Managing secured files in designated locations
First Claim
Patent Images
1. A method for managing files stored in a designated storage location, the method comprising:
- identifying the designated storage location, wherein the designated storage location is one or more of a computing device, a storage device, a computer readable medium, or a memory, wherein the designated storage location is known to at least one requestor, wherein the requester is one or more of a user, a group of users, a software agent, or a client machine associated with a requester;
determining access rules for the designated storage location, wherein the designated storage location is accessible by the at least one requestor, and wherein the designated storage location is remote from a location at which the at least one requestor attempts to access the files; and
applying the access rules to the designated storage location such that the files stored in the designated storage location have substantially similar security.
7 Assignments
0 Petitions
Accused Products
Abstract
Techniques for managing files in a designated location are disclosed. An example of the designated location is a folder, a directory, a repository, a device, or a storage place. A set of access rules is applied to a designated location such that all files in the designated location shall have substantially similar security. As a result, secured files can be easily created and managed with respect to the designated location and users with access privilege to the designated location can access most of the files, in not all, in the designated location.
-
Citations
26 Claims
-
1. A method for managing files stored in a designated storage location, the method comprising:
-
identifying the designated storage location, wherein the designated storage location is one or more of a computing device, a storage device, a computer readable medium, or a memory, wherein the designated storage location is known to at least one requestor, wherein the requester is one or more of a user, a group of users, a software agent, or a client machine associated with a requester; determining access rules for the designated storage location, wherein the designated storage location is accessible by the at least one requestor, and wherein the designated storage location is remote from a location at which the at least one requestor attempts to access the files; and applying the access rules to the designated storage location such that the files stored in the designated storage location have substantially similar security. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A tangible computer readable medium having computer program code stored thereon, that in response to execution by a computing device, causes the computing device to manage secured files stored in a designated storage location by a method, the method comprising:
-
identifying the designated storage location, wherein the designated storage location is one or more of a computing device, a storage device, a computer readable medium, or a memory, wherein the designated storage location is known to at least one requestor, wherein the requestor is one or more of a user, a group of users, a software agent, or a client machine associated with a requestor; determining access rules for the designated storage location, wherein the designated storage location is accessible by the at least one requestor, and wherein the designated storage location is remote from a location at which the at least one requestor attempts to access the files; and applying the access rules to the designated storage location such that the files stored in the designated storage location have substantially similar security. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer implemented method for managing files stored in a designated storage location, comprising:
-
creating the designated storage location in a store, wherein the store comprises one or more computing devices, storage devices, computer readable media, or memories; determining, by a computer, access rules for the designated storage location accessible, wherein the access rules specify one or more designated requestors permitted to access the files in the designated storage location, wherein the one or more designated requestors are one or more of a user, a group of users, a software agent, or a client machine associated with a requestor; applying the access rules to the designated storage location such that the files stored in the designated storage location have substantially similar security, wherein the access rules are stored in a data file associated with the designated storage location, wherein the designated storage location is remote from a location at which the one or more designated s requestors attempt to access the files; and associating the files in the designated storage location with respective security information controlling restrictive access thereto, wherein the respective security information in the files includes respective instances of the access rules. - View Dependent Claims (25, 26)
-
Specification