VALIDATION OF A LOCATION RESOURCE BASED ON RECIPIENT ACCESS
First Claim
1. A method comprising:
- receiving, by a computing node in a distributed computing environment and from a messaging application on a remote client computer, an identifier of a user profile of a user and a location resource that is embedded in a message and that indicates a path to a computing resource outside of the remote client computer;
querying a repository in the distributed computing environment to obtain access permission information about the location resource;
determining, based upon the access permission information about the location resource and the user profile, whether the user has permission to access the location resource; and
communicating, visually using the messaging application, the permission to a sender prior to the sender sending the message to the user.
2 Assignments
0 Petitions
Accused Products
Abstract
Aspects of the present disclosure relate to a method, a system, and a computer program product for validating a location resource, e.g., a hyperlink, embedded in a message for one or more recipients. The method includes receiving, by a computing node in a distributed computing environment and from a messaging application on a remote client computer, an identifier of a user profile and a location resource. The location resource is embedded in a message and that indicates a path to a computing resource outside of the remote client computer. The method also includes querying a repository in the distributed computing environment to obtain access permission information about the location resource. The method also includes determining, based upon the access permission information about the location resource, whether the user profile has access permission for the location resource.
-
Citations
19 Claims
-
1. A method comprising:
-
receiving, by a computing node in a distributed computing environment and from a messaging application on a remote client computer, an identifier of a user profile of a user and a location resource that is embedded in a message and that indicates a path to a computing resource outside of the remote client computer; querying a repository in the distributed computing environment to obtain access permission information about the location resource; determining, based upon the access permission information about the location resource and the user profile, whether the user has permission to access the location resource; and communicating, visually using the messaging application, the permission to a sender prior to the sender sending the message to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system, comprising:
-
a remote client computer that includes; a messaging application configured to; send a message to one or more recipients with a location resource that is embedded in the message and that indicates a path to a computing resource outside of the remote client computer, and communicate, visually, permission to access the location resource by the one or more recipients of the message to a sender prior to the sender sending the message to the one or more recipients, the one or more recipients including a first recipient; a distributed computing environment that includes; a repository of the location resource with access permission information for a user profile associated with the first recipient; and a processing engine, hosted by a computing node in the distributed computing environment, configured to; receive, from the messaging application, the location resource and the user profile of the first recipient, query, within the repository in the distributed computing environment, the location resource, and determine, based on an identifier of the user profile and the access permission information, whether the first recipient has the permission to access the location resource. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A computer program product comprising a computer readable storage device having a computer readable program stored therein, wherein the computer readable program, when executed on a computing device, causes the computing device to:
-
receive, by a computing node in a distributed computing environment and from a messaging application on a remote client computer, an identifier of a user profile of a user and a location resource that is embedded in a message and that indicates a path to a computing resource outside of the remote client computer; query a repository in the distributed computing environment to obtain access permission information about the location resource; determine, based upon the access permission information about the location resource and the user profile, whether the user has permission to access the location resource; communicate, visually using the messaging application, the permission to a sender prior to the sender sending the message to the user. - View Dependent Claims (18, 19)
-
Specification