ACCESS POLICY BASED ON COLLABORATION PARTICIPATION
First Claim
1. A method comprising:
- receiving an indication of multiple participants who participated in an online collaboration meeting;
storing identities of content shared amongst the multiple participants during the on-line collaboration meeting;
generating an access policy based on identities of the multiple participants and the content shared amongst the multiple participants during the on-line collaboration meeting; and
utilizing the access policy to prevent unauthorized access to the content shared amongst the multiple participants during the on-line collaboration meeting.
2 Assignments
0 Petitions
Accused Products
Abstract
According to example configurations as described herein, an on-line conference management application receives an indication of multiple participants that attend an on-line collaboration meeting. The conference management system stores identities of content shared amongst the multiple participants during the on-line collaboration meeting. Based on identities of the multiple participants and shared content, the conference management system generates an access policy. Subsequent to termination of the on-line collaboration meeting, the conference management system utilizes the access policy to prevent unauthorized access to the shared content. For example, the conference management system can receive a request from a user to access the shared content. The management system checks to determine whether the user was a participant at the on-line collaboration meeting. Responsive to detecting that the user attended the on-line collaboration meeting as specified by the access policy, the management system can provide access to the particular document to the user.
-
Citations
25 Claims
-
1. A method comprising:
-
receiving an indication of multiple participants who participated in an online collaboration meeting; storing identities of content shared amongst the multiple participants during the on-line collaboration meeting; generating an access policy based on identities of the multiple participants and the content shared amongst the multiple participants during the on-line collaboration meeting; and utilizing the access policy to prevent unauthorized access to the content shared amongst the multiple participants during the on-line collaboration meeting. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 25)
-
-
15. A non-transitory computer-readable storage medium having instructions stored thereon for processing data information, such that the instructions, when carried out by a processing device, enable the processing device to perform operations of:
-
receiving an indication of multiple participants attending an on-line collaboration meeting; storing identities of content shared amongst the multiple participants during the on-line collaboration meeting; generating an access policy based on identities of the multiple participants and the content shared amongst the multiple participants during the on-line collaboration meeting; and utilizing the access policy to prevent unauthorized access to the content subsequent to the on-line collaboration meeting. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer system comprising:
-
a processor; a memory unit that stores instructions associated with an application executed by the processor; and an interconnect coupling the processor and the memory unit, enabling the computer system to execute the application and perform operations of; receiving an indication of multiple participants attending an on-line collaboration meeting; storing identities of content shared amongst the multiple participants during the on-line collaboration meeting; generating an access policy based on identities of the multiple participants and the content shared amongst the multiple participants during the on-line collaboration meeting; and utilizing the access policy to prevent unauthorized access to the content subsequent to the on-line collaboration meeting.
-
Specification