Email effectivity facility in a networked secure collaborative exchange environment
First Claim
1. A method for managing access to a secure exchange environment managed by an intermediate business entity, the method comprising:
- establishing a secure exchange server hosted by an intermediate business entity, wherein communications and access to a collection of files established by a first business entity are managed to allow conditional secure access to resources of the collection of files by individuals of a second business entity different than the first business entity; and
establishing an email effectivity facility, managed by the secure exchange server, that allows a user of the first business entity to specify conditions for email-based access by a designated individual of the second business entity to at least one resource in the collection of files of the first business entity through an embedded link in an email message provided by the email effectivity facility to the designated individual of the second business entity, wherein the conditions include (a) an effective period for using the embedded link to provide access to the at least one resource and (b) an event condition of email access to the resource by the designated individual of the second business entity,wherein an access permission is assigned using at least one individual user email identity including at least one specific email account of the designated individual of the second business entity, and wherein the email effectivity facility provides access confirmation to allow access to the at least one resource if the conditions are met.
8 Assignments
0 Petitions
Accused Products
Abstract
In embodiments of the present invention improved capabilities are described for managing access to a secure exchange environment managed by an intermediate business entity through a user email identity, the method comprising establishing a secure exchange server hosted by an intermediate business entity, wherein communications and access to a collection of files established by a first business entity are managed for a second business entity; and establishing an email effectivity facility that allows a user of the first business entity to specify a condition for email-based access to at least one resource in the collection of files, wherein the condition expresses (a) an effective period for using an email providing access to the resource and (b) a condition of email access to the resource by a designated individual of the second business entity, wherein the access permission was assigned using a specific email address of the designated individual.
-
Citations
18 Claims
-
1. A method for managing access to a secure exchange environment managed by an intermediate business entity, the method comprising:
-
establishing a secure exchange server hosted by an intermediate business entity, wherein communications and access to a collection of files established by a first business entity are managed to allow conditional secure access to resources of the collection of files by individuals of a second business entity different than the first business entity; and establishing an email effectivity facility, managed by the secure exchange server, that allows a user of the first business entity to specify conditions for email-based access by a designated individual of the second business entity to at least one resource in the collection of files of the first business entity through an embedded link in an email message provided by the email effectivity facility to the designated individual of the second business entity, wherein the conditions include (a) an effective period for using the embedded link to provide access to the at least one resource and (b) an event condition of email access to the resource by the designated individual of the second business entity, wherein an access permission is assigned using at least one individual user email identity including at least one specific email account of the designated individual of the second business entity, and wherein the email effectivity facility provides access confirmation to allow access to the at least one resource if the conditions are met. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification