User interface for controlling access to computer objects
First Claim
1. A computer object access control graphical user interface rendered on a computer display screen for controlling access to a computer object, comprising:
- a query field for indicating a query to access the computer object; and
a recent object field rendered with the query field and listing plural computer objects that have been accessed by the user, the plural computer objects including objects obtained from computer locations and computer communications objects.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer object access control graphical user interface allows a user to set computer locations where a computer object may be accessed and other users who may access the computer object. The computer object may be a computer file, a computer message, person contact information, etc. The access control user interface may operate, for example, to save a computer object to one or more computer locations, and also to specify sharing of the computer object with one or more other users so that they can access the object. Saving a computer object and setting the sharing of it are together referred to as controlling access to the object, the former referring to where the object may be accessed from and the latter referring to who may access the object. This provides, therefore, a unified interface for selecting and displaying destinations that can be either a file store or a person, thereby unifying the control of access to a computer object.
63 Citations
20 Claims
-
1. A computer object access control graphical user interface rendered on a computer display screen for controlling access to a computer object, comprising:
-
a query field for indicating a query to access the computer object; and
a recent object field rendered with the query field and listing plural computer objects that have been accessed by the user, the plural computer objects including objects obtained from computer locations and computer communications objects. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for automatically controlling access to one or more objects, comprising:
-
monitoring computer system activity to collect context data;
storing metadata indicative of the context data;
employing the metadata to create associations between objects; and
automatically controlling access to an object based on the object'"'"'s associations with other objects, wherein controlling access to the object comprises setting object sharing controls. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system to automatically control access to one or more objects, comprising:
-
a data collection system comprising a system activity monitor to collect context data relating to computer system activity; and
a relationship processing system comprising an association system to employ the context data to create context associations between objects, wherein access to an object is automatically controlled utilizing the context associations between objects and wherein automatically controlling access to the object comprises specifying users who can have access to the object and computer locations from where the object can be accessed. - View Dependent Claims (18, 19, 20)
-
Specification