IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
UP-0201756
(2002-07-22)
|
등록번호 |
US-7729995
(2010-06-22)
|
발명자
/ 주소 |
- Alain, Rossmann
- Zuili, Patrick
- Ouye, Michael Michio
- Humpich, Serge
- Lee, Chang-Ping
- Vainstein, Klimenty
- Hilderbrand, Hal
- Garcia, Denis Jacques Paul
- Supramaniam, Senthilvasan
- Huang, Weiqing
- Ryan, Nicholas Michael
|
대리인 / 주소 |
Sterne, Kessler, Goldstein & Fox PLLC
|
인용정보 |
피인용 횟수 :
29 인용 특허 :
314 |
초록
▼
Techniques for managing files in a designated location are disclosed. An example of the designated location is a folder, a directory, a repository, a device, or a storage place. A set of access rules is applied to a designated location such that all files in the designated location shall have substa
Techniques for managing files in a designated location are disclosed. An example of the designated location is a folder, a directory, a repository, a device, or a storage place. A set of access rules is applied to a designated location such that all files in the designated location shall have substantially similar security. As a result, secured files can be easily created and managed with respect to the designated location and users with access privilege to the designated location can access most of the files, in not all, in the designated location.
대표청구항
▼
We claim: 1. A method for managing files stored in a designated storage location, the method comprising: identifying the designated storage location, wherein the designated storage location is one or more of a computing device, a storage device, a computer readable medium, or a memory, wherein the
We claim: 1. A method for managing files stored in a designated storage location, the method comprising: identifying the designated storage location, wherein the designated storage location is one or more of a computing device, a storage device, a computer readable medium, or a memory, wherein the designated storage location is known to at least one requestor, wherein the requester is one or more of a user, a group of users, a software agent, or a client machine associated with a requester; determining access rules for the designated storage location, wherein the designated storage location is accessible by the at least one requestor, and wherein the designated storage location is remote from a location at which the at least one requestor attempts to access the files; and applying the access rules to the designated storage location such that the files stored in the designated storage location have substantially similar security. 2. The method of claim 1, wherein determining the access rules includes receiving input through a graphic user interface that is configured to display providing preferences to control restrictive access to data. 3. The method of claim 2, further comprising storing parameters determining the access rules in a data file associated with the designated storage location. 4. The method of claim 3, wherein applying the access rules further comprises: retrieving the data file when a file is ready to be stored in the designated storage location; and formulating the access rules for the file with respect to the parameters in the data file. 5. The method of claim 4, further comprising expressing the access rules in a markup language. 6. The method of claim 5, wherein expressing the access rules in a markup language includes expressing the access rules in Extensible Access Control Markup Language. 7. The method of claim 5, wherein expressing the access rules includes expressing the access rules using a markup language that is selected from the group consisting of Hyper Text Markup Language (HTML), Extensible Markup Language (XML) and Standard Generalized Markup Language (SGML). 8. The method of claim 4, wherein retrieving the data file includes retrieving a data file that includes a header, the header further including security information as to who and how the data file can be accessed and an encrypted data portion. 9. The method of claim 8, wherein retrieving the data file includes retrieving a data file that contains security information includes the access rules. 10. The method of claim 8, further comprising encrypting the access rules in the security information with a key associated with a user who has placed the data file in the designated storage location. 11. The method of claim 3, wherein applying the access rules comprises: creating the data file; and associating the data file with the designated storage location. 12. The method of claim 1, wherein identifying the designated storage location identifies one of (i) a folder, (ii) a directory, (iii) a repository, (iv) a device, or (v) a storage place within the computing device, the storage device, the computer readable medium, or the memory. 13. A tangible computer readable medium having computer program code stored thereon, that in response to execution by a computing device, causes the computing device to manage secured files stored in a designated storage location by a method, the method comprising: identifying the designated storage location, wherein the designated storage location is one or more of a computing device, a storage device, a computer readable medium, or a memory, wherein the designated storage location is known to at least one requestor, wherein the requestor is one or more of a user, a group of users, a software agent, or a client machine associated with a requestor; determining access rules for the designated storage location, wherein the designated storage location is accessible by the at least one requestor, and wherein the designated storage location is remote from a location at which the at least one requestor attempts to access the files; and applying the access rules to the designated storage location such that the files stored in the designated storage location have substantially similar security. 14. The computer readable medium of claim 13, wherein the computer program code is configured to cause presentation of a graphic user interface, wherein the graphic user interface is further configured to enable determination of the access rules. 15. The computer readable medium of claim 13, wherein the computer program code is configured to cause parameters determining the access rules to be stored in a data file associated with the designated storage location. 16. The computer readable medium of claim 15, wherein applying the access rules further comprises: retrieving the data file when a file is ready to be stored in the designated storage location; and formulating the access rules for the file with respect to the parameters in the data file. 17. The computer readable medium of claim 16, wherein the computer program code is configured to express the access rules in a markup language. 18. The computer readable medium of claim 17, wherein the computer program code is configured to express the access rules in Extensible Access Control Markup Language. 19. The computer readable medium of claim 17, wherein the computer program code is configured to express the access rules in a markup language that is selected from the group consisting of HTML, XML and SGML. 20. The computer readable medium of claim 17, wherein the data file includes a header including security information as to who and how the file can be accessed and an encrypted data portion. 21. The computer readable medium of claim 20, wherein the security information includes the access rules. 22. The computer readable medium of claim 21, wherein the access rules in the security information are encrypted with a key associated with a user who has placed the file in the designated storage location. 23. The computer readable medium of claim 15, wherein applying the access rules comprises: creating the data file; and associating the data file with the designated storage location. 24. A computer implemented method for managing files stored in a designated storage location, comprising: creating the designated storage location in a store, wherein the store comprises one or more computing devices, storage devices, computer readable media, or memories; determining, by a computer, access rules for the designated storage location accessible, wherein the access rules specify one or more designated requestors permitted to access the files in the designated storage location, wherein the one or more designated requestors are one or more of a user, a group of users, a software agent, or a client machine associated with a requestor; applying the access rules to the designated storage location such that the files stored in the designated storage location have substantially similar security, wherein the access rules are stored in a data file associated with the designated storage location, wherein the designated storage location is remote from a location at which the one or more designated s requestors attempt to access the files; and associating the files in the designated storage location with respective security information controlling restrictive access thereto, wherein the respective security information in the files includes respective instances of the access rules. 25. The computer implemented method of claim 24, wherein determining access rules includes specifying the access rules in a markup language. 26. The computer implemented method of claim 24, further comprising encrypting the access rules in the security information of one of the files in the designated storage location with a key associated with a requestor who placed the file in the designated storage location.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.