Secure file sharing
First Claim
Patent Images
1. A method for sharing files with remote users, the method comprising:
- accepting a request from a file sharer to share a file with a remote user;
accessing credentials, the credentials configured to enable access to the file; and
generating a proxy representation for the file, the proxy representation associated with the remote user and storing a location of the file.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention discloses a proxy server that enables remote users to securely share files. A proxy server maintains credentials for accessing files on secure file sources. By sharing a file a user of the file source generates a proxy representation that maintains information about the location of the file and mechanisms for accessing the file. When the recipient submits changes the proxy server executes those changes on the original file.
-
Citations
90 Claims
-
1. A method for sharing files with remote users, the method comprising:
-
accepting a request from a file sharer to share a file with a remote user;
accessing credentials, the credentials configured to enable access to the file; and
generating a proxy representation for the file, the proxy representation associated with the remote user and storing a location of the file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A system for sharing files with remote users, the system comprising:
-
a proxy database storing proxy representations, the proxy representations configured to enable access to files for remote users; and
a proxy configured to;
accept a request from a file sharer to share a file with a remote user;
access credentials, the credentials configured to enable access to the file; and
generate a proxy representation for the file. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56)
-
-
57. A computer program product, stored on a computer readable medium, and including computer executable instructions for controlling a processor to manage access to remote files, the instructions comprising instructions for:
-
accepting a request from a file sharer to share a file with a remote user;
accessing credentials, the credentials configured to enable access to the file; and
generating a proxy representation for the file, the proxy representation associated with the remote user and storing a location of the file. - View Dependent Claims (58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84)
-
-
85. A method for enabling access to files, the method comprising:
-
receiving a sending request for an email message from a file sharer, the sending request associated with a recipient and a file having a file location; and
creating a proxy representation for the file, the proxy representation configured to enable the recipient to access the file; and
storing a reference in the message, the reference associated with the proxy representation. - View Dependent Claims (86, 87, 88, 89, 90)
-
Specification