WO2006084331A1 - Communication system - Google Patents
Communication system Download PDFInfo
- Publication number
- WO2006084331A1 WO2006084331A1 PCT/AU2006/000180 AU2006000180W WO2006084331A1 WO 2006084331 A1 WO2006084331 A1 WO 2006084331A1 AU 2006000180 W AU2006000180 W AU 2006000180W WO 2006084331 A1 WO2006084331 A1 WO 2006084331A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- peer
- communication
- parties
- server
- data
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
- H04L12/1822—Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1061—Peer-to-peer [P2P] networks using node-based peer discovery mechanisms
- H04L67/1063—Discovery through centralising entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
- H04L12/1827—Network arrangements for conference optimisation or adaptation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
Definitions
- This invention relates to a communication system and relates particularly to a system that enables groups of people to communicate and exchange data and information.
- the invention is particularly suitable to facilitate communication between professional businesses, such as law firms and law departments of corporations.
- the invention has wider application and may be useful in many service industries including health, insurance, construction, engineering, banking and finance and many others.
- the invention will be described in terms of its application to the legal profession, although it will be understood that the invention is not so limited.
- systems currently in use require the use of servers interposed between the various users either directly in the internet environment or within local area networks.
- Such servers can give rise to bottle necks in the transfer of information between connected parties.
- a communication system for exchange of information between connected computers of different parties including a connection management server to register the connected parties and to direct initial communication from one party to a selected one or more of other connected parties, and peer-to-peer software to enable the connected parties to communicate directly without server interface.
- the peer-to-peer software creates a collaborative network using existing technologies including .Net, XML web services and the like.
- the software enables practice management and information exchange to take place directly between the connected parties without the need for an interposed server to control inter- parties communications.
- connection management server utilises "thin client" architecture to enable the software to be accessed using a web browser, such as Internet Explorer.
- the server may therefore be located at any suitable location to provide access to the software necessary to manage the peer-to-peer network.
- a corporation law department for example, is then able to communicate directly with and exchange information with a law firm of its choice which is connected to the system.
- the peer-to-peer software facilitates information exchange without an interposed network server. This facilitates real time communication and creates a fully auditable and searchable database.
- the system enables the corporation and the external law firm to work on documents and analyse financial data in a secure environment.
- the system also enables a plurality of law firms and/or a plurality of clients to communicate on one or more selected matters.
- the software will allow for the analysis of matters on a project by project basis.
- a company may create a path for their external law firm(s) which will integrate directly with Outlook (trade mark) or other calendar/email system. This thereby ensures work flow is implemented between the parties, creating time and cost efficiencies for both the corporate counsel and law firm(s).
- the software of preferred embodiments will allow legal firms to receive documentation using, for example, QuickBrief (trade mark), and be able to invoice the corporate counsel electronically.
- a communication and data exchange system for exchange of information between connected computers of different parties comprising: a central connection management server which maintains client details including security data relating to each client, collaboration information concerning clients that are collaborating, and a central web service to facilitate maintenance of the system, the server further maintaining a register of the connected parties and operating to direct a communication from one party to a selected one or more of other connected parties, and peer-to-peer software downloadable from the server to new clients to enable the connected parties to communicate directly without server interface.
- system further including a collaboration class library that contains logic for one or more of data access, security certificate management, logging, access control, peer-to-peer messaging logic and notification activities.
- a collaboration class library that contains logic for one or more of data access, security certificate management, logging, access control, peer-to-peer messaging logic and notification activities.
- the class library further implements collaboration rules, notification and security.
- the server is hosted in a secure zone behind an edge firewall, a DMZ and a backend firewall.
- all data is sent over SSL between clients, each client having a security certificate issued which is sent with each transmission so as to be validated and the transmission authenticated.
- the communication transmissions preferably utilise WSDL and SOAP protocols to facilitate the communication between different computers using different operating systems.
- a method of communicating data and exchanging information between connected computers of different parties comprising the steps of: establishing a central server, connecting a plurality of client computers to the server using the internet, providing peer-to-peer software to each client computer, registering each of the connected client parties and directing an initial communication from one party to a selected one or more of other connected parties to establish a peer-to-peer communication between the parties, and facilitating multiple inter-party connections enabling collaboration between the connected parties whereby the parties are able to exchange information without server interface.
- Figure 1 illustrates one form of business communications system which is utilised in embodiments of the present invention
- Figure 2 illustrates a second communication system
- Figure 3 is a schematic illustration of one application of the present invention
- Figure 4 is a schematic illustration of the communication operation of the embodiment illustrated in Figure 3;
- FIG. 5 illustrates the security features of the described embodiments.
- Figure 6 diagrammatically shows the process of authentication of a certificate in accordance with one embodiment.
- Embodiments of the present invention have been developed utilising existing platforms and software, examples of which are as follows: a) ".net” This is a set of software technologies of Microsoft developed for connecting information, people, systems and devices. It enables a high level of software integration through the use of web services - small, discreet, building block applications that connect to each other as well as to other, larger applications over the internet. b) "asp.net”
- Asp.net brings rapid application development to the server.
- Asp.net pages use a compiled, event driven programming model that improves performance and enables the separation of application logic and user interface.
- the Active Directory (trade mark) service is a central component of the Windows operating system platform, providing the means to manage the identities and relationships that make up network environments.
- Active Directory in Windows Server 2003 introduces key features ensuring that it is one of the most flexible directory structures in the market place. As directory-enabled applications become more prevalent, organisations are able to utilise the capabilities of active directory to manage even the most complicated enterprise network environments. From internet data centres to large distributed branch office enterprises, the improvements provided by Windows Server 2003 simplify administration and increase performance and efficiency, making it a truly versatile solution. e) DMZ
- DMZ demilitarized zone
- SSL Secure Sockets Layer
- SSL is a protocol developed for transmitting private documents via the Internet.
- SSL uses a cryptographic system that uses two keys to encrypt data - a public key known to everyone and a private or secret key known only to the recipient of the message.
- WSDL web service description language
- UDDI Universal Description, Discovery Integration
- connection management server (12) so as to be identified, and the businesses identified thereby, enabling companies to find one another on the web. Once found, the companies are then able to communicate and exchange information, as indicated by arrows A, B and C.
- SOAP Simple Object Access Protocol
- XML web services enables users to develop applications that directly connect two or more client peer computers without an intervening server.
- Such peer-to-peer (P2P) services enable two client computers (16) and (18) to both expose and consume information, largely eliminating the central server (12) and cutting down on network and processing bottle necks.
- peer-to-peer applications expand the possible device and application interactions while largely eliminating server dependencies. In this way, highly collaborative communications and solutions can take form.
- the peer-to-peer software provides innovative use of practice management software by providing real time collaboration between, for example, the corporate counsel and their selected collaborative law firms that will benefit companies of all sizes and in all industries.
- a corporate counsel (14) running a software program "LegalNet” (trade mark) in accordance with embodiments of the present invention connects over the internet (20) with a law firm (10) selected from a group of firms (11) identified through the central, managing network server (12). There is no limit to the number of law firms (11) that may then be connected to the corporate LegalNet system provided they all agree to the communication. As further shown in Figure 4, when the law firm (10) registers with the LegalNet central server (12), all other legal counsel (11) are notified by the server (12). A corporation (14) (or another law firm) that wishes to establish a commercial relationship with the firm (10) then initiates collaboration communication protocol with the firm (10) and it is established when agreements to communicate are made.
- Matters are then able to be sent directly between the law firms (10) and the legal counsel at the corporation (14).
- the LegalNet software is installed at both the corporation (14) and law firm (10).
- a law firm (10) has an installation for the first time, it is assigned a Firm ID and entered into a "firm database" on the server (12). If a new party requires collaboration with an existing party, their certificate is installed into an access control table. Optionally, a contact list for individual or group contacts may also be entered.
- collaboration components enabling establishment of collaboration using peer-to-peer with other firms or corporations are installed.
- the software has been installed and the user clients are registered with the central management server (12), a user can review the list of registered clients and decide to collaborate with another user, or more than one, in relation to a matter.
- the registered user is able to communicate peer-to-peer with any other registered user provided that both agree to the collaboration.
- the software provides appropriate functionality for one party to communicate with the other, in the manner shown in Figure 4.
- a collaboration web service exposes an API (application program interface) to enable collaboration but delegates most functionality to a collaboration class library which implements collaboration rules, notification, security, access control, etc.
- the collaboration class library contains logic for data access, certificate management, logging, access control, P2P messaging logic and notification.
- the central management server (12) includes a web service and an administrative web application for maintaining and configuring the P2P network.
- the web application provided the data entry pages for entering and updating data about firms, contact lists, contact details.
- the web application also has a collaborator page showing all firms that have collaboration installed, message pages and panding task pages.
- the web service handles requests related to maintenance, requests for collaboration, requests for firm lists and contact lists and details of client changes.
- security is paramount.
- the connection management server (12), and associated SQL server (12a) is hosted in a secure zone behind an initial edge firewall (21) and a backend firewall (22) and also using a DMZ (23) to isolate the server (12) from the internet , as shown in Figure 5, so as to prevent breach of security.
- IIS (33) handles the majority of the security requirements. IIS (33) acts as a gatekeeper and will only allow authorised users with a valid Certificate (26) to access the web site (34).
- the security architecture addresses several issues including secure transmission of data, authentication and identification and access control. To prevent data being intercepted by a third party, all data is sent over SSL (35) between the client and the collaborative service. Each installation has an X.509 encryption certificate (26) which is installed in IIS. The collaboration web service (36) is then deployed to IIS and is accessible on port 443.
- each user sends the X.509 certificate (26) with each transmission to the collaboration web service (36).
- This enables the server (12) to identify with 100% certainty who is attempting to access the web service.
- the certificate is validated by a root certificate authority. Once the collaboration service knows that the data channel is secure and that the client is valid, it has to determine if the client is an authorised collaborator. Any organisation that is not listed as a collaborator will be refused access to the web service.
- the advantages for the corporate lawyer (14) and a law firm (12) alike in transacting business through the peer-to-peer software include: a) the system ensures that the law firm (14) accepts the brief and agrees to communicate; b) estimates for fees and disbursements are obtained that are tracked in the database operated by the corporation (14); c) the law firm (14), and associated teams, are notified of all relevant dates, attributes and documents; d) all members of an external firm's team are tracked; and e) a full audit trail is retained.
- Another significant advantage of the system of these embodiments of the invention is that financial data is able to be electronically communicated between the relevant parties.
- Most corporate counsel have large legal expenditure but many are unable to effectively track that expenditure. Law firms will be able to provide a better service to clients by being able to constantly update status on matters of work, specific documentation as well as electronically invoicing clients and providing better financial management.
- the peer-to-peer software utilises "thin client" architecture so that the software can be opened using a normal web browser.
- a key advantage of the system of the embodiments of the invention described, and particularly the peer-to-peer software, is that all data and software can be stored on the central management server which allows changes to made to all software for all users without the need to reinstall the software on each user's personal desktop computer. Also, provided that the user has external access through relevant fire walls, a user is able to access the system from anywhere in the world.
Abstract
A communication and data exchange system for exchanging data, information, communications, accounts applications and other business services between separate registered clients (11) includes a secure, central connection management server (12) which maintains client details, including security data relating to each client, collaboration information concerning clients that are collaborating, and a central web service to facilitate maintenance of the system. The server (12) has a register of the connected parties (11) and directs communications from one party to a selected one or more of other connected parties. Peer-to-peer software downloaded from the server to the clients enable them to communicate directly between themselves without server interface. A collaboration class library contains logic for one or more of data access, security certificate management, logging, access control, peer-to-peer messaging logic and notification activities. The class library also implements collaboration rules and security.
Description
Communication System
Field of the Invention
This invention relates to a communication system and relates particularly to a system that enables groups of people to communicate and exchange data and information.
The invention is particularly suitable to facilitate communication between professional businesses, such as law firms and law departments of corporations. However, the invention has wider application and may be useful in many service industries including health, insurance, construction, engineering, banking and finance and many others. For the purposes of the present description, however, the invention will be described in terms of its application to the legal profession, although it will be understood that the invention is not so limited.
Background of the Invention Legal and commercial business requires that information, instructions and accounts be exchanged between law firms and their clients, and between different law firms, and for the various parties to be able to initiate applications or conduct operations in relation to that information. While various communication protocols exist utilising either direct data connection or internet connection, currently known systems have limitations which prevent the operation of applications other than those directly loaded on the systems of the connected users.
In most instances, the known systems require that the communicating parties use the same operating systems and, in many cases, the identical proprietary software.
Further, systems currently in use require the use of servers interposed between the various users either directly in the internet environment or within local area networks. Such servers can give rise to bottle necks in the transfer of information between connected parties.
It is therefore desirable to provide an improved communications system which obviates at least some of the disadvantages of currently known systems. It is also desirable to provide a communications and data exchange system which utilises peer-to-peer connectivity to facilitate sharing of information.
It is also desirable to provide a communications system that is able to provide real time collaboration between discreet practice management databases.
It is also desirable to provide a collaborative network utilising a range of existing technologies including the Microsoft ".Net" and XML web services.
It is also desirable to provide a communications and data exchange system which is operated using a web browser, such as "Internet Explorer" (trade mark). Summary of the Invention
In accordance with one aspect of the invention there is provided a communication system for exchange of information between connected computers of different parties including a connection management server to register the connected parties and to direct initial communication from one party to a selected one or more of other connected parties, and peer-to-peer software to enable the connected parties to communicate directly without server interface.
Preferably, the peer-to-peer software creates a collaborative network using existing technologies including .Net, XML web services and the like. Preferably, the software enables practice management and information exchange to take place directly between the connected parties without the need for an interposed server to control inter- parties communications.
In preferred embodiments, the connection management server utilises "thin client" architecture to enable the software to be accessed using a web browser, such as Internet Explorer. The server may therefore be located at any suitable location to provide access to the software necessary to manage the peer-to-peer network. Using the peer-to-peer software, a corporation law department, for example, is then able to communicate directly with and exchange information with a law firm of its choice which is connected to the system. Once connected, the peer-to-peer software facilitates information exchange without an interposed network server. This facilitates real time communication and creates a fully auditable and searchable database. The system enables the corporation and the external law firm to work on documents and analyse financial data in a secure environment. Of course, in the preferred embodiments, the system also enables a plurality of law firms and/or a plurality of clients to communicate on one or more selected matters. Still further, in preferred embodiments, the software will allow for the analysis of matters on a project by project basis. A company may create a path for their external law firm(s) which will integrate directly with Outlook (trade mark) or other calendar/email system. This thereby ensures work flow is implemented between the parties, creating time and cost efficiencies for both the corporate counsel and law
firm(s). In addition, the software of preferred embodiments will allow legal firms to receive documentation using, for example, QuickBrief (trade mark), and be able to invoice the corporate counsel electronically.
Thus, law firms will be able to gain work through the "QuickBrief (trade mark) system, whereby a corporate client will be able to send a matter to a specific lawyer at a firm in a very secure on-line environment in real time.
According to a further aspect of the invention there is provided a communication and data exchange system for exchange of information between connected computers of different parties comprising: a central connection management server which maintains client details including security data relating to each client, collaboration information concerning clients that are collaborating, and a central web service to facilitate maintenance of the system, the server further maintaining a register of the connected parties and operating to direct a communication from one party to a selected one or more of other connected parties, and peer-to-peer software downloadable from the server to new clients to enable the connected parties to communicate directly without server interface.
Preferably, the system further including a collaboration class library that contains logic for one or more of data access, security certificate management, logging, access control, peer-to-peer messaging logic and notification activities.
More preferably, the class library further implements collaboration rules, notification and security.
In particular embodiments, the server is hosted in a secure zone behind an edge firewall, a DMZ and a backend firewall. Preferably, all data is sent over SSL between clients, each client having a security certificate issued which is sent with each transmission so as to be validated and the transmission authenticated. The communication transmissions preferably utilise WSDL and SOAP protocols to facilitate the communication between different computers using different operating systems.
In accordance with another aspect of the invention there is provided a method of communicating data and exchanging information between connected computers of different parties comprising the steps of: establishing a central server,
connecting a plurality of client computers to the server using the internet, providing peer-to-peer software to each client computer, registering each of the connected client parties and directing an initial communication from one party to a selected one or more of other connected parties to establish a peer-to-peer communication between the parties, and facilitating multiple inter-party connections enabling collaboration between the connected parties whereby the parties are able to exchange information without server interface.
In order that the invention is more readily understood, embodiments thereof will be described with reference to the accompanying drawings. Description of the Drawings
Figure 1 illustrates one form of business communications system which is utilised in embodiments of the present invention;
Figure 2 illustrates a second communication system; Figure 3 is a schematic illustration of one application of the present invention;
Figure 4 is a schematic illustration of the communication operation of the embodiment illustrated in Figure 3;
Figure 5 illustrates the security features of the described embodiments; and
Figure 6 diagrammatically shows the process of authentication of a certificate in accordance with one embodiment.
Description of Preferred Embodiments
Embodiments of the present invention have been developed utilising existing platforms and software, examples of which are as follows: a) ".net" This is a set of software technologies of Microsoft developed for connecting information, people, systems and devices. It enables a high level of software integration through the use of web services - small, discreet, building block applications that connect to each other as well as to other, larger applications over the internet. b) "asp.net"
This is the engine for web based applications and XML web services. Asp.net brings rapid application development to the server. As part of the class library in the .net framework, asp.net pages use a compiled, event driven programming model that
improves performance and enables the separation of application logic and user interface. c) XML web services
These are the fundamental building blocks in the move to distributed computing on the internet. Open standards and the focus on communication and collaboration among people at applications have created an environment where XML web services are becoming the platform for application integration. In embodiments of the invention, applications are constructed using multiple XML web services from various sources that work together regardless of where they reside or how they were implemented. d) Active Directory
The Active Directory (trade mark) service is a central component of the Windows operating system platform, providing the means to manage the identities and relationships that make up network environments. Active Directory in Windows Server 2003 introduces key features ensuring that it is one of the most flexible directory structures in the market place. As directory-enabled applications become more prevalent, organisations are able to utilise the capabilities of active directory to manage even the most complicated enterprise network environments. From internet data centres to large distributed branch office enterprises, the improvements provided by Windows Server 2003 simplify administration and increase performance and efficiency, making it a truly versatile solution. e) DMZ
In computer networks, a DMZ (demilitarized zone) is a computer host or small network inserted as a "neutral zone" between a company's private network and the outside public network. It prevents outside users from getting direct access to a server that has company data. f) SSL (Secure Sockets Layer)
SSL is a protocol developed for transmitting private documents via the Internet. SSL uses a cryptographic system that uses two keys to encrypt data - a public key known to everyone and a private or secret key known only to the recipient of the message.
Referring to Figure 1, an application is illustrated in which data transfer is arranged between remote computers (8) and (9) using WSDL (web service description language), which is an XML-based language used to describe the services of a business
and to enable others to access the services electronically. The language is a basis for UDDI (Universal Description, Discovery Integration) which is a registry system for businesses to list themselves on the Internet. By using UDDI, law firms and companies may be registered with a connection management server (12) so as to be identified, and the businesses identified thereby, enabling companies to find one another on the web. Once found, the companies are then able to communicate and exchange information, as indicated by arrows A, B and C.
By using programs such as SOAP (Simple Object Access Protocol) companies using different operating systems, such as Linux, Microsoft, Apple or other operating systems are able to communicate with each other. SOAP specifies how to encode an http header and an XML file so that a program in one computer (8), such as a smart client spreadsheet application, can call a program in another computer (9) and pass information notwithstanding that the two computers use different operating systems.
Referring to Figure 2, XML web services enables users to develop applications that directly connect two or more client peer computers without an intervening server. Such peer-to-peer (P2P) services enable two client computers (16) and (18) to both expose and consume information, largely eliminating the central server (12) and cutting down on network and processing bottle necks. Whether contacting a known peer or initially discovering one through the central connection management server (12), and then switching to interact directly as hereinafter described, peer-to-peer applications expand the possible device and application interactions while largely eliminating server dependencies. In this way, highly collaborative communications and solutions can take form. In embodiments of the present invention, the peer-to-peer software provides innovative use of practice management software by providing real time collaboration between, for example, the corporate counsel and their selected collaborative law firms that will benefit companies of all sizes and in all industries.
As further illustrated in Figure 3, a corporate counsel (14) running a software program "LegalNet" (trade mark) in accordance with embodiments of the present invention connects over the internet (20) with a law firm (10) selected from a group of firms (11) identified through the central, managing network server (12). There is no limit to the number of law firms (11) that may then be connected to the corporate LegalNet system provided they all agree to the communication. As further shown in Figure 4, when the law firm (10) registers with the LegalNet central server (12), all other legal counsel (11) are notified by the server (12). A corporation (14) (or another
law firm) that wishes to establish a commercial relationship with the firm (10) then initiates collaboration communication protocol with the firm (10) and it is established when agreements to communicate are made. Matters are then able to be sent directly between the law firms (10) and the legal counsel at the corporation (14). Before collaboration takes place, the LegalNet software is installed at both the corporation (14) and law firm (10). When a law firm (10) has an installation for the first time, it is assigned a Firm ID and entered into a "firm database" on the server (12). If a new party requires collaboration with an existing party, their certificate is installed into an access control table. Optionally, a contact list for individual or group contacts may also be entered.
Where an existing installation is upgraded to a collaborative version in accordance with embodiments of the invention, collaboration components enabling establishment of collaboration using peer-to-peer with other firms or corporations are installed. When the software has been installed and the user clients are registered with the central management server (12), a user can review the list of registered clients and decide to collaborate with another user, or more than one, in relation to a matter. The registered user is able to communicate peer-to-peer with any other registered user provided that both agree to the collaboration. To set up a collaboration, the software provides appropriate functionality for one party to communicate with the other, in the manner shown in Figure 4.
A collaboration web service exposes an API (application program interface) to enable collaboration but delegates most functionality to a collaboration class library which implements collaboration rules, notification, security, access control, etc. The collaboration class library contains logic for data access, certificate management, logging, access control, P2P messaging logic and notification.
The central management server (12) includes a web service and an administrative web application for maintaining and configuring the P2P network. The web application provided the data entry pages for entering and updating data about firms, contact lists, contact details. The web application also has a collaborator page showing all firms that have collaboration installed, message pages and panding task pages. The web service handles requests related to maintenance, requests for collaboration, requests for firm lists and contact lists and details of client changes.
Of course, in an internet environment, security is paramount. In the illustrated embodiments, the connection management server (12), and associated SQL server (12a) is hosted in a secure zone behind an initial edge firewall (21) and a backend firewall (22) and also using a DMZ (23) to isolate the server (12) from the internet , as shown in Figure 5, so as to prevent breach of security. Any requests (X) from external parties are filtered and are passed to the server (12) only if the request is deemed valid. Security is handled at the IIS and application level. As shown in Figure 6, IIS (33) handles the majority of the security requirements. IIS (33) acts as a gatekeeper and will only allow authorised users with a valid Certificate (26) to access the web site (34). The security architecture addresses several issues including secure transmission of data, authentication and identification and access control. To prevent data being intercepted by a third party, all data is sent over SSL (35) between the client and the collaborative service. Each installation has an X.509 encryption certificate (26) which is installed in IIS. The collaboration web service (36) is then deployed to IIS and is accessible on port 443.
For authentication and authorisation, each user sends the X.509 certificate (26) with each transmission to the collaboration web service (36). This enables the server (12) to identify with 100% certainty who is attempting to access the web service. The certificate is validated by a root certificate authority. Once the collaboration service knows that the data channel is secure and that the client is valid, it has to determine if the client is an authorised collaborator. Any organisation that is not listed as a collaborator will be refused access to the web service.
The advantages for the corporate lawyer (14) and a law firm (12) alike in transacting business through the peer-to-peer software include: a) the system ensures that the law firm (14) accepts the brief and agrees to communicate; b) estimates for fees and disbursements are obtained that are tracked in the database operated by the corporation (14); c) the law firm (14), and associated teams, are notified of all relevant dates, attributes and documents; d) all members of an external firm's team are tracked; and e) a full audit trail is retained.
Another significant advantage of the system of these embodiments of the invention is that financial data is able to be electronically communicated between the
relevant parties. Most corporate counsel have large legal expenditure but many are unable to effectively track that expenditure. Law firms will be able to provide a better service to clients by being able to constantly update status on matters of work, specific documentation as well as electronically invoicing clients and providing better financial management.
As previously indicated, the peer-to-peer software utilises "thin client" architecture so that the software can be opened using a normal web browser. A key advantage of the system of the embodiments of the invention described, and particularly the peer-to-peer software, is that all data and software can be stored on the central management server which allows changes to made to all software for all users without the need to reinstall the software on each user's personal desktop computer. Also, provided that the user has external access through relevant fire walls, a user is able to access the system from anywhere in the world.
By enabling law firms and corporate counsel, and others, to have discreet databases that can talk to each other peer-to-peer, information transfer is enhanced and is secure.
Claims
1. A communication and data exchange system for exchange of information between connected computers of different parties including a connection management server to register the connected parties and to direct initial communication from one party to a selected one or more of other connected parties, and peer-to-peer software to enable the connected parties to communicate directly without server interface.
2. A communication and data exchange system according to claim 1 wherein the peer-to-peer software creates a collaborative network using technologies including
".Net" and XML web services.
3. A communication and data exchange system according to claim 1 or claim 2 wherein the peer-to-peer software allows practice management, data and information exchange to take place directly between the connected parties without an interposed server controlling the inter-parties communications.
4. A communication and data exchange system according to any one of claims 1 to 3 wherein the connection management server utilises "thin client" architecture to enable the peer-to-peer software to be accessed using a web browser.
5. A communication and data exchange system according to any one of the preceding claims wherein a plurality of businesses communicate with each other on one or more selected matters using the peer-to-peer software.
6. A communication and data exchange system for exchange of information between connected computers of different parties comprising: a central connection management server which maintains client details including security data relating to each client, collaboration information concerning clients that are collaborating, and a central web service to facilitate maintenance of the system, the server further maintaining a register of the connected parties and operating to direct a communication from one party to a selected one or more of other connected parties, and peer-to-peer software downloadable from the server to new clients to enable the connected parties to communicate directly without server interface.
7. A communication and data exchange system according to claim 6 further including a collaboration class library that contains logic for one or more of data access, security certificate management, logging, access control, peer-to-peer messaging logic and notification activities.
8. A communication and data exchange system according to claim 7 wherein the class library further implements collaboration rules, notification and security.
9. A communication and data exchange system according to claim 7 wherein the server is hosted in a secure zone behind an edge firewall, a DMZ and a backend firewall.
10. A communication and data exchange system according to any one of claims 6 to 9 wherein all data is sent over SSL between clients, each client having a security certificate issued which is sent with each transmission so as to be validated and the transmission authenticated.
11. A communication and data exchange system according to any one of claims 6 to 10 wherein the communication transmissions utilise WSDL and SOAP protocols to facilitate the communication between different computers using different operating systems.
12. A method of communicating data and exchanging information between connected computers of different parties comprising the steps of: establishing a central server, connecting a plurality of client computers to the server using the internet, providing peer-to-peer software to each client computer, registering each of the connected client parties and directing an initial communication from one party to a selected one or more of other connected parties to establish a peer-to-peer communication between the parties, and facilitating multiple inter-party connections enabling collaboration between the connected parties whereby the parties are able to exchange information without server interface.
13. A method of communicating data and exchanging information between connected computers of different parties according to claim 12 including the step of accessing a list of registered clients on the server to determine an' appropriate collaborative partner, and subsequently communicating directly with the partner using the peer-to-peer software.
14. A method of communicating data and exchanging information between connected computers of different parties according to claim 12 or claim 13 further including the steps of providing a security certificate to each registered client, and checking each inter-client communication for validity using the certificate.
15. A method of communicating data and exchanging information between connected computers of different parties according to any one of claims 12 to 14 including the steps of providing a collaborating library containing logic for one or more of data access, security certificate management, logging, access control, peer-to-peer messaging logic and notification activities.
16. A communication and data exchange system for exchange of information between connected computers of different parties substantially as hereinbefore described with reference to the accompanying drawings
17. A method of communicating data and exchanging information between connected computers of different parties having the steps substantially as hereinbefore described.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2005900648 | 2005-02-11 | ||
AU2005900648A AU2005900648A0 (en) | 2005-02-11 | Communication System |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006084331A1 true WO2006084331A1 (en) | 2006-08-17 |
Family
ID=36792849
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/AU2006/000180 WO2006084331A1 (en) | 2005-02-11 | 2006-02-10 | Communication system |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2006084331A1 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1906618A1 (en) * | 2006-09-29 | 2008-04-02 | Sap Ag | A comprehensive security architecture for dynamic, web service based virtual organizations |
US20150370773A1 (en) * | 2014-06-20 | 2015-12-24 | 1Life Workplace Safety & Health Ltd. | System for Generating and Completing Safety Evaluation Forms |
WO2017053956A1 (en) * | 2015-09-25 | 2017-03-30 | Ubiquiti Networks, Inc. | Compact and integrated key controller apparatus for monitoring networks |
US9761954B2 (en) | 2015-10-09 | 2017-09-12 | Ubiquiti Networks, Inc. | Synchronized multiple-radio antenna systems and methods |
US9843096B2 (en) | 2014-03-17 | 2017-12-12 | Ubiquiti Networks, Inc. | Compact radio frequency lenses |
US10164332B2 (en) | 2014-10-14 | 2018-12-25 | Ubiquiti Networks, Inc. | Multi-sector antennas |
US10284268B2 (en) | 2015-02-23 | 2019-05-07 | Ubiquiti Networks, Inc. | Radio apparatuses for long-range communication of radio-frequency information |
US11973271B2 (en) | 2022-04-08 | 2024-04-30 | Ubiquiti Inc. | Synchronized multiple-radio antenna systems and methods |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002033575A2 (en) * | 2000-10-18 | 2002-04-25 | Chasseral Limited | Concurrent file access |
US20020178087A1 (en) * | 2001-05-25 | 2002-11-28 | Henderson Greg S. | Internet-based instant messaging hybrid peer-to-peer distributed electronic commerce system and method |
US20030101235A1 (en) * | 2001-09-04 | 2003-05-29 | Chenglin Zhang | Browser-to-browser, dom-based, peer-to-peer communication with delta synchronization |
US20030217171A1 (en) * | 2002-05-17 | 2003-11-20 | Von Stuermer Wolfgang R. | Self-replicating and self-installing software apparatus |
US20040122958A1 (en) * | 2002-12-19 | 2004-06-24 | International Business Machines Corporation | Method and system for peer-to-peer authorization |
US20040148434A1 (en) * | 2003-01-24 | 2004-07-29 | Hitachi, Ltd. | Method and apparatus for peer-to peer access |
US20040260761A1 (en) * | 2003-03-18 | 2004-12-23 | Yves Leaute | Meta-search web service-based architecture for peer-to-peer collaboration and voice-over-IP |
US20050044146A1 (en) * | 2003-06-02 | 2005-02-24 | Canon Kabuskiki Kaisha | Protection of the distribution of digital documents in a peer to peer network |
-
2006
- 2006-02-10 WO PCT/AU2006/000180 patent/WO2006084331A1/en active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002033575A2 (en) * | 2000-10-18 | 2002-04-25 | Chasseral Limited | Concurrent file access |
US20020178087A1 (en) * | 2001-05-25 | 2002-11-28 | Henderson Greg S. | Internet-based instant messaging hybrid peer-to-peer distributed electronic commerce system and method |
US20030101235A1 (en) * | 2001-09-04 | 2003-05-29 | Chenglin Zhang | Browser-to-browser, dom-based, peer-to-peer communication with delta synchronization |
US20030217171A1 (en) * | 2002-05-17 | 2003-11-20 | Von Stuermer Wolfgang R. | Self-replicating and self-installing software apparatus |
US20040122958A1 (en) * | 2002-12-19 | 2004-06-24 | International Business Machines Corporation | Method and system for peer-to-peer authorization |
US20040148434A1 (en) * | 2003-01-24 | 2004-07-29 | Hitachi, Ltd. | Method and apparatus for peer-to peer access |
US20040260761A1 (en) * | 2003-03-18 | 2004-12-23 | Yves Leaute | Meta-search web service-based architecture for peer-to-peer collaboration and voice-over-IP |
US20050044146A1 (en) * | 2003-06-02 | 2005-02-24 | Canon Kabuskiki Kaisha | Protection of the distribution of digital documents in a peer to peer network |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8365298B2 (en) | 2006-09-29 | 2013-01-29 | Sap Ag | Comprehensive security architecture for dynamic, web service based virtual organizations |
EP1906618A1 (en) * | 2006-09-29 | 2008-04-02 | Sap Ag | A comprehensive security architecture for dynamic, web service based virtual organizations |
US11296407B2 (en) | 2014-03-17 | 2022-04-05 | Ubiqsiti Inc. | Array antennas having a plurality of directional beams |
US9843096B2 (en) | 2014-03-17 | 2017-12-12 | Ubiquiti Networks, Inc. | Compact radio frequency lenses |
US9912053B2 (en) | 2014-03-17 | 2018-03-06 | Ubiquiti Networks, Inc. | Array antennas having a plurality of directional beams |
US10916844B2 (en) | 2014-03-17 | 2021-02-09 | Ubiquiti Inc. | Array antennas having a plurality of directional beams |
US20150370773A1 (en) * | 2014-06-20 | 2015-12-24 | 1Life Workplace Safety & Health Ltd. | System for Generating and Completing Safety Evaluation Forms |
US10770787B2 (en) | 2014-10-14 | 2020-09-08 | Ubiquiti Inc. | Multi-sector antennas |
US11303016B2 (en) | 2014-10-14 | 2022-04-12 | Ubiquiti Inc. | Multi-sector antennas |
US10164332B2 (en) | 2014-10-14 | 2018-12-25 | Ubiquiti Networks, Inc. | Multi-sector antennas |
US11115089B2 (en) | 2015-02-23 | 2021-09-07 | Ubiquiti Inc. | Radio apparatuses for long-range communication of radio-frequency information |
US10749581B2 (en) | 2015-02-23 | 2020-08-18 | Ubiquiti Inc. | Radio apparatuses for long-range communication of radio-frequency information |
US10284268B2 (en) | 2015-02-23 | 2019-05-07 | Ubiquiti Networks, Inc. | Radio apparatuses for long-range communication of radio-frequency information |
US11336342B2 (en) | 2015-02-23 | 2022-05-17 | Ubiquiti Inc. | Radio apparatuses for long-range communication of radio-frequency information |
WO2017053956A1 (en) * | 2015-09-25 | 2017-03-30 | Ubiquiti Networks, Inc. | Compact and integrated key controller apparatus for monitoring networks |
US10680342B2 (en) | 2015-10-09 | 2020-06-09 | Ubiquiti Inc. | Synchronized multiple-radio antenna systems and methods |
US10381739B2 (en) | 2015-10-09 | 2019-08-13 | Ubiquiti Networks, Inc. | Synchronized multiple-radio antenna systems and methods |
US10084238B2 (en) | 2015-10-09 | 2018-09-25 | Ubiquiti Networks, Inc. | Synchronized multiple-radio antenna systems and methods |
US9761954B2 (en) | 2015-10-09 | 2017-09-12 | Ubiquiti Networks, Inc. | Synchronized multiple-radio antenna systems and methods |
US11303037B2 (en) | 2015-10-09 | 2022-04-12 | Ubiquiti Inc. | Synchronized multiple-radio antenna systems and meihods |
US11973271B2 (en) | 2022-04-08 | 2024-04-30 | Ubiquiti Inc. | Synchronized multiple-radio antenna systems and methods |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7903656B2 (en) | Method and system for message routing based on privacy policies | |
US6990513B2 (en) | Distributed computing services platform | |
US7949871B2 (en) | Method for creating virtual service connections to provide a secure network | |
US8578465B2 (en) | Token-based control of permitted sub-sessions for online collaborative computing sessions | |
US7233992B1 (en) | Computerized method and system for managing the exchange and distribution of confidential documents | |
US20100274634A1 (en) | Method and system of conducting a communication | |
US7328247B2 (en) | Self-contained instant messaging appliance | |
WO2006084331A1 (en) | Communication system | |
KR20080026161A (en) | Unified architecture for remote network access | |
AU2001268674A1 (en) | Distributed computing services platform | |
Ranawaka et al. | Custos: Security middleware for science gateways | |
Barlow et al. | Trust negotiation in electronic markets | |
CN1447256A (en) | Method for realizing peer-to-peer network system architecture | |
RU2451996C2 (en) | External combined data centre providing client functionality | |
EP1421479A2 (en) | Distributed computing services platform | |
Luís Osório et al. | Reliable and secure communications infrastructure for virtual enterprises | |
Ferris | Web services architecture | |
Alliance | OMA Web Services Enabler (OWSER): Overview | |
Houri et al. | Presence and Instant Messaging Peering Use Cases | |
Kostienko et al. | Development of TRMS/GTLS–Global Tool Lookup Services | |
CA2709876A1 (en) | A method and system of conducting a communication | |
Afandi | AMPol: Adaptive messaging policy based system | |
Vanhanen | Requirements and a framework for broker based integration in service-oriented architecture | |
Pimenidis et al. | Web services security–Implementation and evaluation issues | |
Maresca et al. | Deployment Experience of a Service Oriented Architecture in the Business Community of the Port of Genoa: Lessons Learned. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06704857 Country of ref document: EP Kind code of ref document: A1 |