METHOD AND SYSTEM FOR MANAGING USER SECURITY PERMISSIONS FOR ACCESS TO RESOURCES
First Claim
1. A computer implemented method of managing user security permissions for access to resources that are provided by providers, to participate in a designated task or conversation relating to the resources, and are accessible over a communications network, the method including:
- assembling resources relating to the designated task or the conversation into a collection;
allocating security permissions for users to access said resources in the collection over the network based on whether the users are active or passive participants in the task or the conversation, whereby the active participants have been invited to participate in the task or the conversation and the passive participants have not been invited to participate in the task or the conversation; and
communicating the security permissions allocated for each of the users to access said resources in the collection to the providers of the resources, such that the providers set the security permissions for each of the users to access the resources.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed is a method and system of managing user security permissions for access to resources accessible over a communications network, to participate in a designated task or conversation relating to the resources. The method and system include: assembling resources relating to the designated task or conversation into a collection and allocating security permissions for users to access said resources in the collection over the network based on whether the users are active or passive participants in the task or the conversation. Active participants have been invited to participate in the task or the conversation and passive participants have not been invited to participate in the task or the conversation, and security permissions allocated for each of the users to access said resources in the collection to the providers of the resources are communicated, such that the providers set the security permissions for each of the users to access the resources.
-
Citations
15 Claims
-
1. A computer implemented method of managing user security permissions for access to resources that are provided by providers, to participate in a designated task or conversation relating to the resources, and are accessible over a communications network, the method including:
-
assembling resources relating to the designated task or the conversation into a collection; allocating security permissions for users to access said resources in the collection over the network based on whether the users are active or passive participants in the task or the conversation, whereby the active participants have been invited to participate in the task or the conversation and the passive participants have not been invited to participate in the task or the conversation; and communicating the security permissions allocated for each of the users to access said resources in the collection to the providers of the resources, such that the providers set the security permissions for each of the users to access the resources. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 14, 15)
-
-
13. A system for managing user security permissions for access to resources that are provided by providers, to participate in a designated task or conversation relating to the resources, and are accessible over a communications network, the system including a controller implementing:
-
a collection module for assembling resources relating to the designated task or the conversation into a collection; a security module for allocating security permissions for users to access said resources in the collection over the network based on whether the users are active or passive participants in the task or the conversation, whereby the active participants have been invited to participate in the task or the conversation and the passive participants have not been invited to participate in the task or the conversation; and an output module for communicating the security permissions allocated for each of the users to access said resources in the collection to the providers of the resources, such that the providers set the security permissions for each of the users to access the resources.
-
Specification