Permissions Based on Behavioral Patterns
First Claim
1. A system comprising:
- a processor;
a memory communicatively coupled to the processor;
a potential recipient analysis module stored in the memory and executable at the processor to analyze data derived at least in part from interactions between a user and potential recipients of documents to determine a level of trust for individual ones of the potential recipients;
a document analysis module stored in the memory and executable at the processor to perform an analysis of the documents to determine a level of document privacy;
an inference module stored in the memory and executable at the processor to derive soft permissions for sharing the documents based at least in part on the level of trust and the level of document privacy; and
an implementation module stored in the memory and executable at the processor to implement soft permissions derived by the inference module.
2 Assignments
0 Petitions
Accused Products
Abstract
Users may choose to have their behavior analyzed in order to infer default sharing permission settings for documents and other information maintained in one or more computer systems. This may increase information security for the users and streamline implementation of privacy and/or sharing permissions. The default sharing permissions are implemented by a computer system as soft permissions that may be used to determine which documents are to be shared with which recipients. The soft permissions may address sharing situations for which a user has not expressly indicated his or her sharing rules. The soft permissions may change over time in response to changing user behavior and/or the soft permissions may be revised in light of user feedback.
105 Citations
27 Claims
-
1. A system comprising:
-
a processor; a memory communicatively coupled to the processor; a potential recipient analysis module stored in the memory and executable at the processor to analyze data derived at least in part from interactions between a user and potential recipients of documents to determine a level of trust for individual ones of the potential recipients; a document analysis module stored in the memory and executable at the processor to perform an analysis of the documents to determine a level of document privacy; an inference module stored in the memory and executable at the processor to derive soft permissions for sharing the documents based at least in part on the level of trust and the level of document privacy; and an implementation module stored in the memory and executable at the processor to implement soft permissions derived by the inference module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method comprising:
-
under control of one or more processors configured with executable instructions, analyzing an action of a user related to sharing a first document with a recipient; deriving, based at least in part on the analyzing, a soft permission for sharing documents; determining potential recipients of a second document, the determining based at least in part on the soft permission; and applying the soft permission to the second document. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. One or more computer-readable media storing computer-executable instructions that, when executed by a processor, configure the processor to perform acts comprising:
-
generating a soft permission for sharing documents based at least in part on inferences derived from past document sharing behavior of a user; receiving feedback from the user regarding the soft permission; and modifying the soft permission based at least in part on the feedback from the user. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. A system comprising:
-
a processor; a memory communicatively coupled to the processor; a potential recipient analysis module stored in the memory and executable at the processor to generate a social graph based at least in part on analysis of relationships between the user and a plurality of potential recipients; a document analysis module stored in the memory and executable at the processor to perform an analysis of the documents to determine a level of document privacy; an inference module stored in the memory and executable at the processor to derive soft permissions for sharing the documents based at least in part on the social graph and the level of document privacy; and an implementation module stored in the memory and executable at the processor to implement a sharing action. - View Dependent Claims (24, 25, 26, 27)
-
Specification