1 - Information organization, management, and processing system and methods - Google Patents

Information organization, management, and processing system and methods Download PDF

Info

Publication number
WO2016115009A1
WO2016115009A1 PCT/US2016/012799 US2016012799W WO2016115009A1 WO 2016115009 A1 WO2016115009 A1 WO 2016115009A1 US 2016012799 W US2016012799 W US 2016012799W WO 2016115009 A1 WO2016115009 A1 WO 2016115009A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
mini
content
objects
macro
Prior art date
Application number
PCT/US2016/012799
Other languages
French (fr)
Inventor
Kuhoo EDSON
Original Assignee
Edson Kuhoo
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/595,092 external-priority patent/US9420017B2/en
Application filed by Edson Kuhoo filed Critical Edson Kuhoo
Publication of WO2016115009A1 publication Critical patent/WO2016115009A1/en
Priority to US15/237,634 priority Critical patent/US20170200122A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/101Collaborative creation, e.g. joint development of products or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management

Definitions

  • the present invention relates to document processing systems and methods. More particularly, the present invention is directed to an electronic information production and management system and methods to generate information from existing information and documents as well as new information and compile the generated information and create documents based on the compiled information. In addition, the present inventions relates to encryption, protection, and control of information within existing information and documents.
  • Various examples in accordance with the present invention provide a cloud-based system comprising at least one local client device communicatively coupled via an intermediate network with a server device including an information processing, organization, and management engine, and further comprising distributed local and cloud databases spread across separately owned user accounts.
  • the information processing, organization, and management engine comprises one or more information processing, organization, and management blocks.
  • the information processing, organization, and management engine comprises one or more of the following blocks; a Connected Workspaces Block to determine how an owner of information Macro-objects (presentations, spreadsheets, word processing documents, etc.), Mini-objects (content within those Macro-objects such as slides, pages, worksheets, etc.), and Micro-objects (e.g., information within the Mini-objects such as text, images, tables, charts, graphics, embedded video, embedded audio, etc.) shares, controls, encrypts, protects, tracks, and analyzes content by granting other users secure access to the information and how the information is visually displayed to those who have access to that content and how they are able to use, manage, and manipulate the information and to organize and display available users with whom the owner may share his/her content; a Grant Access/Smart Sharing Block to connect the owner's workspace to another user's workspace; a Smart Security Block to allow the owner to apply security to Macro-, Mini-, and
  • Smart Delete Block to enable a user to delete his/her own Macro-, Mini-, or Micro-objects from either only his/her workspace, or everywhere those objects are used, including another user's Macro- or Mini-objects in that other user's workspace;
  • a Smart View Block to enable a user to view all uploaded Macro-, Mini-, and Micro-object content and have the ability to filter the uploaded content regardless of the folder in which the content resides;
  • Categorization/Tagging Block to enable content to be categorized automatically based on user defined rules as the content is being uploaded to the user's workspace; a Smart Business Social Graph Block to enable persons who share content with each other to take advantage of their online business social communities to gain access to content to which they would not otherwise have access; a Manage Workspaces Block to enable users to manage and organize their connected workspaces in the cloud by hiding workspaces or adding workspaces to favorites; a Smart Statistics Block to enable statistics to be provided to the owner of content respecting use of the content; an Object Extraction Block to extract Macro- and Mini-objects as well as Micro-objects from within the Mini-objects; a Remove Duplicate Block to enable a user to identify and eliminate duplicate Mini- and Micro-objects from within his/her Macro-objects, ensuring every Mini- and Micro-object has only one copy existing in a user's workspace so when changes are made to that one copy, the changes are reflected within every Macro- and Mini- object in which the Mini- or Micro-object resides;
  • the present invention solves the following prior art shortcomings which users who want to share content deal with today:
  • FIG. 1 shows a block diagram of a deployment implementation for a document and information processing system, in accordance with a non- limiting example of the present invention.
  • FIG. 2 shows a high-level functional block diagram of various components of the document and information processing system in accordance with one non-limiting example of the present invention.
  • FIGS. 3-61 show flowcharts, user interfaces (UIs), and tables pertaining to various techniques for document processing in accordance with examples of the methods of the present invention.
  • FIG. 62 shows a high-level block diagram of hardware for implementing a server device and/or a client device in accordance with an example of the present invention.
  • the term "block” or "module” describes a given unit of functionality that can be performed in accordance with one or more examples of the present invention.
  • a module might be implemented utilizing any form of hardware, software, or a combination thereof.
  • processors, controllers, ASICs, PLAs, PALs, CPLDs, FPGAs, logical components, software routines, or other instrumentalities might be implemented to make up a module.
  • the various modules described herein might be implemented as discrete modules or the functions and features described can be shared in part or in total among one or more modules.
  • examples of the present invention provide an information processing, organization, and management system and methods.
  • file is to be construed broadly to include any type of document or information stored in office applications such as the Microsoft Office® or Adobe Creative Suite®.
  • document may include a PowerPoint® file, an Excel file, a Word file, an image, a video, or an audio file, etc.
  • FIG. 1 illustrates a cloud-based
  • a Workspace Owner can share entire Macro-objects (files or documents)
  • a Workspace Owner may have used shared Mini-objects as to which the Owner has since revoked access. Any Macro-object a Share Designee created using these Locked Mini-Objects will still contain these Locked Mini- Objects, but they will be designated with a lock icon. Additionally, upon being loaded, the notification area will show the message: "WARNING: This Macro-object contains Mini-objects to which you no longer have access, which are designated by the lock icon. If you remove a Mini-object with the lock icon, they cannot be added back to the Macro-object.” The Coleo System enables Share Designees to copy the locked Mini-objects to their own workspace.
  • 3 rd Party Authoring Authoring applications owned by other companies and used by Applications document authors to compile information to create new document types. Examples include but are not limited to Microsoft® Office® applications, Adobe® Creative Suite® applications,
  • the Coleo System 100 comprises a client device 104 communicatively coupled with a server device 108 via an intermediate network 106.
  • the network 106 may comprise the Internet, a wide area network (WAN), metropolitan area network (MAN), local area network (LAN), telephone networks, and/or a combination of these and other networks (wired, wireless, public, private, or otherwise).
  • the server device 108 may include a digital data processing apparatus of the type commercially available in the marketplace suitable for operation as described herein, as adapted in accordance with the teachings hereof.
  • the server device 108 may typically be implemented in a server-class computer, such as a minicomputer, it may also be implemented in a desktop computer, workstation, laptop computer, tablet computer, PDA, mobile phone, car mapping device, or other suitable apparatus (again, as adapted in accordance with the teachings hereof).
  • the server device 108 also comprises central processing, memory, storage, and input output units and other constituent components (not shown) of the type conventional in the art that are configured in accordance with the teachings hereof by a document processing engine 108a.
  • server device 108 Although only a single server device 108 is depicted and described here, it will be appreciated by persons skilled in the art that other examples may have greater numbers of server devices disposed near and/or far from one another, colocated behind one or more common firewalls or otherwise. Those other server devices may differ in architecture and operation from that shown and described here and/or from each other, all consistent with the teachings hereof.
  • the client device 104 may include a mobile phone, a laptop computer, a tablet computer, a personal digital assistant (PDA), or other digital data processing apparatus of the type that is commercially available in the marketplace and that is suitable for operation as described herein, or as adapted in accordance with the teachings hereof.
  • the client device 104 may be provisioned with a user agent 104a, e.g., a browser, whereby the client device 104 may access the document processing engine 108a.
  • FIG. 2 illustrates the components of the document processing engine 108a, in accordance with one non-limiting example of the present invention.
  • the information processing, organization, and management engine 108a comprises a Connected Workspaces Block 200; a Grant Access/Smart Sharing Block 202; a Smart Security Block 204; a Make Content Non-Editable Block 206; a Smart Search Block 208; a Display Search Results Block 210; a Find Similar Block 212; a Smart Version Management Block 214; a Smart Copy/Create New Block 216; a Smart Replace Block 218; a Kahani for 3 rd Party Applications Block 220; a Kahani Offline Block 222; a Synchronization Block 224; a Smart Delete Block 226; a Smart View Block 228; a Smart Categorization/Tagging Block 230; a Smart Business Social Graph Block 232; a Manage Workspaces Block 234; a Smart Statistics Block 236; an Object Extraction Block 238; a
  • the Connected Workspaces Block 200 provides a functionality that determines how owners of information Macro-objects (presentations, spreadsheets, word processing documents, etc.), Mini-objects (the content within the Macro-objects such as slides, pages, worksheets, etc.), and Micro-objects (information within the Mini-objects such as text, images, tables, charts, graphics, embedded video, embedded audio, etc.) share the content by granting other users secure access to the information and how the information is visually displayed for those who have access to that content and how they are able to use, manage, and manipulate the information using the information management method in accordance with the present invention.
  • Macro-objects presentations, spreadsheets, word processing documents, etc.
  • Mini-objects the content within the Macro-objects such as slides, pages, worksheets, etc.
  • Micro-objects information within the Mini-objects such as text, images, tables, charts, graphics, embedded video, embedded audio, etc.
  • Prior art cloud file sharing applications as defined in the glossary, only enable sharing of complete documents and do not organize shared documents by owner, preventing users from quickly determining ownership of content that is shared with them.
  • prior art applications provide their customers an email-like interface where they do not have a graphical or textual list of all users with whom they have shared before. Their customers have to instead type in email addresses every single time they want to share content with other users.
  • a request is sent to an API containing the ID(s) of the selected content/multiple
  • a search is performed for the ID of the selected content in all collections to identify the type of content selected.
  • a check of a UserlD database is performed to determine if any of the UserlDs already have existing access/permission to one or more of the pieces of content in the appropriate collections.
  • the user permission is updated so the UserlD sent in the request is added to UserlD property of user permissions, and the permission level property is updated to grant permission.
  • the owner's workspace is loaded into the user's workspace and will include only content to which access has been granted, based on the privacy rules as defined in the Smart Security Block 204 as will be described below. connected workspace may then be built and connected.
  • Macro-object] Permission Collection where the User ID is equal to the ID of the logged user.
  • a tree object comprising:
  • the tree structure may be displayed according to the following process:
  • the tree will be built based upon the Visual Folder tree list.
  • Macro-object tree list tree structure is already built; if yes, add the Macro- object in the folder with ID equal to the TreelD from the Macro-object; otherwise, build the tree according to the Macro-object list tree structure. ⁇ List Mini-object tree structure.
  • FIG. 3 shows how connected workspaces may be displayed as performed by the Connected Workspaces Block 200 in accordance with one example of the present invention.
  • workspaces from multiple users are connected together based on how access was granted to the workspaces and how viewing and editing permissions were set.
  • the owner of a workspace Once the owner of a workspace has populated the workspace with content (folders, documents, and content inside the documents), the owner can begin the process of sharing the content by granting access to other users.
  • FIG. 4 shows the user interface for the grant access screen (right-hand area), and FIGS 5-8 show the flowchart for operations as defined in the Smart Sharing/Grant Access Block 202, in accordance with one example.
  • the "Grant Access” input is received from the owner and the following checks and actions are performed.
  • the owner can select one or more visual content (any Mini- and/or Macro-object) or hierarchical Visual Folder in the owner's workspace or any of the owner's connected workspaces. All of the above- mentioned content may be selected individually or collectively.
  • the owner can grant "view” and "can edit” permissions to one or more users.
  • the owner grants access to a user(s)
  • the following actions are performed.
  • Smart Security Block 204 determines how security is handled. Unlike prior art cloud file sharing applications, where privacy levels can be set at the folder or file level only, in accordance with a non-limiting example of the present invention the Smart Security Block 204:
  • a user may choose to set the privacy level of Macro-obj ects, Mini-objects, and Visual Folders.
  • the user may choose from the following settings: Public, Private, Confidential, non re-sharable, not-downloadable, frozen, non-editable, watermark, and Non- Searchable.
  • Encryption of Macro-, Mini-, and Micro-objects is defined in the Kahani Encryption Block 244. If the user sets privacy on a Macro-object, the following process is performed:
  • a request is sent to the API, containing the IDs of the selected items
  • a request is sent to the API containing the ID of the selected Visual Folder/Macro-object/Mini-object, the ID of the user for whom permissions are to be added, and the permission level (read or co-edit), and also the parentID of the selected item (the parentID is needed if a Macro- or Mini-object is selected to ascertain in which Visual Folder the selected object is located).
  • Mini-objectID does not exist in the Collection, add the ID to the database; otherwise if the ID exists, fetch that object.
  • Micro-objectID does not exist in the Collection, add the ID to the database; otherwise if the ID exists, fetch that object.
  • the owner of a Macro -object containing confidential Mini- or Micro-objects may grant access to the Macro-object to one or more users.
  • a request is sent to the owner containing the ID(s) of the selected Macro-object(s).
  • Second Action Find the Macro-object with ID sent in the request in the Macro- object Type Collection.
  • Micro -object(s) are Confidential.
  • a user may grant access to a Macro-object that contains confidential Mini- or Micro-objects owned by another user:
  • a request is sent containing the ID(s) of the selected Macro-object(s).
  • FIG. 9 illustrates an example notification a user receives when granting access to a Macro-object (e.g. , a presentation) with a confidential Mini-object(s) (e.g. , a slide).
  • FIG. 10 illustrates a user interface for managing security utilizing the Smart Security Block 204, in accordance with one example.
  • owners of content are enabled to choose if their own Mini- objects within their Macro-objects may be re-shared by other users.
  • the owner of a Mini- object(s) is not affected; the object continues to behave like a sharable object for the owner.
  • this setting will affect the share functionality on the cloud-based application and the local application corresponding to the original application that created the Mini-object.
  • the application for PowerPoint® will be used as an example.
  • the user selects one or more Mini-objects from the main area and marks the checkbox for "Make Cannot Reshare" setting. This setting enables the owner to limit the re-sharing of Macro-, Mini-, and Micro-objects. The following process is then performed:
  • a request is sent to the API, containing the list of ID(s) for selected Mini-objects, and enum for the checkbox's state.
  • the logged-in user is not the owner of the Mini-object, take no action and notify the logged-in user that he/she does not own the Mini-object and therefore cannot set the Mini-obj ect as Cannot Reshare . • If the Mini-object is owned by the logged-in user, mark the Mini-object cannot re- share and update the Mini-object in the database.
  • Each Mini-object that is marked cannot reshare can be unmarked at any time by the owner of the Mini-object.
  • the Mini-object marked cannot reshare will be first removed from the Macro-object.
  • owners and users of content are enabled to choose if Mini- objects within their Macro-objects may be frozen in order to maintain a record of information as it was at a specific time within a specific Macro-object shared with or seen by specific users or people.
  • the Mini-object(s) is only affected within the context of the Macro-object where it was frozen; the Mini-object continues to behave like an unfrozen object everywhere else it exists.
  • this setting will affect the forced propagation of changes on the cloud-based application and the local application corresponding to the original application that created the Mini-object.
  • the application for PowerPoint® will be used as an example.
  • the user selects one or more Mini-objects from the main area and marks the checkbox for "Freeze" setting. The following process is then performed:
  • a request is sent to the API, containing the list of ID(s) for selected Mini-objects, and enum for the checkbox's state.
  • Mini-object is owned by the logged-in user, mark the Mini-object frozen only within the Macro-object within which the owner has chosen to freeze the Mini-object and update the Mini-object in Macro-object in the database for the owner.
  • Each Mini-object that is marked frozen can be unmarked at any time by users who marked it as frozen..
  • Steps 1-12, above, apply to Macro- and Micro-objects, as well.
  • owners of content are enabled to choose if their own Mini- objects within their Macro-objects may be searchable by other users.
  • the owner of a Mini- object(s) is not affected; the object continues to behave like a searchable object for the owner.
  • this setting will affect the search functionality on the cloud-based application and the local application corresponding to the original application that created the Mini-object.
  • the application for PowerPoint® will be used as an example.
  • the user selects one or more Mini-objects from the main area and marks the checkbox for the "Make Non-searchable" setting. The following process is then performed:
  • a request is sent to the API, containing the list of ID(s) for selected Mini-objects, and enum for the checkbox's state.
  • Mini-object is owned by the logged-in user, mark the Mini-object non- searchable and update the Mini-object in the database.
  • Each Mini-object that is marked non-searchable can be unmarked at any time by the owner of the Mini-object.
  • owners of content are enabled to choose if their own Mini- objects within their Macro-objects may be downloadable by other users.
  • the owner of a Mini- object(s) is not affected; the object continues to behave like a downloadable object for the owner.
  • this setting will affect the download functionality on the cloud based application and the local application corresponding to the original application that created the Mini-object.
  • the application for PowerPoint® will be used as an example.
  • a user In order to set content as non re-sharable, a user needs to select some content and navigate to a "Set Privacy Level" option of the Smart Security Block 204. [0054] In one example, the user selects one or more Mini-objects from the main area and marks the checkbox for a "Make Non Downloadable" setting. This setting enables the owner to ensure sensitive Macro-, Mini-, and Micro-objects cannot leave the system environment to be emailed or stored on alternative storage such as the cloud or external drives. The following process is then performed:
  • a request is sent to the API, containing the list of ID(s) for selected Mini-objects, and enum for the checkbox's state.
  • Mini-object is owned by the logged-in user, mark the Mini-object non- downloadable and update the Mini-object in the database.
  • Each Mini-object that is marked non-downloadable can be unmarked at any time by the owner of the Mini-object.
  • Non-downloadable Mini-object is used in a Macro-object by other users, when downloading the Macro-object to a local hard drive, another cloud location, or an external drive, the Mini-object marked non-downloadable first will be removed from the Macro -object.
  • Steps 1-9, above, apply to Macro- and Micro -objects, as well.
  • owners of content are enabled to choose if their own Mini- objects should be watermarked for permanent identification of their special or sensitive nature.
  • the owner of a Mini-object(s) is not affected; the object continues to behave like a non- watermarked object for the owner.
  • this setting will affect the viewing functionality on the cloud-based application and the local application corresponding to the original application that created the Mini-object.
  • the application for PowerPoint® will be used as an example.
  • the user selects one or more Mini-objects from the main area and marks the checkbox for "add watermark” setting. The following process is then performed:
  • a request is sent to the API, containing the list of ID(s) for selected Mini-objects, and enum for the checkbox's state.
  • Mini-object is owned by the logged-in user, present the owner with the ability to upload a watermark image to add to the Mini-object.
  • Each Mini-object that is marked with a watermark can be unmarked at any time by the owner of the Mini-object.
  • the object is permanently watermarked and remains so even if the object is removed from the system environment by being saved to a local hard drive, another cloud location, or an external drive.
  • the Make Content Non-editable Block 206 determines how an owner may prevent a user(s) from editing portions of a Macro- or Mini-object to which that user(s) has been granted access. This capability is not available with any prior art applications, especially for Mini-objects and for Mini- and Macro-objects that reside in a distributed cloud workspace.
  • One example in accordance with the present invention enables an owner to mark portions of his/her Macro-objects as uneditable by other users, even if the uneditable objects are downloaded and all links to original content are broken by the downloaded Uneditable renders the ability to copy, delete, or modify any Micro-objects residing within a Macro- or Mini-object.
  • owners of content are enabled to choose if their own Mini- objects within their Macro-objects may be edited by other users.
  • the owner of a Mini-object(s) is not affected; the object continues to behave like an editable object for the owner.
  • this setting will affect the editing functionality on the cloud-based application and the local application corresponding to the original application that created the Mini-object.
  • the user selects one or more Mini-objects from the main area and marks the checkbox for "non-editable" setting. The following process is then performed:
  • a request is sent to the API, containing the list of ID(s) for selected Mini-objects, and enum for the checkbox's state.
  • Mini-object is owned by the logged-in user, mark the Mini-object non- editable and update the Mini-object in the database.
  • the Smart Search Block 208 enables users to find and access content across multiple distributed cloud-based user accounts and across an enterprise.
  • Current prior art applications when performing the search function, hunt for keywords across all document types, including file names and sometimes the file metadata/properties, and return to the user a list of all the documents that match the search criteria.
  • the user has no idea who is the owner of the documents, and the search is limited to documents that are shared with the user. This results in a lost opportunity, especially within enterprises, where employees create and recreate the same content over and over again because they are unaware that the content already exists.
  • the search function is augmented in two ways:
  • the search includes content that is not shared with the user in the search except
  • All content satisfying the search criteria is displayed visually so the user performing the search can immediately determine all content that satisfies the search criteria, unlike prior art applications which display one matched content at a time.
  • Searches are performed across distributed cloud workspaces that have not previously connected to the user's workspace (i.e., workspaces to which access has not previously been granted to any content) and affords the user performing the search the opportunity to request access to content that matches the search criteria.
  • the search results include finding similar content utilizing the Find Similar Block 212 as will be described below.
  • a user can search for and find content within his/her own workspace folder (s) including Macro- and Mini-objects, within workspaces that are connected to his/her workspace, and, in the case of enterprise accounts, across all workspaces within the enterprise whether or not they are connected to the user's workspace.
  • the results can potentially include content to which the user does not have access. To ensure confidentiality, the portions of content in the owner's workspace that are potential matches cannot be accessed by the user performing the search or any identifying information such as a thumbnail or title.
  • search results are returned, if the user has not been granted access to the content matching the search results, the user can request that the owner of the matched content grant him her access directly from the search results.
  • the user may:
  • the user can also choose options from the Advanced Search flyout. These options include “Type”, “Words show up in”, and “In workspaces”.
  • ⁇ "Type" corresponds to Macro-Objects Types such as presentations, PDF document, spreadsheets, etc.
  • workspaces shared with and accepted by user in other words, the workspaces displayed to the user in his/her left-hand area.
  • FIG. 11 illustrates a portion of the user interface for defining where the search should be conducted utilizing the Smart Search Block 208 in accordance with one example.
  • the Display Search Results Block 210 determines how search results are displayed and how users request access to results to which they do not have access.
  • Prior art cloud file sharing applications do not present search results in the context of the owner of the content searched/matching search criteria, nor do they search content not shared with the user. Consequently, prior art cloud file sharing applications do not enable users to request access to content belonging to owners who have not previously shared their content with the user.
  • one non-limiting example in accordance with the present invention presents the search results in the context of the connected workspace where the search criteria was met and in the case of content match in workspaces not connected to the user's workspace, provides a mechanism for the user to request access from the unconnected workspace. Accordingly, in accordance with the example:
  • a request is sent to the API to retrieve Mini-objects which match the search criteria for the specific user.
  • Matched Mini-objects are fetched from the database, including the information for the workspace associated to the Mini-objects and the Macro-objectID where they originate.
  • Mini-objects are grouped by the workspace name ⁇ and then by the parent Macro - objectlD.
  • a tree object is created according to the following:
  • the user may opt to search in "Connected Workspaces" or "Across My Enterprise", and the search function locates matches for which user does not have access.
  • a single blank “Potential match(s) - request access” thumbnail may be displayed.
  • the title text may be a descriptive text such as "This workspace has potential match(s) - request access.”
  • a request for access notification is sent to the owner of the content, which includes the following: • "[First Last] searched the keyword combination "[SearchCriteria]”.
  • the notification includes:
  • the requestor i.e. , the user who requested access
  • the workspace of the owner is connected to the workspace of the user and displayed as described earlier in conjunction with the description of the Connected Workspaces Block 200.
  • the notification When the owner has made a decision on the last piece of content in the notification, the notification will be removed.
  • FIG. 11a illustrates an example of how search results are displayed in the context of the connected workspace where the matches were found utilizing the Display Search Results Block 210 described earlier.
  • the Find Similar Block 212 provides users the ability to search across their connected workspaces or their enterprise to find content similar (e.g., determined by a percentage range specified by the user) to their own content, including searching for an image within other content.
  • the user who performs the search may then take multiple actions, for example, delete everywhere or replace within their own workspace.
  • This capability provides invaluable services, especially to enterprises, where one application may be to find and remove the use of certain images from within all Macro-objects across the distributed cloud for legal purposes. Prior art applications do not provide this capability.
  • a user may search for content similar to his/her own and can then use the search results to compare, use, and/or replace his/her own content with similar content.
  • search results returned by the find similar operation can potentially include content to which the user performing the search does not have access to the content.
  • the user performing the search may request access to matched content from the owner directly using the Find Similar Block 212.
  • the user who performs the search may set a threshold ⁇ e.g., 90-100%), such that the content will be considered similar only if the content has a percentage match greater than or equal to the threshold set in find similar options for the selected content. That is:
  • the user performing the search will be given options on how/where to look for the searched content.
  • the user performing the search will also be given the option to ignore templates graphics or header/footer information in other file types when looking for similar content.
  • the threshold tab includes a slider-bar, enabling the user to modify his/her find similar threshold.
  • the tolerance range may be set from 90 - 100% by using the slider utilizing whole numbers. 100% requires an exact (/. e. , 100%) match, A lower value requires a match of at least the set percentage (e.g. , if the threshold is set at 90%, Mini-objects/images with a match of 91%, 95%, or 100% would all return as similar, but 89% would not).
  • the initial default is set to "100%”. If the user performing the search sets a different find similar threshold value in his/her preferences, that value will be displayed. If the user performing the search modifies the value and then marks the checkbox to set the find similar threshold as the user's preference, the default threshold will be updated in My Preferences accordingly. "Search in" option - The user may select which workspaces/Visual Folders he/she wishes to include in his/her "Find Similar" search. All users may search within their own workspaces and any Connected Workspace. Enterprise users may also search across all users' workspaces on that enterprise account similar to the search performed by the Smart Search Block 208 described earlier.
  • a notification is displayed to inform the user that the find similar search is in progress.
  • a notification will be displayed to inform the user that the find similar search has completed and where to view the search results.
  • FIG. 12 illustrates a portion of the user interface for specifying where to hunt for similar objects.
  • FIG. 13 shows the flowcharts of operations performed when carrying out the functions performed by Find Similar Block 212 in accordance with one example.
  • the user may find an image within the content. That is, the user may search for a particular image, as a Micro-object, within Macro -objects, to replace, delete, or modify. Furthermore, the user may opt to select "Find Similar" for an image within a Mini-object, even if the image has been altered by having been cropped, skewed, or partially hidden (e.g., within the 90% maximum threshold). If the user opts to exclude template/header/footer/background graphics, etc., Find Similar will search through the remaining content.
  • the Find Similar Block 212 also enables users to replace their own content, in their own workspaces or everywhere the content has been used, with content located via the Smart Search Block 208 or Find Similar Block 212.
  • This functionality is very useful, especially for enterprises, where employees can find a better representation of content that they have created and can simply adopt another employee's version while giving attribution credit to that employee via a "Maintain Provenance" functionality defined in the Smart Copy Block 216.
  • Prior art applications do not provide this capability.
  • the user may choose to replace his her own content with a matched search result comprising content not owned by him/her.
  • the content type must match in order for a "Replace with Matched" function to operate. For example, if the user performing a search desires to replace a PowerPoint® Mini-object he/she owns with content that is owned by another user, the content belonging to the other user must also be a
  • the "Delete Everywhere” function deletes selected searched (searched for) content everywhere that particular content exists. This function is very useful when an enterprise wants to control content and decides to locate and remove obsolete or incorrect content without relying on employees to delete the content themselves. With this function, users do not need to know where an item of content is used (e.g., the content can be within thousands of documents). This function will locate and remove the content from all accounts where the content exists. The functionality of this block is the same as utilizing the Smart Delete Block 226 as will be described below.
  • the Smart Version Management Block 214 maintains all versions of Macro-, Mini-, and Micro-objects as changed by users who have been enabled to edit the Macro-, Mini-, and Micro-objects through permissions. Further, this functionality enables the owner of the content to rollback to any previous version, back to and including the original version, of the object(s) that have been modified. This functionality also enables owners of the object(s) that have been modified to perform replace functions, as defined in the Smart Replace Block 218 or Smart Delete Block 226, with any rolled-back version as will be described below. Prior art applications do not enable version control and version control management (e.g. , replace/delete everywhere) at the Mini- and Micro-object level and do not enable rollback capabilities.
  • FIG. 14 illustrates how the history of a Mini-object (a slide in this example) is shown in the object metadata.
  • FIG. 15 illustrates what a user observes when comparing versions of same Mini-object (a slide in this example) in accordance with one example.
  • users who have co-edit permissions for objects owned by other users may modify the objects. Consequently, a new version of the content can be created when the following occurs:
  • Mini-object For Mini- and Micro-objects a new version is created when the Mini-object is:
  • the old version is on the left
  • the current version is on the right.
  • a yellow highlight is overlaid on the changed areas of the compared thumbnail so that the user can immediately observe areas that have changed.
  • Version to compare - gives the user the option to compare to the current (newest) version or the previous version (prior to the one selected).
  • Macro-objects have forward/backward arrows to aid in navigation. If one of the Macro-objects has more Mini-objects than the other (e.g., count of pages), when the end of the shorter Macro-object is reached, the shorter Macro-object image will instead display "end of document" for the remainder of the Mini- objects in the longer Macro -object. ⁇ ) Rollback icon - If selected, a check will be performed as to whether or not users have access to any of the affected Mini-objects, and a smart confirmation dialog opens (with shared portions italicized):
  • the owner receives a notification and has the option to rollback only in the owner's workspace or every workspace of every user that has the current version of the Mini- or Micro -object in use within their own Macro- or Mini-objects.
  • the Smart Version Management Block 214 creates a new version, using the selected previous version. This is done to ensure versions in between are not created and changes made by others to content are not lost. For example, the owner has vl-7 and chooses to roll back to v2. In this case, v8 is created, which is a duplicate of v2, thus preserving v3-7.
  • the Smart Version Management Block 214 When the rollback function is initiated, the Smart Version Management Block 214:
  • the copied Mini-object is created as vl, according to the rules defined for "Copy” utilizing the Smart Copy Block 216.
  • the user's Macro- objects) is updated to the new version using the new Mini-object.
  • functions previously defined utilizing the Smart Replace Block 218 are initiated. Consequently, the user's Macro -object(s) are updated to the new version using the new Mini-object version.
  • the Smart Version Management Block 214 creates a new version, using the selected previous version. This is done to ensure versions in between are not created, and changes made by others to content are not lost. For example, the owner has vl-7 and chooses to roll back to v2. In this case, v8 is created, which is a duplicate of v2, thus preserving v3-7.
  • the Smart Version Management Block 214 When the rollback function is initiated, the Smart Version Management Block 214:
  • the Smart Version Management Block 214 inserts a comment such as "Rollback to v[x]." where x is the version selected.
  • Macro-object workspace, vl .
  • Mini-object referenced from another Macro-object remove the Mini-object from the Macro -object.
  • Mini-object is not owned by the user - Create a new Mini-object in the workspace of the owner of the Macro-object, vl .
  • the Macro-object points to the new Mini-object. This only affects the Macro-object being rolled back.
  • Deleted Mini-objects i. e. , "Delete - My Workspace/Everywhere"
  • the Mini- object is deleted, according to rules as defined for deleting Mini-objects utilizing the Smart Delete Block 226.
  • the Smart Version Management Block 214 performs the following functions:
  • the copied Mini-object is created as vl, according to the rules defined for "Copy" utilizing the Smart Copy Block 216.
  • the user's Macro- object(s) are updated to a new version incorporating the new Mini-object.
  • a user may delete his/her own Mini-objects and Macro-objects from either his/her workspace or everywhere, including other users' workspaces that are authorized to have access to those Mini-objects.
  • the owner can chose to delete Mini-objects and Macro-objects from "My Workspace" or from "Everywhere", according to rules previously defined for the delete function utilizing the Smart Delete Block 226, which:
  • the Macro-object has Mini-objects A, B, C, and D in positions 1, 2, 3, and 4, respectively. If the Mini-object B is deleted, Mini-objects C and D will be moved from positions 3 and 4 to positions 2 and3, respectively.
  • the Smart Copy/Create New Block 216 enables users to copy content owned by others to their own workspace. Unlike prior art applications, however, the Smart Copy/Create New Block 216 maintains the provenance of the Mini-objects including attribution to the original creator of the content, which incentivizes users to share their content and have their content used by other users. Also, this enables accountability to allow original creators of content to be identified.
  • FIGS. 16 and 17 show flowcharts of operations performed by the Smart Copy/Create New Block 216 to create new content in accordance with one non-limiting example.
  • a Mini-object or Macro-object is created through modification of an existing Mini-object, the following actions are performed by the "Create New" function of the Smart Copy/Create New Block 216:
  • Non-Editable setting is copied over to the new Mini-object (only the owner may edit a non-editable Mini-object).
  • [secondOwnerName] -> ... -> [nOwnerName] are the first and last names of the owners from whom the Mini-object was copied.
  • the identified owners include the current owner. For example, Personl 's Mini-object is copied to Person2's workspace, then to Person3 's workspace, then to Person4's workspace.
  • the Smart Replace Block 218 enables owners of Mini-objects to replace (i.e. , swap out) their Mini-objects for other Mini-objects of the same type (e.g., slide with slide, worksheet with worksheet, etc.). Furthermore, the Smart Replace Block 218 enables the owner of the content to propagate the replacement Mini-object(s) across all workspaces and within all Macro-objects that included the original Mini-object(s). Prior art applications do not enable users to replace Mini-object(s) with other Mini-objects.
  • users may replace their own existing Mini-objects with other already existing (i.e., uploaded and parsed) Mini-objects of their own or Mini-objects shared with them by other users.
  • Mini-objects may be replaced either only for their workspace, or everywhere, including other users' workspaces that are authorized to access those Mini-objects.
  • the replacement function operates as follows:
  • the right- hand area will open with two columns.
  • the right-hand column will load the selected thumbnails (e.g., to-be-replaced Mini-objects.)
  • the left-hand column will load with an equivalent number of blank thumbnails with text such as "Drag & drop
  • the owner may load Mini-objects in the main area by navigating any of the trees under "My Workspace" or from search results that return Mini-objects from other connected workspaces.
  • the owner may select a single Mini-object (e.g. , a replacement Mini-object) and drag-and-drop it over to the blank thumbnail to the left of the Mini-object he/she desires to replace. If the owner selects more than one Mini- object, only the newest selected Mini-object will be moved into the blank thumbnail position.
  • FIGS. 18, 25, and 26 illustrate the user interface for replacement of a Mini- object, notification to users when an owner replaces a Mini-object (a slide in this example) in their own workspace, and notification to other users of an owner's decision to replace a Mini- object everywhere (in this example a slide), respectively.
  • FIGS. 16, 17, and 19-24 show the flowcharts of operations to replace Mini-objects and enable users to copy replaced Mini-objects to their own workspaces in accordance with another example.
  • the owner may decide to "Replace in My Workspace".
  • a request is sent to the API containing the list of pairs with replacement (i.e. , new) Mini-object IDs and to-be-replaced (i.e. , old) Mini-object IDs.
  • replacement i.e. , new
  • to-be-replaced i.e. , old
  • Mini-object ID For each pair of Mini- objects (e.g. , slides) the following is performed: 2. If the replacement Mini-object ID has a value:
  • replacement Mini-object update the Macro-object, and store the updated Macro-object in the database.
  • the owner may decide to replace everywhere.
  • a request will be sent to the API containing a list of pairs with replacement (i. e. , new) Mini-object IDs and to-be-replaced ⁇ i.e., old) Mini-object IDs. For each pair of Mini- objects the following is performed:
  • the Smart Replace Block 218 replaces the Mini-object in all of the user's Macro-objects where the old Mini-object is used.
  • FIG. 25 illustrates notification of a replaced slide with side-by-side comparison.
  • Kahani for 3 rd Party Authoring Applications Block 220 enables users to access and use their connected workspaces from the Coleo Cloud or from their desktops directly from within the authoring application.
  • the Kahani 3 rd Party Authoring Application can be Microsoft® PowerPoint® used to create presentations. Users can access Mini-objects (e.g., slides, images, video, and audio) to which they have been granted access within
  • FIG. 27 shows the user interface for the application from within PowerPoint®.
  • FIGS. 28-30 illustrate the flowchart operations performed by the Kahani for 3 rd Party Authoring Application for PowerPoint® in accordance with one non-limiting example.
  • the Kahani for 3 rd Party Authoring Applications Block 220 for PowerPoint® loads the user's workspace, including shared workspaces, directly into Microsoft® PowerPoint®.
  • the user may navigate his/her trees and Visual Folders similar to utilizing the Manage Workspaces Block 234 by expanding the appropriate tree and Visual Folders, and then selecting the Visual Folder name to load that Visual Folder's content to the section directly to the right.
  • the User may add/modify/delete Visual Folders in his/her workspace similar to utilizing the Manage Workspaces Block 234.
  • the user may utilize a slider to adjust thumbnail sizes for Macro- and Mini- objects.
  • the user may select and open slides and presentations from his/her Connected Workspaces in PowerPoint® using the Kahani for 3 rd Party Authoring Applications Block 220.
  • My Files includes file types other than PowerPoint®. As such, document type icons are displayed on thumbnails. The following file types may be viewed by a user:
  • the user may drag-and-drop content to a Visual Folder in left-hand area of the section.
  • the content is tagged.
  • the user may drag-and-drop to an open PowerPoint® presentation (i.e. , in the same window) to add to the open presentation.
  • 3 rd Party Authoring Applications Block 220 is cached, with the exception of checking to determine if the thumbnail of the slide has been changed.
  • the Kahani for 3 Party Authoring Applications Block 220 refreshes the information, reflecting any updates that have occurred since the last refresh.
  • the refreshed information includes changes such as access granted/revoked and new/modified content.
  • the information being used to create the current Macro-object using the Kahani for 3 rd Party Authoring Applications Block 220 is changed by the owner(s) or users authorized to change the information.
  • the new Macro-object creator will be notified within the authoring application that the information used has been modified and will be given the option to update the information in the then current and open Macro-object as defined in the Real Time Update block 247.
  • users may tag their slides and presentations directly from PowerPoint®. Users can tag presentations and slides in three ways:
  • the user may grab single or multiple items of content from the main area of the application and drop them on a Visual Folder in the left-hand area of the application. This includes tagging other users' content to the user's own Visual Folders.
  • the user saves a presentation from PowerPoint® directly to the Coleo Cloud.
  • the following rules apply:
  • modification is not considered a modification to the image, but rather the slide.
  • the Coleo Cloud mode will be exited and switched to Desktop Coleo mode only if the Desktop Coleo mode is successfully started up (i.e., same as in the previous case described above).
  • the Desktop Coleo mode will be exited and switched to the Coleo Cloud mode only if valid credentials are entered (i.e., same as in the previous case described above).
  • the user can search for his/her own or shared slides directly from within PowerPoint® while Kahani for 3 rd Party Authoring Applications Block 220 is in operation.
  • the search is performed in the same manner as the search function described earlier utilizing the Smart Search Block 208.
  • Search results are displayed in the top portion of the main area of the application. As is the case in Coleo Cloud, the number of search results will be displayed where the breadcrumbs normally appear.
  • a search result is a presentation
  • the user can double-select to open the slides for that presentation in the bottom portion of the main area. This is the standard action for the user to open slides in a presentation within the application.
  • the user selects content from the search results to add to slides or the presentation which is open in PowerPoint®. It is possible that a combination of content may be returned in the search results comprising two or more slides, images, audio, and video. If the user selects multiple content and then takes action (e.g., double-selects or drags- and-drops):
  • Double-select opens the slides or presentations. If media files are double-selected, the user is notified that these file types cannot be opened within PowerPoint® and that the user can only add media elements to existing slides in a presentation.
  • drag-and-drop can be utilized to add them to the presentation as described directly above.
  • drag- and-drop can be utilized to add them to the open presentation as described above.
  • the presentation will point to the existing slide in the database, rather than create the slide as the user's own slide in a presentation. If another user's slide was used and modified, the user will be presented with options, if he/she has co-edit access. The action for the slide will depend upon the option chosen by the user as will be described below.
  • a new slide is created in the user's presentation (i.e. , the user is now owner of the new slide.)
  • a presentation is modified, the user will be given appropriate choices to create a new presentation or replace the presentation with the modified presentation, depending upon whether the user is the owner, has co-edit access, or lacks co-edit access.
  • Applications Block 220 comprises a font crawler function which enables a user to modify fonts in the entire presentation.
  • Prior art applications such as Microsoft® PowerPoint® allow users to change fonts across the whole document but in a very limited fashion. First, the user must type in the font to change from, which forces the user to know every font that exists in the
  • the user may select "Font Crawler” in the ribbon bar to modify fonts in his/her open presentation.
  • the user can select the portions of the presentation he/she wants modified, with various font options available from the standard Font dialog.
  • FIG. 31 shows a portion of the user interface for defining where the fonts should be changed.
  • the font tab This tab enables the user to select the font he/she wants to apply to the presentation.
  • the Kahani Offline Block 222 controls the way owned and shared content is synchronized to the owner's local machine.
  • Prior art cloud file sharing applications have the following limitations:
  • the Kahani Offline Block 222 synchronizes Macro-, Mini-, and Micro- objects, clearly organizes content by the owner's workspace, allows users to determine if they want to synchronize their content, content that is shared with them per the content owner, or synchronize a combination thereof, and enables users to grant access to local content which synchronizes and executes once the user is connected to the internet.
  • the Kahani Offline Block 222 enables users to synchronize to/from their computers and Coleo Cloud, specifically:
  • FIG. 33 shows the notifications and status interface.
  • FIGS. 34-37 show various aspects of the user interface for Desktop Coleo in accordance with one example.
  • the interface provided by the Kahani Offline Block 222 will contain the last synchronized workspace-tree structure from the Coleo Cloud based on what the user selected utilizing the functionality defined in setting preferences in the what to sync section of the Kahani Offline Block 222.
  • the user can perform the following actions utilizing the interface:
  • the interface consists of two sections.
  • Send links - enables the user to send secure links to content viewers to view in a web page
  • the user may navigate his/her and shared trees and Visual Folders by expanding the appropriate tree and Visual Folders, and then selecting the Visual Folder name to load that Visual Folder's content to the section directly to the right.
  • the user can expand trees not only by selecting the expand/collapse arrow (same arrow as on the Coleo Cloud), but also selecting the tree name will result in the same action. For example, if the user selects on the "My Files" tree, if it was collapsed, selecting on the name will expand it and vice versa.
  • Mini-object - one or more of the content thumbnails of the same type may be selected.
  • the application will create a single file from the selected Mini-object and open using the parent application as long as the user has an active license for the application.
  • the user desires to add files to Desktop Coleo from his/her local machine.
  • the Macro-objects(s) will be tagged in the selected My Files folder. • "Later” - radio button; when marked, if the tree structure is loaded, the tree structure will not be displayed anymore and the area will collapse.
  • FIGS. 38 and 39 show the user interface for defining preferences in Desktop Coleo in accordance with one example.
  • a new window is opened utilizing the Kahani Offline Block 222.
  • the window shows a list of all workspaces (i.e., owned and shared) along with the tree structure within each workspace. The user is allowed to select which workspaces and which Visual Folders within the workspaces should be synchronized.
  • the user sets preferences for how he/she wants the Kahani Offline Block 222 to handle synchronization of content to the Coleo Cloud.
  • File Syncing preferences are accessed via the Main Desktop Coleo window > ⁇ > Preferences > File Syncing tab, where the user specifies how to handle file syncing for checking duplicates (new content), privacy level (new content), and deleted content.
  • the window includes the following sections:
  • the Kahani Offline Block 222 determines how to handle the content when synchronizing.
  • the user has the option to set his/her Delete preferences; this preference in the Coleo Cloud is overruled by determinations made in Desktop Coleo when syncing.
  • FIG. 40 shows the user interface for setting preferences respecting how modified content is handled upon synchronization in accordance with an example.
  • the user directs the Kahani Offline Block 222
  • synchronization functions how to handle content that the user has modified while in the offline mode.
  • the user needs to specify directions for Macro- and Mini-objects. These directions are used when Desktop Coleo contains content which also exists in the Coleo Cloud. In this example, the content in Desktop Coleo was modified since that content was last synchronized. Even if the content in the Coleo Cloud has a record of deletion or was modified after it was modified in Desktop Coleo, the modifications need to be synchronized to the Coleo Cloud using the File Syncing preferences for modified content. Note: If an existing Mini-object is incorporated in several Macro -objects, but on synchronization is created as new, those Macro- objects will still point to the original Mini-object, not the newly created one.
  • Modified Content - Create New - My Workspace Any modified content will be created as new within the user's own workspace. This includes content that the user has modified which was owned by other users.
  • the existing functions for "Create New - My Workspace" as defined in the Kahani for 3 rd Party Authoring Applications Block 220 for Save to Coleo Cloud apply, and the modified Mini-objects for slides and Macro-objects for presentations are substituted.
  • Modified Content - Create New - Owner's Workspace If the user has set his/her File Syncing preferences for modified content to "Create New - Owner's workspace", then for any modified content in another user's workspace a check will be performed: • Does the user still have Read + co-edit access to that modified content in the Coleo Cloud?
  • the modified content is created as new content in the user's own workspace.
  • Modified Content - Replace Existing Version - My/Owner's Workspace If the user has set his/her File Syncing preferences for modified content to "Replace Existing Version - My/Owner's Workspace", then for any modified content in another user's workspace a check will be performed:
  • Modified Content - Replace Existing Version - Everywhere If the user has set his/her File Syncing preferences for modified content to "Replace Existing Version - Everywhere", then for any modified content in another user's workspace a check will be performed:
  • FIG. 26 illustrates the replacement content notification sent to users when the owner replaces content in accordance with one example.
  • the synchronization will check for any tagging and untagging to Visual Folders.
  • Macro- and Mini-objects can be tagged to multiple folders without creating multiple copies in contrast to currently implemented prior art applications. If Macro- or Mini-objects have no tags, they are placed in Untagged.
  • Desktop Coleo has content that may be tagged to a Visual Folder since the last synchronization.
  • the Coleo Cloud has that content with no record of deletion, and:
  • the user tags Mini-object A to a Cars Visual Folder in
  • Mini-object A is not tagged to Cars, nor was it untagged from Cars, in the Coleo Cloud.
  • the mini-object will be tagged to Cars in the Coleo Cloud upon synchronization.
  • Desktop Coleo has content that was untagged from a Visual Folder since the last synchronization.
  • the Coleo Cloud has that content with no record of deletion, and:
  • mini-object A As an example, the user untags mini-object A from a Cars Visual Folder in Desktop Coleo. Mini-object A is still tagged to Cars in the Coleo Cloud. Mini-object A will be untagged from Cars in the Coleo Cloud upon synchronization.
  • the Coleo Cloud has content that was tagged to a Visual Folder since the last synchronization.
  • Desktop Coleo has that content with no record of deletion, and:
  • Mini-object A As an example, the user tags Mini-object A to a Cars Visual Folder in the Coleo Cloud. Mini-object A is not tagged to Cars, nor was it untagged from Cars in Desktop Coleo. Mini-object A will be tagged to Cars in Desktop Coleo upon synchronization. 4. Untagged in the Coleo Cloud: The Coleo Cloud has content that was untagged from a Visual Folder since the last synchronization. Desktop Coleo has that content with no record of deletion, and:
  • Mini-object A is tagged to Cars in Desktop Coleo.
  • Mini- object A is now untagged from Cars in Desktop Coleo upon synchronization.
  • the Synchronization Block 224 instantiates immediately after Desktop Coleo is running and synchromzation is set to activate. Synchronization will perform the following tasks:
  • Visual Folder structure the various workspaces, trees, and Visual Folders.
  • Mini-objects within My Visual Content belong to some parent Macro-object, and Macro-objects can contain Mini-objects that are from another Macro-object. Consequently, a Macro-object(s) can be synchronized that is in a Visual Folder which the user chose not to synchronize. As a result, the entire Visual Folder structure for the user's own workspace and all shared workspaces will still be synchronized, but the Visual Folders and content will not be visible to the user in the Desktop Coleo interface or in Desktop Coleo if the user has selected not to synchronize the content.
  • the Smart Delete Block 226 enables users to delete their own Mini-objects from either only their workspaces, or everywhere, including other users' workspaces that are using those Mini-objects. Prior art applications do not allow users to delete Mini-objects from within Macro-objects owned by other users across distributed cloud workspaces.
  • FIGS. 41-45 show the flowchart operations of the Smart Delete function in accordance with one example.
  • a request is sent to the server containing the Item type, Delete type, and the
  • Item's ID • Get the item from the database, set its Is Deleted flag to true, and update the database.
  • a notification is sent for each slide deleted with a thumbnail for each Mini- object deleted and the ability to copy the Mini-object if the owner deleted that Mini-object only within his/her workspace. If the owner selected to delete everywhere, a notification is sent to each user of the Mini-object informing him/her that the Mini-object was removed from his/her workspace at the request of the owner.
  • the Smart View Block 228 enables users to view all uploaded Macro- and Mini-object content and have the ability to filter the uploaded content regardless of the folder in which the content resides. In addition to filtering by content type, users will also be able to view all content within a date range. Prior art applications only allow users to view all Macro-objects within one folder at a time and even then do not provide users with the ability to sort or filter the content by type.
  • FIG. 46 illustrates one example of the view of all functionality.
  • the Smart Categorization/Tagging Rules Block 230 enables content to be categorized automatically based on user defined rules as the content is being uploaded to the user's workspace. Prior art applications do not provide this capability.
  • a user may manage (e.g. , add/edit/delete/run) rules by which content will be categorized automatically, by defining the rules.
  • the following icons are displayed to the user for selection:
  • the first screen will appear with only the icons. If there are existing rules, the rules are displayed one per line. By default, the rules will be shown newest to oldest, but the rules may be sorted by standard sorting options available in main area. For each rule, there is a checkbox to the left, followed by the name of the rule and a status (/. e. , Active or Inactive).
  • the user decides to add a rule.
  • the Add/Edit Rule will be loaded into the right-hand area.
  • a name field at the top of the right-hand area will be displayed with a default name: "NewRule [Date]".
  • the user may edit the Categorization rule name.
  • the Smart Categorization/Tagging Rules Block 230 checks to ensure that the new name does not match an existing Categorization rule name or is blank. If a match occurs, a warning is displayed. Following the check for a matching name, the following actions are performed:
  • Step 1 The user selects the type content to which the categorization rules will be applied.
  • Step 2 The user selects what the categorization will be based upon, e.g., by filename and/or by keywords in a title, text, notes, etc. If the user opts to categorize based upon keyword, he/she may specify if the keyword is within title, text, and/or notes, and by default all will be selected.
  • [ ] Content contains specific words in header/footer.
  • the user can select on each instance of "specific words" to set words for that condition. After the user has set words, those words will be underlined, and the user can select to add/edit the words set.
  • Example 1 - after words set
  • Step 3 The user is able to define rules for exceptions and will have the same options as in Step 2, above. If only images, audio, and/or video were selected, the option to exclude by keywords will be greyed out and may not be selected.
  • [ ] Content contains specific words (in the title, text, or notes).
  • Example 1 - after words set Content type: Visual Slides
  • the user may select "specific words” to define the words, and once set, may select the set words to modify them.
  • Step 4 The user can select for which Visual Folders content will be categorized. Based upon what was selected in Step 1 , above, the appropriate tree structure(s) will be displayed for the user's own workspace (My Workspace) and any groups of which the user is a member.
  • My Workspace My Workspace
  • a Categorize Rule definition will be displayed as to what the user selected in addition to selections in Steps 1, 2, and 3. The order of selected Visual Folders will match that shown in Step 4, not the order in which the Visual Folder was added. If the user changes his/her selection, the selection will update here as well. Each Visual Folder marked will he displayed on a separate line. If the user unmarks a Visual Folder in Step 4, the Visual Folder will be removed from the definition.
  • the user may turn the rule on/off and set the rule to run on existing content. If a rule is turned on, the rule will always be run on content being uploaded.
  • rule If the rule is set to run on existing content, the rule will run once.
  • FIGS. 47-49 illustrate the user interfaces for viewing rules and adding rules for tagging while content is being uploaded or for content already existing in the owner's workspace in accordance with one example.
  • the Smart Business Social Graph Block 232 enables people who share content with each other to take advantage of their online business social communities to gain access to content to which they would not otherwise have access.
  • the Smart Business Social Graph Block 232 enables users to see profiles of users in their connected workspaces and the connected workspaces of those other users. Users have visibility into the tree structure of each workspace and will have the ability to request access to any folder they can view. Users will be able to learn who is part of their connected workspaces as well as who is following them and who they are following with a comprehensive view of all social activity. Users will be able to view all public content belonging to other users from a single user interface. Also, users will be able to view pending access requests as well as the status of their requests for access to content owned by other users.
  • FIG. 50 shows how users can view and navigate the profiles of users in their connected workspaces.
  • a request is sent to the API.
  • a request is sent to the API.
  • a request is sent to the API containing the ID of the user who has requested
  • a request is sent to the API containing the ID of the user who has requested access to a Visual Folder/content and the ID and the type of the requested Visual Folder/content.
  • the owner can view his/her own workspace:
  • My Profile To the user who is the owner is following:
  • step e For every UserlD in the list from step c, above, find the user with that ID in the Users Collection and add the UserlD to the newly created users' list from the previous step d.
  • step f) Return the list of following users from step d, above, as a response and display the users.
  • the user will view the other user's workspace, excluding any Confidential Visual Folders to which other users do not have access.
  • the user can (i.e., select the arrow) expand the trees and Visual Folders and contract the other user, just as in My Workspace.
  • the user may subscribe to that Visual Folder by selecting the "Subscribe” icon, to the right of the Visual Folder name. If the user selects the "Subscribe” icon:
  • a request is sent to the API containing the ID of the owner's Public Profile, the ID of the Visual Folder, and the type of Visual Folder.
  • a new object is created with the OwnerlD.
  • a new subscription user object is created for the owner with the UserlD.
  • the user may request access to that Visual Folder by selecting the "Request Access” icon.
  • the “Request Access” icon When the user selects the "Request Access” icon:
  • a request is sent to the API containing the ID of the owner's Public Profile and the
  • users can rate Macro- and Mini-objects belonging to other users who have shared their content with the user as follows:
  • Rate Content When a user rates someone's content:
  • a request is sent to the API containing the ID of the user who owns that content, the ID of the content, and the rating value.
  • a user can add comments to any Macro- or Mini-object that is shared with that user.
  • the user may write a comment in the comment text area by entering a maximum 500 characters.
  • delete will be visible on the user's own comments. When delete is selected, the following occurs:
  • a request is sent to the API containing the ID of the content loaded in the metadata, the ID of the comment, and the ID of the poster.
  • a request is sent to the API containing the ID of the content loaded in the metadata, the ID of the comment to which "Reply" is selected, and the comment and the comment that was posted.

Abstract

A cloud-based system is disclosed including at least one local client device communicatively coupled, via an intermediate network, with a server device having an information processing, organization, and management engine, and further including distributed local and cloud databases spread across separately owned user accounts. The information processing, organization, and management engine includes one or more information processing, organization, and management blocks responsive to selections by the owner of content and other users of the system to control access to and use of content by users of the system.

Description

Description
Title
INFORMATION ORGANIZATION, MANAGEMENT, AND
PROCESSING SYSTEM AND METHODS
Field
[001] The present invention relates to document processing systems and methods. More particularly, the present invention is directed to an electronic information production and management system and methods to generate information from existing information and documents as well as new information and compile the generated information and create documents based on the compiled information. In addition, the present inventions relates to encryption, protection, and control of information within existing information and documents.
Background
[002] With prior art applications such as box.com, Google Drive, dropbox.com, hightail.com and all other similar cloud file sharing applications, sharing of content is limited to files, and in some cases, folder-level content. In other words, the only information users can share amongst each other is a complete file or a folder containing complete files. Once the complete files or folder is shared with other users, the other users may access the file(s) and/or folder(s) which become available in their account. The content is typically not organized by users, and in most cases, multiple actions are required to determine the ownership of shared content. In addition, current file sharing applications employ the one-to-many technique where one user shares his/her content with multiple other users. What these systems lack is a technique of many-to-many sharing where users can share content collectively amongst themselves and access collectively shared content organized by the users. Summary
[003] Various examples in accordance with the present invention provide a cloud-based system comprising at least one local client device communicatively coupled via an intermediate network with a server device including an information processing, organization, and management engine, and further comprising distributed local and cloud databases spread across separately owned user accounts. The information processing, organization, and management engine comprises one or more information processing, organization, and management blocks.
[004] By way of non-limiting examples in accordance with the present invention, the information processing, organization, and management engine comprises one or more of the following blocks; a Connected Workspaces Block to determine how an owner of information Macro-objects (presentations, spreadsheets, word processing documents, etc.), Mini-objects (content within those Macro-objects such as slides, pages, worksheets, etc.), and Micro-objects (e.g., information within the Mini-objects such as text, images, tables, charts, graphics, embedded video, embedded audio, etc.) shares, controls, encrypts, protects, tracks, and analyzes content by granting other users secure access to the information and how the information is visually displayed to those who have access to that content and how they are able to use, manage, and manipulate the information and to organize and display available users with whom the owner may share his/her content; a Grant Access/Smart Sharing Block to connect the owner's workspace to another user's workspace; a Smart Security Block to allow the owner to apply security to Macro-, Mini-, and Micro-objects, to apply inheritance rules, to protect content which is marked confidential or encrypted, to notify the owner when confidential information is re-shared, to add watermarks to Macro-, Mini-, and Micro-objects and to enable the owner to revoke access to another user who has access to the content via a re-share; a Make Content Non-Editable Block to determine how the owner may prevent a user from editing portions of a Macro- or Mini-object to which that user has been granted access by enabling an owner to mark portions of his/her Macro- or Mini-objects as uneditable by other users; a Smart Search Block to enable a user to find and access content across multiple distributed cloud-based user accounts or across an enterprise; a Display Search Results Block to determine how search results are displayed and how a user requests access to results to which he/she does not have access; a Find Similar Block to enable a user to search across connected workspaces or his/her enterprise to find content similar to his/her own content, including searching for an image within other content, and to replace his/her own content, in his/her own workspace or everywhere the content has been used, with content located during the search; a Smart Version Management Block to maintain versions of Macro-, Mini-, and Micro-objects as changed by any user who has been enabled to edit the Macro-, Mini-, or Micro-objects through permissions and to enable the owner of the content to rollback to any previous version, back to and including the original version, of a Macro-, Mini-, or Micro-object that has been modified; a Smart Copy/Create New Block to enable a user to copy content owned by another user to his/her own workspace and maintain the provenance of a Mini- or Micro-object including attribution to allow an original creator of content to be identified; a Smart Replace Block to enable the owner of Mini- or Micro-objects to replace his/her Mini- or Micro -objects with other Mini- or Micro-objects of the same type and to propagate the replacement Mini- or Micro-objects across all workspaces and within all Macro- objects that included the original Mini- or Micro-objects; a Kahani for 3rd Party Authoring Applications Block to enable a user to access, control, share, protect, track, and use connected workspaces from the cloud or from his/her desktop directly from within the corresponding application (including but not limited to Microsoft® Office, Google® Docs, Adobe® Creative Suite, Microsoft® Sway, Apple® authoring applications, etc.) to access Macro-, Mini-, or Micro-objects to which he/she has been granted access within the authoring applications to create new Macro- or Mini-objects or modify existing Macro- and Mini-objects; a Kahani Offline Block to control the way owned and shared content is synchronized to the owner's client device including synchronization of Macro, Mini-, and Micro-objects and to enable a user to grant access to other users directly from the user's local database; a Synchronization Block to synchronize Macro- , Mini-, and Micro-objects once the user is connected to the network; a
Smart Delete Block to enable a user to delete his/her own Macro-, Mini-, or Micro-objects from either only his/her workspace, or everywhere those objects are used, including another user's Macro- or Mini-objects in that other user's workspace; a Smart View Block to enable a user to view all uploaded Macro-, Mini-, and Micro-object content and have the ability to filter the uploaded content regardless of the folder in which the content resides; a Smart
Categorization/Tagging Block to enable content to be categorized automatically based on user defined rules as the content is being uploaded to the user's workspace; a Smart Business Social Graph Block to enable persons who share content with each other to take advantage of their online business social communities to gain access to content to which they would not otherwise have access; a Manage Workspaces Block to enable users to manage and organize their connected workspaces in the cloud by hiding workspaces or adding workspaces to favorites; a Smart Statistics Block to enable statistics to be provided to the owner of content respecting use of the content; an Object Extraction Block to extract Macro- and Mini-objects as well as Micro-objects from within the Mini-objects; a Remove Duplicate Block to enable a user to identify and eliminate duplicate Mini- and Micro-objects from within his/her Macro-objects, ensuring every Mini- and Micro-object has only one copy existing in a user's workspace so when changes are made to that one copy, the changes are reflected within every Macro- and Mini- object in which the Mini- or Micro-object resides; a Create New File Block to enable a user to mix-and-match Mini- and Micro-objects from multiple workspaces across the distributed cloud databases from within the cloud interface to create new Macro- or Mini-objects; a Kahani Glass Block to enable a user to add comments in the form of text or graphics within existing Macro- and Mini-objects for the purpose of providing feedback without altering the content of the Macro- and Mini-objects; an Add Comments to Links Block to enable viewers to add comments using text or graphics on top of Macro- and Mini-objects shared with them via a secure Web link; a Kahani Encryption Block to enable content owners to encrypt Macro- and Mini-objects to protect the objects and control how users access and interact with the objects and to permanently embed the protection into the Macro- and Mini-objects such that the protection and encryption controls travel with the Macro- and Mini-objects regardless of where the objects travel, inside or outside the system environment; a Smart Tracking Block to enable owners of information to see exactly where the information is used, including but not limited to new information created by the owner or users who have access to the information, within or outside the enterprise; a Real Time Update Block to enable 3rd Party Authoring Applications to notify users of shared information that the shared information they are using in the then current document has been changed by the owner or by people authorized to change the information and to give the user of said information the ability to review the changes and adopt or reject the changes in real time depending on whether the owner or modifier of said information requested a mandatory or optional propagation of the change everywhere the information is used; and a Smart Notifications Block to notify owners and users of content when actions are taken with the content.
[005] The present invention solves the following prior art shortcomings which users who want to share content deal with today:
• How information (entire files and within files) is shared and viewed
· How the shared information is maintained
• How the shared information is tracked • How the shared information is controlled
• How the shared information is encrypted and protected
• How the shared information is used to create new information
• How ownership is determined for shared information at the file level or information within a file at the document level
The present invention provides new capabilities currently missing in the prior art including the following capabilities:
• How shared information is protected secured
• The level at which the information is protected/secured
• How the shared information is used to search for similar information across
databases/workspaces of multiple users
• How the shared information is controlled, including but not limited to the updating of the information wherever it is used, inside or outside the enterprise, the instant revocation of the shared information from within documents inside or outside the enterprise, the tracking of shared information for data mining purposes or to measure the effectiveness of the information inside or outside the enterprise.
• How collaborators can use portions of the shared information from multiple
sources/documents to create new information
• How enterprises in the business of licensing information for use can track and charge users who have used proprietary information without authorization
• How an enterprise can avert liability by searching for and removing
incoirect/invalid/outdated/unauthorized/confidential information from every network node existing within the enterprise
• How an enterprise can avert liability by searching for and removing
incorrect/invalid/outdated/unauthorized/confidential information from every network node outside of the enterprise
• How owners of information can revert to any previous revision of their information and manage that decision across all network nodes that have used the information in their own content
• How owners of information can track the use of the information inside their own or other users' documents • How users with access to the information can provide feedback to the owners directly on the content without altering the information itself
• How owners and users of information can view and use all information to which they have access directly within third party applications used to create new information. This includes, but is not limited to: Microsoft® Office products; Adobe® Creative Suite Products; Google® Docs; and Apple® Pages, Numbers, Keynote, Docs to go.
• How third party application mentioned above can be altered to keep track of information belonging to specific owners even when information from multiple owners is used to create new documents.
Brief Description of Drawings
[006] In the following description, for purposes of explanation, numerous specific examples are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to persons skilled in the art that the present invention can be practiced without the specific details described by way of example. In other instances, structures and devices are shown in block diagram form only in order to avoid obscuring the present invention.
[007] The present invention, in accordance with one or more various examples, is described in detail with reference to the following drawing figures. The drawing figures are provided for purposes of illustration only and merely depict examples in accordance with the present invention. These drawing figures are provided to facilitate the reader's understanding of the present invention and shall not be considered limiting of the breadth, scope, or applicability of the present invention. It should be noted that for clarity and ease of illustration the drawing figures are not necessarily made to scale.
[008] FIG. 1 shows a block diagram of a deployment implementation for a document and information processing system, in accordance with a non- limiting example of the present invention.
[009] FIG. 2 shows a high-level functional block diagram of various components of the document and information processing system in accordance with one non-limiting example of the present invention. [0010] FIGS. 3-61 show flowcharts, user interfaces (UIs), and tables pertaining to various techniques for document processing in accordance with examples of the methods of the present invention.
[0011] FIG. 62 shows a high-level block diagram of hardware for implementing a server device and/or a client device in accordance with an example of the present invention.
[0012] The drawing figures are not intended to be exhaustive or to limit the present invention to the precise form disclosed. It should be understood that the present invention can be practiced with modification and alteration, and that the present invention is limited only by the claims and the equivalents thereof. Description of Embodiments
[0013] Reference in this specification to "an example" or "one example" means that a particular feature, structure, or characteristic described in connection with the example is included in at least one example of the present invention. The appearance of the phrase "in one example" in various places in the specification is not necessarily all referring to the same example, nor are separate or alternative examples mutually exclusive of other examples.
Moreover, various features are described which may be exhibited by some examples and not by others. Similarly, various requirements may be described which are requirements for some examples but not other examples.
[0014] Moreover, although the following description contains many details for the purposes of illustration, persons skilled in the art will appreciate that many variations and/or alterations to said details are within the scope of the present invention. Similarly, although many of the features of the present invention are described in terms of each other, or in conjunction with each other, persons skilled in the art will appreciate that many of these features can be provided independently of other features. Accordingly, the following description of the present technology is set forth without any loss of generality to, and without imposing limitations upon, the present invention.
[0015] As used herein, the term "block" or "module" describes a given unit of functionality that can be performed in accordance with one or more examples of the present invention. A module might be implemented utilizing any form of hardware, software, or a combination thereof. For example, one or more processors, controllers, ASICs, PLAs, PALs, CPLDs, FPGAs, logical components, software routines, or other instrumentalities might be implemented to make up a module. In implementation, the various modules described herein might be implemented as discrete modules or the functions and features described can be shared in part or in total among one or more modules. In other words, as would be apparent to persons skilled in the art after reading this description, the various features and functionality described herein may be implemented in any given application and can be implemented in one or more separate or shared modules in various combinations and permutations. Even though various features or elements of functionality may be individually described or claimed as separate modules, persons skilled in the art will understand that these features and functionality can be shared among one or more common software and hardware elements, and such description shall not require or imply that separate hardware or software components are used to implement such features or functionality.
[0016] Where components or modules described in conjunction with the examples of the present invention are implemented in whole or in part using software, in one example, these software elements can be implemented to operate with a computing or processing module capable of carrying out the functionality described with respect thereto. After reading this description, it will become apparent to persons skilled in the relevant art how to implement the invention using other computing modules or architectures.
[0017] Broadly, examples of the present invention provide an information processing, organization, and management system and methods. As used herein the term "file" is to be construed broadly to include any type of document or information stored in office applications such as the Microsoft Office® or Adobe Creative Suite®. The term "document" may include a PowerPoint® file, an Excel file, a Word file, an image, a video, or an audio file, etc.
[0018] For descriptive convenience, the information processing, organization, and management system in accordance with the various examples of the present invention will be referred to as the "Coleo System" 100 in FIG. 1. FIG. 1 illustrates a cloud-based
implementation 102 for the Coleo System 100 in accordance with one example of the present invention.
[0019] The following is a glossary of terms to be used in describing the Coleo System 100 and the information processing, organization, and management methods implemented by said system in accordance with various examples of the present invention. [0020]
Figure imgf000010_0001
permissions to read, co-edit, and re-share confidential content.
Owner's Connected A method of displaying all users who have shared content with Workspaces each other and have accepted the sharing of content amongst each other
Macro-Object Sharing A Workspace Owner can share entire Macro-objects (files or documents)
Locked Mini-Objects A Workspace Owner may have used shared Mini-objects as to which the Owner has since revoked access. Any Macro-object a Share Designee created using these Locked Mini-Objects will still contain these Locked Mini- Objects, but they will be designated with a lock icon. Additionally, upon being loaded, the notification area will show the message: "WARNING: This Macro-object contains Mini-objects to which you no longer have access, which are designated by the lock icon. If you remove a Mini-object with the lock icon, they cannot be added back to the Macro-object." The Coleo System enables Share Designees to copy the locked Mini-objects to their own workspace.
Coleo Tree Pane A pane added to PowerPoint® to display the Owner's workspace tree. Available only in the PowerPoint® Add-on
Coleo Objects Pane A pane directly to the right of the Coleo Tree Pane added to
PowerPoint® to display the Coleo Objects within the Visual Folders in the Coleo Tree Pane. Available only in the
PowerPoint® Add-on
Collections Components of information management and organization
methods used to collect specific information regarding a piece of content - Macro-, Mini-, and Micro-objects.
3rd Party Authoring Authoring applications owned by other companies and used by Applications document authors to compile information to create new document types. Examples include but are not limited to Microsoft® Office® applications, Adobe® Creative Suite® applications,
Apple® authoring applications, and Google® Docs.
Frozen Objects Mini- and Micro-objects frozen by owners or users who have
access to the content in order to prevent optional or forced updates
[0021] Referring again to FIG. 1, in accordance with one non-limiting example of the present invention, the Coleo System 100 comprises a client device 104 communicatively coupled with a server device 108 via an intermediate network 106. In one example, the network 106 may comprise the Internet, a wide area network (WAN), metropolitan area network (MAN), local area network (LAN), telephone networks, and/or a combination of these and other networks (wired, wireless, public, private, or otherwise).
[0022] In one example, the server device 108 may include a digital data processing apparatus of the type commercially available in the marketplace suitable for operation as described herein, as adapted in accordance with the teachings hereof. Although the server device 108 may typically be implemented in a server-class computer, such as a minicomputer, it may also be implemented in a desktop computer, workstation, laptop computer, tablet computer, PDA, mobile phone, car mapping device, or other suitable apparatus (again, as adapted in accordance with the teachings hereof).
[0023] The server device 108 also comprises central processing, memory, storage, and input output units and other constituent components (not shown) of the type conventional in the art that are configured in accordance with the teachings hereof by a document processing engine 108a.
[0024] Although only a single server device 108 is depicted and described here, it will be appreciated by persons skilled in the art that other examples may have greater numbers of server devices disposed near and/or far from one another, colocated behind one or more common firewalls or otherwise. Those other server devices may differ in architecture and operation from that shown and described here and/or from each other, all consistent with the teachings hereof.
[0025] The client device 104 may include a mobile phone, a laptop computer, a tablet computer, a personal digital assistant (PDA), or other digital data processing apparatus of the type that is commercially available in the marketplace and that is suitable for operation as described herein, or as adapted in accordance with the teachings hereof. In one example, the client device 104 may be provisioned with a user agent 104a, e.g., a browser, whereby the client device 104 may access the document processing engine 108a.
[0026] FIG. 2 illustrates the components of the document processing engine 108a, in accordance with one non-limiting example of the present invention. As shown, the information processing, organization, and management engine 108a comprises a Connected Workspaces Block 200; a Grant Access/Smart Sharing Block 202; a Smart Security Block 204; a Make Content Non-Editable Block 206; a Smart Search Block 208; a Display Search Results Block 210; a Find Similar Block 212; a Smart Version Management Block 214; a Smart Copy/Create New Block 216; a Smart Replace Block 218; a Kahani for 3rd Party Applications Block 220; a Kahani Offline Block 222; a Synchronization Block 224; a Smart Delete Block 226; a Smart View Block 228; a Smart Categorization/Tagging Block 230; a Smart Business Social Graph Block 232; a Manage Workspaces Block 234; a Smart Statistics Block 236; an Object Extraction Block 238; a Remove Duplicate Block 240; a Create New File Block 242; a Smart Tracking Block 243; a Kahani Encryption Block 244; an Add Comments to Links Block 245; a Kahani Glass Block 246; a Real Time Update Block 247; and a Smart Notification Block 248. The functions and operations of each of the aforesaid components/blocks will become apparent from the description below.
[0027] The Connected Workspaces Block 200 provides a functionality that determines how owners of information Macro-objects (presentations, spreadsheets, word processing documents, etc.), Mini-objects (the content within the Macro-objects such as slides, pages, worksheets, etc.), and Micro-objects (information within the Mini-objects such as text, images, tables, charts, graphics, embedded video, embedded audio, etc.) share the content by granting other users secure access to the information and how the information is visually displayed for those who have access to that content and how they are able to use, manage, and manipulate the information using the information management method in accordance with the present invention. This also creates a new approach to organizing and displaying available users with whom the owner may share his/her content, Prior art cloud file sharing applications, as defined in the glossary, only enable sharing of complete documents and do not organize shared documents by owner, preventing users from quickly determining ownership of content that is shared with them. Also, prior art applications provide their customers an email-like interface where they do not have a graphical or textual list of all users with whom they have shared before. Their customers have to instead type in email addresses every single time they want to share content with other users.
[0028] In one example, once the owner has instantiated the Grant Access/Smart Sharing Block 202, the following steps are performed to connect the owner's workspace to the Share Designee's workspace.
1. A request is sent to an API containing the ID(s) of the selected content/multiple
contents/Visual Folder(s), the USE IDs to whom access is being granted, and the permission level (read and/or edit), and the parentID of the selected content.
2. A search is performed for the ID of the selected content in all collections to identify the type of content selected.
3. A check of a UserlD database is performed to determine if any of the UserlDs already have existing access/permission to one or more of the pieces of content in the appropriate collections.
4. If the UserlD does not exist for a particular collection, the UserlD is added to the database.
5. The user permission is updated so the UserlD sent in the request is added to UserlD property of user permissions, and the permission level property is updated to grant permission.
6. The users corresponding to the UserlDs are notified of their permission to access the new content.
• In accordance with one non-limiting example, if this is the first time the owner has granted access to the user in order to connect workspaces with the user, the user will be asked to accept the request to connect workspaces with the owner. Once accepted, the owner's workspace will be loaded into the user's workspace and will include only content to which access has been granted, based on privacy rules defined in the Smart Security Block 204 as will be described below.
• If the user's workspace was already connected to the owner's workspace, the owner's workspace is loaded into the user's workspace and will include only content to which access has been granted, based on the privacy rules as defined in the Smart Security Block 204 as will be described below. connected workspace may then be built and connected.
o A request is sent to the API, containing the UserlD for the logged-in user. o All Visual Folders to which this user has access are located.
o A new list that contains all Visual Folders and objects for that user with access to Visual Folders is created,
o For each Visual Folder:
The Visual Folder in the Visual Folders Collection is accessed.
The tree structure for the accessed Visual Folders is fetched.
The tree structure is then added to the List Visual Folder Trees.
o A new list is created: Content Tree>that will contain all Macro-objects to which the user has access,
o An action is performed to locate all Macro-objects from [corresponding
Macro-object] Permission Collection where the User ID is equal to the ID of the logged user.
o For each Macro-object that is located, the following operations are performed:
Get the TreelD from the object.
Find the Visual Folders in the Visual Folders Collection where the Visual Folder ID is equal to the TreelD.
Get the tree structure for this Visual Folder.
Add the Macro-object and the tree structure for this Macro-object in the Macro -object list
o A tree object is created comprising:
Tree list
Visual Folder tree list
Macro-object list
o A response is sent back containing this tree object.
o The tree structure may be displayed according to the following process:
First, the tree will be built based upon the Visual Folder tree list.
Then, for each Macro-object from the macro-object list, check if the
Macro-object tree list tree structure is already built; if yes, add the Macro- object in the folder with ID equal to the TreelD from the Macro-object; otherwise, build the tree according to the Macro-object list tree structure. ■ List Mini-object tree structure.
[0029] FIG. 3 shows how connected workspaces may be displayed as performed by the Connected Workspaces Block 200 in accordance with one example of the present invention.
[0030] In one example, workspaces from multiple users are connected together based on how access was granted to the workspaces and how viewing and editing permissions were set. Once the owner of a workspace has populated the workspace with content (folders, documents, and content inside the documents), the owner can begin the process of sharing the content by granting access to other users.
[0031] In one example, when the owner of information wishes to grant access to My Visual Content Folders or My Files Folder in order for the folder and its content to be connected to the workspaces of one or more other users, the owner selects a "Grant Access" function.
[0032] FIG. 4 shows the user interface for the grant access screen (right-hand area), and FIGS 5-8 show the flowchart for operations as defined in the Smart Sharing/Grant Access Block 202, in accordance with one example.
[0033] In accordance with one example, the "Grant Access" input is received from the owner and the following checks and actions are performed.
1. Fetch all Visual Folders and display the tree.
• A request is sent to the API to locate all Visual Folders that exist in the system for the current owner.
• A response is sent back containing the list of Visual Folders.
• In the left area, display the tree of Visual Folders and content thumbnails /documents underneath the tree.
2. Fetch all existing users and display the tree.
• A request is sent to the API to locate all IDs in the following Collections:
• UserCollection
• MyContactUserColIection
• FreemiumUserCollection
• FavoritesUserCollection
• GroupsUserCollection • In the right hand area, display in the following order:
• An input field to type in email address(es) of new freemium user(s) who are not part of owner's connected workspaces.
• A sortable, alphabetical list of returned favorite Users
• A sortable, alphabetical list of returned Freemium Users
• A sortable, searchable, alphabetical list of returned Favorites Users
• A sortable, searchable, alphabetical list of returned Groups
• A sortable, searchable, alphabetical list of returned My Contacts
[0034] In one example, to select content to which access is granted, the owner can select one or more visual content (any Mini- and/or Macro-object) or hierarchical Visual Folder in the owner's workspace or any of the owner's connected workspaces. All of the above- mentioned content may be selected individually or collectively.
[0035] In an example, to grant access to selected content, the owner can grant "view" and "can edit" permissions to one or more users. When the owner grants access to a user(s), the following actions are performed.
[0036] The functionality of the Smart Security Block 204 determines how security is handled. Unlike prior art cloud file sharing applications, where privacy levels can be set at the folder or file level only, in accordance with a non-limiting example of the present invention the Smart Security Block 204:
1. Allows owners to apply security to Macro- and Mini-objects. This is important because often only some information within documents requires confidential treatment, but because owners are forced to mark entire documents confidential, true sharing and collaboration of the non-confidential information within the document is impaired.
2. Applies smart security inheritance rules, and the user is given new protections for content which is marked confidential.
3. Notifies the owner when confidential information is re-shared and provides the owner a way to revoke access from anyone/everyone who has access to the content via a re- share.
[0037] In one example, a user may choose to set the privacy level of Macro-obj ects, Mini-objects, and Visual Folders. The user may choose from the following settings: Public, Private, Confidential, non re-sharable, not-downloadable, frozen, non-editable, watermark, and Non- Searchable. Encryption of Macro-, Mini-, and Micro-objects is defined in the Kahani Encryption Block 244. If the user sets privacy on a Macro-object, the following process is performed:
1. Fetch the selected content from the main area or from the Smart Search Block 208.
2. A request is sent to the API, containing the IDs of the selected items
3. If multiple portions of content are selected:
• Load the names of the selected items in right-hand area, and below show blank radio buttons for "Private", "Public", "Confidential", "Cannot eshare", "Not- downloadable", "Freeze", "Non Editable", "Watermark", and "Non-searchable" settings.
4. If one item is selected:
• Load the right-hand area with name of the item at the top, and below show blank radio buttons for "Private", "Public", "Confidential", "Non re-sharable", "Not- downloadable", "Freeze", "Non Editable", "Watermark", and "Non-searchable" settings (marked or unmarked, depending on what has been set for this item previously read from the returned basic information).
• If the non-editable forever flag is set to true, then the checkbox will be inactive and gray.
5. In accordance with one non-limiting example, when the owner marks a user with some permission, the following actions are performed:
• A request is sent to the API containing the ID of the selected Visual Folder/Macro-object/Mini-object, the ID of the user for whom permissions are to be added, and the permission level (read or co-edit), and also the parentID of the selected item (the parentID is needed if a Macro- or Mini-object is selected to ascertain in which Visual Folder the selected object is located).
• Search for the ID of the selected Visual Folder/Macro-object/Mini-object in the Visual Folders/Macro-object/Mini-object Collection, with respect to the action, to determine what type of item is selected.
1. If a Visual Folder level is selected: • Check if the Visual Folder ID exists in the Visual Folder tree permissions Collection.
• If the ID does not exist in the Collection, add the ID to the database; otherwise if the ID exists, fetch that object.
• Update the user permission of the object, so the UserlD sent in the request is added to UserlD property of user permissions, and the permission level property is updated with the permission level.
• Save the changes to the database.
If a Mini-object is selected:
• Check if the Mini-objectID sent in the request exists in the Mini-object permission collection.
• If the Mini-objectID does not exist in the Collection, add the ID to the database; otherwise if the ID exists, fetch that object.
• Update the Visual Folder ID property so it will be set to the value of the parentID of the Mini-object.
• Update the user permission property to contain the UserlD sent in the request, and set the permission level based on the permission level sent in the request.
• Save the changes to database.
If a Micro-object is selected:
• Check if the Micro-objectID sent in the request exists in the Micro-object permission collection.
• If the Micro-objectID does not exist in the Collection, add the ID to the database; otherwise if the ID exists, fetch that object.
• Update the Visual Folder ID property so it will be set to the value of the parentID of the Micro-object.
• Update the user permission property to contain the UserlD sent in the request, and set the permission level based on the permission level sent in the request.
• Save the changes to database.
If a Macro-object is selected: • Check if the Macro-objectID sent in the request exists in the Macro-object permission Collection.
• If the Macro-objectID does not exist in the collection, add it to the
database; otherwise, if it exists, get that object.
• Update the Visual Folder ID property so it is set to the value of the
parentID of the presentation.
• Update the user permission property to contain the UserlD sent in the request, set the permission level based on the permission level sent in the request, and set the inherited permission flag to false.
• Save the changes to the database.
[0038] In one example, in the case content is confidential, the owner of a Macro -object containing confidential Mini- or Micro-objects may grant access to the Macro-object to one or more users. The following describes how access may be granted:
1. A request is sent to the owner containing the ID(s) of the selected Macro-object(s).
2. Second Action: Find the Macro-object with ID sent in the request in the Macro- object Type Collection.
3. Third Action: Check the "Privacy Level" property to determine if the Mini- or
Micro -object(s) are Confidential.
4. Fourth Action: Stop the iteration of Mini- or Micro-object(s) and return a response confirming that the Macro-object targeted for access contains a confidential Mini- or Micro- object(s).
5. Fifth Action: Allow the owner to decide to authorize access to confidential Mini- or Micro-objects within the Macro-object being shared.
• If yes, grant access to the entire Macro-object.
• If no, redact confidential Mini- or Micro-objects from the Macro-object prior to granting access.
[0039] In another example, a user may grant access to a Macro-object that contains confidential Mini- or Micro-objects owned by another user:
1. A request is sent containing the ID(s) of the selected Macro-object(s).
2. Find the Macro-object having the ID sent in the request in the Macro- Object Type Collection. 3. Fetch the Mini - or Micro -obj ect(s) in the Macro-obj ect.
4. Check the "Privacy Level" property to determine if the Mini- or Micro-object(s) are confidential. Stop the iteration of the Mini- or Micro-object(s) and return a response confirming that the Macro-object targeted for access contains a confidential Mini- or Micro-objects(s) which is not owned by the user.
5. Allow the user to decide to proceed and authorize access to confidential Mini- or Micro-objects that are owned by other users within the Macro-object being shared.
• If yes, authorize access to the entire Macro-object, including confidential Mini- and Micro-objects owned by other users.
• Send notification(s) to the owner(s) of confidential Mini- or Micro-objects
notifying them that users have been indirectly granted access to the owner's confidential Mini-objects in accordance with the Smart Notification Block 248.
• Provide the name of the user who has been granted access indirectly to the owner's confidential Mini- or Micro-objects.
• Provide a thumbnail corresponding to each item of confidential content to which access has been granted.
• Provide a remove access button for each confidential Mini- or Micro-object, one for the user who indirectly granted access and another for the user who indirectly received access.
• If no, remove confidential Mini- or Micro-objects from the Macro-object prior to authorizing access.
[0040] Users receive a sharing confirmation dialog regarding confidential Visual Folders or Macro-, Mini-, or Micro-objects when they do one of the following:
1. Grant access to a non-confidential Visual Folder(s) which contains a confidential sub- folder(s) and/or Macro-, Mini, and/or Micro-object(s).
2. Grant access to a non-confidential Macro -obj ect(s) which contains a confidential Mini-object(s).
3. Grant access to one or more other users' (>=1 user's) confidential Mini- and/or
Micro-objects(s). 4. Grant access to a combination selected from another user's confidential Mini- and/or Micro-objects plus non-confidential Macro-objects(s) which contain confidential Mini- or Micro-objects(s).
[0041] FIG. 9 illustrates an example notification a user receives when granting access to a Macro-object (e.g. , a presentation) with a confidential Mini-object(s) (e.g. , a slide). FIG. 10 illustrates a user interface for managing security utilizing the Smart Security Block 204, in accordance with one example.
[0042] In one example, owners of content are enabled to choose if their own Mini- objects within their Macro-objects may be re-shared by other users. The owner of a Mini- object(s) is not affected; the object continues to behave like a sharable object for the owner. However, for all other users with access to the Mini-objects, this setting will affect the share functionality on the cloud-based application and the local application corresponding to the original application that created the Mini-object. For the purposes of this description, the application for PowerPoint® will be used as an example.
[0043] In order to set content as non re-sharable, a user needs to select some content and navigate to a "Set Privacy Level" option of the Smart Security Block 204.
[0044] In one example, the user selects one or more Mini-objects from the main area and marks the checkbox for "Make Cannot Reshare" setting. This setting enables the owner to limit the re-sharing of Macro-, Mini-, and Micro-objects. The following process is then performed:
1. Fetch a list with ID(s) of selected Mini-object(s).
2. Pass the list and information for checkbox state (in this case, marked).
3. A request is sent to the API, containing the list of ID(s) for selected Mini-objects, and enum for the checkbox's state.
4. Retrieve the Mini-objects from the database according to the selected ID(s).
5. Check to determine if any selected Mini-object does not belong to the logged-in user.
6. For each Mini-object:
• If the logged-in user is not the owner of the Mini-object, take no action and notify the logged-in user that he/she does not own the Mini-object and therefore cannot set the Mini-obj ect as Cannot Reshare . • If the Mini-object is owned by the logged-in user, mark the Mini-object cannot re- share and update the Mini-object in the database.
7. Add a "cannot reshare" icon on each of the Mini-object(s) marked cannot reshare so users know they should not re-share that Mini-object.
8. Each Mini-object that is marked cannot reshare can be unmarked at any time by the owner of the Mini-object.
9. If the cannot reshare Mini-object is used in a Macro-object by other users, when
resharing the Macro -object with other users, the Mini-object marked cannot reshare will be first removed from the Macro-object.
Steps 1-9, above, apply to Macro- and Micro-objects, as well.
[0045] In one example, owners and users of content are enabled to choose if Mini- objects within their Macro-objects may be frozen in order to maintain a record of information as it was at a specific time within a specific Macro-object shared with or seen by specific users or people. The Mini-object(s) is only affected within the context of the Macro-object where it was frozen; the Mini-object continues to behave like an unfrozen object everywhere else it exists. However, for all other users with access to the Mini-objects, this setting will affect the forced propagation of changes on the cloud-based application and the local application corresponding to the original application that created the Mini-object. For the purposes of this description, the application for PowerPoint® will be used as an example.
[0046] In order to set content as frozen, a user needs to select some content and navigate to a "Set Privacy Level" option of the Smart Security Block 204.
[0047] In one example, the user selects one or more Mini-objects from the main area and marks the checkbox for "Freeze" setting. The following process is then performed:
1. Fetch a list with ID(s) of selected Mini-object(s).
2. Pass the list and information for checkbox state (in this case, marked).
3. A request is sent to the API, containing the list of ID(s) for selected Mini-objects, and enum for the checkbox's state.
4. Retrieve the Mini-objects from the database according to the selected ID(s).
5. Check to determine if any selected Mini-object is being selected within a Macro - object. 6. If not within the context of a Macro-object, notify the user that the "freeze" control is only applied to Mini-objects within specific Macro-objects.
7. For each Mini-object selected within a Macro-object:
• If the logged-in user is not the owner of the Mini-object, mark the Mini-object as frozen only within the Macro-object containing the Mini-object and update the Mini-object in the database for the user for the Macro-object and notify the owner of the Mini-object that the user has marked it as frozen within the Macro-object.
• If the Mini-object is owned by the logged-in user, mark the Mini-object frozen only within the Macro-object within which the owner has chosen to freeze the Mini-object and update the Mini-object in Macro-object in the database for the owner.
8. Add a "frozen" icon on each of the Mini-object(s) marked frozen inside a Macro- object so users know that the Mini-object cannot be updated even when the owner or users with co-edit rights request a force update whenever the Mini-object is modified and a new version is created,
9. Notify users who have frozen Mini-objects that the owner or users with co-edit rights have updated the Mini-object, and provide users the option to unfreeze and adopt new changes.
10. Notify owners or users with co-edit rights who chose to propagate their changes everywhere that the changes were not propagated where the Mini-object is marked as frozen.
1 1. Provide owners of Mini-objects that are marked as frozen by other users the ability to see every user and every Macro-object that has been marked as frozen.
12. Each Mini-object that is marked frozen can be unmarked at any time by users who marked it as frozen..
[0048] Steps 1-12, above, apply to Macro- and Micro-objects, as well.
[0049] In one example, owners of content are enabled to choose if their own Mini- objects within their Macro-objects may be searchable by other users. The owner of a Mini- object(s) is not affected; the object continues to behave like a searchable object for the owner. However, for all other users with access to the Mini-objects, this setting will affect the search functionality on the cloud-based application and the local application corresponding to the original application that created the Mini-object. For the purposes of this description, the application for PowerPoint® will be used as an example.
[0050] In order to set content as non-searchable, a user needs to select some content and navigate to a "Set Privacy Level" option of the Smart Security Block 204,
[0051] In one example, the user selects one or more Mini-objects from the main area and marks the checkbox for the "Make Non-searchable" setting. The following process is then performed:
1. Fetch a list with ID(s) of selected Mini-object(s).
2. Pass the list and information for checkbox state (in this case, marked).
3. A request is sent to the API, containing the list of ID(s) for selected Mini-objects, and enum for the checkbox's state.
4. Retrieve the Mini-objects from the database according to the selected ID(s).
5. Check to determine if any selected Mini-object does not belong to the logged-in user.
6. For each Mini-object:
• If the logged-in user is not the owner of the Mini-object, take no action and notify the logged-in user that he/she does not own the Mini-object and therefore cannot set the Mini-object as non-searchable.
• If the Mini-object is owned by the logged-in user, mark the Mini-object non- searchable and update the Mini-object in the database.
7. Each Mini-object that is marked non-searchable can be unmarked at any time by the owner of the Mini-object.
Steps 1-7, above, apply to Macro- and Micro-objects, as well.
[0052] In one example, owners of content are enabled to choose if their own Mini- objects within their Macro-objects may be downloadable by other users. The owner of a Mini- object(s) is not affected; the object continues to behave like a downloadable object for the owner. However, for all other users with access to the Mini-objects, this setting will affect the download functionality on the cloud based application and the local application corresponding to the original application that created the Mini-object. For the purposes of this description, the application for PowerPoint® will be used as an example.
[0053| In order to set content as non re-sharable, a user needs to select some content and navigate to a "Set Privacy Level" option of the Smart Security Block 204. [0054] In one example, the user selects one or more Mini-objects from the main area and marks the checkbox for a "Make Non Downloadable" setting. This setting enables the owner to ensure sensitive Macro-, Mini-, and Micro-objects cannot leave the system environment to be emailed or stored on alternative storage such as the cloud or external drives. The following process is then performed:
1. Fetch a list with ID(s) of selected Mini-object(s).
2. Pass the list and information for checkbox state (in this case, marked).
3. A request is sent to the API, containing the list of ID(s) for selected Mini-objects, and enum for the checkbox's state.
4. Retrieve the Mini-objects from the database according to the selected ID(s).
5. Check to determine if any selected Mini-object does not belong to the logged-in user.
6. For each Mini-object:
• If the logged-in user is not the owner of the Mini-object, take no action and notify the logged-in user that he/she does not own the Mini-object and therefore cannot set the Mini-object as non-downloadable.
• If the Mini-object is owned by the logged-in user, mark the Mini-object non- downloadable and update the Mini-object in the database.
7. Add a "non-downloadable" icon on each of the Mini-object(s) marked non- downloadable so users know that they cannot/should not attempt to download that Mini-object.
8. Each Mini-object that is marked non-downloadable can be unmarked at any time by the owner of the Mini-object.
9. If the Non-downloadable Mini-object is used in a Macro-object by other users, when downloading the Macro-object to a local hard drive, another cloud location, or an external drive, the Mini-object marked non-downloadable first will be removed from the Macro -object.
Steps 1-9, above, apply to Macro- and Micro -objects, as well.
[0055] In one example, owners of content are enabled to choose if their own Mini- objects should be watermarked for permanent identification of their special or sensitive nature. The owner of a Mini-object(s) is not affected; the object continues to behave like a non- watermarked object for the owner. However, for all other users with access to the Mini-objects, this setting will affect the viewing functionality on the cloud-based application and the local application corresponding to the original application that created the Mini-object. For the purposes of this description, the application for PowerPoint® will be used as an example.
[0056] In order to add a watermark on content, a user needs to select some content and navigate to a "Set Privacy Level" option of the Smart Security Block 204.
[0057] In one example, the user selects one or more Mini-objects from the main area and marks the checkbox for "add watermark" setting. The following process is then performed:
1. Fetch a list with ID(s) of selected Mini-object(s).
2. Pass the list and information for checkbox state (in this case, marked).
3. A request is sent to the API, containing the list of ID(s) for selected Mini-objects, and enum for the checkbox's state.
4. Retrieve the Mini-objects from the database according to the selected ID(s).
5. Check to determine if any selected Mini-object does not belong to the logged-in user.
6. For each Mini-object:
· If the logged-in user is not the owner of the Mini-object, take no action and notify the logged-in user that he/she does not own the Mini-object and therefore cannot add a watermark to it.
• If the Mini-object is owned by the logged-in user, present the owner with the ability to upload a watermark image to add to the Mini-object.
7. Add the watermark image to the Mini-object so users know that the owner has chosen to identify the object as sensitive or special.
8. Each Mini-object that is marked with a watermark can be unmarked at any time by the owner of the Mini-object.
9. If the watermarked Mini-object is used in a Macro-object by other users, the object is permanently watermarked and remains so even if the object is removed from the system environment by being saved to a local hard drive, another cloud location, or an external drive.
Steps 1-9, above, apply to Macro-objects, as well.
[0058] The Make Content Non-editable Block 206 determines how an owner may prevent a user(s) from editing portions of a Macro- or Mini-object to which that user(s) has been granted access. This capability is not available with any prior art applications, especially for Mini-objects and for Mini- and Macro-objects that reside in a distributed cloud workspace. One example in accordance with the present invention enables an owner to mark portions of his/her Macro-objects as uneditable by other users, even if the uneditable objects are downloaded and all links to original content are broken by the downloaded Uneditable renders the ability to copy, delete, or modify any Micro-objects residing within a Macro- or Mini-object.
[0059] In one example, owners of content are enabled to choose if their own Mini- objects within their Macro-objects may be edited by other users. The owner of a Mini-object(s) is not affected; the object continues to behave like an editable object for the owner. However, for all other users with access to the Mini-objects, this setting will affect the editing functionality on the cloud-based application and the local application corresponding to the original application that created the Mini-object. For the purposes of this description, the application for
PowerPoint® will be used as an example.
[0060] In order to set content as editable/non-editable, a user needs to select some content and navigate to a "Set Privacy Level" option of the Smart Security Block 204.
[0061] In one example, the user selects one or more Mini-objects from the main area and marks the checkbox for "non-editable" setting. The following process is then performed:
1. Fetch a list with ID(s) of selected Mini-object(s).
2. Pass the list and information for checkbox state (in this case, marked).
3. A request is sent to the API, containing the list of ID(s) for selected Mini-objects, and enum for the checkbox's state.
4. Retrieve the Mini-objects from the database according to the selected ID(s).
5. Check to determine if any selected Mini-object does not belong to the logged-in user.
6. For each Mini-object:
• If the logged-in user is not the owner of the Mini-object, take no action and notify the logged-in user that he/she does not own the Mini-object and therefore cannot set the Mini-object as non-editable.
• If the Mini-object is owned by the logged-in user, mark the Mini-object non- editable and update the Mini-object in the database.
7. Add a "non-editable" icon on each of the Mini-object(s) marked non-editable so users know that they cannot/should not attempt to modify that Mini-object. 8. Each Mini-object that is marked non-editable can be unmarked at any time by the owner of the Mini-object.
Steps 1-8, above, apply to Macro- and Micro-objects, as well.
[0062] The Smart Search Block 208 enables users to find and access content across multiple distributed cloud-based user accounts and across an enterprise. Current prior art applications, when performing the search function, hunt for keywords across all document types, including file names and sometimes the file metadata/properties, and return to the user a list of all the documents that match the search criteria. The user has no idea who is the owner of the documents, and the search is limited to documents that are shared with the user. This results in a lost opportunity, especially within enterprises, where employees create and recreate the same content over and over again because they are unaware that the content already exists. In accordance with an example of the present invention, the search function is augmented in two ways:
1. The search includes content that is not shared with the user in the search except
content that is marked confidential or non- searchable by owners of said content.
2. The search lists all search results in the context of the workspace owner so that the user knows who owns the content.
3. All content satisfying the search criteria is displayed visually so the user performing the search can immediately determine all content that satisfies the search criteria, unlike prior art applications which display one matched content at a time.
4. Searches are performed across distributed cloud workspaces that have not previously connected to the user's workspace (i.e., workspaces to which access has not previously been granted to any content) and affords the user performing the search the opportunity to request access to content that matches the search criteria.
5. The search results include finding similar content utilizing the Find Similar Block 212 as will be described below.
[0063] In one example, a user can search for and find content within his/her own workspace folder (s) including Macro- and Mini-objects, within workspaces that are connected to his/her workspace, and, in the case of enterprise accounts, across all workspaces within the enterprise whether or not they are connected to the user's workspace. The results can potentially include content to which the user does not have access. To ensure confidentiality, the portions of content in the owner's workspace that are potential matches cannot be accessed by the user performing the search or any identifying information such as a thumbnail or title. Once search results are returned, if the user has not been granted access to the content matching the search results, the user can request that the owner of the matched content grant him her access directly from the search results. In one example, the user may:
1. Search by entering one or more keywords in the search field. Preferably, Boolean search is also enabled.
2. The user can also choose options from the Advanced Search flyout. These options include "Type", "Words show up in", and "In workspaces".
· "Type" corresponds to Macro-Objects Types such as presentations, PDF document, spreadsheets, etc.
• "Words show up in" corresponds to words contained in the title, main content, notes, Macro-object properties or metadata, Macro-object name, etc.
• "In workspaces" includes:
· "Selected Visual Folder only", which restricts the search to only the selected
Visual Folder.
• "My Workspace", which restricts the search to only the user's own
workspace.
• "My Connected Workspaces", which restricts the search to only the
workspaces shared with and accepted by user; in other words, the workspaces displayed to the user in his/her left-hand area.
a) Includes any workspaces set by the user to "Hidden".
b) Includes any groups of which user is a member, including those set by user to "Hidden".
c) "Across My Enterprise", which is a feature available to enterprise
accounts, restricts the search to all users on that enterprise account, even those that have not previously connected their workspaces to the user performing the search through sharing.
[0064] FIG. 11 illustrates a portion of the user interface for defining where the search should be conducted utilizing the Smart Search Block 208 in accordance with one example. [0065] The Display Search Results Block 210 determines how search results are displayed and how users request access to results to which they do not have access. Prior art cloud file sharing applications do not present search results in the context of the owner of the content searched/matching search criteria, nor do they search content not shared with the user. Consequently, prior art cloud file sharing applications do not enable users to request access to content belonging to owners who have not previously shared their content with the user. In contrast, one non-limiting example in accordance with the present invention presents the search results in the context of the connected workspace where the search criteria was met and in the case of content match in workspaces not connected to the user's workspace, provides a mechanism for the user to request access from the unconnected workspace. Accordingly, in accordance with the example:
1. A request is sent to the API to retrieve Mini-objects which match the search criteria for the specific user.
2. Matched Mini-objects are fetched from the database, including the information for the workspace associated to the Mini-objects and the Macro-objectID where they originate.
3. The Mini-objects are grouped by the workspace name} and then by the parent Macro - objectlD.
4. A tree object is created according to the following:
• List<Workspace>
• List<Macro-object>
• List<Mini-objects> for each Macro-object.
[0066] In one example, the user may opt to search in "Connected Workspaces" or "Across My Enterprise", and the search function locates matches for which user does not have access. For each workspace with search results for which the user does not have access, a single blank "Potential match(s) - request access" thumbnail may be displayed. The title text may be a descriptive text such as "This workspace has potential match(s) - request access." When a user selects "Request Access" to content to which he/she currently has no access, the following actions take place:
1. A request for access notification is sent to the owner of the content, which includes the following: • "[First Last] searched the keyword combination "[SearchCriteria]".
• A list of all the content that matches the search criteria in the owner's workspace with a thumbnail and the ability to grant access or reject access in response to a request on an item-by-item basis.
2. For each item of content, the notification includes:
a) Match Thumbnail, which is the thumbnail for that item of content so that the owner can determine exactly what the user wants to access.
b) Match Title, which is the title of that item of content.
• Grant Read - If selected, the requestor (i.e. , the user who requested access) will be granted read access to the item of content. The workspace of the owner is connected to the workspace of the user and displayed as described earlier in conjunction with the description of the Connected Workspaces Block 200.
• Grant Read + Co-edit - If selected, the requestor will be granted Read + Co- edit access to the item of content. The workspace of the owner is connected to the workspace of the user and displayed as described earlier in conjunction with the description of the Connected Workspaces Block 200.
• Reject Request - if selected, the requestor will not be granted access to the piece of content.
· Selecting any of the above icons removes that piece of content from the
notification. When the owner has made a decision on the last piece of content in the notification, the notification will be removed.
[0067] FIG. 11a illustrates an example of how search results are displayed in the context of the connected workspace where the matches were found utilizing the Display Search Results Block 210 described earlier.
[0068] The Find Similar Block 212 provides users the ability to search across their connected workspaces or their enterprise to find content similar (e.g., determined by a percentage range specified by the user) to their own content, including searching for an image within other content. The user who performs the search may then take multiple actions, for example, delete everywhere or replace within their own workspace. This capability provides invaluable services, especially to enterprises, where one application may be to find and remove the use of certain images from within all Macro-objects across the distributed cloud for legal purposes. Prior art applications do not provide this capability.
[0069] In one example, a user may search for content similar to his/her own and can then use the search results to compare, use, and/or replace his/her own content with similar content. As in the case of the operation of the Smart Search Block 208, search results returned by the find similar operation can potentially include content to which the user performing the search does not have access to the content. Moreover, once identified as a match or potential match, the user performing the search may request access to matched content from the owner directly using the Find Similar Block 212. To ensure confidentiality, the user is not informed how many items of content are stored in the owner's workspace that are potential matches nor any other identifying information such as a thumbnail, title, or any other marking that may visually identify the matched content. The user who performs the search may set a threshold {e.g., 90-100%), such that the content will be considered similar only if the content has a percentage match greater than or equal to the threshold set in find similar options for the selected content. That is:
1. When finding similar content, the user performing the search will be given options on how/where to look for the searched content. The user performing the search will also be given the option to ignore templates graphics or header/footer information in other file types when looking for similar content.
2. In one non-limiting example, the threshold tab includes a slider-bar, enabling the user to modify his/her find similar threshold. The tolerance range may be set from 90 - 100% by using the slider utilizing whole numbers. 100% requires an exact (/. e. , 100%) match, A lower value requires a match of at least the set percentage (e.g. , if the threshold is set at 90%, Mini-objects/images with a match of 91%, 95%, or 100% would all return as similar, but 89% would not).
3. The initial default is set to "100%". If the user performing the search sets a different find similar threshold value in his/her preferences, that value will be displayed. If the user performing the search modifies the value and then marks the checkbox to set the find similar threshold as the user's preference, the default threshold will be updated in My Preferences accordingly. "Search in" option - The user may select which workspaces/Visual Folders he/she wishes to include in his/her "Find Similar" search. All users may search within their own workspaces and any Connected Workspace. Enterprise users may also search across all users' workspaces on that enterprise account similar to the search performed by the Smart Search Block 208 described earlier.
When the find similar function is successfully initiated, a notification is displayed to inform the user that the find similar search is in progress. When the find similar search has completed, a notification will be displayed to inform the user that the find similar search has completed and where to view the search results.
Find Similar will search within all Macro-objects for each selected user in the
"Search in" tab.
Content that is deemed similar according to the parameters set in a "Find Similar popup" is placed in "Similar Content", with the following exceptions (results not returned):
a) If a Visual Folder is marked "non-searchable", content within the folder is
excluded from the search results.
• If set in the owner's workspace, the owner will be informed of the search results, as the matched content is the owner's own content.
• If set in a group, all members of that group will be informed of the search results.
• Note: Even if a user has access to a another user's content, Visual Folder, or parent Visual Folder, the user still will not be informed of the search results in search and find similar operations if the Visual Folder is marked as "non- searchable".
b) If a Macro-object is marked "non-searchable", Mini-objects within the Macro - object are excluded from the search results. The same rules apply as in the case that a Visual Folder is marked "non- searchable".
c) If certain Mini-objects within a Macro-object are marked "non-searchable", the find similar function skips over Mini-objects marked non-searchable while searching inside a Macro-object. FIG. 12 illustrates a portion of the user interface for specifying where to hunt for similar objects. FIG. 13 shows the flowcharts of operations performed when carrying out the functions performed by Find Similar Block 212 in accordance with one example.
[0070] In one non-limiting example, the user may find an image within the content. That is, the user may search for a particular image, as a Micro-object, within Macro -objects, to replace, delete, or modify. Furthermore, the user may opt to select "Find Similar" for an image within a Mini-object, even if the image has been altered by having been cropped, skewed, or partially hidden (e.g., within the 90% maximum threshold). If the user opts to exclude template/header/footer/background graphics, etc., Find Similar will search through the remaining content.
[0071] The Find Similar Block 212 also enables users to replace their own content, in their own workspaces or everywhere the content has been used, with content located via the Smart Search Block 208 or Find Similar Block 212. This functionality is very useful, especially for enterprises, where employees can find a better representation of content that they have created and can simply adopt another employee's version while giving attribution credit to that employee via a "Maintain Provenance" functionality defined in the Smart Copy Block 216. Prior art applications do not provide this capability.
[0072] In one example, the user may choose to replace his her own content with a matched search result comprising content not owned by him/her. Note, however, that the content type must match in order for a "Replace with Matched" function to operate. For example, if the user performing a search desires to replace a PowerPoint® Mini-object he/she owns with content that is owned by another user, the content belonging to the other user must also be a
PowerPoint® Mini-object.
1. "Replace with Matched" - Single-select.
a) For the selected thumbnail, the original content (i.e. , content that was searched for using the "Find Similar" function) will be replaced with the matched content, b) Once the searched content is replaced with the similar or 100% matched content, the user who performed the search is given the same options as if he/she were replacing the searched content with another item of content owned by him/her via the Smart Replace Block 218. 2. "Compare Match" - "Compare Match" is available only in the case of single-select and only if the user has access to the matched content (e.g., thumbnail) selected. The "Compare Match" function will open a preview screen with the both the searched and matched content shown, so the user may see a side-by-side comparison. a) A similar Mini-object/image is shown on left-hand side, with the title "Similar" above the content.
b) In areas where there is a mismatch (i.e., in the case of a search performed using a threshold of 90-99%), a yellow highlight will be overlaid on the mismatched areas of the matched thumbnail so that the user can immediately observe areas that do not match.
c) An X% matched Mini-object/image is shown on right-hand side, with the title "Matched" above the content.
3. "Request Access"- If the user has not been previously granted access to the matched content, the user can multi-select thumbnails from multiple owners to request access to the potential matches.
4. "Delete Everywhere" - Multi-select. The "Delete Everywhere" function deletes selected searched (searched for) content everywhere that particular content exists. This function is very useful when an enterprise wants to control content and decides to locate and remove obsolete or incorrect content without relying on employees to delete the content themselves. With this function, users do not need to know where an item of content is used (e.g., the content can be within thousands of documents). This function will locate and remove the content from all accounts where the content exists. The functionality of this block is the same as utilizing the Smart Delete Block 226 as will be described below.
[0073] The Smart Version Management Block 214 maintains all versions of Macro-, Mini-, and Micro-objects as changed by users who have been enabled to edit the Macro-, Mini-, and Micro-objects through permissions. Further, this functionality enables the owner of the content to rollback to any previous version, back to and including the original version, of the object(s) that have been modified. This functionality also enables owners of the object(s) that have been modified to perform replace functions, as defined in the Smart Replace Block 218 or Smart Delete Block 226, with any rolled-back version as will be described below. Prior art applications do not enable version control and version control management (e.g. , replace/delete everywhere) at the Mini- and Micro-object level and do not enable rollback capabilities.
[0074] FIG. 14 illustrates how the history of a Mini-object (a slide in this example) is shown in the object metadata. FIG. 15 illustrates what a user observes when comparing versions of same Mini-object (a slide in this example) in accordance with one example.
[0075] In one non-limiting example, users who have co-edit permissions for objects owned by other users may modify the objects. Consequently, a new version of the content can be created when the following occurs:
1. For Mini- and Micro-objects a new version is created when the Mini-object is:
a) Newly created (vl ), e.g. , or a "Copy" of a Replaced/Deleted Mini-object in Smart Copy/Create New Block 216, a "Create New" in the ahani for 3rd Party
Authoring applications Block 220, or "Save to Cleo Cloud" utilizing the Kahani for 3rd Party Authoring Applications Block 220.
b) Modified in the Kahani for 3 rd Party Authoring Applications Block and saved as "Replace Existing Version - My Workspace" or "Replace Existing Version - Everywhere" utilizing the Smart Replace Block 218.
c) Rolled back to a previous version.
2. For Macro-objects a new version is created when the Macro-object is:
a) Newly created (vl).
b) Modified in the Kahani for 3rd Party Authoring Applications Block 220 and saved as "Replace Existing Version - My Workspace" or "Replace Existing Version - Everywhere" utilizing the Smart Replace Block 218.
c) Edited in the Coleo Cloud using the "Save to Coleo Cloud" function as defined in the Kahani for 3rd Party Authoring Applications Block 220.
d) Rolled back to a previous version.
3. A new version is not created when objects are:
a) Mini- or Micro-objects which are replaced within the Coleo Cloud via "Replace - My Workspace/Everywhere" utilizing the Smart Replace Block 218. b) Mini- or Micro-objects are deleted within the Coleo Cloud via "Delete - My
Workspace/Everywhere" utilizing the Smart Delete Block 226. c) Macro-objects are modified utilizing the Kahani for 3 Party Authoring
Applications Block 220 and only the Mini-object order was changed (/. e. , no modifications to the Mini-object itself).
Location (i.e. , where to view) - Versioning is displayed in right-hand metadata, under the "Basic Information" section. Any user who may view the metadata for that content may also view the versioning. Included within a title of "History", a table with the following is displayed for each row. Note that due to space constraints, this may span more than one row:
a) Version - the version number. The format is "vl", "v2",... "v[nj", where the number (n) is incremented by 1 for each new version. Rows are ordered in this format with the newest version at the top.
b) Modified by - The [First Last] name of the user who modified the content.
c) Comments - any comments added by user when saving to the Coleo Cloud using the Kahani for 3 rd Party Authoring Applications Block 220.
d) Date - when the content was modified; format: MM DD/YYYY hh:mm.
e) Compare icon- opens with a format like the format utilized for preview, but with a side-by-side comparison. In one example, the old version is on the left, and the current version is on the right. A yellow highlight is overlaid on the changed areas of the compared thumbnail so that the user can immediately observe areas that have changed.
• Version to compare - gives the user the option to compare to the current (newest) version or the previous version (prior to the one selected).
• Old version - show version number directly above the image, such as "v2".
• Current version - show version number directly above the image, such as "v7".
• Mini-objects do not have forward/backward arrows.
• Macro-objects have forward/backward arrows to aid in navigation. If one of the Macro-objects has more Mini-objects than the other (e.g., count of pages), when the end of the shorter Macro-object is reached, the shorter Macro-object image will instead display "end of document" for the remainder of the Mini- objects in the longer Macro -object. ί) Rollback icon - If selected, a check will be performed as to whether or not users have access to any of the affected Mini-objects, and a smart confirmation dialog opens (with shared portions italicized):
• In the case of Mini- and Micro-objects: If there is at least one user with
access to the [Mini- or Micro-Object Type(s)] and has used them in his/her own Macro- or Mini-objects, the owner receives a notification and has the option to rollback only in the owner's workspace or every workspace of every user that has the current version of the Mini- or Micro -object in use within their own Macro- or Mini-objects.
a My Workspace - Mini- or Micro-object rollback actions proceed for "My Workspace" utilizing the Smart Replace Block 218.
b Everywhere - Mini- or Micro-object rollback actions proceed for
"Everywhere" as defined in the Smart Replace Block 218.
• In case of a Macro-object: If there is at least one user with access to [Mini- Object Type(s)] within the [Macro-Object Type] and the user has used them in his/her own Macro-objects, the owner receives a notification and has the option to rollback only in the owner's workspace or every workspace of every user who has the current version of the Mini-object in use within his/her own Macro-objects.
[0076] In one non-limiting example, when the owner of a Mini- or Micro-object confirms rollback, the Smart Version Management Block 214 creates a new version, using the selected previous version. This is done to ensure versions in between are not created and changes made by others to content are not lost. For example, the owner has vl-7 and chooses to roll back to v2. In this case, v8 is created, which is a duplicate of v2, thus preserving v3-7. When the rollback function is initiated, the Smart Version Management Block 214:
1. Creates a new version of the Mini-object, copying the selected version.
2. Inserts a comment such as "Rollback to v[x]", where x is the version selected.
3. Updates the "modified by" field to the owner of the Mini-object.
4. Records the date and time of the rollback action.
5. Enables the owner to make the rollback effective in the owner's workspace only or everywhere that the Mini-object is located. 6. Initiates a check for all NEWEST VERSION Macro-objects containing that Mini- object:
a) Replace Existing Version - Everywhere -> automatically updates all (i. e. ,
owner's and others') Macro-objects to the new version, using the new Mini-object version. A "Replace - Everywhere" notification is sent, according to the rules previously defined for "Replace - Everywhere" utilizing the Smart Replace Block 218.
• Replace Existing Version - My Workspace the owner's Macro-objects are updated to the new version, using the new Mini-object version. Other users having access to that Mini-object are sent a "Replace - My Workspace" notification, according to the rules previously defined for "Replace - My workspace" utilizing the Smart Replace Block 218.
• User chooses "Copy" -> The previously defined function for "Copy" is
initiated. The copied Mini-object is created as vl, according to the rules defined for "Copy" utilizing the Smart Copy Block 216. The user's Macro- objects) is updated to the new version using the new Mini-object. When the user chooses "Replace" or fails to take action, functions previously defined utilizing the Smart Replace Block 218 are initiated. Consequently, the user's Macro -object(s) are updated to the new version using the new Mini-object version.
[0077] In one example, when the owner confirms rollback of Macro-objects, the Smart Version Management Block 214 creates a new version, using the selected previous version. This is done to ensure versions in between are not created, and changes made by others to content are not lost. For example, the owner has vl-7 and chooses to roll back to v2. In this case, v8 is created, which is a duplicate of v2, thus preserving v3-7. When the rollback function is initiated, the Smart Version Management Block 214:
1. In the case of rolling back Macro-objects to previous versions, requires an owner to select "Replace Existing Version" options for Mini-objects within the Macro-objects when he/she confirms rollback. The Mini-object rollback actions will be based upon the owner's selection. When rollback is to a previous version, creates a new version, copying the selected version.
The Smart Version Management Block 214 inserts a comment such as "Rollback to v[x]." where x is the version selected.
Updates the "modified by" field to the owner of the Macro-object.
Records the date and time of the rollback action.
Checks Mini-objects within the Macro-object to determine if they were removed from the Macro-object sometime after the selected version. (Note: not the same as the Mini-object itself being deleted.) - General action: Add the Mini-object back to the Macro-object, using the correct version at the time of the version of that Macro- object.
• Removed Mini-object: Is not owned by the owner of the Macro-object:
• No version change - Add the Mini-object back to the Macro-object, pointing to where the Mini-object exists in the workspace of the owner (of the Mini- object, not the Macro-object) in the database.
• Version change - Create as a new Mini-object in the owner's (i.e., owner of
Macro-object) workspace, vl . Add the Mini-object back to the Macro-object, pointing to this new Mini-object. This only affects the Macro-object which is being rolled back.
• Removed Mini-object is owned by the user.
• No version change - add the Mini-object back to the Macro-object, pointing to where the Macro-object is located in the owner's workspace in the database.
• Version change - "rollback" to the correct version, according to the rules defined previously for rollback actions for Mini-object(s) utilizing the Smart Version Management Block 214. Add the Mini-object back to the Macro-object, pointing to the newly created version (i.e., the rolled-back version).
• Added to a Macro-object sometime after the selected version - Remove the Mini- object from the Macro-object.
• Mini-object referenced from another Macro-object - Remove the Mini-object from the Macro -object. • Mini-object belongs to the Macro-object (i. e. , a parent Macro-object in which the Mini-object was initially created) - Remove the Mini-object from the Macro- object.
• Modified in the Macro-object sometime after the selected version -Use correct version of the Mini-object.
• If the Mini-object is not owned by the user - Create a new Mini-object in the workspace of the owner of the Macro-object, vl . The Macro-object points to the new Mini-object. This only affects the Macro-object being rolled back.
• If the User ID is the owner of the Mini-object - Roll back to the correct version, according to the rules as defined previously for rollback actions utilizing the Smart Version Management Block 214 for rollback actions for Mini-objects. The Macro-object points to the newly created version of the Mini-object.
• Reordered in the Macro-object - Reorder the Mini-objects to the correct position in the Macro-object.
• Deleted Mini-objects (i. e. , "Delete - My Workspace/Everywhere") - The Mini- object is deleted, according to rules as defined for deleting Mini-objects utilizing the Smart Delete Block 226.
[0078] In another example, when a new version of a Mini-object is created, not due to rollback, the Smart Version Management Block 214 performs the following functions:
1. Creates a new version of the Mini-object.
2. Adds a Comment "Updates to macro-object [macro-objectName]", where "macro- objectName" is the name of the Macro-object associated to the new version of the Mini-object.
3. Updates the "modified by" field to the owner of Macro-object.
4. Records the date and time of the action.
5. Enables the owner to make the action effective in the owner's workspace only or everywhere access to the Mini-object is authorized.
6. Initiates a check for all newest versions of the Macro-objects containing that Mini- object.
a) Replace Existing Version - Everywhere - automatically updates all (owner's and other users') Macro-objects to the new version using the new Mini-object version. A "Replace - Everywhere" notification is sent, according to the rules previously defined for "Replace - Everywhere" utilizing the Smart Replace Block 218.
b) Replace Existing Version - My Workspace - The owner's Macro-objects are updated to the new version using the new Mini-object version. Other users who have previously been authorized to access the previous version of the Mini-object are sent a "Replace - My Workspace" notification, according to the rules previously defined for "Replace - My workspace" utilizing the Smart Replace Block 218.
• User chooses "Copy" The previously defined function for "Copy" is
initiated. The copied Mini-object is created as vl, according to the rules defined for "Copy" utilizing the Smart Copy Block 216. The user's Macro- object(s) are updated to a new version incorporating the new Mini-object.
• User chooses "Replace" (or fails to take action) According to the rules defined for "Replace" utilizing the Smart Replace Block 218, the user's Macro-objects are updated to a new version using the new version of the Mini-object.
9] In a further example, when a new version of a Macro-object is created, not due the Smart Version Management Block 214 performs the following functions:
Adds a Comment - "[as entered by the user (Coleo for PowerPoint®)/specified (edit in Coleo Cloud)]".
Updates the "modified by" field to the owner of Macro-object.
Records the date and time of the action.
Enables the owner to make the action effective in the owner's workspace only or everywhere access to the Macro-object is authorized.
Initiates a check to determine whether the Mini-objects comprising the Macro-object are:
• Brand new Mini-objects/Create New - a new version of the Macro-object is
created as vl, according to rules defined previously to create new Mini-objects utilizing the Smart Copy/Create New Block 216. • Modified existing Mini-object (owned by the user or to which the user has co-edit access) - a new version of the Macro-object is created by the "Replace Existing Version" function, according to rules previously defined utilizing the Smart Replace Block 218.
[0080] In a non-limiting example, a user may delete his/her own Mini-objects and Macro-objects from either his/her workspace or everywhere, including other users' workspaces that are authorized to have access to those Mini-objects. After the owner has selected Macro- or Mini-objects for deletion, the owner can chose to delete Mini-objects and Macro-objects from "My Workspace" or from "Everywhere", according to rules previously defined for the delete function utilizing the Smart Delete Block 226, which:
1. Will not create a new version.
2. Will not update modified date, author, or comments.
3. Reorders the Mini-object deleted from the associated Macro-object and any
succeeding Mini -objects in the Macro-object to reflect the new order. For example, the Macro-object has Mini-objects A, B, C, and D in positions 1, 2, 3, and 4, respectively. If the Mini-object B is deleted, Mini-objects C and D will be moved from positions 3 and 4 to positions 2 and3, respectively.
4. If the user previews the Macro-object or rolls back to the former version, the deleted Mini-object will not be included.
[0081 J In one non-limiting example, the Smart Copy/Create New Block 216 enables users to copy content owned by others to their own workspace. Unlike prior art applications, however, the Smart Copy/Create New Block 216 maintains the provenance of the Mini-objects including attribution to the original creator of the content, which incentivizes users to share their content and have their content used by other users. Also, this enables accountability to allow original creators of content to be identified.
[0082] FIGS. 16 and 17 show flowcharts of operations performed by the Smart Copy/Create New Block 216 to create new content in accordance with one non-limiting example. When a Mini-object or Macro-object is created through modification of an existing Mini-object, the following actions are performed by the "Create New" function of the Smart Copy/Create New Block 216:
1. Comments and ratings are not copied over to new Mini-object. 2. The privacy level is not copied over to the new Mini-object.
3. The "Non-Editable" setting is copied over to the new Mini-object (only the owner may edit a non-editable Mini-object).
4. An "Inheritance" is added to provide provenance - new, shown in "Basic
Information", below the "Owner".
• Inheritance: [originalOwnerName] - first and last name of the owner from whom the Mini-object was copied. If the Mini-object is brand new and has never existed on the Coleo Cloud previously (e.g., "Upload Content", a non-Coleo Mini-object is added to a Macro-object), this is first and last name of the user who uploaded the content.
• Multiple inheritances - Inheritance: [originalOwnerName] ->
[secondOwnerName] -> ... -> [nOwnerName] are the first and last names of the owners from whom the Mini-object was copied. The identified owners include the current owner. For example, Personl 's Mini-object is copied to Person2's workspace, then to Person3 's workspace, then to Person4's workspace.
"Inheritance: Personl Person2 -> Person3 - Person4".
[0083] The Smart Replace Block 218 enables owners of Mini-objects to replace (i.e. , swap out) their Mini-objects for other Mini-objects of the same type (e.g., slide with slide, worksheet with worksheet, etc.). Furthermore, the Smart Replace Block 218 enables the owner of the content to propagate the replacement Mini-object(s) across all workspaces and within all Macro-objects that included the original Mini-object(s). Prior art applications do not enable users to replace Mini-object(s) with other Mini-objects.
[0084] In one example, users may replace their own existing Mini-objects with other already existing (i.e., uploaded and parsed) Mini-objects of their own or Mini-objects shared with them by other users. Mini-objects may be replaced either only for their workspace, or everywhere, including other users' workspaces that are authorized to access those Mini-objects. The replacement function operates as follows:
1. After the owner has selected one or more Mini-objects for replacement, the right- hand area will open with two columns. The right-hand column will load the selected thumbnails (e.g., to-be-replaced Mini-objects.) The left-hand column will load with an equivalent number of blank thumbnails with text such as "Drag & drop
replacement [mini-object type] here!".
2. The owner may load Mini-objects in the main area by navigating any of the trees under "My Workspace" or from search results that return Mini-objects from other connected workspaces. The owner may select a single Mini-object (e.g. , a replacement Mini-object) and drag-and-drop it over to the blank thumbnail to the left of the Mini-object he/she desires to replace. If the owner selects more than one Mini- object, only the newest selected Mini-object will be moved into the blank thumbnail position.
3. If a user selects a replacement Mini-object that is a duplicate of the to-be-replaced Mini-object, the user is notified that no action will be taken, and the owner will be notified.
4. To indicate that the user has completed replacing Mini-objects ("Replacement" mode) and desires to exit to normal browsing mode, he/she may select "I'm Done" near the top of the right-hand area. Once "I'm Done" is selected by the user, a confirmation dialog will open and the user will be allowed to make the changes in his/her own workspace or across all the workspaces that have Macro-objects containing the Mini- object(s) being replaced.
[0085] FIGS. 18, 25, and 26 illustrate the user interface for replacement of a Mini- object, notification to users when an owner replaces a Mini-object (a slide in this example) in their own workspace, and notification to other users of an owner's decision to replace a Mini- object everywhere (in this example a slide), respectively. FIGS. 16, 17, and 19-24 show the flowcharts of operations to replace Mini-objects and enable users to copy replaced Mini-objects to their own workspaces in accordance with another example.
[0086] In one example, the owner may decide to "Replace in My Workspace".
Anywhere from which the original content was visible will now show the replaced content (e.g. , slides) for both the owner and any users who had authorization for access to the content within the owner's workspace. Considered in more detail:
1. A request is sent to the API containing the list of pairs with replacement (i.e. , new) Mini-object IDs and to-be-replaced (i.e. , old) Mini-object IDs. For each pair of Mini- objects (e.g. , slides) the following is performed: 2. If the replacement Mini-object ID has a value:
a. Find the Mini-object that needs to be replaced from the Mini-object Collection using its ID.
b. Find the replacement Mini-object from the Mini-object Collection using its ID.
c. Find all tags from the owner's workspace, which have been applied to the old Mini-object.
d. For every tag, replace the old Mini-object with the replacement Mini-object. e. Find all Macro-objects located in the owner's workspace where the Mini- object to be replaced is used.
f. For every located Macro-object, replace the old Mini-object with the
replacement Mini-object, update the Macro-object, and store the updated Macro-object in the database.
g. Update the tag collection in the database.
[0087] In another example, the owner may decide to replace everywhere.
Consequently, the following actions are performed:
1. A request will be sent to the API containing a list of pairs with replacement (i. e. , new) Mini-object IDs and to-be-replaced {i.e., old) Mini-object IDs. For each pair of Mini- objects the following is performed:
2. If the replacement Mini-object ID has a value, Repeat steps a-f from step 2 above.
Then,
a. Determine if other users have been granted access to the Mini-object and used in any Macro-objects by any other user.
b. Replace the old Mini-object in those Macro-objects.
c. Find all Visual Folders in which the Mini-object has been categorized and to
which other users have been granted access.
d. If the old Mini-object has been tagged with tags, for every tagged old Mini-object to which other users have access, replace the old Mini-object with the replacement Mini-object.
e. Remove all tags from the old Mini-object.
f. Update the tag collection in the database. g. Note: If the replacement Mini-object ID is empty (i.e. , the user did not add a replacement Mini-object in the left-hand column), no action will be taken and the to-be-replaced Mini-object will not be replaced with "Replacing within My Workspace."
[0088] In one example, when the owner replaces a Mini-object in his/her own workspace only, all users of that Mini-object are notified and given the option to adopt the change made by the owner by also replacing the Mini-object in their own workspaces or copy the original Mini-object to their own workspaces and become the owner of the original Mini-object. Users will have thumbnails of both the original and the replaced Mini-objects for comparison purposes. In one non-limiting example, users have 10 days to make the decision, at which time, if no decision been made, their Mini-object will be replaced by the new replacement Mini-object everywhere they used the original Mini-object. Considered in more detail:
1. If the user ignores the notification (i.e.5 takes no action), the old Mini-object is
replaced in the user's Macro-objects on the date specified in the notification.
2. If the user choses to replace the Mini-object (i. e. , update the Mini-object), the Smart Replace Block 218 replaces the Mini-object in all of the user's Macro-objects where the old Mini-object is used.
3. If the user choses to "Copy Original" ("Provenance" rules as defined in the Smart Copy Block 216 apply):
• A new Macro-object will be created with the Mini-object and saved in the user's "My Files" folder.
• A metatag of original owner = previous owner of the Mini-object being copied is added.
• The current owner of the Mini-object is changed to the user who is copying the original Mini-object to his/her workspace.
[0089] In another example, when the owner forces a replacement of any Mini-object across all workspaces that used that Mini-object within new or existing Macro-objects, the users whose Macro-objects have been modified will receive a notification "[Name] replaced one or more mini-objects and requested they be replaced everywhere they are used. As a result, these mini-object(s) were replaced in all your custom macro-objects."
[0090] FIG. 25 illustrates notification of a replaced slide with side-by-side comparison. [0091] Kahani for 3 rd Party Authoring Applications Block 220 enables users to access and use their connected workspaces from the Coleo Cloud or from their desktops directly from within the authoring application. In one example, the Kahani 3rd Party Authoring Application can be Microsoft® PowerPoint® used to create presentations. Users can access Mini-objects (e.g., slides, images, video, and audio) to which they have been granted access within
PowerPoint® to create new Macro-objects or modify existing Macro- and Mini-objects. This functionality is not available with any prior art applications, especially for providing access to shared content across distributed cloud databases directly within PowerPoint®.
[0092] In one example, the user choses to connect to Coleo Connected Workspaces from within PowerPoint®. FIG. 27 shows the user interface for the application from within PowerPoint®. FIGS. 28-30 illustrate the flowchart operations performed by the Kahani for 3rd Party Authoring Application for PowerPoint® in accordance with one non-limiting example.
1. The Kahani for 3rd Party Authoring Applications Block 220 for PowerPoint® loads the user's workspace, including shared workspaces, directly into Microsoft® PowerPoint®.
2. The user has access to the following capabilities added to the PowerPoint® Menu:
• Logged in as: [email Address]
• Refresh Desktop Coleo
• Show Coleo / Hide Coleo (i.e. , toggles)
• Coleo Font Crawler as defined in the Kahani for 3rd Party Authoring Applications Block 220
• Tag Slide(s)/Presentation(s)
• Share Folder(s)/Presentation(s)/Slides(s)/Image(s)/A/V objects
• Search shared and owned content for keyword matches
• Save to Desktop Coleo
• Switch to Coleo Cloud
3. The User has access to the following capabilities loaded into the right-hand menu area in PowerPoint®
• Workspaces - My Workspace/Shared Workspaces/Groups (of which user is a member)
• Content - to the right of Workspaces • Presentation loaded - a section below will be displayed, which will load slides of a selected presentation.
• The user may navigate his/her trees and Visual Folders similar to utilizing the Manage Workspaces Block 234 by expanding the appropriate tree and Visual Folders, and then selecting the Visual Folder name to load that Visual Folder's content to the section directly to the right.
• The User may add/modify/delete Visual Folders in his/her workspace similar to utilizing the Manage Workspaces Block 234.
• Content will load in the section to the right of the workspaces section. If a presentation is loaded, the user may single-select the presentation thumbnail, and in the section below, the name of the presentation and slides in that presentation will load.
• Search for content to utilize that content. The user may request access to content to which the user does not already have access. This functionality operates the same as the search functionality previously defined utilizing the Smart Search and Find Similar Blocks 208 and 212 described earlier.
• The user may utilize a slider to adjust thumbnail sizes for Macro- and Mini- objects.
[0093] In one example, the user may select and open slides and presentations from his/her Connected Workspaces in PowerPoint® using the Kahani for 3 rd Party Authoring Applications Block 220.
1. "My Files" includes file types other than PowerPoint®. As such, document type icons are displayed on thumbnails. The following file types may be viewed by a user:
• Audio
• Video
• Images
• Presentations
• Slides
2. Once content is loaded in the main area, the user may select one or more content thumbnails and perform the following actions:
• Single-select - loads slide thumbnails of a presentation. • Presentation thumbnails only.
• Single-select only.
• The slide(s) within the selected thumbnail(s) will load in the main area of the section utilized by the Kahani for 3 rd Party Authoring Applications Block220 in the bottom portion.
• Double-select - opens selected content.
• Presentations and slides only.
• Multi-select.
• Each selected item of content will open in its own new PowerPoint®
window as a presentation.
• The user may drag-and-drop content to a Visual Folder in left-hand area of the section. The content is tagged.
• Any type of content.
• Both slides and presentations can be tagged to My Content's Visual
Folders and Groups > [Group Name]'s Content's Visual Folders (groups of which the user is a member). If a presentation is tagged, the slides within the selected presentation are tagged.
• Presentations and media can be tagged to My Files' Visual Folders and Groups > [Group Name]'s Files' Visual Folders as will be described below.
• The user may drag-and-drop to an open PowerPoint® presentation (i.e. , in the same window) to add to the open presentation.
• Slide(s) - The user adds the slide(s) to the open presentation after the currently selected slide.
• Media - The user adds the media to the open presentation in the currently selected slide.
• In all cases, ownership, permissions, and protections are maintained as defined in Kahani Encryption Block 244 and Smart Security Block 204.
[0094] In one non-limiting example, the information being processed by the Kahani for
3rd Party Authoring Applications Block 220 is cached, with the exception of checking to determine if the thumbnail of the slide has been changed. When the user selects "Refresh Coleo Cloud", the Kahani for 3 Party Authoring Applications Block 220 refreshes the information, reflecting any updates that have occurred since the last refresh. The refreshed information includes changes such as access granted/revoked and new/modified content.
[0095] In one non-limiting example, the information being used to create the current Macro-object using the Kahani for 3rd Party Authoring Applications Block 220 is changed by the owner(s) or users authorized to change the information. The new Macro-object creator will be notified within the authoring application that the information used has been modified and will be given the option to update the information in the then current and open Macro-object as defined in the Real Time Update block 247.
[0096] In one example, users may tag their slides and presentations directly from PowerPoint®. Users can tag presentations and slides in three ways:
1. Drag-and-drop from the PowerPoint® window over a Visual Folder. To tag slides, the user can grab single/multiple slides from PowerPoint® and drop them onto a Visual Folder into the application section. The Visual Folder will change its appearance to designate the action:
• Valid folder - If the slides being placed over the Visual Folder can be tagged there, then the Visual Folder will emphasize to designate that the slides can be dropped.
• Invalid folder - If the slides being placed over the Visual Folder cannot be tagged there, then an appropriate windows-style icon will appear to designate the restricted permission.
2. Drag-and-drop from application main area over a Visual Folder. To tag slides,
presentations, and or media within the application, the user may grab single or multiple items of content from the main area of the application and drop them on a Visual Folder in the left-hand area of the application. This includes tagging other users' content to the user's own Visual Folders.
• Valid folder - If the content being placed over the Visual Folder can be tagged there, then the Visual Folder will emphasize to designate that the content can be dropped. • Invalid folder - If the content being placed over the Visual Folder cannot be tagged there, then an appropriate windows-style icon will appear to designate the restricted permission.
[0097] In one non-limiting example, the user saves a presentation from PowerPoint® directly to the Coleo Cloud. The following rules apply:
1. Existing presentation with no modifications - a dialog is displayed "You haven't made any modifications to this presentation so there is no need to save at this time. [Ok]"
2. Images: If the user modifies an existing image that was added to a slide, the
modification is not considered a modification to the image, but rather the slide.
3. Slide: If another user's slides were used but not modified, the presentation will point to the existing slides in the other user's workspace in the database, rather than create new slides in the owner's workspace. This enables any changes the original owners of the slides make to be propagated. If another user's slides were used and modified, and the user using these slides had co-edit permissions, options on how to save the changes will be presented to the user.
• ( ) Create New - My Workspace
• ( ) Create New - Owner's workspace
• ( ) Replace Existing Version - [My Workspace and/or Owner's workspace] only
• ( ) Replace Existing Version - Everywhere
4. Presentation
• If a presentation is modified, the user will have appropriate choices to create a new or replace the presentation, depending upon whether the user is the owner, has co-edit access, or lacks a Check Duplicates tab.
[0098] In another example, when the user is connected in either online (Coleo Cloud) or offline (Desktop Coleo) mode, he/she may switch to the other mode.
1. Switch Coleo Cloud -> Desktop Coleo (online offline) mode
• Once the user is successfully connected in the online mode, selecting "Switch to Desktop Coleo" will initiate a check to determine if Desktop Coleo is installed. • If Desktop Coleo is not installed, the user will be notified and requested to install the desktop application and directed to a link from which the user can download the desktop application. Until installed, the user will remain in the online mode,
• If Desktop Coleo is installed, then:
• If a single presentation is open, and the user made modifications to the content or uploaded new content, the user is notified that he/she has unsaved changes and if he/she switches modes, all changes will be lost.
a) If "Save and switch" - A "Save to Coleo Cloud" dialog will load. Upon a successful save, the mode will be switched (the same checks for switching apply as when "Switch" is selected).
b) If "Switch" - Upon select, the pop up message closes, and no changes are saved. If Desktop Coleo is not running, it will be started up with the last credentials saved into the local database. If there are not any credentials saved, a "Sign in to Coleo Cloud" screen will load.
c) Only if Desktop Coleo is successfully started up will the mode be
switched, with the Desktop Coleo ribbon and PowerPoint® application section loaded. In the meanwhile, the user will remain in the online mode, and the processing wheel will indicate that the user is waiting. d) If a single presentation is open and the user did not make any changes, the Coleo Cloud mode will be exited and switched to Desktop Coleo mode only if the Desktop Coleo mode is successfully started up (i.e., same as in the previous case described above).
e) If multiple presentations are open, the user will be asked to close all
presentations before switching.
Switch from Desktop Coleo Coleo Cloud (offline online)
• If the user switches from Desktop Coleo (/. e. , offline) to Coleo Cloud (/. e. ,
online), checks will be performed in the following order:
• The user has an active internet connection.
• If the user does not have an active internet connection, the user will receive a message informing him/her of the need to connect to the internet. • If a single presentation is open, and the user made modifications to the content or uploaded new content, the user can:
a) "Save and switch" - A "Save to Desktop Coleo" dialog will load. Upon a successful save, the mode will be switched (the same checks for switching apply as when "Switch" is selected).
b) "Switch" - the pop up message closes, and no changes are saved. Proceed to check if credentials are saved.
• When the user is successfully connected, the mode will be switched. In the meanwhile, the user will remain in the offline mode, and the processing wheel will indicate that the user will have to wait.
• If a single presentation is open and the user did not make any changes, the Desktop Coleo mode will be exited and switched to the Coleo Cloud mode only if valid credentials are entered (i.e., same as in the previous case described above).
· If multiple presentations are open, the user will be asked to close all
presentations before switching.
[0099] In one example, the user can search for his/her own or shared slides directly from within PowerPoint® while Kahani for 3rd Party Authoring Applications Block 220 is in operation. The search is performed in the same manner as the search function described earlier utilizing the Smart Search Block 208.
[00100] In this example, the user views the results from the search function within PowerPoint®.
1. Search results are displayed in the top portion of the main area of the application. As is the case in Coleo Cloud, the number of search results will be displayed where the breadcrumbs normally appear.
2. If a search result is a presentation, the user can double-select to open the slides for that presentation in the bottom portion of the main area. This is the standard action for the user to open slides in a presentation within the application.
[00101] In another example, the user selects content from the search results to add to slides or the presentation which is open in PowerPoint®. It is possible that a combination of content may be returned in the search results comprising two or more slides, images, audio, and video. If the user selects multiple content and then takes action (e.g., double-selects or drags- and-drops):
1. Double-select opens the slides or presentations. If media files are double-selected, the user is notified that these file types cannot be opened within PowerPoint® and that the user can only add media elements to existing slides in a presentation.
2. In the case of drag-and-drop:
• If the user selects only media, the media is added to the currently selected slide open in the main PowerPoint® window.
• If the user selects only a slide(s), the slide(s) is added to the currently open
presentation, inserted after the currently selected slide open in the main
PowerPoint® window.
• If the user selects a combination of media and a slide(s), drag-and-drop can be utilized to add them to the presentation as described directly above.
• If the user selects some combination of media/slide(s) and presentation^), drag- and-drop can be utilized to add them to the open presentation as described above.
• If the user selects only presentation(s), all slides from the presentation will be added to the open presentation.
[00102] In one non-limiting example, when the user creates a new presentation or modifies an existing presentation, he/she has the option to save the presentation to the Coleo Cloud by selecting the "Save to Coleo Cloud" function. A smart check is performed to determine if the user made any modifications to a presentation.
1. If an existing presentation has no modifications, a dialog is displayed "You haven't made any modifications to this presentation so there is no need to save at this time. [Ok]".
2. Images: If the user has modified an existing image that was added to a slide, it is not considered a modification to the image, but rather a modification to the slide.
3. If another user's slide was used and not modified, the presentation will point to the existing slide in the database, rather than create the slide as the user's own slide in a presentation. If another user's slide was used and modified, the user will be presented with options, if he/she has co-edit access. The action for the slide will depend upon the option chosen by the user as will be described below.
• If a user used any existing slides owned by the user or to which the user has co- edit access in the presentation and modified them, the Kahani for 3 rd Party Authoring Applications Block 220 needs to determine from the user how to handle them.
• Slide Dialog:
• ( ) Create New - My Workspace
• ( ) Create New - Owner' s workspace
• ( ) Replace Existing Version - [My Workspace and/or Owner's workspace] only
• ( ) Replace Existing Version - Everywhere
• Slide Notes:
• "Create New - My Workspace"
a) Only displayed if "My Workspace" (presentation) was selected.
b) Default, if displayed.
c) Modified slides (owner's and to which the user has co-edit access) will be created within the user's workspace.
• "Create New - Owner's workspace"
a) Only displayed if "Owner's workspace" (presentation) was selected.
b) Default, if displayed.
c) Modified slides (owner's and to which the user has co-edit access) will be created within workspace of the owner of the presentation.
• "Replace Existing Version - [My Workspace and/or Owner's workspace]" a) "Smart" check based upon whether or not the user has any slides in the presentation to which he/she has co-edit permissions + whether or not the user has any of his/her own slides in the presentation, which will cause either "My Workspace", "My Workspace and Owner's workspace", or "Owner's workspace" to be displayed. b) Creates a new version of the slide, replacing the current version in "My Workspace". "My Workspace" refers to the overall action which a user with the slide in his/her presentation will have the option to copy or replace.
c) Applies to both the user's own slides and slides owned by others to which the user has co-edit access.
• "Replace Existing Version - Everywhere"
a) Creates a new version of the slide, replacing the current version
"everywhere".
b) Applies to both the user's own slides and slides of other users to which user has co-edit access.
If the user does not have co-edit access, a new slide is created in the user's presentation (i.e. , the user is now owner of the new slide.)
If the user's own slide was used and modified, the options vary depending upon whether or not the user is editing his/her own presentation or a presentation owned by another user to which the user has co-edit access. See the description of the "Slide dialog" and "Slide notes" above for details.
Reordering - If slides are reordered within a presentation, then the user can Save the reordered presentation to the Coleo Cloud.
If a presentation is modified, the user will be given appropriate choices to create a new presentation or replace the presentation with the modified presentation, depending upon whether the user is the owner, has co-edit access, or lacks co-edit access.
• Presentation Dialog:
• Enter the presentation name and where the presentation will be saved.
• ( ) My Workspace
a) Name: [ textbox ] * (required)
b) [ ] Replace existing presentation in My Files if the name already exists.
• ( ) Owner's workspace
a) Name: [ textbox ] * (required) b) [ ] Replace the existing presentation in the owner's My Files if the name already exists.
• Comments: [ textbox ]
• Notes Presentation:
• "My Workspace" - default.
• "Owner's workspace" - only shown if the user has co-edit access to that other user's presentation.
• "Name: [ textbox]" - by default use the name of the presentation. The user can modify the name.
a) Required for selected option (e.g. , if "My Workspace" is selected, the Name field underneath is required.)
• "Replace..." - creates a new version of the presentation, replacing the existing version (if a presentation exists with that name). If no presentation of that name exists, a new presentation is created in the selected workspace - My Workspace or Owner's workspace.
• "Comments" - not required. Supports up to 255 characters which are
displayed in History info in metadata for that version of the created presentation.
[00103] The PowerPoint® integration for the Kahani for 3rd Party Authoring
Applications Block 220 comprises a font crawler function which enables a user to modify fonts in the entire presentation. Prior art applications such as Microsoft® PowerPoint® allow users to change fonts across the whole document but in a very limited fashion. First, the user must type in the font to change from, which forces the user to know every font that exists in the
presentation. Second, only one font type can be swapped at a time. Third, the user is not enabled to change the font size across the whole document. Fourth, the user is not enabled to specify where to make the changes, for example, in the title or just the content or just the header/footer.
[00104] In one example, the user may select "Font Crawler" in the ribbon bar to modify fonts in his/her open presentation. The user can select the portions of the presentation he/she wants modified, with various font options available from the standard Font dialog. There is no restriction on how many times a user may run "Font Crawler" on a presentation. This is because the user may want to set one "place" {e.g. , Title, Notes, or any other option in the Apply to tab) with different font settings than another "place" in the presentation, or he/she may want to modify his/her previous font updates. FIG. 31 shows a portion of the user interface for defining where the fonts should be changed. FIG. 32 shows the flowchart operations performed when changing fonts in accordance with one example. When "Font Crawler" is selected, a pop up will open, with tabs for each "decision" the owner may make, each with default selections preset. These tabs are:
1. The font tab: This tab enables the user to select the font he/she wants to apply to the presentation.
2. The Apply to tab: This tab enables the user to select every "place" within the
presentation where he/she wants to apply the new font settings. The user can chose, one, many, or all.
• Title
• Content area - selected by default.
• All text - Tables, Charts, Shapes, etc.
• Notes
• Date & Time
• Slide number
• Header
• Footer
[00105] The Kahani Offline Block 222 controls the way owned and shared content is synchronized to the owner's local machine. Prior art cloud file sharing applications have the following limitations:
1. Only synchronize Macro-objects and have no concept of Mini- or Micro-objects.
2. Do not provide any mechanism to identify the owner of shared content once the
content is synchronized to the user's local machine.
3. Does not allow users to mark content for sharing in an offline mode.
4. Allows users to only select which folders to synchronize, does not distinguish
between shared and owned content, and does not distinguish between owners of various shared content. In contrast, the Kahani Offline Block 222 synchronizes Macro-, Mini-, and Micro- objects, clearly organizes content by the owner's workspace, allows users to determine if they want to synchronize their content, content that is shared with them per the content owner, or synchronize a combination thereof, and enables users to grant access to local content which synchronizes and executes once the user is connected to the internet. The Kahani Offline Block 222 enables users to synchronize to/from their computers and Coleo Cloud, specifically:
5. Their Workspace
6. Other users' connected workspaces.
7. Groups of which they are a member.
8. Coleo contacts with whom to share.
[00106] Fig. 33 shows the notifications and status interface. FIGS. 34-37 show various aspects of the user interface for Desktop Coleo in accordance with one example.
[00107] The interface provided by the Kahani Offline Block 222 will contain the last synchronized workspace-tree structure from the Coleo Cloud based on what the user selected utilizing the functionality defined in setting preferences in the what to sync section of the Kahani Offline Block 222.
1. The user can perform the following actions utilizing the interface:
• Add files from File Explorer to Desktop Coleo (via drag-and-drop/browse)
• Tag content
• Add/Manage folders
• Preview content
• Open content in an appropriate application
• Delete content
• Search for content
• Send links
2. The interface consists of two sections.
• Left hand area
• Search
• Things to do
a) Get started - summarizes what the user can perform with Desktop Coleo b) Add files - opens the add files dialog c) Grant access - enables the grant access function in the right pane
d) Send links - enables the user to send secure links to content viewers to view in a web page
• Workspaces/Groups (enterprise only)
a) My Workspace
b) Shared Workspaces/Groups
• Right hand area (similar to utilizing the Coleo for PowerPoint® functionality)
• Content - to the right of Things to do and Workspaces.
[00108] In one example, the user may navigate his/her and shared trees and Visual Folders by expanding the appropriate tree and Visual Folders, and then selecting the Visual Folder name to load that Visual Folder's content to the section directly to the right. Note that the user can expand trees not only by selecting the expand/collapse arrow (same arrow as on the Coleo Cloud), but also selecting the tree name will result in the same action. For example, if the user selects on the "My Files" tree, if it was collapsed, selecting on the name will expand it and vice versa.
1. Content will load in the section to the right of the Workspaces section. If Macro- Object Type = presentation is loaded, the user may select the presentation thumbnail, and in the section below, the name of the folder, presentation, and slides in that presentation will load.
2. Visual Folder > More Options
• Mouse hovering over a Visual Folder belonging to the user's own workspace (left-hand area) will display a "More Options" menu (with the exception of reserved folders). Selecting the menu will list options which will differ based on:
• If it is a folder created by the user, then the options are:
• Add sub-folder
• Rename
• Delete
• If it is a tree then the option is:
• Add sub-folder
• Note that selecting "Add sub-folder" or "Rename" will have the same look and feel as Coleo Cloud 3. Content area > Icons: Whenever the user selects either single/multiple Macro-objects from the Content area or single/multiple Mini-objects from the Macro-object being currently loaded, to the right of the name of the folder being currently opened, the following icons will be displayed:
• Remove from folder
• Delete
• Double selecting on a Macro- or Mini-object thumbnail will open in the
appropriate parent application.
• Macro-object - one content thumbnail may be selected.
• Mini-object - one or more of the content thumbnails of the same type may be selected. The application will create a single file from the selected Mini-object and open using the parent application as long as the user has an active license for the application.
4. Move/drag-and-drop content
• The user will be able to move (i.e. , reorder) folders by drag-and-drop. All
restrictions which apply to reordering folders in Coleo Cloud also apply in Desktop Coleo.
[00109] In one example, the user desires to add files to Desktop Coleo from his/her local machine.
1. Selecting "Things to do > Add files" will enable the user to add files into Desktop Coleo either by drag-and-drop or via browsing his/her computer, the same as the Coleo Cloud. The interface to add files will load in the right-hand area.
2. As soon as any content is being added either via drag-and-drop or browsing, the pop up will immediately load with the following being displayed:
• Tag content - now/later
• "Now" - radio button; marked by default.
a) When marked, the area below will expand to display the entire tree.
b) If the user selects both the My visual Content and My Files folder, then:
• All Mini-objects contained in the Macro -object(s) being uploaded will be tagged into the selected Visual Folder(s).
• The Macro-objects(s) will be tagged in the selected My Files folder. • "Later" - radio button; when marked, if the tree structure is loaded, the tree structure will not be displayed anymore and the area will collapse.
3. "Keep my folder structure" creates an identical folder structure under "My Files" into which the files are added.
[00110] FIGS. 38 and 39 show the user interface for defining preferences in Desktop Coleo in accordance with one example.
[00111] In one example, when the user desires to select what to synchronize by selecting the sync option, a new window is opened utilizing the Kahani Offline Block 222. The window shows a list of all workspaces (i.e., owned and shared) along with the tree structure within each workspace. The user is allowed to select which workspaces and which Visual Folders within the workspaces should be synchronized.
1. If any preferences under "What to Sync" are modified while content is actively being synchronized, any files in the process of being synced will retain their old preferences. Any files yet to be synchronized will have the new preferences applied.
2. If the user adds a new folder utilizing the Desktop Coleo interface, then that new folder will be automatically marked under "What to sync" as soon as the user synchronizes the content with the Coleo Cloud. Also, if the user first marked to synchronize a certain folder and then decided to unmark it, the folder will be deleted within Desktop Coleo interface.
[00112] In one example, the user sets preferences for how he/she wants the Kahani Offline Block 222 to handle synchronization of content to the Coleo Cloud. File Syncing preferences are accessed via the Main Desktop Coleo window >≡ > Preferences > File Syncing tab, where the user specifies how to handle file syncing for checking duplicates (new content), privacy level (new content), and deleted content. The window includes the following sections:
1. Check Duplicates - The user can select whether to check for duplicates immediately or later. This applies to both new and modified content that is successfully synchronized.
• Later - default; if marked, duplicates checking is not initiated upon successful sync.
• Now - if marked, duplicates checking is initiated when new or modified content synchronization is completed. Privacy Level - If the user has new content in Desktop Coleo, the selected privacy level will apply when successfully synchronized. Note that this does not apply to existing content whether modified or not. It also does not apply to newly created Visual Folders.
• Public - if marked, new content which is synchronized will have a privacy level set as Public.
• Private - default; if marked, new content which is synchronized will have a privacy level set as Private.
• Confidential - default; if marked, new content which is synchronized will have a privacy level set as Confidential.
Deleted Content - If the user has deleted any content, the Kahani Offline Block 222 determines how to handle the content when synchronizing. In the Coleo Cloud, the user has the option to set his/her Delete preferences; this preference in the Coleo Cloud is overruled by determinations made in Desktop Coleo when syncing.
• Delete My Workspace - default; if the user has set his/her File Syncing
preferences for deleted content to "Delete - My Workspace", then any deleted content will be deleted within the user's own workspace only. The existing function for "Delete - My Workspace" defined in the Smart Delete Block 226 applies.
• Mini-objects - when synchronized, the Mini-objects within the user's
workspace are deleted; user selection "Delete - My Workspace" triggers the "Delete - My Workspace" notification to other users with the deleted Mini- object in the current version of their Macro-object(s).
• Macro-objects - when synchronized up, the Macro-objects are deleted, b) Delete Everywhere - If the user has set his/her File Syncing preferences for deleted content to "Delete - Everywhere", then any deleted content will be deleted everywhere. The existing function for "Delete - Everywhere" defined in the Smart Delete Block 226 applies.
• Mini-objects - when synchronized, the Mini-object is deleted everywhere; user selection of "Delete - Everywhere" triggers the "Delete - Everywhere" notification to other users with the deleted Mini-objects in the current version of their Macro-object(s).
• Macro-objects - when synchronized up, the Macro-objects are deleted.
[00113] In a non-limiting example, if any preferences in the "File Syncing" tab are modified while content is actively being synchronized, any files in the process of being synced will retain their old preferences. Any files yet to be synchronized will have the new preferences applied.
[00114] FIG. 40 shows the user interface for setting preferences respecting how modified content is handled upon synchronization in accordance with an example.
[00115] In another example, the user directs the Kahani Offline Block 222
synchronization functions how to handle content that the user has modified while in the offline mode. The user needs to specify directions for Macro- and Mini-objects. These directions are used when Desktop Coleo contains content which also exists in the Coleo Cloud. In this example, the content in Desktop Coleo was modified since that content was last synchronized. Even if the content in the Coleo Cloud has a record of deletion or was modified after it was modified in Desktop Coleo, the modifications need to be synchronized to the Coleo Cloud using the File Syncing preferences for modified content. Note: If an existing Mini-object is incorporated in several Macro -objects, but on synchronization is created as new, those Macro- objects will still point to the original Mini-object, not the newly created one.
1. Modified Content - Create New - My Workspace: Any modified content will be created as new within the user's own workspace. This includes content that the user has modified which was owned by other users. When the user selects "Create New - My Workspace", the existing functions for "Create New - My Workspace" as defined in the Kahani for 3 rd Party Authoring Applications Block 220 for Save to Coleo Cloud apply, and the modified Mini-objects for slides and Macro-objects for presentations are substituted.
2. Modified Content - Create New - Owner's Workspace: If the user has set his/her File Syncing preferences for modified content to "Create New - Owner's workspace", then for any modified content in another user's workspace a check will be performed: • Does the user still have Read + co-edit access to that modified content in the Coleo Cloud?
• If yes -> Create new in the owner's workspace.
• If no - Create new in user's own workspace. When the user selects "Create New - Owner's Workspace" the existing functions for "Create New - Owner's Workspace" defined in the Kahani for 3rd Party Authoring
Applications Block 220 for Save to Coleo Cloud apply, and modified Mini- objects for slides and Macro-objects for presentations are substituted.
• For any modified content within the user's own workspace (i.e. , the user is the owner), the modified content is created as new content in the user's own workspace.
Modified Content - Replace Existing Version - My/Owner's Workspace : If the user has set his/her File Syncing preferences for modified content to "Replace Existing Version - My/Owner's Workspace", then for any modified content in another user's workspace a check will be performed:
• Does the user still have Read + co-edit access to that modified content and there is no record of deletion in the Coleo Cloud?
• If yes Replace the existing version in the owner's workspace.
• If no -> Create new in the user's own workspace.
a) When the user selects "Create New - My Workspace", the existing
functions as defined for online Kahani for 3 rd Party Authoring Applications Block 220, for Save to the Coleo Cloud, apply (e.g., Inheritance).
• For any modified content within user's own workspace ( . e. , the user is the owner) -> replace the existing version in user's own workspace.
• When the user selects "Replace Existing Version - My/Owner's Workspace", the existing functions as defined in the Kahani for 3 rd Party Authoring Applications Block 220 for Save to the Coleo Cloud apply, and modified Mini-objects for slides and Macro-objects for presentations are substituted.
Modified Content - Replace Existing Version - Everywhere: If the user has set his/her File Syncing preferences for modified content to "Replace Existing Version - Everywhere", then for any modified content in another user's workspace a check will be performed:
• Does the user still have Read + co-edit access to that modified content and there is no record of deletion in the Coleo Cloud?
• If yes - Replace the existing version everywhere.
• If no - Create new in the user's own workspace.
a) When the user selects "Create New - My Workspace", the existing
functions as defined for online Kahani for 3 rd Party Authoring
Applications Block 220 for Save to the Coleo Cloud apply (e.g.,
Inheritance.)
• For any modified content within the user' s own workspace (i. e. , the user is the owner) -> replace the existing version everywhere.
• When the user selects "Replace Existing Version - Everywhere", the existing functions as defined in the Kahani for 3rd Party Authoring Applications Block 220 for Save to the Coleo Cloud apply, and modified Mini-objects for slides and Macro-objects for presentations are substituted.
[00116] FIG. 26 illustrates the replacement content notification sent to users when the owner replaces content in accordance with one example.
[00117] In another example, where the user tags or untags content by placing the content directly into Visual Folders or utilizing the Kahani for 3rd Party Authoring Applications Block 220 where slides and presentations are concerned, the synchronization will check for any tagging and untagging to Visual Folders. Macro- and Mini-objects can be tagged to multiple folders without creating multiple copies in contrast to currently implemented prior art applications. If Macro- or Mini-objects have no tags, they are placed in Untagged.
1. Tagged in Desktop Coleo: Desktop Coleo has content that may be tagged to a Visual Folder since the last synchronization. The Coleo Cloud has that content with no record of deletion, and:
• No tagging to that Visual Folder.
• Record of untagging from that Visual Folder before the record of tagging in
Desktop Coleo. • If any of the above apply the content is tagged to the corresponding Visual Folder in the Coleo Cloud.
• As an example, the user tags Mini-object A to a Cars Visual Folder in
Desktop Coleo. Mini-object A is not tagged to Cars, nor was it untagged from Cars, in the Coleo Cloud. The mini-object will be tagged to Cars in the Coleo Cloud upon synchronization.
Untagged in Desktop Coleo: Desktop Coleo has content that was untagged from a Visual Folder since the last synchronization. The Coleo Cloud has that content with no record of deletion, and:
• Has tagging to that Visual Folder before the record of untagging in Desktop
Coleo.
• No record of untagging from that Visual Folder.
• If both of the above apply the content is untagged from that Visual Folder in the Coleo Cloud.
• As an example, the user untags mini-object A from a Cars Visual Folder in Desktop Coleo. Mini-object A is still tagged to Cars in the Coleo Cloud. Mini-object A will be untagged from Cars in the Coleo Cloud upon synchronization.
Tagged in the Coleo Cloud: The Coleo Cloud has content that was tagged to a Visual Folder since the last synchronization. Desktop Coleo has that content with no record of deletion, and:
• No tagging to that Visual Folder.
• Record of untagging from that Visual Folder before record of tagging in the Coleo Cloud.
• If any of the above apply the content is tagged to that Visual Folder in Desktop Coleo.
• As an example, the user tags Mini-object A to a Cars Visual Folder in the Coleo Cloud. Mini-object A is not tagged to Cars, nor was it untagged from Cars in Desktop Coleo. Mini-object A will be tagged to Cars in Desktop Coleo upon synchronization. 4. Untagged in the Coleo Cloud: The Coleo Cloud has content that was untagged from a Visual Folder since the last synchronization. Desktop Coleo has that content with no record of deletion, and:
• Has tagging to that Visual Folder before record of untagging in the Coleo Cloud.
• No record of untagging from that Visual Folder.
• If both of the above apply -> the content is untagged from that Visual Folder in Desktop Coleo.
• As an example, the user untags Mini-object A from a Cars Visual Folder in the Coleo Cloud. Mini-object A is tagged to Cars in Desktop Coleo. Mini- object A is now untagged from Cars in Desktop Coleo upon synchronization.
[00118] In one example, the Synchronization Block 224 instantiates immediately after Desktop Coleo is running and synchromzation is set to activate. Synchronization will perform the following tasks:
1. Check that the user is still active (e.g. , not cancelled or deleted).
2. Check the UTC time.
3. Compare folders structure.
4. Synchronize Visual Folders (/. e. , create or delete Visual Folders in the Coleo Cloud or local Visual Folder).
5. Compare the content (both Macro- and Mini-objects) in Desktop Coleo and the Coleo Cloud.
6. Synchronize the content (i.e. , push, pull, or delete content in Desktop Coleo or the Coleo Cloud).
7. Check that the Coleo Cloud disk space allowance will not be exceeded.
8. Check that the user's local hard drive space, where Desktop Coleo is installed, will not be exceeded.
9. The order in which synchronizing is performed is:
• Check that the user is still active (e.g. , not cancelled or deleted).
• Check the UTC time.
• Visual Folder structure - the various workspaces, trees, and Visual Folders.
• Content - Mini-objects, Macro-objects. [00119] In one example, Mini-objects within My Visual Content belong to some parent Macro-object, and Macro-objects can contain Mini-objects that are from another Macro-object. Consequently, a Macro-object(s) can be synchronized that is in a Visual Folder which the user chose not to synchronize. As a result, the entire Visual Folder structure for the user's own workspace and all shared workspaces will still be synchronized, but the Visual Folders and content will not be visible to the user in the Desktop Coleo interface or in Desktop Coleo if the user has selected not to synchronize the content.
[00120] In an example, during synchronization, the entire Visual Folders structure is synchronized in the following order:
1. Sync up - All changes made in Desktop Coleo will sync up to the Coleo Cloud. Note that this applies only to the user's own workspace ("My Workspace"), as the user cannot make Visual Folder structure changes to another user's workspace. For enterprise users, this will also sync up changes to groups of which they are a member. 2. Sync down - All changes made in the Coleo Cloud will sync down to Desktop Coleo.
This includes both My Workspace and shared workspaces, as well as groups in the case of enterprise users only.
[00121] The Smart Delete Block 226 enables users to delete their own Mini-objects from either only their workspaces, or everywhere, including other users' workspaces that are using those Mini-objects. Prior art applications do not allow users to delete Mini-objects from within Macro-objects owned by other users across distributed cloud workspaces. FIGS. 41-45 show the flowchart operations of the Smart Delete function in accordance with one example.
1. Deleting from "My Workspace" removes the Mini-objects(s) only for the user
performing the deletion function. Any other user who is using the Mini-object in his/her own workspace will be given the option to copy the Mini-object and make it his/her own. Provenance will be maintained according to rules defined in the Smart
Copy Block 216.
2. Deleting "Everywhere" removes the Mini-objects(s) from all the Connected
Workspaces where the Mini-objects have been used. This option is useful to retract confidential or incorrect information. To delete "Everywhere":
· A request is sent to the server containing the Item type, Delete type, and the
Item's ID. • Get the item from the database, set its Is Deleted flag to true, and update the database.
• Get all visual topics for the item's owner, and remove the item from every category in which the item has been categorized. This is applicable to all types of items.
• Update the item's owner's category structure in the database.
• If the item is a Mini-object, fetch all Macro-objects created by the item's owner and remove the Mini-object from them. Update the Mini-object order for every modified Macro-object.
• If the type of deleting is "from my workspace", insert the newly deleted item in the ToBeDeleted collection, which will later be used by the Smart Delete service. Then, return and display a message in the notification area reporting the success status (e.g., "item successfully deleted").
• If the type of deleting is "from everywhere", the item is immediately removed from every user's workspace the same way the item is removed from the owner's workspace. Return and display a message (i.e., in the notification area) reporting the success status (e.g., "item successfully deleted").
• A notification is sent for each slide deleted with a thumbnail for each Mini- object deleted and the ability to copy the Mini-object if the owner deleted that Mini-object only within his/her workspace. If the owner selected to delete everywhere, a notification is sent to each user of the Mini-object informing him/her that the Mini-object was removed from his/her workspace at the request of the owner.
[00122] The Smart View Block 228 enables users to view all uploaded Macro- and Mini-object content and have the ability to filter the uploaded content regardless of the folder in which the content resides. In addition to filtering by content type, users will also be able to view all content within a date range. Prior art applications only allow users to view all Macro-objects within one folder at a time and even then do not provide users with the ability to sort or filter the content by type.
[00123] FIG. 46 illustrates one example of the view of all functionality. [00124] The Smart Categorization/Tagging Rules Block 230 enables content to be categorized automatically based on user defined rules as the content is being uploaded to the user's workspace. Prior art applications do not provide this capability.
[00125] In one example, a user may manage (e.g. , add/edit/delete/run) rules by which content will be categorized automatically, by defining the rules. The following icons are displayed to the user for selection:
1. Checkbox - to select all/deselect all
2. Add rule
3. Edit rule
4. Delete rule(s)
5. Ru rule(s)
6. If no rules have previously been selected, the first screen will appear with only the icons. If there are existing rules, the rules are displayed one per line. By default, the rules will be shown newest to oldest, but the rules may be sorted by standard sorting options available in main area. For each rule, there is a checkbox to the left, followed by the name of the rule and a status (/. e. , Active or Inactive).
7. When a rule is selected, the user has the option to:
a) Edit the rule
b) Delete the rule(s)
c) Run the rule(s)
[00126] In one example, the user decides to add a rule. The Add/Edit Rule will be loaded into the right-hand area. A name field at the top of the right-hand area will be displayed with a default name: "NewRule [Date]". The user may edit the Categorization rule name. The Smart Categorization/Tagging Rules Block 230 checks to ensure that the new name does not match an existing Categorization rule name or is blank. If a match occurs, a warning is displayed. Following the check for a matching name, the following actions are performed:
1. Step 1 : The user selects the type content to which the categorization rules will be applied.
• New content during uploads
• Existing Macro -objects in the user's workspace
• Existing Mini-objects in the user's workspace. Step 2: The user selects what the categorization will be based upon, e.g., by filename and/or by keywords in a title, text, notes, etc. If the user opts to categorize based upon keyword, he/she may specify if the keyword is within title, text, and/or notes, and by default all will be selected.
[ ] Name contains specific words.
[ ] Content contains specific words (anywhere).
[ ] Content contains specific words in title.
[ ] Content contains specific words in text.
[ ] Content contains specific words in notes
[ ] Content contains specific words in header/footer.
The user can select on each instance of "specific words" to set words for that condition. After the user has set words, those words will be underlined, and the user can select to add/edit the words set.
Example 1 : - after words set
Content type: Visual Slides
with: "blue" or "color" or "black" in the title.
Example 2 - after words set:
Content type: Uploaded Files - audio, images, and Excel,
with: cars in the title.
and "Audi" or "BMW" or "Mercedes" in the title and notes.
Step 3: The user is able to define rules for exceptions and will have the same options as in Step 2, above. If only images, audio, and/or video were selected, the option to exclude by keywords will be greyed out and may not be selected.
Exceptions:
[ ] Filename contains specific words.
[ ] Content contains specific words (in the title, text, or notes).
[ ] Content contains specific words in the title.
[ ] Content contains specific words in the text.
[ ] Content contains specific words in the notes.
Example 1 : - after words set Content type: Visual Slides
with: "blue" or "color" or "black" in the title.
Except if: "specific words" in the title.
Example 2 - after words set
Content type: Uploaded Files - audio, images, and Excel,
with: cars in the title.
and "Audi" or "BMW" or "Mercedes" in the title and notes.
Except if: "specific words" in the in text, title, or notes.
As described in Step 2, above, the user may select "specific words" to define the words, and once set, may select the set words to modify them.
4. The user can select for which Visual Folders content will be categorized. Based upon what was selected in Step 1 , above, the appropriate tree structure(s) will be displayed for the user's own workspace (My Workspace) and any groups of which the user is a member.
Categorize to
My Workspace
[tree name]
[Visual Folder structure]
[Groupname] Group
[tree name]
[Visual Folder structure]
Upon selection of any Visual Folder, a Categorize Rule definition will be displayed as to what the user selected in addition to selections in Steps 1, 2, and 3. The order of selected Visual Folders will match that shown in Step 4, not the order in which the Visual Folder was added. If the user changes his/her selection, the selection will update here as well. Each Visual Folder marked will he displayed on a separate line. If the user unmarks a Visual Folder in Step 4, the Visual Folder will be removed from the definition.
Example 1 :
Content type: Slides
with: "blue" or "color" or "black" in the title. Except if: "teal" in the title.
Categorize it to:
My Workspace > Visual Slides > Colors
My Workspace > Visual Slides > Paints > Blue Period
Some Group > Visual Slides > Bright
Example 2:
Content type: Uploaded Files - audio, images, and Excel,
with: cars in the title.
and "Audi" or "BMW" or "Mercedes" in the title and notes.
Except if: "specific words" in the in text, title, or notes.
Categorize it to:
Other Group > Uploaded Files > Cars > Manufacturers
Some Group > Uploaded Files > Cars
5. Step 5 - Options
The user may turn the rule on/off and set the rule to run on existing content. If a rule is turned on, the rule will always be run on content being uploaded.
If the rule is set to run on existing content, the rule will run once.
Options
"Finish rule"
[ ] Run this rule on already uploaded content - checkbox.
[ ] Make active (i.e., the rule will run on content being uploaded) - checkbox.
[00127] FIGS. 47-49 illustrate the user interfaces for viewing rules and adding rules for tagging while content is being uploaded or for content already existing in the owner's workspace in accordance with one example.
[00128] The Smart Business Social Graph Block 232 enables people who share content with each other to take advantage of their online business social communities to gain access to content to which they would not otherwise have access. The Smart Business Social Graph Block 232 enables users to see profiles of users in their connected workspaces and the connected workspaces of those other users. Users have visibility into the tree structure of each workspace and will have the ability to request access to any folder they can view. Users will be able to learn who is part of their connected workspaces as well as who is following them and who they are following with a comprehensive view of all social activity. Users will be able to view all public content belonging to other users from a single user interface. Also, users will be able to view pending access requests as well as the status of their requests for access to content owned by other users. Prior art file sharing applications do not provide users the ability to request access to specific content nor do they provide a single view to the users of their business social status and activity as defined in the Smart Business Social Graph Block 232. FIG. 50 shows how users can view and navigate the profiles of users in their connected workspaces.
[00129] In one example, if a user wants to view the status of his/her pending requests for access:
1. A request is sent to the API.
2. Fetch all requests from the Collaborations Collection for the Owner ID.
3. Return all found objects as a response and display the objects in the Your Pending Requests section in the right hand area.
[00130] In another example, if a user wants to view the status of other users' requests for sharing:
1. A request is sent to the API.
2. Fetch all requests from Collaborations Collection for the UserlD.
3. Return all found objects as a response and display the objects in the Other's Request for Sharing.
[00131] In one example, if a user wants to Accept other users' requests to share (i.e. , Visual Folder/Content):
1. A request is sent to the API containing the ID of the user who has requested
access, the ID of the requested content/Visual Folder, and the type of the requested content/Visual Folder.
2. Fetch the object from the Collaborations Collection for the OwnerlD who requested access that was sent to Content.
3. Update the Collaborations Collection. Depending of the type in the request, add a new read permission for the user.
4. If the requested access is for a Visual Folder: • Check in which tree the Visual Folder belongs.
• Add the new permission for the user where the UserlD = ID of the user who has requested access and set the Permission level = Read.
5. If the requested access is for a Mini-object:
• Find the object in the Mini-object permission collection.
• Add the new permission for the user where the User ID = ID of the user who has requested access and set the Permission level = Read.
6. If the requested access is for a Macro-object:
• Find the object in the Macro-object permission collection.
• Add the new permission for the user where the User ID = ID of the user who has requested access and set the Permission level = Read.
[00132] In an example, if the owner rejects the other's request (Visual Folder/Content):
1. A request is sent to the API containing the ID of the user who has requested access to a Visual Folder/content and the ID and the type of the requested Visual Folder/content.
2. Fetch the object from the Collaborations Collection and set the "is pending" flag to false.
3. For this object, update the Is Pending flag to false.
4. Update the Collaborations Collection.
5. Send a notification to the requestor informing him/her of the decision made by owner.
[00133] In one example, the owner can view his/her own workspace:
1. My Profile: Display My Connected Workspaces
a) A request is sent to the API.
b) Create a new list of users, and find users with whom the logged-in user has shared content.
c) Get all distinct User IDs from the Mini-object permissions collection.
d) For every found UserlD from the previous step, find the user in the Users Collection with this ID and add the UserlD to the newly created users' list from step b, above.
e) Get all distinct UserlDs from the Macro-object permissions Collection. f) For every found UserlD in the previous step e, find the user in the Users Collection with that UserlD.
g) Check if the user already exists in the list from step b, above.
• If yes, no action taken.
• If no, add the user in the users' list.
• Find users with whom the logged-in user has shared Visual Folders.
h) Fetch all distinct UserlDs from the Visual Topic Tree permissions collection. i) For every found UserlD in the previous step h, find the user in Users
Collection with that UserlD.
j) Return the users' list as a response, and the users will be displayed under the My Connected Workspaces section in the right hand area.
My Profile: To the user who is the owner is following:
a) A request is sent to the API.
b) Find the logged-in user in the Follow Collection.
c) Get the list of following UserlD s of the user.
d) Create a new list of following users.
e) For every UserlD in the list from step c, above, find the user with that ID in the Users Collection and add the UserlD to the newly created users' list from the previous step d.
f) Return the list of following users from step d, above, as a response and display the users.
My Profile: Display users following the owner:
a) A request is sent to the API.
b) Find all distinct OwnerlDs from the Follow Collection.
c) Create a new list of users.
d) For every found OwnerlD from the previous step c, find the user with this ID in the Users Collection and add it to the list of users from the previous step c.
e) Return the list of followers for the logged user as the response and these users will be displayed under the Followers Section in the right hand area. For all three of these sections (i.e., My Connected Workspaces, Following, and
Followers), mini avatars are shown. Hover reveals First and Last Name and Location. Select goes to the user's Public Profile.
[00134] In an example, a user views someone else's Public Profile.
1. In the main area, below public content, the user will view the other user's workspace, excluding any Confidential Visual Folders to which other users do not have access. The user can (i.e., select the arrow) expand the trees and Visual Folders and contract the other user, just as in My Workspace.
[00135] In one example, for any Visual Folder to which the user has Read permissions, the user may subscribe to that Visual Folder by selecting the "Subscribe" icon, to the right of the Visual Folder name. If the user selects the "Subscribe" icon:
1. A request is sent to the API containing the ID of the owner's Public Profile, the ID of the Visual Folder, and the type of Visual Folder.
2. Find the Visual Folder in Visual Topics Tree permissions/Macro-object Topics Tree permissions/Collection depending on the type of the Visual Folder.
3. Check if the user with the ID sent in the request has Read permissions for this Visual Folder.
• If the user has Read permission:
i. Find the owner with the OwnerlD
· If the user is null:
i. A new object is created with the OwnerlD.
4. Save the object in the Subscription Collection.
• If the user is not null:
i. A new subscription user object is created for the owner with the UserlD.
5. Update the object in the subscription collection.
[00136] In one example, for any Visual Folder to which the user does not have Read permissions, the user may request access to that Visual Folder by selecting the "Request Access" icon. When the user selects the "Request Access" icon:
1. A request is sent to the API containing the ID of the owner's Public Profile and the
ID of the Visual Folder for which the user requests access. 2. Find the object in the Collaborations Collection for the OwnerlD.
3. If the object = null, a new pending request for sharing is created,
4. If the object is not null, create a new User Collaboration object for the UserlD
5. Update the Collaborations Collection.
[00137] In an example, users can rate Macro- and Mini-objects belonging to other users who have shared their content with the user as follows:
• "Average Rating" with five starts to the right, highlighted as rated, 0-5, and total ratings.
• "Your Rating" with five blank starts to the right. The user may hover to see the stars highlight, with a tooltip explanation, e.g., "Very Good", and may select the star to set his/her rating. The user may rate as many times as he/she wants. Note that owners may not rate their own content.
Rate Content: When a user rates someone's content:
1. A request is sent to the API containing the ID of the user who owns that content, the ID of the content, and the rating value.
2. Determine if the object for the logged-in user exists in the Rating Collection
(OwnerlD = ServiceContext.Current.User.Id).
3. If the object does not exist, create a new object where OwnerlD =
ServiceContext.Current.User.Id, and create a new RatingContent object for this owner where User ID = ID of the user sent in the request, ContentID = ID of the content sent in the request, and RatingValue = value sent in the request
4. If the object exists, add a new RatingContent object for this owner where: UserlD = ID of the user sent in the request, ContentID = ID of the content sent in the request, and RatingValue = value sent in the request.
5. Update the Rating Collection.
[00138] In one example, a user can add comments to any Macro- or Mini-object that is shared with that user. The user may write a comment in the comment text area by entering a maximum 500 characters.
When the user selects the "Add comment" button:
1. A request is sent to the API containing the ID of the loaded content and the written comment that was posted. 2. Find the object in the Comments Collection, where ContentID = ID of the content sent in the request.
3. Create a new Comment object.
4. Add the comment object to the list of comments for the content objects.
5. Save the object in the database.
6. Fetch the user object and time stamp of the added comment and return in the
response.
7. Show the new comment as newest below the comment text area,
[00139] In an example, delete will be visible on the user's own comments. When delete is selected, the following occurs:
1. A request is sent to the API containing the ID of the content loaded in the metadata, the ID of the comment, and the ID of the poster.
2. Find the object in the Comments Collection, where ContentID = ID of the content sent in the request.
3. Find the comment with the commentID sent in the request and UserPosterlD = ID of the poster sent in the request.
4. Delete the found comment. That will automatically delete all sub-comments (i.e., replies) to that comment.
5. Save the object in the database.
6. Return a response confirming that the action is successful.
7. Remove that comment and any sub-comments from the metadata.
[00140] In one example, "Reply" will be visible only on first-level comments. If
" is selected:
1. A request is sent to the API containing the ID of the content loaded in the metadata, the ID of the comment to which "Reply" is selected, and the comment and the comment that was posted.
2. Find the object in Comments Collection where ContentID = ID of the content sent in the request.
3. From the list of comments for that content, find the comment object with ID = ID of the comment to which the "Reply" pertains.
4. Set DateModified of the comment to DateTime.UtcNow. 5. Create a new reply.
6. Add the new reply to the list of replies for the comment.
7. Save the obj ect in the database .
8. Here will follow the steps for creating social notifications that will be sent to the owner of the content and to the poster of the first-level comment. The steps will be described below.
9. Create a response containing the user object along with the timestamp of creating the reply, and return the response.
10. Display the reply under the appropriate comment.
[00141] In one example, when a reply is added to a comment, a social notification is sent to the poster of first-level comment "[Avatar] [First Last] posted a reply to your comment. See the comment."
1. Get the UserPosterlD of the first-level comment.
2. Create a social notification with:
OwnerlD ~ ServiceContext.Current.User.Id
DateCreated = DateTime.UtcNow
Seen = false
User ID = UserPosterld
Type = ReplyToComment
ContentType = the type of the content loaded in metadata.
3. Save the social notification in the Social Notifications database.
[00142] In another example, if the user who received the social notification selects the link from the social notification to view, the following steps take place:
1. A request is sent to the API containing the content ID, the ID of the comment, and the ID of the user who posted the comment.
2. Find the comment with the comment ID sent in the request.
3. Create a comment object the same as the found object, and add a new empty list as the list of replies.
4. From the found comment from step 2, above, find the reply with the ID sent in the request. 5. Add the found reply object to the newly created list of replies to the previously created comment from step 3, above.
6. Return this object as a response and show the pop up which will display the original comment of the user with the reply below it.
[00143] The Manage Workspaces Block 234 enables users to manage and organize their connected workspaces (single and groups) in the Coleo Cloud by hiding workspaces, adding workspaces to favorites, etc. This capability helps users hide content from some users in order to better organize their workspaces and to give prominence to content from certain users. Prior art file sharing applications do not enable organizing content by the owner of content and thus do not enable any of the capabilities defined in the Manage Workspaces Block 234.
[00144] In one example, workspaces and groups are divided into Shown and Hidden. Hidden will be below all shown workspaces and groups, and by default will be collapsed.
Shown workspaces and groups will be displayed above Hidden. By default, all existing shared workspaces, new shared workspaces, and new groups will be in Shown until Hidden.
1. Hiding and showing workspaces and groups - A user may hide a workspace or group by going to: [Workspace/Group Name] >≡ > Hide. If selected, the workspace or group will be moved under "Hidden". A user may choose to show a workspace or group again by going to: Hidden (select to expand) > [Workspace/Group Name] >≡ > Show. If selected, the workspace or group will be moved to "Shown". The user can drag-and-drop a shown workspace/group into Hidden, and drag-and-drop a hidden workspace/group into Shown. When a user hides/shows a workspace/group, the workspace/group is added in the default alphabetical (A-Z) order.
2. My Favorites: By default no workspace and/or group will be underneath this section. Users/groups that are in My Favorites will be sorted alphabetically, A-Z. The user can add/remove a workspace/group to My Favorites, excluding My Workspace:
• Not in My Favorites -≡ > Add to My Favorites
• Only shown in workspaces/groups that are not in My Favorites.
• If selected, the workspace/group is set to a favorite. a) If the workspace/group is under Shown, the
workspace/group will be moved to My Favorites.
b) If the workspace/group is under Hidden, the
workspace/group will not be moved to My Favorites and remains in Hidden.
• In My Favorites -≡ > Remove from My Favorites
• Only shown on users/groups that are in My Favorites.
• If selected, the workspace/group is no longer set to a favorite. a) If the workspace/group is under Shown, the
workspace/group is removed from My Favorites and placed back in Shown in alphabetical order below My Favorites. b) If the workspace/group is under Hidden, the
workspace/group remains in Hidden.
3. My Favorites and Hidden interactions: If a workspace or group is in My Favorites and then is set to Hidden, the workspace/group will be moved to Hidden. The designation as a favorite will not be removed. As such, if the user moves the workspace/group back to Shown, the workspace/group will be placed under My Favorites again. If a workspace or group is in Hidden and is set to My Favorites, the workspace/group will set it to a favorite, but the workspace or group will not be moved under My Favorites until the user opts to make the workspace/group Shown, as described above.
[00145] In one example, the user may search for users within connected workspaces by simply typing the first few letters of the user's name. Even if the user workspace is hidden, the Manage Workspaces Block 234 will reveal the user, and the searcher can unhide the user if desired.
[00146] FIG. 54 illustrates how users can manage their connected workspaces or view content within a specific folder in accordance with one example.
[00147] In an example, the user may wish to view all public content belonging to another user in their connected workspaces or within the connected workspace of that user.
1. For each piece of public content owned by the user: • Audio and video will only have a thumbnail and not be capable of being
played.
• Each Mini -object thumbnail will have an icon with the file type.
• Forward/backward arrows will be available for users to go forward/backward.
[00148] In one example, the user may wish to subscribe to specific content in another user's workspace. Every time the user adds content to the folder, the subscriber will receive a notification. The user may subscribe to another user's folder by selecting the subscribe icon next to the folder(s) to which he/she wants to subscribe. The user may unsubscribe at any time.
[00149] In another example, the user may want to navigate My Workspace as well as all Connected Workspaces. This is accomplished in a manner similar to navigation utilizing the Kahani Offline Block 222.
[00150] FIG. 51 illustrates how a user can subscribe/unsubscribe to another user's workspace folders. FIG. 53 shows how users can comment and respond to comments made on Macro- or Mini-objects in accordance with one example.
[00151] The Smart Statistics Block 236 enables useful statistics to be provided to the owner of content. Prior art file sharing applications do not provide the statistics provided by the Smart Statistics Block 236.
[00152] In one example, the owner can track his/her content to which access has been granted by viewing general statistical information, running a report, or by selecting the content and viewing the metadata area (i.e., the right-hand area).
1. Right-hand metadata information: In the right-hand metadata area of My Workspace, the user can view every other user who has access to any specific content (e.g., folders, Macro -objects, Mini-objects, etc.), including whether the permission is Read, co-edit, or Read + co-edit access. For each Mini-object selected, the user can also view every user who has used that Mini-object in his/her own Macro-object. A section will be displayed in the right-hand metadata, called "Statistics", which includes:
• "# of People Using the mini-object" - This is a linked object that
expands to show the avatars of all the users of that Mini-object. The count is calculated for each unique user that has added that Mini-object to a Macro-object. If a single user adds the item of content to numerous custom files, the count is still considered as "1".
• Avatars - The avatars of users of the item of content are displayed below the statistic, with the option for owner to view the name of the user and go to their Public Profile.
• The owner is able to revoke access/remove the Mini-object from that user's Macro-objects from directly below the avatar.
[00153] In an example, the owner can find the following statistics directly in the user interface:
1. Duplicate content - link: Loads the Duplicate Visual Folders in My Workspaces tab.
2. Untagged content - link: Loads the Untagged Visual Folders in My Workspaces tab.
3. Total Macro-objects - link: Loads "View All Available Files" in My Workspaces tab.
4. All content to which the user has access in his/her Connected Workspaces - link:
Loads "View all shared content" in My Workspace tab.
5. # of the user's Mini-objects used by other users - link: Loads all Mini-objects that are used by other users. The owner may then revoke access, replace, modify, or delete Mini-objects in every Macro-object in which the Mini-object(s) exist.
6. Total available Macro-objects - link: Loads all Macro-objects utilizing the Smart View Block 228.
7. All content shared with users - The owner can select a user and display all owned content shared with that user. The owner may then revoke access or change permissions on an object-by-object basis for that user,
[00154] In another example, in addition to the metadata area and the general statistics, the owner can view more detailed information by running a number of reports from the main area of Home, including how many times the content owned by him/her has been re-shared, how many times that content was used directly versus indirectly (i.e., resulting from re-shares), who has used the content, where, how many links contained the content, and how people interacted with the content, whether the content has not been used for some time, content that has not be shared, etc. An item is considered re-shared if a user other than the owner shared that content. An item is considered to be used directly if that content is used by the owner or another user who was granted access to the content by the owner. Otherwise, the content is considered to be used indirectly.
1. The "Old content" report enables the user to view the last modification date of
content and then opt to delete that content.
2. The "Unused content" report enables the user to view his/her own content which has not been used for some period of time and then opt to delete that content. The user can set the following options when running this report:
• Content type - Checkboxes with "All" marked by default (and all options
marked). The user can select/de-select Macro-object types as desired, but at least one type of content must be selected in order to run the report.
• Length of time since last use - drop down, with options.
• Exclude My Stats - checkbox, marked by default.
• If unmarked, an item of content is not returned if the owner has used that content in a file other than the parent file.
• If marked, an item of content will be returned, even if the owner has used that content in a file other than the parent file.
• If a report is run, the results are based upon selected parameters.
• No results - "No results found!"
• Results - columns are provided for the following:
a) Content Type - name of the content type. There is a default column for sorting in alphanumerical order.
b) Modified Date - the last modified date of the content.
c) Content Title - the content's title. This is what is displayed below the thumbnail in the main area when navigating Visual Folders. If there is no content title, Content Title is left blank. There is a secondary column for sorting in alphanumerical order with a blank first.
d) Last Used Date - the last (i.e. , most recent) date any user has added the item of content to his/her file.
e) Days Since Last Used - a count of days since any user has added the item of content to his/her file. For example, if the Last Used Date is 2014-05- 01, and today is 2014-05-30, the count is "30". • Actions
a) Delete - icon; if selected, utilizes a delete confirmation dialog asking if the user wants to delete in "My Workspace" or "Everywhere". Depending upon the user's selection, appropriate action is taken.
The "Content not reshared" report enables the user to view his/her own content that has not been reshared for some period of time and then opt to delete the content. The same filters as described above apply.
The "Reshared content" report enables the user to view his/her own content that has been reshared, the recipients of the reshared content, and then opt to revoke access for a user(s) or delete the content. The same filters as described above apply.
• No results - "No results found!"
• Results - columns for the following:
• Content Type - name of the content type. The default column for sorting is alphanumerical order.
• Modified Date - the last date that the content was modified.
• Content Title - the content's title. This is what is displayed below the
thumbnail in the main area when navigating Visual Folders. If there is no content title, the Modified Date is left blank. The secondary column for sorting is alphanumerical order with a blank first,
• Grantor - the name of the user who has granted access to that item of content to one or more other users.
o Sub-rows - Because there can be more than one user who reshared the item of content, these are sub-rows within the row for that item of content.
• Grantee - name of a user to whom the grantor has granted access one or more times to that item of content.
o Sub-sub-rows - Because there can be more than one user to whom the grantor granted access to that item of content, the sub- sub-rows are sub- rows of the grantor column.
• # of Times Reshared - a count of the number of times the grantor has reshared that specific item of content to one or more grantees. For example, if the grantor reshared "Slide A" with five grantees, the # of Times Reshared is "5". o Sub-rows - Because there can be more than one grantor who reshared the item of content to one or more grantees, these are sub-rows within the row for that item of content.
o Total - a sum of the total number of times reshared by all grantees. For example, if UserA reshared the item of content three times, UserB six times, and UserC one time, the total is 3 + 6 + 1 = 10.
o The user cannot sort by this row.
• Actions
o Revoke access - icon: If selected, the selection confirms that the owner wants to revoke access for that particular grantee. If confirmed, access to that item of content is revoked for that grantee.
o Delete - icon: If selected, the selection launches a standard delete
confirmation dialog asking if the user wants to delete in "My Workspace" or "Everywhere". Depending upon user's selection, appropriate action is taken.
The "Used content" report enables owners to view their content that has been used by other users in their own Macro-objects, and enables the owner to opt to revoke access for a user(s) or delete the content. The same filters described above apply.
No results - "No results found!"
Results - columns for the following:
• Content Type - name of the content type. The default column for sorting is alphanumerical order.
• Modified Date - the last date that the content was modified.
• Content Title - the content's title. This is what is displayed below the
thumbnail in the main area when navigating Visual Folders. If there is no content title, Content Title is left blank. The secondary column for sorting is alphanumerical order with a blank first.
• Used By - the name(s) of the user(s) who have added that item of content into one or more files. The user(s) can include the owner of the content, if he/she has used that item of content in another file. Used By does not include the parent file. • Used In - the name(s) of user(s) and Macro-objects that item is added to.
• # of Times Used - the count of the number of times that the specific user has added the specific item of content to one or more of his/her files. For example, if the user added "Slide A" to five presentations, # of Times Used is "5".
o Total - a sum of the total number of times that the item of content is used by all users. For example, if UserA used the item of content three times, UserB six times, and UserC one time, the total is: 3 + 6 + 1 = 10.
• Actions - the same actions as above apply {i.e., revoke access or delete
content)
[00155] FIG. 52 illustrates one example of how the results from the used by reports are shown to the user.
[00156] The Object Extraction Block 238 extracts Micro-objects (e.g. , charts, tables, images, text, graphics, etc.) from within Mini-objects. The Object Extraction Block 238 enables users to pick and choose these extracted Micro-objects and add them to empty Mini-objects from directly within the Coleo Cloud. Prior art applications do not offer this capability. In fact, the only way users can currently pick and choose objects from documents to add to other documents is by opening each document, locating the object they wish to copy, copy and then paste that object into their new document. They have to repeat this procedure for every object in every document that they desire to reuse.
[00157] FIGS. 55-76 illustrate a flowchart for Mini- and Micro-object extraction performed by the Micro- Object Extraction Block 238 in accordance with one example. FIG. 58 shows examples of Micro-objects extracted in accordance with the functionality shown in FIGS. 55-76. FIG 59 shows how users can select objects from one Mini-object and add them to other Mini-objects in accordance with one example.
[00158] The Remove Duplicate Block 240 enables users to identify and eliminate duplicate Mini -objects from within their Macro-objects, ensuring every Mini-object has only one copy existing in a user's workspace so when changes are made to that one copy, the changes are reflected within every Macro-object in which the Mini-object resides. Users can choose to have the function ignore Mini-object elements such as headers, footers, and templates so the focus is only the content. In addition, users may choose to search for Mini-objects matching their own across other users' workspaces and replace their own copies of Mini-objects with those found in other workspaces. In this scenario, any changes owners of the copied Mini-objects make to their Mini-objects will be reflected across all the workspaces that perform the find duplicate and replace function. Prior art applications only enable finding of exact duplicates including templates, headers, and footers within only one type of document, namely, presentations, and within only a single central database.
[00159] FIGS. 60-61 show the flowchart operations performed when finding redundant content in accordance with one example.
[00160] In another example, when a user opts to check for duplicates, there is the option to ignore templates and/or graphics in a presentation or header and/or footer information in other file types when looking for similar content. An item of content is considered a match if it is an exact {i.e., 100%) match. If the user chooses the option to ignore information such as
header/footer, that exact match is based on what remains. This can be both text, images, formulas, graphs, tables, etc. When comparing Mini-objects, the Remove Duplicate Block 240 compares the same types of content. For example, a slide is compared against other slides, and a spreadsheet is compared against other spreadsheets. If the user has chosen to include everything, the template/graphics or header/footer must match exactly as well as the main content. If the user has chosen to exclude either some portion, such as the template, then all other content must match, but the template is not checked. This means that the comparison is not done pixel by pixel but by template, header, footer, text, and/or images. Once identified, duplicates are placed in a reserved folder called Duplicates and are displayed and acted upon in a similar manner to the results returned utilizing the Smart Search and Find Similar Blocks 208 and 212, respectively.
[00161] The Create New Document Block 242 enables users to mix-and-match Mini- objects from multiple workspaces across the distributed cloud databases from within the Coleo Cloud interface to create new Macro-objects. Prior art cloud file sharing applications do not provide this capability.
[00162] In one example, the user selects the Create New File option which opens a blank document for the user to populate. The user can then select and drag-and-drop thumbnails from My Workspace or from any or all Connected Workspaces to create the new document.
1. If all Mini-objects selected are the same content type, a brand new document will be created for that type of Mini-object. For example, if all objects the user selects are slides, a PowerPoint® presentation will be generated when the user selects "I'm Done". If all Mini-objects selected are Microsoft Word pages, then a Word document will be generated when the user selects "I'm Done". 2. If the Mini-objects selected are different content types, an Adobe® Acrobat® PDF file will be created.
[00163] The Smart Tracking Block 243 enables owners of Mini- and Micro-objects to track who uses the objects, the Macro-objects in which the Mini- and Micro-objects have been used, who owns those Macro -objects, who has frozen those objects, how many links the objects were included in, and how many people viewed the objects and for how long.
[00164] The Kahani Encryption Block 244 enables users to go beyond the current file encryption methods to enable the encryption of information inside files, specifically Mini- and Micro-objects.
1. The owner of Mini- and Micro-objects selects the objects and selects the encryption functionality.
2. The object targeted for encryption is isolated and treated to a 256 SSL encryption
3. All Macro-objects using the encrypted Mini- and Micro-object are updated with the encrypted status, and the encrypted objects are replaced with black boxes indicating the encrypted status of the objects.
4. The owner can choose to make visible the encrypted object by specifically sharing the object with users and specifying additional permissions which include
• View only - the person can only view the object in a web browser.
• Can use in other Macro-objects - the person will be allowed to drag and drop the encrypted objects into new Macro-objects using the Kahani for 3 rd Party Authoring Applications Block 220.
• Cannot re-use - the person will not be allowed to drag and drop the encrypted objects into new Macro-objects using the Kahani for 3rd Party Authoring Applications Block 220.
• Cannot copy - the copy capabilities of 3rd Party Authoring applications will be disabled for the encrypted objects within new Macro-objects in the Kahani for 3rd Party Authoring Applications Block 220. The owners of encrypted content will be notified of copy attempts with the following information:
• Name of person who tried to edit/copy the object
• The time and location of the person who tried to edit/copy the object
• The identity of the object itself
• The name of the Macro-object the encrypted objects were added to.
• Option to revoke access from the person.
Cannot leave the system environment - any attempts to save a Macro- object containing the encrypted Mini- or Micro -object will result in the encrypted object being removed from the file prior to saving. The person trying to save the object outside the system environment will receive a warning that the file he or she is trying to save has encrypted objects and the encrypted objects will be removed prior to saving. The owner of the encrypted objects will also be notified with the following information:
• Name of person who tried to save the object
• The time and location of the person who tried to save the object
• The identity of the object itself
• The name of the Macro-object the encrypted objects were added to.
• Option to revoke access from the person.
Number of devices the user can authenticate on - can be limited to one. When more than one, the user will be asked to authenticate on every device used to access encrypted objects.
Expiration date - if specified, the encrypted objects are no longer accessible after the expiration date and are removed from any Macro- objects still in the system environment and made permanently illegible in any document outside the system environment. [00165] Once an object has been encrypted and shared with users, the users will receive a notification with instructions to authenticate themselves (e.g., email addresses) and the authentication device (computer, phone, tablet, etc.) will be recorded.
1. Users have to be logged into their accounts on the authenticated devices in order to access the encrypted content.
2. If allowed to save a Macro-object containing the encrypted Mini- or Micro - objects, use outside the system environment will still require authorized users to be on their authenticated devices.
3. If any Macro-object containing the encrypted Micro- or Mini-objects is opened outside of the system environment by an unauthorized user or on an unauthorized device (i.e., the Macro-object was emailed to someone, it was converted to a PDF or another format, it was copied to a local or USB drive, etc.), the encrypted objects within the Macro-object will be replaced with a black box warning users they are not authorized to view or manipulate the objects.
[00166] The Add comments to Links Block 245 enables owners who send links to their Macro-objects from the Coleo Cloud, Kahani Offline Block 222, or from the Kahani for 3rd Party Authoring Applications Block 220 to collect comments, review, and feedback from the link recipients.
1. When the link recipient opens the link in a Kahani Viewer, a toolbox is made available to the viewer in the upper right hand corner of the viewer.
2. The toolbox contains a text icon, ability to pick from the a simple set of graphics elements (e.g., square, circle, freeform, etc.) as well as the ability to pick from a simple set of colors (e.g., black, white, red, yellow, blue, and green).
3. The viewer can use the toolbox elements to add comments anywhere on the
surface of the content being viewed using capabilities from the Kahani Glass Block 246.
[00167] The Kahani Glass Block 246 enables users to redline Macro-, Mini-, or Micro- objects and save the redlines on a transparent (Glass) element associated with the object and choose to turn the glass overlay on the object on or off depending on whether they wish to view the redlines/review or not. 1. In one example, the redlining can be accomplished using the Add Comments to Links Block 245 or the Kahani for 3 rd Party Authoring Applications Block 220. In the case of the latter, a toolbox will be added to the 3rd Party Authoring
Application behaving exactly like the capabilities defined in the Add Comments to Links Block 245.
2. Upon saving at the end of the redlining process, all comments or redline markings are rendered and saved on a transparent background and linked to the Mini- or Micro-object with which they are associated.
3. The owner of the linked Macro-object is notified of pending review from editors.
• A Kahani Glass icon is added to every object that has been redlined.
• A number is added to the icon to indicate the number of editors who have redlined the object.
• The owner of the object can expand the Kahani Glass icon to view, by user, all redlines either in the cloud or in the Kahani for 3rd Party Authoring Applications Block 220.
[00168] The Real Time Update Block 247 enables users who have access to and have used Mini- or Micro-objects in the Kahani for 3rd Party Authoring Applications Block 220 to be notified of any changes to the Mini- and Micro-objects in real time.
1. Upon the change in status (new version) of a Mini- or Micro -obj ect due to rules defined in the Smart Version Management Block 214, the system identifies all currently open instances of the modified objects.
2. For every user editing a Macro-object using the Kahani for 3rd Party Authoring Applications Block 220 which contains Mini- or Micro-objects whose status has changed due to a new version, the user receives a notification informing them that objects currently open in the Macro-object have been modified.
• If the owner of the modified content wants the changes to be propagated everywhere they are used and the user has not made any of his or her own changes to the objects, users with the Macro -objects open in their documents will simply receive notification that the content was replaced at the owners' request. • If the owner of the modified content wants the changes to be propagated everywhere they are used and the user has made changes to the object themselves but not saved yet, the system will insert the modified object in the Macro-object immediately after the original object is saved and change ownership of the object modified by the current user to the current user.
• The owner of the content that was copied over to another user's workspace receives a notification that his or her content has been modified and adopted by another user per the Smart Notification Block 248.
• The new owner can chose to receive notification every time the original owner makes any changes, or the new owner can choose to permanently unlink the copied content from its original.
• If the owner of the modified content does not want to force the latest modification on everyone, the user is given the option to compare the current version with the new version in the ahani for 3 rd Party
Authoring Applications Block 220 and take appropriate action.
• If the user decides to adopt the new changes, the system swaps out the previous version of the modified Mini- or Micro-objects in the open Macro-object.
• If the user decides to ignore the new changes, the system copies the unchanged object to the user's workspace and notifies the owner that their object has been adopted by another user per the Smart Notification Block 248.
[00169] The Smart Notification Block 248 informs owners and users of content how other users are interacting with the content. Notifications are sent to users every time content interaction occurs.
1. Content is modified by users who have co-edit rights to Macro-, Mini-, or Micro- objects and have chosen to propagate the changes to all users. • The owner has an option to reject the modifications and rollback to a previous version of the object per the Smart Version Management Block 214.
The owner is notified every time another user modifies and adopts the owner's Mini- or Micro-object.
The owner receives notification every time his or her confidential Macro-, Mini-, or Micro-objects are re-shared.
• The owner has an option to revoke access from either re-sharer, the person who obtained new access to the content, or both.
Users are notified every time Macro-, Mini-, or Micro-objects they used are modified by the owner.
• When the owner does not force the changes everywhere, users have an option to adopt the modifications or adopt the previous version of the objects with proper provenance attribution.
Owners are notified every time users try to modify encrypted Macro-, Mini-, or Micro-objects that have been marked non-editable by either modifying, copying, or deleting the objects.
Owners are notified whenever users freeze objects belonging to the owners. Owners are notified of all Macro-objects that are not updated because they contain frozen Mini-objects when the owner forces a change to the Mini-objects everywhere.
• The owner has an option to send a note to the users of the Macro -objects that contain frozen Mini-objects about the importance of adopting the changes.
Users are notified when they are followed or people subscribe to their Mini- objects.
Users are notified when others have conducted a search that results in matches within their content that is not shared with the user that conducted the search. The owner receives:
• The name of the person who conducted the search
• The keyword(s) or images used to seed the search • The content that matches the search criteria
• The option to share, on an object-by-object basis, the content that
matches the search criteria.
10. Users who adopt other owners' Mini-objects are notified when owners modify the objects.
• Users have the option to update their adopted objects to reflect the
changes made by the original owners.
11. Owners are notified whenever users add comments to their Macro- or Mini- objects via the Add Comments to Links Block 245 and the Kahani Glass Block 246.
[00170] Referring again to FIG. 1, the devices 102, 104 might include, for example, one or more processors, controllers, control modules, or other processing devices. Modules might be implemented using a general-purpose or special-purpose processing engine such as, for example, a microprocessor, controller, or other control logic. The modules may be connected to a bus, although any communication medium can be used to facilitate interaction with other components of computing modules or to communicate externally.
[00171] The devices 102, 104 might also include one or more memory modules, simply referred to herein as main memory. For example, preferably, random access
memory (RAM) or other dynamic memory, might be used for storing information and instructions to be executed by a processor. Main memory might also be used for storing temporary variables or other intermediate information during execution of instructions to be executed by the processor. A computing module might likewise include a read only memory (ROM) or other static storage device coupled to a bus for storing static
information and instructions for the processor.
[00172] The devices 102, 104 might also include one or more various forms of information storage mechanisms, which might include, for example, a hard disk, floppy disk, magnetic tape, cartridge, optical disk, a CD, DVD, or Blu-ray, or other fixed or removable medium that is read by, written to, or accessed by a media drive. As these examples illustrate, the storage media can include a computer usable storage medium having stored therein computer software or data.
[00173] In alternative examples, the information storage mechanism might include other similar instrumentalities for allowing computer programs or other instructions or data to be loaded into the computing module. Such instrumentalities might include, for example, a fixed or removable storage unit and an interface. Examples of such storage units and interfaces can include a program cartridge and cartridge interface, a removable memory (e.g., a flash memory or other removable memory module) and memory slot, a PCMCIA slot and card, and other fixed or removable storage units and interfaces that allow software and data to be transferred from the storage unit to the computing module.
[00174] The devices 102, 104 might also include a communications interface such as an Ethernet, network interface card, WiFiMedia, IEEE 802.XX, or other interface, or other communications interface. Data transferred via communications interface might typically be carried on signals, which can be electronic, electromagnetic (which includes optical), or other signals capable of being exchanged by a given communications interface. These signals might be provided to the communications interface via a channel. This channel might carry signals and might be implemented using a wired or wireless communication medium. Some examples of a channel might include a phone line, a cellular link, an RF link, an optical link, a network interface, a local or wide area network, and other wired or wireless communications channels.
[00175] In general, the routines executed to implement the examples of the present invention may be implemented as part of an operating system or a specific application, component, program, object, module, or sequence of instructions referred to as "computer programs." The computer programs typically comprise one or more instructions set at various times in various memory and storage devices in a computer, and that, when read and executed by one or more processors in a computer, cause the computer to perform operations necessary to execute elements involving the various aspects of the present invention. Moreover, while the present invention has been described in the context of fully functioning computers and computer systems, persons skilled in the art will appreciate that the various examples of the present invention are capable of being distributed as a program product in a variety of forms, and that the present invention applies equally regardless of the particular type of machine or computer- readable media used to actually effect the distribution. Examples of computer-readable media include but are not limited to recordable type media such as volatile and non- volatile memory devices, floppy and other removable disks, hard disk drives, optical disks (e.g. , Compact Disk Read-Only Memory (CD ROMS), Digital Versatile Disks (DVDs), etc.), and flash drives among others.
[00176] FIG. 62 shows an example of hardware 600 that may be used to implement any of the devices 104,108. The hardware 600 typically includes at least one processor 602 coupled to a memory 604. The processor 602 may represent one or more processors (e.g. ,
microprocessors), and the memory 604 may represent random access memory (RAM) devices comprising a main storage of the hardware 600, as well as any supplemental levels of memory, e.g., cache memories, non- volatile or back-up memories (e.g., programmable or flash memories), read-only memories, etc. In addition, the memory 604 may be considered to include memory storage physically located elsewhere in the hardware 600, e.g., any cache memory in the processor 602, as well as any storage capacity used as a virtual memory, e.g., as stored on a mass storage device 610.
[00177] The hardware 600 also typically receives a number of inputs and outputs for communicating information externally. For interface with a user or operator, the hardware 600 may include one or more user input devices 606 (e.g., a keyboard, a mouse, a scanner, etc.) and a display 608 (e.g. , a Liquid Crystal Display (LCD) panel). For additional storage, the hardware 600 may also include one or more mass storage devices 610, e.g., a floppy or other removable disk drive, a hard disk drive, a Direct Access Storage Device (DASD), an optical drive (e.g., a Compact Disk (CD) drive, a Digital Versatile Disk (DVD) drive, etc.) and/or a tape drive, among others. Furthermore, the hardware 600 may include an interface with one or more networks 512 (e.g., a local area network (LAN), a wide area network (WAN), a wireless network, and/or the Internet among others) to permit the communication of information with other computers coupled to the networks. It should be appreciated that the hardware 600 typically includes suitable analog and/or digital interfaces between the processor 602 and each of the components 604, 606, 608, and 612 as is well known in the art.
[00178] The hardware 600 operates under the control of an operating system 614, and executes various computer software applications, components, programs, objects, modules, etc., indicated collectively by reference numeral 616, to perform the functions described above.
[00179] Although the present invention has been described with reference to specific examples, it will be evident that various modifications and changes can be made to these examples without departing from the broader spirit of the present invention. Accordingly, the specification and drawing figures are to be regarded in an illustrative sense rather than in a restrictive sense.
[00180] While various examples of the present invention have been described above, it should be understood that they have been presented by way of example only, and not of limitation. Likewise, the various diagrams may depict an example architectural or other configuration for implementation of the present invention, which is done to aid in understanding the features and functionality that can be included in the present invention. The present invention is not restricted to the illustrated example architectures or configurations, but the desired features can be implemented using a variety of alternative architectures and
configurations. Indeed, it will be apparent to persons skilled in the art how alternative functional, logical, or physical partitioning and configurations can be implemented to implement the desired features of the present invention. Also, a multitude of different constituent module names other than those depicted herein can be applied to the various partitions. Additionally, with regard to flow diagrams, operational descriptions and method claims, the order in which the steps are presented herein shall not mandate that various examples be implemented to perform the recited functionality in the same order unless the context dictates otherwise.
[00181] "Example" is used to provide exemplary instances of the item in discussion, not an exhaustive or limiting list thereof; the terms "a" or "an" should be read as meaning "at least one", "one or more", or the like; and adjectives such as "conventional", "traditional", "normal", "standard", "known", and terms of similar meaning should not be construed as limiting the item described to a given time period or to an item available as of a given time, but instead should be read to encompass conventional, traditional, normal, or standard technologies that may be available or known now or at any time in the future. Likewise, where this document refers to technologies that would be apparent or known to persons skilled in the art, such technologies encompass those apparent or known to the skilled artisan now or at any time in the future.
[00182] The presence of broadening words and phrases such as "one or more", "at least", "but not limited to", or other like phrases in some instances shall not be read to mean that the narrower case is intended or required in instances where such broadening phrases may be absent. The use of the term "module" does not imply that the components or functionality described or claimed as part of the module are all configured in a common package. Indeed, any or all of the various components of a module, whether control logic or other components, can be combined in a single package or separately maintained and can further be distributed in multiple groupings or packages or across multiple locations.
[00183] Additionally, the various examples set forth herein are described in terms of exemplary block diagrams, flow charts, and other illustrations. As will become apparent to persons skilled in the art after reading this document, the illustrated examples and their various alternatives can be implemented without confinement to the illustrated examples. For example, block diagrams and their accompanying description should not be construed as mandating a particular architecture or configuration. Also, techniques, devices, subsystems, and methods described and illustrated in the various examples as discrete or separate may be combined or integrated with other systems, modules, techniques, or methods without departing from the scope of the present technology. Other items shown or discussed as directly coupled or communicating with each other may be coupled through some interface or device, such that the items may no longer be considered directly coupled with each other but may still be indirectly coupled and in communication, whether electrically, mechanically, or otherwise, with one another. Other examples of changes, substitutions, and alterations ascertainable by persons skilled in the art, upon or subsequent to studying the examples disclosed herein, may be made without departing from the spirit and scope of the present technology.
[00184] Various examples of the present disclosure, as discussed above, may be practiced with steps and/or operations in a different order, and/or with hardware elements in configurations which are different than those which are disclosed. Therefore, although the technology has been described based upon these examples, it is noted that certain modifications, variations, and alternative constructions may be apparent and well within the spirit and scope of the technology. Although various examples of the present technology are described herein in a language specific to structural features and/or methodological acts, the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as exemplary forms of implementing the claims.

Claims

WHAT IS CLAIMED IS:
1. A cloud-based system comprising:
at least one local client device communicatively coupled, via an intermediate network, with a server device, comprising an information processing, organization, and management engine, and distributed local and cloud databases across separately owned user accounts;
wherein the information processing, organization, and management engine comprises: a Connected Workspaces Block to determine how an owner of information Macro- objects, Mini-objects, and Micro-objects has selected to share content by granting other users secure access to the information, and how the information is visually displayed for those who have access to that content and how they are able to use, manage, and manipulate the
information, and to organize and display available users with whom the owner may share his/her content; a Grant Access/Smart Sharing Block to connect the owner's workspace to another user's workspace; a Smart Security Block to enable the owner to apply security to Macro- and Mini- objects comprising one or more of marking objects as non re-sharable, watermarked, cannot download, non-searchable, and frozen, to apply inheritance rules, to protect content which is marked confidential, to notify the owner when confidential information is re-shared, and to enable the owner to revoke access to another user who has access to the content via a re-share; a Make Content Non-Editable Block to determine if the owner has selected to prevent a user from editing portions of a Macro- or Mini-object to which that user has been granted access by enabling an owner to mark portions of his/her Macro- or Mini-objects as uneditable by other users; a Smart Search Block to enable a user to find and access content across multiple distributed cloud-based user accounts or across an enterprise; a Display Search Results Block to determine how search results are displayed and to enable a user to request access to results to which he/she does not have access; a Find Similar Block to enable a user to search across connected workspaces or his/her enterprise to find content similar to his/her own content, including searching for an image within other content, and to replace his/her own content, in his/her own workspace or everywhere the content has been used, with content located during the search; a Smart Version Management Block to maintain versions of Macro- and Mini-objects as changed by any user who has been enabled to edit the Macro- and Mini-objects through permissions and to enable the owner of the content to rollback to any previous version, back to and including the original version, of a Mini-object that has been modified; a Smart Copy/Create New Block to enable a user to copy content owned by another user to his/her own workspace and maintain the provenance of a Mini-object including attribution to allow an original creator of content to be identified; a Smart Replace Block to enable the owner of Mini-objects to replace his/her Mini-objects with other Mini-objects of the same type and to propagate the replacement Mini-objects across all workspaces and within all Macro-objects that included the original Mini- objects; a 3rd Party Authoring Applications Block to enable a user to access and use connected workspaces from the cloud or from his/her desktop directly from applications comprising PowerPoint® to access Macro- and Mini-objects to which he/she has been granted access within PowerPoint® to create new Macro-objects or modify existing Macro- and Mini-objects; an Offline Block to control the way owned and shared content is synchronized to the owner's client device including synchronization of Macro- and Mini-objects and to enable a user to grant access to other users directly from the user's local database; a Synchronization Block to synchronize both Macro- and Mini-objects once the user is connected to the network; a Smart Delete Block to enable a user to delete his/her own Macro- and Mini-objects from either only his/her workspace, or everywhere those objects are used, including another user's Macro-objects in that other user's workspace; a Smart View Block to enable a user to view all uploaded Macro- and Mini-object content and have the ability to filter the uploaded content regardless of the folder in which the content resides; a Smart Categorization/Tagging Block to enable content to be categorized automatically based on user defined rules as the content is being uploaded to the user's workspace; a Smart Business Social Graph Block to enable persons who share content with each other to take advantage of their online business social communities to gain access to content to which they would not otherwise have access; a Manage Workspaces Block to enable users to manage and organize their connected workspaces in the cloud by hiding workspaces or adding workspaces to favorites; a Smart Statistics Block to enable statistics to be provided to the owner of content respecting use of the content; an Object Extraction Block to extract Macro- and Mini- objects as well as Micro-objects from within the Mini-objects; a Remove Duplicate Block to enable a user to identify and eliminate duplicate Mini-objects from within his/her Macro-objects, ensuring every Mini-object has only one copy existing in a user's workspace so when changes are made to that one copy, the changes are reflected within every Macro-object in which the Mini-object resides; a Create New File Block to enable a user to mix-and-match Mini-objects from multiple workspaces across the distributed cloud databases from within the cloud interface or from within the authoring application for the objects to create new Macro-objects; a Glass Block to enable a user to add comments in the form of text or graphics within existing Macro- and Mini-objects for the purpose of providing feedback without altering the content of the Macro- and Mini-objects; an Add Comments to Links Block to enable viewers to add comments using text or graphics on top of Macro- and Mini-objects shared with them via a secure web link; an Encryption Block to enable content owners to encrypt Macro- and Mini-objects to protect the objects and control how users access and interact with the object and to permanently embed the protection into the Macro- and Mini-objects such that the protection and encryption controls travel with the Macro- and Mini-objects regardless of where the objects travel, inside or outside the system environment; a Smart Tracking Block to enable owners of information to see exactly where the information is used, including new information created by owners or users who have access to the information, within or outside an enterprise; and a Real Time Update Block to enable 3 rd party authoring applications to notify users of shared information that the shared information they are using in the then current document has been changed by the owner or by people authorized to change the information and to give the user of said information the ability to review the changes and adopt or reject the changes in real time depending on whether the owner or modifier of said information requested a mandatory or optional propagation of the change everywhere the information is used.
2. A system as in claim 1 wherein the Find Similar Block enables a user to search across connected workspaces or his/her enterprise to find content similar to his/her own content using a percentage range of similarity specified by the user.
3. A system as in claim 1 wherein the 3rd Party Authoring Applications Block further comprises a font crawler function which enables a user to modify fonts in an entire presentation and for all presentations within a workspace.
4. A system as in claim 1 wherein the Smart View Block enables a user to view all content within a date range selected by the user.
5. A system as in claim 1 wherein the Remove Duplicate Block enables a user to select to ignore Mini-object elements such as headers, footers, and templates.
PCT/US2016/012799 2014-01-10 2016-01-11 Information organization, management, and processing system and methods WO2016115009A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/237,634 US20170200122A1 (en) 2014-01-10 2016-08-16 Information organization, management, and processing system and methods

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US14/595,092 2015-01-12
US14/595,092 US9420017B2 (en) 2014-01-10 2015-01-12 Information organization, management, and processing system and methods

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/595,092 Continuation-In-Part US9420017B2 (en) 2014-01-10 2015-01-12 Information organization, management, and processing system and methods

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/237,634 Continuation-In-Part US20170200122A1 (en) 2014-01-10 2016-08-16 Information organization, management, and processing system and methods

Publications (1)

Publication Number Publication Date
WO2016115009A1 true WO2016115009A1 (en) 2016-07-21

Family

ID=56408929

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2016/012799 WO2016115009A1 (en) 2014-01-10 2016-01-11 Information organization, management, and processing system and methods

Country Status (1)

Country Link
WO (1) WO2016115009A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11308039B2 (en) 2019-12-31 2022-04-19 Dropbox, Inc. Binding local device folders to a content management system for synchronization

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6256610B1 (en) * 1998-12-30 2001-07-03 Lernout & Hauspie Speech Products N.V. Header/footer avoidance for reading system
US20040064449A1 (en) * 2002-07-18 2004-04-01 Ripley John R. Remote scoring and aggregating similarity search engine for use with relational databases
US20090044117A1 (en) * 2007-08-06 2009-02-12 Apple Inc. Recording and exporting slide show presentations using a presentation application
US20090181776A1 (en) * 2006-11-13 2009-07-16 Bally Gaming, Inc. Gaming machine collection and management
US20130290502A1 (en) * 2012-04-30 2013-10-31 Sergiy Bilobrov Continuous content identification of broadcast content
US20140372539A1 (en) * 2013-06-12 2014-12-18 Cloudon Ltd Systems and methods for supporting social productivity using a dashboard

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6256610B1 (en) * 1998-12-30 2001-07-03 Lernout & Hauspie Speech Products N.V. Header/footer avoidance for reading system
US20040064449A1 (en) * 2002-07-18 2004-04-01 Ripley John R. Remote scoring and aggregating similarity search engine for use with relational databases
US20090181776A1 (en) * 2006-11-13 2009-07-16 Bally Gaming, Inc. Gaming machine collection and management
US20090044117A1 (en) * 2007-08-06 2009-02-12 Apple Inc. Recording and exporting slide show presentations using a presentation application
US20130290502A1 (en) * 2012-04-30 2013-10-31 Sergiy Bilobrov Continuous content identification of broadcast content
US20140372539A1 (en) * 2013-06-12 2014-12-18 Cloudon Ltd Systems and methods for supporting social productivity using a dashboard

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11308039B2 (en) 2019-12-31 2022-04-19 Dropbox, Inc. Binding local device folders to a content management system for synchronization
US11748315B2 (en) 2019-12-31 2023-09-05 Dropbox, Inc. Binding local device folders to a content management system for synchronization

Similar Documents

Publication Publication Date Title
US20170200122A1 (en) Information organization, management, and processing system and methods
US9420017B2 (en) Information organization, management, and processing system and methods
US11816615B2 (en) Managing project tasks using content items
US20200327500A1 (en) Presenting project data managed by a content management system
US11526533B2 (en) Version history management
JP7150830B2 (en) Content management system workflow functionality enforced by the client device
US20070033154A1 (en) System and method managing documents
US10970656B2 (en) Automatically suggesting project affiliations
US10922426B2 (en) Managing content item collections
US10776505B2 (en) Data loss prevention for an online content management platform
US20180181549A1 (en) Automatically formatting content items for presentation
US20220417251A1 (en) Team member transfer tool
US20190294659A1 (en) Embedding a portion of a source content item
WO2016115009A1 (en) Information organization, management, and processing system and methods
US20220318489A1 (en) Management of tracked changes objects for cloud document editing
US9519399B1 (en) Providing a visual indication that stored content is associated with a collaboration environment
US11625365B2 (en) Method for managing virtual file, apparatus for the same, computer program for the same, and recording medium storing computer program thereof
CN115270178A (en) Authorization management method based on label
JP2020525878A (en) Managing content item collections

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16737658

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16737658

Country of ref document: EP

Kind code of ref document: A1