Patents Assigned to Workshare Technology, Inc.
-
Patent number: 8286171Abstract: The present invention provides methods and systems to enable fast, efficient, and scalable means for fingerprinting textual information using word runs. The present system receives textual information and provides algorithms to convert the information into representative fingerprints. In one embodiment, the fingerprints are recorded in a repository to maintain a database of an organization's secure data. In another embodiment, textual information entered by a user is verified against the repository of fingerprints to prevent unauthorized disclosure of secure data. This invention provides approaches to allow derivative works (e.g., different ordering of words, substitution of words with synonyms, etc.) of the original information to be detected at the sentence level or even at the paragraph level. This invention also provides means for enhancing storage and resource efficiencies by providing approaches to optimize the number of fingerprints generated for the textual information.Type: GrantFiled: July 21, 2008Date of Patent: October 9, 2012Assignee: Workshare Technology, Inc.Inventors: Scott More, Ilya Beyer
-
Publication number: 20120136951Abstract: Disclosed herein are methods and systems for monitoring and detecting changes in files attached to incoming emails. In one embodiment, if files are attached to an outgoing email, the change service uniquely tags each of the attached files and optionally stores local or remote copies of the tagged files. Additionally, in embodiments, the change service monitors and intercepts incoming emails. If files are attached to an incoming email, the change service identifies whether the files are tagged in a manner unique to the compare service. The change service then matches uniquely tagged files in the incoming email to corresponding files previously tagged by the change service. The change service then compares the two documents and generates reports that identify changes in the received document in relation to the transmitted document. Further, in embodiments, the change service provides visual indicators of the changes within the email application.Type: ApplicationFiled: November 29, 2011Publication date: May 31, 2012Applicant: Workshare Technology, Inc.Inventor: Samuel Peter Matthew Mulder
-
Publication number: 20120136952Abstract: Disclosed herein are methods and systems for monitoring and detecting changes in files attached to incoming emails. In one embodiment, if files are attached to an outgoing email, the change service uniquely tags each of the attached files and optionally stores local or remote copies of the tagged files. Additionally, in embodiments, the change service monitors and intercepts incoming emails. If files are attached to an incoming email, the change service identifies whether the files are tagged in a manner unique to the compare service. The change service then matches uniquely tagged files in the incoming email to corresponding files previously tagged by the change service. The change service then compares the two documents and generates reports that identify changes in the received document in relation to the transmitted document. Further, in embodiments, the change service provides visual indicators of the changes within the email application.Type: ApplicationFiled: November 29, 2011Publication date: May 31, 2012Applicant: Workshare Technology, Inc.Inventor: Samuel Peter Matthew Mulder
-
Publication number: 20120136862Abstract: Changes identified between two electronic documents are grouped according to the category of the identified change, and the categorized changes are grouped and displayed to a user. Additionally, each change is assigned a review state that can be updated to reflect the status of each change as the user reviews the changes in a comparison document.Type: ApplicationFiled: November 29, 2011Publication date: May 31, 2012Applicant: Workshare Technology, Inc.Inventor: Robin Wallace Glover
-
SYSTEM AND METHOD FOR PROVIDING A COMMON FRAMEWORK FOR REVIEWING COMPARISONS OF ELECTRONIC DOCUMENTS
Publication number: 20120133989Abstract: Systems and methods for providing a common framework for a document comparison review process are disclosed. Using the common framework, the comparison review process allows a reviewer to perform either an electronic-based review or a paper-based review. The different review technologies can be used interchangeably in the common framework.Type: ApplicationFiled: November 29, 2011Publication date: May 31, 2012Applicant: Workshare Technology, Inc.Inventor: Robin Wallace Glover -
Publication number: 20110022960Abstract: Disclosed herein are methods and systems for comparing two slide decks using a compare service. The compare service generates a comparison analysis for the two slide decks based on a comparison theme selected by the user. The result of the analysis is displayed in a comparison display that includes a slide selector section, a slide pair viewer section, and a navigable change summary section. In one embodiment, the compare service allows the user to select preferred slides from the two slide decks displayed in the comparison display, and subsequently generates a new slide deck that contains only the preferred slides selected by the user.Type: ApplicationFiled: July 27, 2010Publication date: January 27, 2011Applicant: Workshare Technology, Inc.Inventor: Robin W. Glover
-
Publication number: 20100299727Abstract: A technique for efficiently preventing exact data words (“entities”) from unauthorized disclosure is disclosed. Protect agents installed at various egress points identify candidate entities from digital information desired to be disclosed by a user. The candidate entities are compared against registered entities stored in a lightweight entity database (LWED). If a candidate entity matches against a registered entity in the LWED, the protect agent initiates a security action. Alternately, the protect agent transmits the matching candidate entity to a global entity database (GED) server to receive additional confirmation on whether the candidate entity matches a registered entity. In some instances, the protect agent also receives (from the GED server) metadata information associated with the matching candidate entity. The protect agent utilizes the metadata information to initiate suitable security actions.Type: ApplicationFiled: November 18, 2009Publication date: November 25, 2010Applicant: Workshare Technology, Inc.Inventors: Scott More, Ilya Beyer
-
Publication number: 20100124354Abstract: The present invention provides methods and systems to protect an organization's secure image information from unauthorized disclosure. In one embodiment, methods and systems to generate image fingerprints are provided. The fingerprints are generated for each feature point of an image data. Because the fingerprints take into account the neighborhood features around each feature point, the image fingerprints are robust against derivate images where the original image may have been altered. Methods and systems to maintain a fingerprint database for an organization's secure image data is also provided. In one embodiment, client fingerprints are generated for image data that a user intends to transmit outside of the organization. In some embodiments, suitable security actions are initiated if any of the client fingerprints match any of the fingerprints in the fingerprint database.Type: ApplicationFiled: November 20, 2008Publication date: May 20, 2010Applicant: Workshare Technology, Inc.Inventor: Scott More
-
Publication number: 20100064347Abstract: The present invention provides methods and systems to protect an organization's secure information from unauthorized disclosure. The present system uses protect agents installed across various egress points (e.g., email server, user's computer, etc.) to monitor information disclosed by a user. The present system also provides the use of lightweight fingerprint databases (LFD) to maintain a database of fingerprints associated with the organization's secure data. In one embodiment, the LFD is stored locally at the site of each protect agent such that the organization's secure information can be protected even when a protect agent is disconnected from the network. Methods and systems to compress fingerprints to achieve the lightweight fingerprint databases are also provided.Type: ApplicationFiled: September 11, 2008Publication date: March 11, 2010Applicant: Workshare Technology, Inc.Inventors: Scott More, Ilya Beyer, Daniel Christopher John Sweeting
-
Publication number: 20100064372Abstract: The present invention provides methods and systems to protect an organization's secure information from unauthorized disclosure. The present system uses protect agents installed across various egress points (e.g., email server, user's computer, etc.) to monitor information disclosed by a user. The present system also provides the use of fingerprint servers to remotely maintain a database of fingerprints associated with the organization's secure data. In one embodiment, the protect agents transmit fingerprints associated with the user's information to the fingerprint server utilizing a local network or the public internet. The protect agents then receive a comparison analysis from the fingerprint servers and execute appropriate security action based on the analysis. In one embodiment, a combination of the local network and public internet is utilized to achieve remote agent lookups.Type: ApplicationFiled: September 11, 2008Publication date: March 11, 2010Applicant: Workshare Technology, Inc.Inventors: Scott More, Ilya Beyer, Daniel Christopher John Sweeting