System and method for executing access transactions of documents related to drug discovery

ABSTRACT

Disclosed is a system for executing access transactions of documents, for example, pertaining to drug discovery. A document and its metainformation are obtained, and value features are extracted from the document based on identification of concepts associated with the document. An importance score of the document is determined based on the value features and the metainformation. A summarized view of the document is constructed based on the value features, the metainformation, the concepts and the importance score. A unique identifier is generated for the document and associated with the summarized view and the concepts of the document. A search query is processed, and the summarized view of the document is retrieved and displayed based on the query. A request for accessing the document is validated, and document access is allowed when the request is validated successfully. The document access transaction may, for example, be facilitated using a blockchain platform.

CROSS-REFERENCE TO RELATED APPLICATIONS

This is a continuation patent application of U.S. patent applicationSer. No. 16/011,045, filed on Jun. 18, 2018. This application alsoclaims benefit of U.S. Provisional application Ser. No. 62/664,458 asfiled on Apr. 30, 2018 and claims priority under 35 U.S.C. 199(e).

TECHNICAL FIELD

The present disclosure relates generally to systems for processingdocuments pertaining to a research field, and more specifically, tosystems for executing access transactions of documents, for example,pertaining to drug discovery. Moreover, the present disclosure relatesto methods of executing access transactions of documents.

BACKGROUND

In past few decades, a lot of work such as research, discovery andinnovation has been done in various fields of technology. It is desiredthat findings of such researches, discoveries and innovations be sharedamong the research community for a progressive development in respectivefields thereof. Sometimes, the findings of researches, discoveries andinnovations are published by their authors in a form of articles,theses, journals, research papers and so forth. At other times, researchorganizations end up doing experiments that have been already done bysome other research organizations (or personnel). The researchorganizations are unaware of such experiments, as findings of theseexperiments are not published, and therefore, are not available in thepublic domain. Typically, an experiment does not get published, when oneof the following happens:

-   -   the experiment has failed to prove a hypothesis, that is, the        hypothesis is proven to be false,    -   the direction of a research organization (where the experiment        was performed) has changed, post the experiment, or    -   the experiment has been done in an academic setting (for        example, for a doctorate thesis).

In order to create synergy among the research community, exchange ofunpublished documents/findings of experiments needs to be facilitated inan easy to use, yet secured manner.

Conventionally, digital platforms (like Elsevier®) provide access topublished documents on a subscription-basis. However, such platformsonly deal with the published documents, but do not deal with unpublisheddocuments. Currently, even if some research organization (or personnel)is interested in sharing the unpublished experimental findings withothers, there is no real-time mechanism for secured exchange and fairvaluation of technical documents.

Moreover, authors are reluctant in sharing their unpublished documentson such digital platforms for several reasons. Conventionally, thedocuments are stored at the digital platforms for sharing them furtherwith interested consumers (for example, such as other researchorganizations). Consequently, the conventional digital platforms sufferwith a risk of data misuse, data theft and other threats caused due tolack of security. Additionally, conventional digital platforms do notauthenticate and validate users uploading new documents, and therefore,are incapable of preventing plagiarism. Moreover, upon publishing thedocuments on the conventional digital platforms, the authors do not haveany control over how the documents are shared and with whom they areshared.

Therefore, in light of the foregoing discussion, there exists a need toovercome the aforementioned drawbacks associated with the conventionaldigital platforms for executing access transaction of the document.

SUMMARY

The present disclosure seeks to provide a system for executing adocument access transaction. The present disclosure also seeks toprovide a method of executing a document access transaction. The presentdisclosure seeks to provide a solution to the existing problem ofsecurity risks associated with access transaction of documents. An aimof the present disclosure is to provide a solution that overcomes atleast partially the problems encountered in prior art, and provides areliable and secure platform for executing access transaction of thedocument, thereby eliminating risks pertaining to the security of thedocument.

In one aspect, an embodiment of the present disclosure provides a systemfor access transaction of a document containing sensitive andconfidential information, the system comprising a server arrangementincluding one or more processors, the server arrangement beingcommunicably coupled via one or more data communication networks with afirst client device and a second client device, wherein the serverarrangement, when operated, provides a platform configured to:

-   -   receive an access request for a document selected, by the second        user, from a list of documents retrieved in response to a search        query and displayed, on a user interface connected to the second        client device, wherein each of the document in the list is        associated with a summarized view and an importance score, and        -   wherein the importance score, displayed along-with the            summarized view, for each of the document in the list is            determined on the platform without storing, on the platform,            any document of said list of documents;    -   validate the access request for the document by the second user;    -   retrieve and deliver to the second client device a hash        pertaining to the document wherein the hash corresponds to a        location of the document in a distributed file storage system;    -   cause the first client device to communicate the document to the        second client device in response to a successful validation of        the access request.

In another aspect, an embodiment of the present disclosure provides amethod for access transaction of a document containing sensitive andconfidential information, wherein the method is implemented via a systemcomprising a server arrangement including one or more processors, theserver arrangement being communicably coupled via one or more datacommunication networks with a first client device and a second clientdevice, the method comprising:

-   -   receive an access request for a document selected, by the second        user, from a list of documents retrieved in response to a search        query and displayed, on a user interface connected to the second        client device, wherein each of the document in the list is        associated with a summarized view and an importance score, and        -   wherein the importance score, displayed along-with the            summarized view, for each of the document in the list is            determined on the platform without storing, on the platform,            any document of said list of documents;    -   validating the access request for the document by the second        user;    -   retrieving and delivering to the second client device a hash        pertaining to the document wherein the hash corresponds to a        location of the document in a distributed file storage system;    -   causing the first client device to communicate the document to        the second client device in response to a successful validation        of the access request.

Embodiments of the present disclosure substantially eliminate or atleast partially address the aforementioned problems in the prior art,and enable access transaction of the document in a secure environment.

Additional aspects, advantages, features and objects of the presentdisclosure would be made apparent from the drawings and the detaileddescription of the illustrative embodiments construed in conjunctionwith the appended claims that follow.

It will be appreciated that features of the present disclosure aresusceptible to being combined in various combinations without departingfrom the scope of the present disclosure as defined by the appendedclaims.

BRIEF DESCRIPTION OF THE DRAWINGS

The summary above, as well as the following detailed description ofillustrative embodiments, is better understood when read in conjunctionwith the appended drawings. For the purpose of illustrating the presentdisclosure, exemplary constructions of the disclosure are shown in thedrawings. However, the present disclosure is not limited to specificmethods and instrumentalities disclosed herein. Moreover, those in theart will understand that the drawings are not to scale. Whereverpossible, like elements have been indicated by identical numbers.

Embodiments of the present disclosure will now be described, by way ofexample only, with reference to the following diagrams wherein:

FIG. 1 is a schematic illustration of a network environment, wherein asystem for executing a document access transaction is implemented,pursuant to an embodiment of the present disclosure;

FIG. 2 is a schematic illustration of a high-level architecture of anetwork environment in which a system for executing a document accesstransaction is implemented, pursuant to a specific embodiment of thepresent disclosure;

FIGS. 3A and 3B collectively are a flow chart depicting steps of amethod for executing a document access transaction, in accordance withan embodiment of the present disclosure;

FIGS. 4A and 4B are example views of a graphical user interface that arepresented to a user of a first client device, in accordance with anembodiment of the present disclosure; and

FIGS. 5A and 5B are example views of a graphical user interface that arepresented to a user of a second client device, in accordance with anembodiment of the present disclosure.

In the accompanying drawings, an underlined number is employed torepresent an item over which the underlined number is positioned or anitem to which the underlined number is adjacent. A non-underlined numberrelates to an item identified by a line linking the non-underlinednumber to the item. When a number is non-underlined and accompanied byan associated arrow, the non-underlined number is used to identify ageneral item at which the arrow is pointing.

DETAILED DESCRIPTION OF EMBODIMENTS

The following detailed description illustrates embodiments of thepresent disclosure and ways in which they can be implemented. Althoughsome modes of carrying out the present disclosure have been disclosed,those skilled in the art would recognize that other embodiments forcarrying out or practicing the present disclosure are also possible.

In one aspect, an embodiment of the present disclosure provides a systemfor access transaction of a document containing sensitive andconfidential information, the system comprising a server arrangementincluding one or more processors, the server arrangement beingcommunicably coupled via one or more data communication networks with afirst client device and a second client device, wherein the serverarrangement, when operated, provides a platform configured to:

-   -   receive an access request for a document selected, by the second        user, from a list of documents retrieved in response to a search        query and displayed, on a user interface connected to the second        client device, wherein each of the document in the list is        associated with a summarized view and an importance score, and        -   wherein the importance score, displayed along-with the            summarized view, for each of the document in the list is            determined on the platform without storing, on the platform,            any document of said list of documents;    -   validate the access request for the document by the second user;    -   retrieve and deliver to the second client device a hash        pertaining to the document wherein the hash corresponds to a        location of the document in a distributed file storage system;    -   cause the first client device to communicate the document to the        second client device in response to a successful validation of        the access request.

In another aspect, an embodiment of the present disclosure provides amethod for access transaction of a document containing sensitive andconfidential information, wherein the method is implemented via a systemcomprising a server arrangement including one or more processors, theserver arrangement being communicably coupled via one or more datacommunication networks with a first client device and a second clientdevice, the method comprising:

-   -   receive an access request for a document selected, by the second        user, from a list of documents retrieved in response to a search        query and displayed, on a user interface connected to the second        client device, wherein each of the document in the list is        associated with a summarized view and an importance score, and        -   wherein the importance score, displayed along-with the            summarized view, for each of the document in the list is            determined on the platform without storing, on the platform,            any document of said list of documents;    -   validating the access request for the document by the second        user;    -   retrieving and delivering to the second client device a hash        pertaining to the document wherein the hash corresponds to a        location of the document in a distributed file storage system;    -   causing the first client device to communicate the document to        the second client device in response to a successful validation        of the access request.

The aforesaid system for executing the document access transaction andthe aforesaid method of executing the document access transaction asdescribed in the present disclosure provide a single platform forexecuting the document access transaction in a secure and reliablemanner. Pursuant to embodiments of the present disclosure, the serverarrangement of the aforesaid system neither stores a copy of thedocument locally nor stores it in a database. This potentially preventsany fraudulent activity, for example, such as a misuse of the documentby unauthorized parties. In other words, the aforesaid system and methodreduce the risk of data misuse, data theft and other threats that areoften caused due to a lack of security in conventional digitalplatforms.

Moreover, the aforesaid server arrangement is configured to present(namely, display) only the summarized view of the document, namely briefinformation associated with the document, before a rightful access tothe document is provided to an authorized party. In other words, theaccess to the document (for example, a document containing highlysensitive and confidential information) is not provided, unless therequest from the second client device is validated successfully.

It will be appreciated that the aforesaid system and the aforesaidmethod are not limited to execute document access transaction for only asingle document. The system and method can be employed to executedocument access transaction for multiple documents at a given time. Themultiple documents could comprise documents owned by a same first clientdevice or documents owned by different first client devices.

Optionally, the aforementioned document is related to a current researchwork performed in a research organization. Throughout the presentdisclosure, the term “document” refers to a set of files in which anobservation made in a scientific investigation or experiment isrecorded, wherein the observation can be recorded in a form of one ormore types of data. Some examples of various types of data are textdata, tabular data, image data, video data and audio data. Thus, filescan be in any suitable file formats depending upon the type of data thatis stored therein. As an example, the set of files could comprise asingle file having one or more of: a written text, one or more tables,one or more graphs, or a set of images. As another example, the set offiles could comprise a plurality of files having different types ofdata, for example, such as a written text, one or more tables, one ormore graphs, a set of images, one or more videos, or one or more audioclips.

Throughout the present disclosure, the term “server arrangement” refersto an arrangement of one or more servers that includes one or moreprocessors configured to perform various operations, for example, asmentioned earlier. Optionally, the server arrangement includes anyarrangement of physical or virtual computational entities capable ofperforming the various operations. The term “one or more processors” mayrefer to one or more individual processors, processing devices andvarious elements associated with a processing device that may be sharedby other processing devices. Additionally, the one or more individualprocessors, processing devices and elements are arranged in variousarchitectures for responding to and processing the instructions thatdrive the aforesaid system.

Moreover, it will be appreciated that the server arrangement can beimplemented by way of a single hardware server. The server arrangementcan alternatively be implemented by way of a plurality of hardwareservers operating in a parallel or distributed architecture. As anexample, the server arrangement may include components such as memory, aprocessor, a network adapter and the like, to store and processinformation pertaining to the document and to communicate the processedinformation to other computing components, for example, such as a clientdevice.

Throughout the present disclosure, the term “server” generally refers toa device executing an application, program, or process in aclient/server relationship that responds to requests for information orservices by another application, program, process or device (namely, aclient) on a data communication network. Optionally, a given server isimplemented by way of a device executing a computer program thatprovides various services (for example, such as a database service) toother devices, modules or apparatus.

The term “client device” generally refers to a device executing anapplication, program, or process in a client/server relationship thatrequests information or services from another application, program,process or device (namely, a server) on a data communication network.Importantly, the terms “client” and “server” are relative, as anapplication may be a client to one application but a server to anotherapplication.

Notably, the first and second client devices are configured to functionas a “client” in a client/server relationship with the serverarrangement. However, the first and second client devices may beconfigured to function as a “server” in a client/server relationshipwith other computing devices. Throughout the present disclosure, theterms “first client device” and “second client device” refer to devicesassociated with a first user and a second user that acts as clients tothe server arrangement in a client/server relationship, wherein suchdevices can be personal devices or servers in local environments of thefirst user and the second user, respectively. As an example, the firstclient device can be an internal server of the research organizationwhere the current research work has been performed (namely, from wherethe document has originated), while the second client device can be aninternal server of another research organization that is interested inaccessing the document.

It will be appreciated that the document may have been authored orco-authored by one or more authors. The first user can be any one of theone or more authors, a representative of the one or more authors, or anowner of the document, who uses the first client device to performcommercial transactions of the document (for example, such as sale,licensing and so forth). On the other hand, the second user can be, forexample, an individual or a representative of a group of individuals oran organization seeking access to the document, wherein the second useruses the second client device to perform commercial actions (forexample, such as purchase, lease, rent, and so forth) for consuming thedocument.

Throughout the present disclosure, the term “remote extraction module”refers to a module comprising programmable components that is stored onthe first client device. Optionally, the remote extraction module isimplemented by way of a trusted software application that, when executedat the first client device, obtains the document and the metainformationpertaining to the document. Optionally, in such a case, the trustedsoftware application is received (for example, downloaded) from theserver arrangement or a trusted third party. The trusted third party canbe a publicly-accessible digital distribution platform, for example,such as Google Play®, the App Store® (for iOS®) and the like.

Pursuant to embodiments of the present disclosure, when triggered, theremote extraction module is configured to present a graphical userinterface to the first user that allows the first user to submit to theremote extraction module the document and the metainformation pertainingto the document. Optionally, the metainformation pertaining to thedocument is submitted in a form of a meta file.

Optionally, in order to submit the metainformation, the remoteextraction module is configured to provide the first user with a formhaving input fields, via the graphical user interface. The first user isrequired to fill the form to provide the metainformation pertaining tothe document. Optionally, the remote extraction module is configured tocollate the metainformation pertaining to the document into the metafile.

Optionally, the metainformation pertaining to the document comprisesinformation about one or more of: names of the one or more authors, nameof a research organization where the current research work has beenperformed, a statistical significance of the current research work, aset of keywords associated with the current research work, one or moreresearch fields to which the current research work pertains, ahypothesis of the current research work, an experiment performed duringthe current research work, a stage of drug development to which thecurrent research work is applicable. Additionally, optionally, themetainformation also comprises information pertaining to cost incurredin the current research work of the one or more authors.

Optionally, the remote extraction module is configured to allow, via thegraphical user interface, the first user to view and edit themetainformation previously submitted by the first user.

Moreover, optionally, the remote extraction module is configured toprovide the first user, via a graphical user interface of the firstclient device, with a Single Sign-On (SSO) feature, based on storedcredentials of the first user. Optionally, the graphical user interfaceof the first client device allows the first user to input his/hercredentials (for example, a user identification and a password) tocomplete a sign-in procedure. Additionally, optionally, the graphicaluser interface of the first client device allows the first user to storesuch credentials on the first client device, thereby allowing the firstuser to sign-in without a need to input the credentials.

Beneficially, the server arrangement is configured to authenticate thefirst user prior to allowing the first user to submit the document. Thispotentially prevents an unauthorized party from masquerading as thefirst user.

Optionally, when signing-up for the first time, the first user isrequired to provide one-time information, for example, includinginformation about the one or more authors. Optionally, the informationabout the one or more authors is indicative of at least one of: names orunique identifiers of the one or more authors, academic qualificationsof the one or more authors, academic institutes from where the one ormore authors obtained the academic qualifications, researchorganizations and/or departments to which the one or more authors arecurrently affiliated, areas of expertise of the one or more authors,areas of interest of the one or more authors, digital libraries wherethe one or more authors have made publications.

Optionally, the remote extraction module is configured to communicatethe information about the one or more authors to the server arrangement,wherein the information about the one or more authors is to be utilizedby the scoring module of the server arrangement. More optionally, theinformation about the one or more authors is communicated to the serverarrangement during an initial sign-up procedure.

Furthermore, optionally, the remote extraction module is configured toconvert a data format of the document into a predefined data formatprior to extracting the one or more value features from the document.Optionally, the predefined data format is a file format, for example,such as a JavaScript Object Notation (JSON) format. It will beappreciated that the document obtained from the first client device canbe in any file format, for example, such as a Portable Document Format(PDF), Joint Photographic Experts Group (JPEG) format, Microsoft Worddocument format, Microsoft Excel worksheet format and so forth.

Pursuant to embodiments of the present disclosure, the remote extractionmodule is configured to process the document to extract the one or morevalue features therefrom. Optionally, when processing the document,different sections of the document are identified and at least one ofthe sections of the document is further processed to extract the one ormore value features, wherein the one or more value features areindicative of entities and semantic inter-relationships between theentities as mentioned in the at least one of the sections of thedocument.

Optionally, the document is related to a current research work of one ormore authors, and wherein the one or more value features of the documentcomprise information elements indicative of entities and semanticinter-relationships between the entities. Beneficially, a semanticinter-relationship between two given entities is indicative of a causalrelationship between the two given entities. As an example, in drugdiscovery, examples of a causal relationship between a drug and adisease could be “causes”, “inhibits”, “catalyzes” and so on.

Optionally, the remote extraction module is configured to compare words(and/or phrases) occurring in the at least one of the sections of thedocument with the concepts stored in the ontological databank, and toidentify the one or more concepts of the document based on thecomparison with the concepts stored in the ontological databank.Optionally, in this regard, the remote extraction module is configuredto stem the words prior to performing said comparison, and identifywords matching the concepts stored in the ontological databank as theone or more concepts of the document.

Optionally, sentences present in the at least one of the sections of thedocument are processed by employing a frame semantic parsing techniqueto generate semantic frames, wherein these semantic frames form a partof the one or more value features. Optionally, the frame semanticparsing technique employs a directed acyclic transition-based recurrentneural network.

In the frame semantic parsing technique, sentences or phrases in anatural language are parsed and processed to generate the semanticframes. In other words, lexical targets (namely, words and phrases) intheir sentential contexts are processed to generate the semantic frames.Herein, the term “semantic frame” refers to a coherent structure ofrelated concepts that specify features that are typically associatedwith a particular word (for example, attributes, functions andinteractions of a particular entity). As an example, a semantic frameobserved in research work related to drug discovery could include atleast two of: a drug, a pathway, a target, a disease.

Such a frame semantic parsing technique is optionally implemented usingknown techniques and models, for example as described in a publishedpaper, titled “SLING: A framework for frame semantic parsing” (MichaelRinggaard et. al., available here https://arxiv.org/abs/1710.07032).

Beneficially, the frame semantic parsing technique employs theaforementioned ontological databank. It will be appreciated that theframe semantic parsing technique identifies the entities and theirsemantic inter-relationships even when the entities and their semanticinter-relationships may be defined very subjectively in the document.

Throughout the present disclosure, the term “ontological databank”refers to a data repository that is configured to store informationabout a set of concepts related to a technical field (namely, a subjectarea, a technical domain and so forth), wherein said information isindicative of types of concepts, properties of the concepts and semanticinter-relationships between the concepts. Optionally, the ontologicaldatabank is configured to store the information about the set ofconcepts in a structured manner. Additionally, optionally, theontological databank is configured to store information on how a certainconcept in a certain technical field may be associated with one or moreconcepts in other field(s).

In an embodiment, the ontological databank is stored at the first clientdevice. In another embodiment, the ontological databank is stored at adatabase arrangement associated with the server arrangement. Optionally,the database arrangement comprises one or more databases.

For illustration purposes only, there will now be considered an exampledocument related to drug discovery, wherein an abstract of the documentis as follows:

-   “This experiment was carried out in vivo to check if IL1b mRNA did    not show any change in Cortex and Hippocampi. All LPS-induced    changes were restored in 70 day old rats. 5 PUPs were treated with    Saline and LPS (IP 2 mg/kg). mRNA level of pro-inflammatory cytokine    (IL1b) was examined. Found that ILib mRNA was left significantly    unregulated in Substantia nigra. Further experiments like WB, ELISA    were also conducted.”

In such a case, the abstract of the example document is processed, byemploying an ontological databank related to drug discovery, to extractvalue features indicative of entities and their semanticinter-relationships, wherein the entities and their types can beidentified as follows:

Drug: LPS

Disease: pro-inflammatory cytokine

Target: Cortex and Hippocampi

Moreover, the semantic inter-relationships can be represented asfollows:

LPS—No Effect—Cytokine

Moreover, optionally, upon receiving the one or more value features andthe metainformation pertaining to the document, the server arrangementis configured to process the one or more value features and themetainformation to check the authenticity of the document. Thispotentially prevents a fraudulent user or the first user from uploadinga facsimile of the document intentionally or ignorantly, therebypreventing plagiarism and identity theft.

Pursuant to embodiments of the present disclosure, the scoring module ofthe server arrangement, in operation, determines the importance score ofthe document based on the one or more value features and themetainformation pertaining to the document and optionally, theaforementioned information about the one or more authors.

Optionally, the scoring module is configured to access, based upon theinformation about the one or more authors, information indicative ofentities and semantic inter-relationships specific to a previousresearch work of the one or more authors. Optionally, in this regard,the scoring module is configured to:

-   -   obtain, from a plurality of database servers, other documents        authored by at least one of the one or more authors;    -   process the other documents to identify the entities and the        semantic inter-relationships specific to the previous research        work; and    -   store the information indicative of the entities and the        semantic inter-relationships specific to the previous research        work.

Hereinabove, the term “database servers” refers to database serversrelated to a plurality of digital libraries that publish technicaldocuments authored by various authors or research organizations, whilethe term “other documents” refers to all the documents authored orco-authored previously (namely, prior to the current research work) bythe at least one of the one or more authors that are available in thepublic domain, and therefore, represent the previous research work ofthe one or more authors. Such published technical documents may, forexample, be pre-clinical reports, clinical reports, scientific articles,theses, granted patents, published patent applications and so on.

Optionally, in order to obtain the other documents, the plurality ofdatabase servers are queried using the names or other unique identifiersof the one or more authors (as obtained from the information about theone or more authors).

Optionally, when processing a given other document, different sectionsof the given other document are identified and at least one of thedifferent sections of the given other document is further processed toidentify the entities and the semantic inter-relationships specific tothe previous research work. It will be appreciated that technicaldocuments typically have well-defined sections that can be identifiedfrom their respective headings, and therefore, it is possible to selectat least one of these sections for further processing. As an example, ascientific report related to an experiment may include various sectionshaving suitable headings, for example, such as ‘Abstract’,‘Introduction’, ‘Materials and Methods’, ‘Results’, ‘Discussion’,‘Conclusion’ and ‘References’. In such a case, the section(s) ‘Abstract’and/or ‘Conclusion’ may be further processed to identify entities andsemantic inter-relationships mentioned in the scientific report. Asanother example, a patent document typically includes sections havingheadings, for example, such as ‘Abstract’, ‘Background’, ‘Summary’,‘Brief Description of Drawings’, ‘Detailed Description’ and ‘Claims’. Insuch a case, the section(s) ‘Abstract’ and/or ‘Claims’ may be furtherprocessed to identify entities and semantic inter-relationshipsmentioned in the patent document.

Optionally, the other documents are processed by employing theaforementioned frame semantic parsing technique to generatecorresponding semantic frames. Optionally, in such a case, sentencespresent in at least one section of each of the other documents areparsed and processed to generate the semantic frames. Optionally, thesesemantic frames form a part of the information indicative of theentities and the semantic inter-relationships specific to the previousresearch work.

Optionally, the information indicative of the entities and the semanticinter-relationships specific to the previous research work is stored ata data repository of the server arrangement. Optionally, the datarepository is implemented by way of data memory associated with at leastone of the one or more processors of the server arrangement.Alternatively, optionally, the data repository is implemented by way ofthe database arrangement associated with the server arrangement.

Optionally, the scoring module is configured to obtain and process theother documents even before the document is obtained by the remoteextraction module. It will be appreciated that the other documents canbe obtained and processed after the initial sign-up procedure.

Moreover, optionally, the scoring module is configured to process theone or more value features and/or the metainformation pertaining to thedocument to determine a technical field of the current research work.Optionally, the scoring module is configured to access, based upon thetechnical field of the current research work, information indicative ofentities and semantic inter-relationships related to the technicalfield. Optionally, in this regard, the scoring module is configured to:

-   -   obtain, from the plurality of database servers, a plurality of        documents pertaining to the technical field of the current        research work;    -   process the plurality of documents to identify the entities and        the semantic inter-relationships related to the technical field;        and    -   store the information indicative of the entities and the        semantic inter-relationships related to the technical field.

Optionally, in order to obtain the plurality of documents pertaining tothe technical field of the current research work, the plurality ofdatabase servers are queried using key words (namely, key strings) thatare relevant to the technical field. Hereinabove, the term “databaseservers” refers to the database servers related to the plurality ofdigital libraries that publish technical documents authored by variousresearchers or research organizations, while the term “plurality ofdocuments” refers to all the documents pertaining to the technical fieldthat are available in the public domain, and therefore, representknowledge available publicly.

Optionally, when processing a given document, different sections of thegiven document are identified and at least one of the different sectionsof the given document is further processed to identify the entities andthe semantic inter-relationships related to the technical field, asdescribed earlier.

Optionally, the information indicative of the entities and the semanticinter-relationships related to the technical field is stored at theaforementioned data repository or another data repository of the serverarrangement.

Optionally, the scoring module is configured to obtain and process theplurality of documents even before the aforementioned document isobtained by the remote extraction module. Optionally, the plurality ofdocuments are obtained and processed for a plurality of technicalfields; for each technical field, information indicative of entities andsemantic inter-relationships related to that technical field is storedat the data repository and updated from time to time.

Optionally, the scoring module is configured to:

-   -   compare the entities and the semantic inter-relationships        specific to the current research work with the entities and the        semantic inter-relationships related to the technical field of        the current research work;    -   compare the entities and the semantic inter-relationships        specific to the current research work with the entities and the        semantic inter-relationships specific to the previous research        work of one or more authors; and    -   determine the importance score based upon said comparisons.

Optionally, in this regard, the scoring module is configured to:

-   -   generate a current-work graph representing the entities and the        semantic inter-relationships specific to the current research        work;    -   generate a knowledge graph representing the entities and the        semantic inter-relationships related to the technical field of        the current research work;    -   generate a previous-work graph representing the entities and the        semantic inter-relationships specific to the previous research        work; and    -   perform the aforementioned comparisons using the current-work        graph, the previous-work graph and the knowledge graph.

Optionally, the knowledge graph represents the entities and the semanticinter-relationships related to the technical field, and weights assignedto the semantic inter-relationships. Likewise, optionally, theprevious-work graph represents the entities and the semanticinter-relationships specific to the previous research work, and weightsassigned to the semantic inter-relationships. Similarly, optionally, thecurrent-work graph represents the entities and the semanticinter-relationships specific to the current research work, and weightsassigned to the semantic inter-relationships.

Optionally, in this regard, a given graph is generated by linking theentities according to the semantic inter-relationships between them. Inthe given graph, the entities are represented by nodes of the givengraph, while the semantic inter-relationships between the entities arerepresented by edges (namely, links) between the nodes.

As mentioned above, the semantic inter-relationships between theentities have weights assigned thereto. Optionally, in case of theprevious-work graph, a given semantic inter-relationship between twoentities is assigned a weight based upon at least one of: a type ofcausal relationship represented by the given semantic inter-relationshipbetween the two entities, the number of documents authored by the atleast one of the one or more authors in which the given semanticinter-relationship occurred, ranks of digital libraries where thedocuments were published.

Likewise, optionally, in case of the knowledge graph, a given semanticinter-relationship between two entities is assigned a weight based uponat least one of: a type of causal relationship represented by thesemantic inter-relationship between the two entities, the number ofdocuments in which the semantic inter-relationship occurred, ranks ofdigital libraries where the documents were published.

Moreover, optionally, in case of the current-work graph, a givensemantic inter-relationship between two entities is assigned a weightbased upon the weight of the given semantic inter-relationship in theknowledge graph.

It will be appreciated that the weight of the given semanticinter-relationship represents a strength of the given semanticinter-relationship.

Furthermore, optionally, the scoring module is configured to:

-   -   process the information about the one or more authors, whilst        taking into consideration rankings of the academic institutes,        the research organizations and the digital libraries, to        determine a reputation factor associated with the document; and    -   determine the importance score of the document, based upon the        reputation factor.

Moreover, optionally, the scoring module is configured to:

-   -   process the information pertaining to the cost incurred in the        current research work to determine a cost factor associated with        the document; and    -   determine the importance score of the document, based upon the        cost factor.

Furthermore, optionally, the scoring module is configured to:

-   -   process the information about the statistical significance of        the current research work, whilst taking into account a rank of        the research organization where the current research work has        been performed, to determine a statistical-significance factor        associated with the document; and    -   determine the importance score of the document, based upon the        statistical-significance factor.

Throughout the present disclosure, the term “importance score” refers toa rating (namely, a grade or a value) that is determined for thedocument, wherein the importance score is indicative of a quantifiedimportance of the current research work from a technical point of view.Thus, the importance score can be used to provide a potential consumerwith an insight into the current research work, and to help the consumerin deciding whether or not to purchase the document. Moreover, theimportance score can be used to provide the first user with a guidancefor pricing the document for selling the document to researchorganizations or personnel that are interested in buying the document.

Moreover, optionally, the importance score is a monetary value.Optionally, the monetary value is in a crypto-currency for enablingfuture transactions of the document using a blockchain. It will beappreciated that the monetary value can alternatively be in any suitablecurrency, as required.

As mentioned earlier, the server arrangement is configured to constructthe summarized view of the document based on at least one of: the one ormore value features, the metainformation, the one or more concepts ofthe document and the importance score. Notably, the summarized view ofthe document provides a concise outline of the document representativeof significant features of the document. Furthermore, the summarizedview of the document provides the second user with a synopticdescription of the document.

Optionally, the summarized view comprises a brief description of thedocument, bibliographical information pertaining to the document, a listof keywords associated with the document, and the importance score ofthe document. Optionally, the list of keywords associated with thedocument includes at least one of the one or more concepts of thedocument. Moreover, optionally, the server arrangement is configured toemploy Natural Language Generation (NLG) techniques to generate thebrief description of the document based on the one or more concepts ofthe document.

Furthermore, as mentioned earlier, the persistence module of the serverarrangement is configured to generate a unique identifier for thedocument, and associate the unique identifier with the summarized viewand with the one or more concepts of the document. Optionally, theunique identifier is a string of alphabets, numbers, symbols or acombination thereof. Specifically, the unique identifier serves as ameans for identification and retrieval of the summarized view of thedocument (and consequently, the document).

Optionally, the persistence module is configured to store the uniqueidentifier of the document with the summarized view and with the one ormore concepts of the document in a non-volatile storage location, forexample, such as at least one of the one or more databases of thedatabase arrangement.

Optionally, the unique identifier of the document is stored with the oneor more concepts of the document in a form of inverted indices.Optionally, the persistence module is configured to map a given conceptto unique identifiers of a plurality of documents in which the givenconcept is identified. In other words, the given concept acts as anindex to the unique identifiers of the plurality of documents in whichthe given concept is identified.

For illustration purposes only, there will now be considered an examplescenario, wherein:

-   -   a first document has a unique identifier “B6A34” that is        associated with concepts, “Cancer”, “Lung Cancer”, “EGFR”        identified therefrom;    -   a second document has a unique identifier “C8X45” that is        associated with concepts “Cancer”, “Breast Cancer”, “Lung        Cancer” identified therefrom; and    -   a third document has a unique identifier “S3F89” that is        associated with concepts “Cancer”, “Diabetes” and “EGFR”        identifier therefrom.

In the illustrated example, a table below represents the mapping of theconcepts to the unique identifiers as follows:

Concept Unique Identifier(s) Cancer B6A34, C8X45, S3F89 Lung CancerB6A34, C8X45 Breast Cancer C8X45 EGFR B6A34, S3F89 Diabetes S3F89

It will be appreciated that such inverted indexing is particularlybeneficial when there are a large number of documents (for example, inmillions or more), because searching for documents matching a particularconcept can be performed relatively fast.

Moreover, as mentioned earlier, the server arrangement is configured toreceive the search query from the second client device and process thesearch query to identify the at least one concept pertaining to thesearch query. Specifically, the second client device is the deviceassociated with the second user who is interested in accessing thedocument.

Optionally, the server arrangement is configured to present thegraphical user interface to the second user that allows the second userto input the search query. As an example, the second user can providethe search query in an input field displayed on the graphical userinterface of the second client device. The search query may, forexample, comprise a set of keywords entered by the second based onhis/her area of interest.

Optionally, the search query is parsed and compared with the conceptsstored in the ontological databank to identify a possible matchtherebetween. Additionally, optionally, a spell check is performed onthe search query.

Optionally, the search query comprises one or more query segments(namely, fragments, phrases and so forth) and contextual (namely,conceptual, semantic and so forth) associations therebetween. A querysegment is a part of a search query that has a significant contextualmeaning. As an example, the search query can be as follows: “drugstablets for curing lung cancer”. In such a case, the query segments canbe as follows: “drugs”, “tablets”, “curing”, “lung”, and “cancer”.Optionally, the one or more query segments are compared with theconcepts stored in the ontological databank to identify the at least oneconcept pertaining to the search query.

Optionally, the server arrangement is configured to expand the searchquery to include at least one of: lexical variants for at least one ofthe one or more query segments, synonyms of at least one of the one ormore query segments, abbreviations of at least one of the one or morequery segments, word stems of at least one of the one or more querysegments. Additionally, optionally, the lexical variants, the synonyms,the abbreviations and/or the word stems are processed into a canonicalform (namely, to standardize the one or more query segments).

Moreover, optionally, the server arrangement is configured to convertthe search query into a machine-readable format. Optionally, the searchquery is converted into the JSON format or any other suitable format.

Furthermore, as mentioned earlier, the server arrangement is configuredto retrieve the summarized view of the document based on the uniqueidentifier of the document, when the at least one concept pertaining tothe search query matches at least one of the one or more concepts of thedocument. Optionally, in this regard, the at least one conceptpertaining to the search query is compared with each of one or moreconcepts of multiple documents that were associated and stored by thepersistence module.

Subsequently, for each concept that is found to match the at least oneconcept pertaining to the search query, summarized views of alldocuments whose unique identifiers are associated with that concept areretrieved. As mentioned previously, the unique identifiers of thedocuments are associated with the summarized views of the documents.Therefore, when the at least concept pertaining to the search querymatches the at least one of the one or more concepts of the document,the summarized view of the document is retrieved.

Optionally, the server arrangement is configured to present, via thegraphical user interface of the second client device, a list ofdocuments that matched the search query.

Moreover, the server arrangement is configured to display, on thegraphical user interface of the second client device, the summarizedview of the document. Optionally, in this regard, the summarized view isdisplayed to the second user, based upon a user's selection of thedocument from the list of documents. This allows the second user tocheck whether or not the document is relevant to his/her search query,thereby helping him/her make a decision regarding the document.

It will be appreciated that the summarized view can alternatively beconstructed on the fly, when the summarized view is required to bedisplayed to the second user. In such cases, the summarized view is notpre-stored.

Pursuant to embodiments of the present disclosure, the graphical userinterface allows the user to initiate the request for accessing thedocument. In this regard, the server arrangement is configured tovalidate the request, received from the second client device foraccessing the document, using the validation module of the serverarrangement.

Optionally, in this regard, the validation module is configured tovalidate an identity of the second user and/or a payment transactionmade by the second user for accessing the document.

Optionally, upon successful validation, the first client device isconfigured to allow the second client device to access the document overa data communication network that is different from the one or more datacommunication networks. As mentioned earlier, the server arrangement iscommunicably coupled with the first client device and the second clientdevice using the one or more data communication networks. Therefore,allowing the access of the document over the data communication networkthat is different from the one or more data communication networksensures security of the document. In an instance, when a security of theone or more data communication networks is compromised, the security ofthe document may not be breached.

Moreover, it will be appreciated that the scoring module, thepersistence module and the validation module can be implemented by wayof a single processor or separate processors of the server arrangement.

Furthermore, optionally, a document sharing module stored on the firstclient device is configured to encrypt the document using a key of thefirst client device. Optionally, the document sharing module isconfigured to generate the key to be used for encrypting the document.The document is encrypted to prevent unauthorized access of the documentfrom malicious parties masquerading as the second client device.

Furthermore, the key that is used to encrypt the document may, forexample, be a hash function, a mathematical operator, a mathematicaloperation and so forth.

Optionally, the document sharing module is configured to store theencrypted document in a distributed file system. The distributed filesystem provides a protocol for storing and exchanging documents forpeer-to-peer transfers. Furthermore, the encrypted document is stored atvarious peer nodes pertaining to various public nodes of the distributedfile system. The peer nodes are not dependent on each other; thisensures that the distributed file system has no failures due tonon-functionality of any of the peer nodes. Once stored, the content ofthe encrypted document cannot be changed. This makes the distributedfile system secure. An example of the distributed file system isInterPlanetary File System (IPFS).

Optionally, in this regard, the distributed file system is operable togenerate a hash that uniquely identifies the document. Optionally, inorder to generate the hash of the document, the distributed file systemapplies a hash operation on a combination of: the encrypted document,metadata of the document and a file format of the document. The hash ofthe document is a string of alphanumeric characters having a fixedlength. It will be appreciated that the length of the string is basedupon the hash operation that is applied on the aforesaid combination.

The distributed file system communicates the hash to the documentsharing module. Optionally, the document sharing module is configured tocommunicate the hash of the document to the server arrangement.

Moreover, optionally, the document sharing module is configured to storethe hash of the document on a blockchain platform, wherein theblockchain platform associates a timestamp with the hash of thedocument. Specifically, the blockchain platform relates to a distributedledger arrangement that is configured to store a list of records. Morespecifically, in the blockchain platform, each block stores acryptographic hash of a previous block, new information stored in theblock and a timestamp associated with the block. Pursuant to embodimentsof the present disclosure, the new information stored in the blockcomprises the hash of the document.

Furthermore, the blockchain platform is managed by a peer-to-peernetwork collectively adhering to a protocol for inter-node communicationand validating new blocks in a blockchain. Moreover, once a block isstored in the blockchain (namely, the distributed ledger arrangement),the block cannot be altered. Thus, storing the hash of the document inthe blockchain platform provides an immutable proof of publishing of theencrypted document with its associated timestamp.

Optionally, the server arrangement is configured to communicate the hashof the document to the second client device, for example, upon receiptor successful validation of the request for accessing the document. Thisenables the second client device to retrieve the encrypted document fromthe distributed file system.

Moreover, optionally, the document sharing module is configured tocommunicate to the second client device a key to be used to decrypt theencrypted document, upon successful validation of the request foraccessing the document. This enables the second client device to decryptthe encrypted document using the key.

Furthermore, in some implementations, the second client device isconfigured to make a payment transaction for purchasing the documentusing the aforementioned blockchain platform.

For illustration purposes only, there will now be considered an examplenetwork environment, wherein a system for executing a document accesstransaction can be implemented pursuant to embodiments of the presentdisclosure. One such network environment has been illustrated inconjunction with FIG. 1 as explained in more detail below.

The network environment includes a first client device and a secondclient device, a server arrangement of the system, a databasearrangement of the system, and one or more data communication networks.The server arrangement, comprising one or more processors, iscommunicably coupled via the one or more data communication networkswith the first client device and the second client device. Optionally,the network environment also includes a plurality of database serverscommunicably coupled via the one or more data communication networkswith the one or more processors of the server arrangement.

It will be appreciated that it is not necessary for the one or moreprocessors of the server arrangement to be coupled in communication withall the client devices simultaneously at all times.

The one or more data communication networks can be a collection ofindividual networks, interconnected with each other and functioning as asingle large network. Such individual networks may be wired, wireless,or a combination thereof. Examples of such individual networks include,but are not limited to, Local Area Networks (LANs), Wide Area Networks(WANs), Metropolitan Area Networks (MANs), Wireless LANs (WLANs),Wireless WANs (WWANs), Wireless MANs (WMANs), the Internet, secondgeneration (2G) telecommunication networks, third generation (3G)telecommunication networks, fourth generation (4G) telecommunicationnetworks, fifth generation (5G) telecommunication networks and WorldwideInteroperability for Microwave Access (WiMAX) networks.

Examples of the first and second client devices include, but are notlimited to, mobile phones, smart telephones, Mobile Internet Devices(MIDs), tablet computers, Ultra-Mobile Personal Computers (UMPCs),phablet computers, Personal Digital Assistants (PDAs), web pads,Personal Computers (PCs), handheld PCs, laptop computers, desktopcomputers, large-sized touch screens with embedded PCs, a server, andNetwork-Attached Storage (NAS) devices.

The one or more processors of the server arrangement are configured toexecute machine readable instructions that cause the server arrangementto perform operations, for example, as illustrated with respect to theaforementioned aspect.

Moreover, the present description also relates to the method asdescribed above. The various embodiments and variants disclosed aboveapply mutatis mutandis to the method.

Optionally, the method further comprises converting a data format of theobtained document, using the remote extraction module, into a predefineddata format prior to extracting the one or more value features from thedocument.

Optionally, the document is related to a current research work of one ormore authors, wherein the one or more value features of the documentcomprise information elements indicative of entities and semanticinter-relationships between the entities specific to the currentresearch work.

Optionally, the method comprises using the scoring module to:

-   -   compare the entities and the semantic inter-relationships        specific to the current research work with entities and semantic        inter-relationships related to a technical field of the current        research work;    -   compare the entities and the semantic inter-relationships        specific to the current research work with entities and semantic        inter-relationships specific to a previous research work of the        one or more authors; and    -   determine the importance score based upon said comparisons.

Optionally, the method comprises using the scoring module to:

-   -   generate a current-work graph representing the entities and the        semantic inter-relationships specific to the current research        work;    -   generate a knowledge graph representing the entities and the        semantic inter-relationships related to the technical field of        the current research work;    -   generate a previous-work graph representing the entities and the        semantic inter-relationships specific to the previous research        work; and    -   perform said comparisons using the current-work graph, the        previous-work graph and the knowledge graph.

Optionally, the method comprises mapping a given concept to uniqueidentifiers of a plurality of documents in which the given concept isidentified, using the persistence module.

Optionally, the method further comprises providing a user of the firstclient device, via a graphical user interface of the first clientdevice, with a single sign-on feature based on stored credentials of theuser.

More optionally, the method comprises allowing the second client deviceto access the document over a data communication network that isdifferent from the one or more data communication networks.

Optionally, the method further comprises using a document sharing modulestored on the first client device to:

-   -   encrypt the document using a key of the first client device; and    -   store the encrypted document in a distributed file system,        wherein the distributed file system is operable to generate a        hash that uniquely identifies the document.

Optionally, the method further comprises storing the hash of thedocument on a blockchain platform, wherein the blockchain platformassociates a timestamp with the hash of the document.

DETAILED DESCRIPTION OF THE DRAWINGS

Referring now to the drawings, particularly by their reference numbers,FIG. 1 is a schematic illustration of a network environment 100, whereina system for executing a document access transaction is implemented,pursuant to an embodiment of the present disclosure. The networkenvironment 100 comprises a server arrangement 102 including one or moreprocessors, a first client device 104 and a second client device 106.The server arrangement 102 is communicably coupled via one or more datacommunication networks (depicted as a data communication network 108)with the first client device 104 and the second client device 106.

The server arrangement 102 comprises a scoring module 110, a persistencemodule 112 and a validation module 114. As shown, the first clientdevice 104 comprises a remote extraction module 116. The remoteextraction module 116 is communicably coupled to an ontological databank118.

FIG. 1 is merely an example, which should not unduly limit the scope ofthe claims herein. It is to be understood that the specific designationfor the network environment 100 is provided as an example and is not tobe construed as limiting the network environment 100 to specificnumbers, types, or arrangements of server arrangements, client devices,data communication networks and ontological databanks. A person skilledin the art will recognize many variations, alternatives, andmodifications of embodiments of the present disclosure.

FIG. 2 is a schematic illustration of a high-level architecture of anetwork environment 200 in which a system for executing a documentaccess transaction is implemented, pursuant to a specific embodiment ofthe present disclosure.

The network environment 200 comprises a server arrangement 202 includingone or more processors, a first client device 204 and a second clientdevice 206. The server arrangement 202 is communicably coupled via oneor more data communication networks (not shown) with the first clientdevice 204 and the second client device 206. As shown, the first clientdevice 204 comprises a remote extraction module 208 and a data sharingmodule 210.

With reference to FIG. 2 , the network environment 200 comprises adistributed file system 212 and a blockchain platform 214.

The remote extraction module 208 is configured to transmit valuefeatures extracted from a document and metainformation pertaining to thedocument to the server arrangement 202. The server arrangement 202 isconfigured to perform various operations, for example, as describedearlier.

The document sharing module 210 is configured to encrypt the documentand store the encrypted document in the distributed file system 212. Thedistributed file system 212 is operable to generate a hash that uniquelyidentifies the document and communicate the hash to the document sharingmodule 210.

The document sharing module 210 is configured to store the hash of thedocument on the blockchain platform 214, wherein the blockchain platform214 associates a timestamp with the hash of the document. Moreover, thedocument sharing module 210 is configured to communicate the hash of thedocument to the server arrangement 202.

The server arrangement 202 is configured to communicate the hash of thedocument to the second client device 206, for example, upon receipt of arequest for accessing the document from the second client device 206, orupon successful validation of the request. This enables the secondclient device 206 to retrieve the encrypted document from thedistributed file system 212.

The document sharing module 210 is configured to communicate to thesecond client device 206 a key to be used to decrypt the encrypteddocument, upon successful validation of the request for accessing thedocument. This enables the second client device 206 to decrypt theencrypted document using the key.

In some implementations, the second client device 206 makes a paymenttransaction for purchasing the document using the blockchain platform214.

FIG. 2 is merely an example, which should not unduly limit the scope ofthe claims herein. It is to be understood that the specific designationfor the network environment 200 is provided as an example and is not tobe construed as limiting the network environment 200 to specificnumbers, types, or arrangements of server arrangements, client devices,modules, distributed file systems and blockchain platforms. A personskilled in the art will recognize many variations, alternatives, andmodifications of embodiments of the present disclosure.

Referring to FIGS. 3A and 3B, illustrated is a flow chart depictingsteps of a method for executing a document access transaction, inaccordance with an embodiment of the present disclosure. The method isdepicted as a collection of steps in a logical flow diagram, whichrepresents a sequence of steps that can be implemented in hardware,software, or a combination thereof, for example as aforementioned.

The method is implemented via a system comprising a server arrangementincluding one or more processors, the server arrangement beingcommunicably coupled via one or more data communication networks with afirst client device and a second client device.

At a step 302, a remote extraction module, stored on the first clientdevice, is triggered to obtain a document and metainformation pertainingto the document, extract one or more value features from the documentbased on an identification of one or more concepts of the document thatare identified as associated with concepts stored in an ontologicaldatabank, the ontological databank being communicably coupled to theremote extraction module, and transmit the one or more value featuresand the metainformation to the server arrangement.

At a step 304, an importance score of the document is determined, usinga scoring module of the server arrangement, based on the one or morevalue features and the metainformation pertaining to the document.

At a step 306, a summarized view of the document is constructed based onat least one of: the one or more value features, the metainformation,the one or more concepts of the document and the importance score.

At a step 308, a persistence module of the server arrangement isinitialized to generate a unique identifier for the document andassociate the unique identifier with the summarized view and with theone or more concepts of the document.

At a step 310, a search query, received from the second client device,is processed to identify at least one concept pertaining to the searchquery.

At a step 312, the summarized view of the document is retrieved based onthe unique identifier of the document, when the at least one conceptpertaining to the search query matches at least one of the one or moreconcepts of the document.

At a step 314, the summarized view of the document is displayed on auser interface of the second client device.

At a step 316, a request, received from the second client device, foraccessing the document is validated using a validation module of theserver arrangement. The validation module is configured to cause thefirst client device to allow the second client device to access thedocument, when the request is validated successfully.

The steps 302 to 316 are only illustrative and other alternatives canalso be provided where one or more steps are added, one or more stepsare removed, or one or more steps are provided in a different sequencewithout departing from the scope of the claims herein.

FIGS. 4A and 4B are example views of a graphical user interface that arepresented to a first user of a first client device, in accordance withan embodiment of the present disclosure. The graphical user interfaceallows the first user to submit to, a remote extraction module stored onthe first client device, a document and metainformation pertaining tothe document.

With reference to FIG. 4A, a first example view includes text boxesand/or drop-down menus that allow the first user to enter details and/orselect a suitable option.

With reference to FIG. 4B, a second example view allows the first userto select one or more documents for submission.

FIGS. 4A and 4B are merely examples, which should not unduly limit thescope of the claims herein. A person skilled in the art will recognizemany variations, alternatives, and modifications of embodiments of thepresent disclosure. For example, another example view of the graphicaluser interface can show and allow the first user to edit themetainformation provided by the user.

FIGS. 5A and 5B are example views of a graphical user interface that arepresented to a second user of a second client device, in accordance withan embodiment of the present disclosure. The graphical user interfaceallows the second user to input a search query and access a document.

With reference to FIG. 5A, a first example view includes an input fieldfor the search query. Subsequent to an input of the search query by thesecond user, a list of documents related to the search query is shown.

With reference to FIG. 5B, a second example view presents a summarizedview of a document, for example, based upon a user's selection from thelist of documents.

FIGS. 5A and 5B are merely examples, which should not unduly limit thescope of the claims herein. A person skilled in the art will recognizemany variations, alternatives, and modifications of embodiments of thepresent disclosure. For example, another example view of the graphicaluser interface can allow the second user to initiate a request foraccessing the document.

Modifications to embodiments of the present disclosure described in theforegoing are possible without departing from the scope of the presentdisclosure as defined by the accompanying claims. Expressions such as“including”, “comprising”, “incorporating”, “have”, “is” used todescribe and claim the present disclosure are intended to be construedin a non-exclusive manner, namely allowing for items, components orelements not explicitly described also to be present. Reference to thesingular is also to be construed to relate to the plural.

What is claimed is:
 1. A system for access transaction of a documentcontaining sensitive and confidential information, the system comprisinga server arrangement including one or more processors, the serverarrangement being communicably coupled via one or more datacommunication networks with a first client device and a second clientdevice, wherein the server arrangement, when operated, provides aplatform configured to: receive an access request for a documentselected, by the second user, from a list of documents retrieved inresponse to a search query and displayed, on a user interface connectedto the second client device, wherein each of the document in the list isassociated with a summarized view and an importance score, and whereinthe importance score, displayed along-with the summarized view, for eachof the document in the list is determined on the platform withoutaccessing and storing, on the platform, any document of said list ofdocuments, wherein the importance score is determined, by a scoringmodule on the server arrangement, based on metainformation of thedocument and one or more value features transmitted to the serverarrangement by a remote sharing module of the first client devicesubmitting the document, wherein the one or more value features of thedocument comprise information elements related to entities and semanticinter-relationships between the entities, wherein the importance scoreis indicative of technical importance of the document, and wherein themetainformation of the document comprises information related to astatistical significance of current research work related to thedocument; validate the access request for the document by the seconduser; retrieve and deliver to the second client device a hash pertainingto the document wherein the hash corresponds to a location of thedocument in a distributed file storage system; and cause the firstclient device to communicate the document to the second client device inresponse to a successful validation of the access request.
 2. The systemof claim 1, wherein the search query is expanded, based on anontological databank, to include one or more concepts from theontological databank and wherein each of the document in the list of alldocuments correspond to at least one concept of the ontologicaldatabank.
 3. The system of claim 1, wherein the remote extraction moduleis operable to extract the one or more value features based on anontological databank related to a technical field of the document, theontological databank being communicably coupled to the remote extractionmodule.
 4. The system of claim 1, wherein the summarized views areconstructed, on the fly, at the time of processing the search query. 5.The system of claim 1, wherein the summarized views are pre stored onthe server arrangement.
 6. The system of claim 1, wherein the documentis stored on the distributed file storage system by a document sharingmodule of the first client device.
 7. The system of claim 6, wherein thedocument sharing module is configured to encrypt the document with akey, prior to storing on the distributed file storage system, andcommunicate the key to the second client device in response tosuccessful validation of the access request.
 8. The system of claim 6,wherein the document sharing module is configured to store the hash ofthe document on a blockchain platform, wherein the blockchain platformassociates a timestamp with the hash of the document.
 9. A method foraccess transaction of a document containing sensitive and confidentialinformation, wherein the method is implemented via a system comprising aserver arrangement including one or more processors, the serverarrangement being communicably coupled via one or more datacommunication networks with a first client device and a second clientdevice, the method comprising: receive an access request for a documentselected, by the second user, from a list of documents retrieved inresponse to a search query and displayed, on a user interface connectedto the second client device, wherein each of the document in the list isassociated with a summarized view and an importance score, and whereinthe importance score, displayed along-with the summarized view, for eachof the document in the list is determined on the platform withoutaccessing and storing, on the platform, any document of said list ofdocuments, wherein the importance score is determined, by a scoringmodule on the server arrangement, based on metainformation of thedocument and one or more value features transmitted to the serverarrangement by a remote sharing module of the first client devicesubmitting the document, wherein the one or more value features of thedocument comprise information elements related to entities and semanticinter-relationships between the entities, wherein the importance scoreis indicative of technical importance of the document, and wherein themetainformation of the document comprises information related to astatistical significance of current research work related to thedocument; validating the access request for the document by the seconduser; retrieving and delivering to the second client device a hashpertaining to the document wherein the hash corresponds to a location ofthe document in a distributed file storage system; and causing the firstclient device to communicate the document to the second client device inresponse to a successful validation of the access request.
 10. Themethod of claim 9, wherein the search query is expanded, based on anontological databank, to include one or more concepts from theontological databank and wherein each of the document in the list of alldocuments correspond to at least one concept of the ontologicaldatabank.
 11. The method of claim 9, wherein the remote extractionmodule is operable to extract the one or more value features based on anontological databank related to a technical field of the document, theontological databank being communicably coupled to the remote extractionmodule.
 12. The method of claim 9, wherein the summarized views areconstructed, on the fly, at the time of processing the search query. 13.The method of claim 9, wherein the summarized views are prestored on theserver arrangement.
 14. The method of claim 9, wherein the document isstored on the distributed storage system by a document sharing module ofthe first client device.
 15. The method of claim 14, wherein thedocument sharing module is configured to encrypt the document with akey, prior to storing on the distributed file storage system, andcommunicate the key to the second client device in response tosuccessful validation of the access request.
 16. The method of claim 14,wherein the document sharing module is configured to store the hash ofthe document on a blockchain platform, wherein the blockchain platformassociates a timestamp with the hash of the document.