Method and system for enabling users of a group shared across multiple file security systems to access secured files
First Claim
Patent Images
1. A computer-implemented method for interacting between file security systems, the method comprising:
- creating, using a computing device, a first shared group at a first file security system;
creating, using the computing device, a second shared group at a second file security system;
permitting one or more users of the first file security system to be within the second shared group;
permitting one or more users of the second file security system to be within the first shared group;
creating, using the computing device, a third shared group; and
permitting one or more users who are within both the first and second shared groups to be within the third shared group.
4 Assignments
0 Petitions
Accused Products
Abstract
Improved system and approaches for permitting users of different organizations to access secured files (e.g., documents) are disclosed. These users can be part of a group that is shared across a plurality of file security systems. For example, at a first file security system, a user of the shared group can secure a file for restricted access by those users within the shared group. Subsequently, at a different file security system, another user of the shared group is able to access the content of the secured file.
315 Citations
19 Claims
-
1. A computer-implemented method for interacting between file security systems, the method comprising:
-
creating, using a computing device, a first shared group at a first file security system; creating, using the computing device, a second shared group at a second file security system; permitting one or more users of the first file security system to be within the second shared group; permitting one or more users of the second file security system to be within the first shared group; creating, using the computing device, a third shared group; and permitting one or more users who are within both the first and second shared groups to be within the third shared group. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer readable storage medium including at least computer program code for interacting between file security systems, the computer readable medium comprising:
-
computer program code enabling a processor to create a first shared group at a first file security system; computer program code enabling a processor to create a second shared group at a second file security system; computer program code enabling a processor to permit one or more users of the first file security system to be within the second shared group; computer program code enabling a processor to permit one or more users of the second file security system to be within the first shared group; computer program code enabling a processor to create a third shared group; and computer program code enabling a processor to permit one or more users who are within both the first and second shared groups to be within the third shared group.
-
-
12. A method for restricting access to electronic files, the method comprising:
-
receiving, at a computing device, respective requests from a first requestor being a member of a first group and a second requestor being a member of a second group requesting access to a security system, one of the first and second requestor being associated with the security system, the security system being accessible by a shared group including at least one member from each of the first group and the second group; verifying, using the computing device, authentication information from the first and second requestor to determine if they are part of the shared group; and allowing respective ones of the first and second requestors access to the security system upon successful verification they are part of the shared group. - View Dependent Claims (13, 14)
-
-
15. A computer-readable storage medium comprising computer program code enabling a computing device to perform a method for restricting access to electronic files, the method comprising:
-
receiving respective requests from a first requestor being a member of a first group and a second requestor being a member of a second group requesting access to a security system, one of the first and second requestor being associated with the security system, the security system being accessible by a shared group including at least one member from each of the first group and the second group; verifying authentication information from the first and second requestor to determine if they are part of the shared group; and allowing respective ones of the first and second requestors access to the security system upon successful verification they are part of the shared group.
-
-
16. A system that restricts access to electronic files, comprising:
-
a computing device comprising; a processor; and a memory; wherein the computing device is capable of receiving respective requests from a first requestor being a member of a first group and a second requestor being a member of a second group requesting access to the security system, one of the first and second requestor being associated with the security system, the security system being accessible by a shared group including at least one member from each of the first group and the second group; and wherein the computing device is capable of verifying authentication information from the first and second requestor to determine if they are part of the shared group, wherein respective ones of the first and second requestors are allowed access to the security system upon successful verification they are part of the shared group. - View Dependent Claims (17, 18, 19)
-
Specification