发明名称 Item sharing based on information boundary and access control list settings
摘要 An item is shared based on an information boundary and access control settings. An application such as a document management application detects a selection of an information boundary to manage a sharing action associated with the item. The information boundary includes rules to define how the item is shared. A selection of an access control list is also detected to manage recipients who have an access to the item. The access control list allows a recipient in the list an ability to search and discover the item. In response to a detection of the sharing action to share the item, the information boundary and the access control list is applied to the item. The item is then shared based on the information boundary and the access control list through a link of the item transmitted to a recipient.
申请公布号 US9384337(B1) 申请公布日期 2016.07.05
申请号 US201514697540 申请日期 2015.04.27
申请人 Microsoft Technology Licensing, LLC 发明人 Sirbu Alin;DeMaris John Lincoln;Pasch Mary David;Shallcross Zachary;Burst Alexandru;Rayson Steve;Van Waardhuizen Michael
分类号 G06F17/30;G06F21/31 主分类号 G06F17/30
代理机构 代理人 Akhter Julie Kane;Chinagudabha Raghu;Minhas Micky
主权项 1. A computing device configured to share an item based on information boundary and access control list settings, the computing device comprising: a memory configured to store one or more instructions; and a processor coupled to the memory and configured to execute an item management application, wherein the item management application is configured to: detect a first selection of an information boundary to manage a sharing action associated with the item;provide a user interface of the item management application to enable selection of one or more access rules associated with the information boundary to define the information boundary, wherein the one or more access rules are displayed through the user interface in a sorted format from a most restrictive access rule to a least restrictive access rule;detect a second selection of an access control list to manage recipients who have an access to the item;detect the sharing action to share the item;apply the information boundary and the access control list to the item;share the item based on the information boundary and the access control list by transmitting a link to the item to the recipients in the access control list; andin response to a determination that the link was transmitted to an additional recipient that is not in the access control list: detect an attempt by the additional recipient to access the item through the link;determine whether the additional recipient is allowed to access the item based on the information boundary; andin response to a determination that the additional recipient is allowed to access the item based on the information boundary, add the additional recipient to the access control list such that the additional recipient is enabled to search and discover the item through a user interface of the item management application.
地址 Redmond WA US
您可能感兴趣的专利