AN APPARATUS AND METHOD FOR AUTONOMIC EMAIL ACCESS CONTROL
First Claim
1. A method of autonomic building and updating access control for referenced databases in documents sent via email by an originator to addressees, comprising:
- dynamically updating an access control list of said addressees for said originator of said email;
tracking distribution routes of said documents in a repository; and
providing a request to said originator and a response from said originator to any of said addressees for approving, altering, or rejecting the access of said referenced databases in said documents.
1 Assignment
0 Petitions
Accused Products
Abstract
A software application and corresponding architecture to implement the application that dynamically updates the access control list and keeps track of the distribution routes of a document in a repository where the document is built and accessed through usage of a common email system. The access control list and distribution routes are built by tracking recipients of the email message linked to the document. Some recipients can be disabled by the originator from forwarding the referenced databases within the emailed document, while others may designate further transmissions to selected persons or groups.
63 Citations
34 Claims
-
1. A method of autonomic building and updating access control for referenced databases in documents sent via email by an originator to addressees, comprising:
-
dynamically updating an access control list of said addressees for said originator of said email;
tracking distribution routes of said documents in a repository; and
providing a request to said originator and a response from said originator to any of said addressees for approving, altering, or rejecting the access of said referenced databases in said documents. - View Dependent Claims (2, 3, 4, 5, 6, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
7. A method of autonomic building and updating access control of referenced databases on documents shared via email, comprising:
-
selecting a list of addressees in an email transmission to give access to said referenced databases;
selecting the type of access for said selected list of addressees;
constructing an email transaction to send to an originator, said email transaction including database and access requests for each of said addressees;
constructing database transactions to send to database servers;
sending said database transactions to said database servers;
matching said list of addressees and access requests to an access control list in said database;
sending said email transaction to said addressees;
requesting forwarding approval by said addressees of said referenced databases from said originator;
transmitting a forwarding approval or rejection from said originator to said addressee; and
tracing email forwarding for said originator. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A program storage device readable by a machine, tangibly embodying a program of instructions executable by the machine to perform method steps for building and updating access control for referenced databases in documents sent via email by an originator to addressees, said method steps comprising:
-
dynamically updating an access control list of said addressees for said originator of said email;
tracking distribution routes of said documents in a repository; and
providing a request to said originator and a response from said originator to any of said addressees for approving, altering, or rejecting the access of said referenced databases in said documents. - View Dependent Claims (14, 15, 16)
-
-
17. A program storage device readable by a machine, tangibly embodying a program of instructions executable by the machine to perform method steps for building and updating access control for referenced databases in documents sent via email by an originator to addresses, said method steps comprising:
-
selecting a list of addressees in an email transmission to give access to said referenced databases;
selecting the type of access for said selected list of addressees;
constructing an email transaction to send to an originator, said email transaction including database and access requests for each of said addressees;
constructing database transactions to send to database servers;
sending said database transactions to said database servers;
matching said list of addressees and access requests to an access control list in said database;
sending said email transaction to said addressees;
requesting access approval by said addressees of said referenced databases from said originator;
transmitting a forwarding approval or rejection from said originator to said addressee; and
tracing email forwarding for said originator. - View Dependent Claims (18, 19)
-
Specification