Item sharing based on information boundary and access control list settings
First Claim
1. A computing device configured to share an item based on information boundary and access control list settings, the computing device comprising:
- a memory configured to store one or more instructions; and
a processor coupled to the memory and configured to execute an item management application, wherein the item management application is configured to;
detect a first selection of an information boundary to manage a sharing action associated with the item;
provide a user interface of the item management application to enable selection of one or more access rules associated with the information boundary to define the information boundary, wherein the one or more access rules are displayed through the user interface in a sorted format from a most restrictive access rule to a least restrictive access rule;
detect a second selection of an access control list to manage recipients who have an access to the item;
detect the sharing action to share the item;
apply the information boundary and the access control list to the item;
share the item based on the information boundary and the access control list by transmitting a link to the item to the recipients in the access control list; and
in response to a determination that the link was transmitted to an additional recipient that is not in the access control list;
detect an attempt by the additional recipient to access the item through the link;
determine whether the additional recipient is allowed to access the item based on the information boundary; and
in response to a determination that the additional recipient is allowed to access the item based on the information boundary, add the additional recipient to the access control list such that the additional recipient is enabled to search and discover the item through a user interface of the item management application.
1 Assignment
0 Petitions
Accused Products
Abstract
An item is shared based on an information boundary and access control settings. An application such as a document management application detects a selection of an information boundary to manage a sharing action associated with the item. The information boundary includes rules to define how the item is shared. A selection of an access control list is also detected to manage recipients who have an access to the item. The access control list allows a recipient in the list an ability to search and discover the item. In response to a detection of the sharing action to share the item, the information boundary and the access control list is applied to the item. The item is then shared based on the information boundary and the access control list through a link of the item transmitted to a recipient.
-
Citations
19 Claims
-
1. A computing device configured to share an item based on information boundary and access control list settings, the computing device comprising:
-
a memory configured to store one or more instructions; and a processor coupled to the memory and configured to execute an item management application, wherein the item management application is configured to; detect a first selection of an information boundary to manage a sharing action associated with the item; provide a user interface of the item management application to enable selection of one or more access rules associated with the information boundary to define the information boundary, wherein the one or more access rules are displayed through the user interface in a sorted format from a most restrictive access rule to a least restrictive access rule; detect a second selection of an access control list to manage recipients who have an access to the item; detect the sharing action to share the item; apply the information boundary and the access control list to the item; share the item based on the information boundary and the access control list by transmitting a link to the item to the recipients in the access control list; and in response to a determination that the link was transmitted to an additional recipient that is not in the access control list; detect an attempt by the additional recipient to access the item through the link; determine whether the additional recipient is allowed to access the item based on the information boundary; and in response to a determination that the additional recipient is allowed to access the item based on the information boundary, add the additional recipient to the access control list such that the additional recipient is enabled to search and discover the item through a user interface of the item management application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method to employ context-based inference to share an item based on information boundary and access control list settings, the method comprising:
-
detecting a first selection of an information boundary to manage a sharing action associated with the item, wherein the information boundary includes one or more access rules associated with the item; providing a user interface of an item management application to enable selection of one or more access rules associated with the information boundary to define the information boundary, wherein the one or more access rules are displayed through the user interface in a sorted format from a most restrictive access rule to a least restrictive access rule; detecting a second selection of an access control list to manage recipients who have an access to the item; detecting the sharing action to share the item; applying the information boundary and the access control list to the item; sharing the item based on the information boundary and the access control list by transmitting a link to the item to a selected recipient that is in the access control list; and in response to a determination that the link was transmitted to an additional recipient that is not in the access control list; detecting an attempt by the additional recipient to access the item through the link; determining whether the additional recipient is allowed to access the item based on the information boundary; and in response to a determination that the additional recipient is allowed to access the item based on the information boundary, adding the additional recipient to the access control list such that the additional recipient is enabled to search and discover the item through a user interface of the item management application. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A computer-readable memory device with instructions stored thereon to share an item based on information boundary and access control list settings, the instructions comprising:
-
detecting a first selection of an information boundary to manage a sharing action associated with the item, wherein the information boundary includes one or more access rules associated with the item; providing a user interface of an item management application to enable selection of at least one of the one or more access rules to define the information boundary, wherein the one or more access rules are displayed through the user interface in a sorted format from a most restrictive access rule to a least access restrictive rule; detecting a second selection of an access control list to manage recipients who have an access to the item; detecting the sharing action to share the item; applying the information boundary and the access control list to the item; sharing the item based on the information boundary and the access control list by transmitting a link to the item to a selected recipient that is in the access control list; and in response to a determination that the link was transmitted to an additional recipient that is not in the access control list; detecting an attempt by the additional recipient to access the item through the link; determining whether the additional recipient is allowed to access the item based on the information boundary; and in response to a determination that the additional recipient is allowed to access the item based on the information boundary, adding the additional recipient to the access control list such that the additional recipient is enabled to search and discover the item through a user interface of the item management application. - View Dependent Claims (18, 19)
-
Specification