EMAIL EFFECTIVITY FACILTY IN A NETWORKED SECURE COLLABORATIVE EXCHANGE ENVIRONMENT
First Claim
1. A method for managing access to a secure exchange environment managed by an intermediate business entity, the method comprising:
- establishing a secure exchange server hosted by an intermediate business entity, wherein communications and access to a collection of files established by a first business entity are managed to allow conditional secure access to resources of the collection of files by individuals of a second business entity different than the first business entity; and
establishing an email effectivity facility, managed by the secure exchange server, that allows a user of the first business entity to specify conditions for email-based access by a designated individual of the second business entity to at least one resource in the collection of files of the first business entity,wherein an access permission is assigned using at least one individual user email identity including at least one specific email account of the designated individual of the second business entity, andwherein the conditions for email-based access permit access, viewing, and editing of the collection of files stored on a computer device of the designated individual while the computing device is disconnected from a communication network.
6 Assignments
0 Petitions
Accused Products
Abstract
In embodiments of the present invention improved capabilities are described for managing access to a secure exchange environment managed by an intermediate business entity through a user email identity, the method comprising establishing a secure exchange server hosted by an intermediate business entity, wherein communications and access to a collection of files established by a first business entity are managed for a second business entity; and establishing an email effectivity facility that allows a user of the first business entity to specify a condition for email-based access to at least one resource in the collection of files, wherein the condition expresses (a) an effective period for using an email providing access to the resource and (b) a condition of email access to the resource by a designated individual of the second business entity, wherein the access permission was assigned using a specific email address of the designated individual.
20 Citations
24 Claims
-
1. A method for managing access to a secure exchange environment managed by an intermediate business entity, the method comprising:
-
establishing a secure exchange server hosted by an intermediate business entity, wherein communications and access to a collection of files established by a first business entity are managed to allow conditional secure access to resources of the collection of files by individuals of a second business entity different than the first business entity; and establishing an email effectivity facility, managed by the secure exchange server, that allows a user of the first business entity to specify conditions for email-based access by a designated individual of the second business entity to at least one resource in the collection of files of the first business entity, wherein an access permission is assigned using at least one individual user email identity including at least one specific email account of the designated individual of the second business entity, and wherein the conditions for email-based access permit access, viewing, and editing of the collection of files stored on a computer device of the designated individual while the computing device is disconnected from a communication network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for managing access to a secure exchange environment managed by an intermediate business entity, the method comprising:
-
establishing a secure exchange server hosted by an intermediate business entity, wherein communications and access to a collection of files established by a first business entity are managed to allow conditional secure access to resources of the collection of files by individuals of a second business entity different than the first business entity; and establishing an email effectivity facility, managed by the secure exchange server, that allows a user of the first business entity to specify conditions for email-based access by a designated individual of the second business entity to at least one resource in the collection of files of the first business entity, wherein an access permission is assigned using at least one individual user email identity including at least one specific email account of the designated individual of the second business entity, and wherein the conditions for email-based access permit rendering files of the collection of files as actively rendered documents from the secure exchange server to a computer device of the designated individual through a rendering viewer on the computer device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method for managing access to a secure exchange environment managed by an intermediate business entity, the method comprising:
-
establishing a secure exchange server hosted by an intermediate business entity, wherein communications and access to a collection of files established by a first business entity are managed to allow conditional secure access to resources of the collection of files by individuals of a second business entity different than the first business entity; and establishing an email effectivity facility, managed by the secure exchange server, that allows a user of the first business entity to specify conditions for email-based access by a designated individual of the second business entity to at least one resource in the collection of files of the first business entity, wherein the specified conditions include the ability to revoke access to the at least one resource after the at least one resource has been downloaded to a computing device by the designated individual; and assigning an access permission using at least one individual user email identity including at least one specific email account of the designated individual of the second business entity. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification