CN104335222A - A method and apparatus for requesting access to files - Google Patents

A method and apparatus for requesting access to files Download PDF

Info

Publication number
CN104335222A
CN104335222A CN201280072218.7A CN201280072218A CN104335222A CN 104335222 A CN104335222 A CN 104335222A CN 201280072218 A CN201280072218 A CN 201280072218A CN 104335222 A CN104335222 A CN 104335222A
Authority
CN
China
Prior art keywords
owner
access rights
user
expression
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201280072218.7A
Other languages
Chinese (zh)
Inventor
雅各布·费特尔松
奥哈德·科尔库斯
戴维·巴斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Varonis Systems Inc
Original Assignee
Varonis Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Varonis Systems Inc filed Critical Varonis Systems Inc
Publication of CN104335222A publication Critical patent/CN104335222A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy

Abstract

A method for requesting access rights for an object of a computerized system comprising installing in the computerized system a code that associates an object with an owner of the object, thereby enabling to automatically request access rights for the object from an owner of the object, and an apparatus for performing the same.

Description

For the method and apparatus of request access file
Technical field
The disclosure relates in general to the authority of request access file, relates more specifically in the authority organizing request access file in enterprise.
Background technology
Generally organizing in enterprise, certain user has access rights and other users do not have access rights, and there is such a case, and when user wishes access file, this user does not have access rights.
Such as, U.S. Patent Publication No. US2007/0244899 method and system proposed for dispersion user data access authority control behavior in the tissue of networking.
Summary of the invention
An exemplary embodiment of theme of the present disclosure is the method for the access rights for asking the object to computerized system, comprise: in computerized system, code is installed, this code makes the owner of object and described object be associated, thus can from the access rights of owner's request to described object of object described in trend, wherein, the method is computer-implemented by least one in described computerized system.
Another exemplary embodiment of theme of the present disclosure is the device of the access rights for request object, comprise: at least one computing machine, it has program, described application configuration has the code owner of object and described object be associated, thus can from the access rights of owner's request to described object of object described in trend; And indicating equipment.
In text of the present disclosure, be not limited to this, term " enterprise " represents computerized system, comprise multiple computing machine intercomed mutually, and have and/or shared data-carrier store, wherein said enterprise also can be described as " computerized system ", and the storage of described data also can be used as " storer ".
Communication between computing machine can be direct and/or indirectly.Described data-carrier store comprises one or more data storage device.
Usually but not as restriction ground, enterprise comprises the multiple computing machines of scope between about 10 computing machines and more than about 1000 computing machines.Optionally, enterprise comprises and is less than 10 computing machines, does not get rid of and has such as a computing machine of mainframe computer.
Not as restriction ground, in text of the present disclosure, about enterprise, term " object " represents data object, and such as file or folder is stored in the storer of enterprise, also referred to as the object of enterprise.
In text of the present disclosure, not as restriction ground, term " user " or " operator " represent individual, and/or represent the procedure operation of this individual, and it uses the resource of enterprise, the computing machine of such as enterprise.User or operator are also called the user of enterprise or the operator of enterprise.
In text of the present disclosure, not as restriction ground, term " access rights " or " authority " or " sufficient authority " represent that user accesses the mandate of the object of enterprise, and insufficient authority represents the mandate of not accessing described object, such as, be used for opening or arrive this object to browse.Relate to the mandate that general or common license represents any kind, sufficient authority and/or insufficient authority may be comprised.
Usually but not as restriction ground, authorize and perhaps can, and/or other attributes of object are such as classified, arrange by the supvr of enterprise or keeper and/or by the object owner of enterprise and/or the operator (also referred to as power user or keeper) with special advanced authorization.
In text of the present disclosure, not as restriction ground, term " owner of object " represents that user has mandate for object and/or access rights, and therefore he or she can grant or authorize the user not having an abundant authority for this object to access described object.Not as restriction ground, the owner of representative object and authorize the individual operating or operating of the authority for granting this object and/or program and/or any entity to be also considered or as the owner.Described access can be authorized on ad hoc basis or any other basis such as time restriction, the permanent basis relying on user.
In text of the present disclosure, not conduct restriction ground, about arriving operation, term " expediently " or " easily " expression automatically perform operation at least in part, thus get rid of and/or remove specific manual action.
The wherein above-mentioned term quoted also changeable type and change.
Accompanying drawing explanation
Accompanying drawings illustrate some non-restrictive illustrative embodiment or the feature of open theme.
Occur that same or that copy or equivalent or similar structure, element or parts in one or more of the drawings generally mark with same Reference numeral, the modification of object like region class or object is carried out alternatively with additional letter, and not duplicate marking and/or description.
In accompanying drawing, the size of illustrated assembly and feature is that convenience for representing or clearness are selected, and must not show in proportion or show in real ratio.For convenience or clearness, some element or structure do not illustrate or only part illustrates and/or has different views in different viewpoints.
With reference to the element that exists before and not necessarily quotes the drawing and description that it occurred further.
Accompanying drawing 1 schematically illustrates the enterprise comprising one or more computing machine of the exemplary embodiment according to disclosure theme, represents the computing machine of arbitrary number with three computing machines;
Accompanying drawing 2 schematically illustrates the display of the tree structure according to the object in the enterprise of the exemplary embodiment of disclosure theme, and for the ejection dialog box of authority request;
Accompanying drawing 3A summarises access rights solicit operation user not being possessed to the object of access rights of the exemplary embodiment according to disclosure theme; And
Accompanying drawing 3B summarises the access rights solicit operation by user, it not being possessed to the object of access rights of the exemplary embodiment according to disclosure theme.
Embodiment
Usually, before disclosure theme, when the user operating business equipment runs into the object in enterprise, such as when object search or when exploring the tree structure of object, if user does not have the access rights of this object, this user must contact the owner of this object and ask the access rights to this object.This comprises searches possessory contact details (such as e-mail address), and sends mark and the request access authority of this object.In addition, usually, do not know that who is that therefore the user of object owner also cannot find these possessory contact details.
The technical matters that disclosure theme solves runs into its object without access rights to user to respond, and makes it be easy to ask the access rights of Enterprise Object, and this object is called tout court " forbidding object " but be not limited thereto.
A technical solution according to disclosure theme is that computing machine carrys out running program, and this application configuration is such as show the expression structure be suitable for according to carrying out the access rights of request object to the triggering or activation of forbidding object on the display device.
In certain embodiments, described expression structure is assembly or the graphic user interface (GUI) of user interface, such as dialog box, form, or any other represents structure (such as button).For to simplify and clear, be not limited to this and unless otherwise prescribed, represent that structure is also referred to as " dialog box " or " ejection dialog box ".
In certain embodiments, form dialog box and make user to receive dialog box, such as, by clicking " OK " button in dialog box, or by such as any other mode such as double-click in dialog box.
Respond to accepting dialog box, notified the owner of described object to this owner by transmission Email, therefore, the owner can to the access rights of this subscriber authorisation object.
The potential technique effect of disclosure theme is to provide for responding to the object browsing enterprise and automatically asks the method easily of forbidding the access rights of object in enterprise.
Illustrate below and implement general nonrestrictive summary of the present disclosure.Described summary summarises the exemplary enforcement of embodiment of the present disclosure, provides the structuring basis for changing and/or change and/or amplify embodiment, will describe wherein part subsequently.
According to disclosure theme, in order to ask the access rights of forbidding object by user, this user does not need the owner identifying this object and locate this object. but, independently program code (also referred to as " code ") is enrolled to the program of enterprise or application or file system, this code makes object be associated with the contact data of object owner, further alternative, object has other information of the mark of one or more such as objects.
Therefore, when user run into forbid object time, by activating or trigger run into object, such as, by pointing to this object and clicking with special mouse button (such as right button), then show dialog box (such as ejecting dialog box) by this code to user.
For the purpose of concisely clear, but not as restriction, also to mean with reference to represented object and/or as selecting, the expression of references object and/or link to it, the symbol of link such as will be embedded with to object.
In certain embodiments, the mark of such as its complete trails of dialog box display object, and the owner of display object alternatively.In certain embodiments, in response to being such as subject to dialog box by " carriage return " keyed jointing, automatically inform or notify that the owner has the access rights of user's request object, and user need not perform the location owner, identify the miscellaneous work of the access rights of object and request object.
In some embodiment, forbid that object is activated, then the owner of notify object has the access rights of user's request object automatically, and does not need to accept dialog box, and/or dialog box performs the request forbidding the access rights of object to identifying in regular hour section display in order to feedback or confirmation.
Forbid object based on code activation, comprise by the positioning equipment of such as mouse or pointed to by finger manipulation touch-screen and forbid object.In certain embodiments, this activation is personalized.Such as, special click type (as the right button of mouse or on the touchscreen with finger double-click), or the combination of keyboard key and mouse button (such as " Alt/ left button ").
In certain embodiments, the object of enterprise relates to its owner and their respective contact details, such as, with the form of data structure, such as, with the form of index or database, as a part for the management data be kept in enterprise.Thus, forbid the inquiry associated based on the Administrator Info to enterprise of object and possessory contact details.
By such as installation process known in the art, install or the integrated code as program in enterprise and/or in its part.As selection or alternative, installed in enterprise or integrated code by plug-in unit known in the art or additional mechanism.Optionally, installed or integrated code by the script of such as Flash (Adobe company) or JavaScript (Oracle company) or ActiveX (Microsoft) in enterprise.
Therefore, in the mode of code, user can from forbidding the automatic request access authority of the owner of object, and must not understand or know and forbid what the owner of object be who and/or its contact details is.
In certain embodiments, by sending Email to the owner, or by such as SMS, the owner of any other method notify object of instant message or phone.In certain embodiments, the owner is by Email or such as SMS, any other method of instant message or removed by the business facility of being accessed by user and forbid that object will forbid that the access rights mandate of object is to user, alternatively, authorize and continue regular hour section, and alternatively, inform its impact of user.
Fig. 1 schematically shows enterprise 100, comprises one or more computing machine, for three computing machines 104, represents the computing machine 104 of arbitrary number as indicated by dashed lines 114.
Enterprise 100 comprises one or more data storage device further, for two data storage devices 102, and the data storage device 102 of representative arbitrary number as shown by dotted line 112.Data storage device 102 is storage object or data entity (such as file, or data-base recording, or user's definition or analogous element) usually, is referred to as object.
The example of computing machine 104 is reciprocally and with the instant teaching of data storage device 102 or link or connect, and described connection or link are illustrated by network 106.
Fig. 2 diagrammatically illustrates the display of the tree structure 200 with the ejection dialog box 210 for authority request of the object in the enterprise of the such as enterprise 100 of the exemplary embodiment according to disclosure theme.Dotted line in tree structure 200 indicates the continuous of some tree structure that may exist.
In certain embodiments and/or in example, browse the user of enterprise, such as " keeper " of mark in server 212, may run into be expressed as file or folder " xyz " forbid object 202.
Such as, imagine user and wish to access that it does not have access rights forbids object 202.Therefore, user from owner's request access authority of forbidding object 202, and does not need to know that who is the owner and/or how contacts the owner.
User can activate or trigger and forbid object 202, such as, forbid object 202 with mouse-pointing and by right button, eject dialog box 210 so show.
Eject dialog box 210 and comprise the object identity 204 forbidding object 202, and optionally, also comprise the possessory title 206 of forbidding object 202.
Want to forbid the access rights of object 202 by identifying 204 confirmations after, user, by pressing the button 208 to accept request, is labeled as " acceptance ", such as, by double-clicking button 208 and/or pressing " Enter (carriage return) " key.After accepting request, eject dialog box 210 and disappear.
Accept action in response to this, such as the owner of " IT manager " receives the notice that user's request access forbids object 202, and the owner can provide the access rights of forbidding object 202 to user.
In certain embodiments, substitute the mark 204 of forbidding object 202 and/or except the mark 204 of forbidding object 202, can will forbid the highlighted expression of object 202 (such as with special color or texture or pattern).
In certain embodiments, whom the owner is not allow user to know, and under these circumstances, ejects in dialog box 210 and do not comprise title 206.
Therefore, in certain embodiments, eject dialog box 210 and only comprise button 208.
In certain embodiments, when forbidding that object 202 is the files comprising multiple object, all or part of access rights of the object subtree of forbidding in object 202 can be asked, correspondingly, ejecting dialog box 210 and comprising the button 214 being called " accepting tree ".
In certain embodiments, can be selected by the left button such as repeating to click the mouse multiplely to forbid object, and such as triggered by the right button of mouse and multiplely forbid object.Accordingly, occur comprising multiple dialog box of forbidding the mark of object alternatively, and comprise multiple each owner forbidding object further alternatively.After receiving dialog box, multiplely forbid that each owner of object is notified of people and asks multiple access rights of forbidding object, and this owner is by providing request permissions to respond.
In certain embodiments, there will not be dialog box, but optionally there is some instruction such as " serge serge " sound the user that has permission to be activated or triggered target responds.Optional or alternative, there are the access rights of his or she not this object of Dialog notification user.
In certain embodiments, the triggering of object or activation are comprised and being rested on object by the indicating equipment of such as mouse, and without any the operation of such as click right further.
It should be noted that when a touch screen is used, indicating equipment comprises other parts of finger and/or user.
Can notice in certain embodiments, forbid what user the owner of object should be provided as and obtain explanation and/or the reason of forbidding the access rights of object.
Fig. 3 A outlines access rights solicit operation user to without the object of access rights of the exemplary embodiment according to disclosure theme.
In operation 302, the code of the access rights starting or be convenient to request object (being such as locked into capable by operation 304 below and operation 306) has been installed.
Code is arranged in the enterprise that such as enterprise 100 is such, is arranged in one or more programs of enterprise, such as file system wherein, or any other program that can show and/or browse the object of enterprise of such as search utility.
In certain embodiments, install as extracode or the code inserting code or script, and/or to work together with enterprise program and/or program in addition and/or integrated.
In operation 304, not there is in response to activated user the expression of the object of access rights and show as ejected the dialog box of dialog box.
Can by realize representing of triggered target with mouse-pointing object and apply preset or predetermined operation (such as right mouse button) perform.
In operation 306, reception dialog box is responded, automatically notify that the owner that user does not have an object of access rights has the request to access rights.
In certain embodiments, code can select multiple user not have the object of access rights, and accepts to be used for the dialog box of multiple object, notifies that the owner of each object or multiple owner have the request of the access rights for object.
Once install code, operation 304 and operation 306 can carry out repetitive operation as indicated in arrow 308.
Fig. 3 B outlines the operation by user, this user not being had to the object requests access rights of access rights of the exemplary embodiment according to disclosure theme.
Alternatively, in operation 312, user identifies that it does not have the expression of the object of access rights.
In operation 314, user triggers the expression that it does not have the object of access rights.Such as, by the expression of mouse-pointing object, and application is preset or predetermined operation (such as right mouse button or stop are thereon) in the expression of object.
In operation 316, user's acceptance response does not have the expression of the object of access rights and the dialog box that occurs in triggering its user, thus automatically notifies that the owner that user does not have an object of access rights has user's request access authority.
In certain embodiments, user can select multiple its not have the object of access rights, and in a similar manner to the owner or multiple owner's request access authority of object.
It should be noted that method described herein and embodiment, from it, user can not know that the owner is owner's request access authority of whose object, and even optionally, who is the owner and/or knows how to contact the owner not allow user to know.
It should be noted that the enterprise of such as enterprise 100 exemplarily provides, and method described herein can be used for any computerized system comprising single computing machine.
A kind of for asking the method for the access rights of the object to computerized system according to present disclose provides, be included in computerized system and code is installed, this code makes the owner of object and this object be associated, thus allow to the access rights of the owner's request object from trend object, wherein the method is computer-implemented by least one in computerized system.
In certain embodiments, the request automatically that allows to comprises the access rights of described object, allows to the automatic notify object owner in response to the expression of the object triggering display.
In certain embodiments, the user of computerized system does not have the access rights of object.
In certain embodiments, user does not know that who is the owner of object.
In certain embodiments, user does not know possessory contact details.
In certain embodiments, the expression triggering the object of display comprises, and is pointed to the expression of the object of display by indicating equipment.
In certain embodiments, the expression triggering the object of display comprises this indicating equipment of operation further.
In certain embodiments, notify that the owner comprises, send Email to the owner, send SMS to the owner, transfer immediate news to the owner, to send a telegraph in the owner at least one mode or its combination in any to notify the owner.
In certain embodiments, code is at least one in appendage, plug-in card program and script or its combination in any.
In certain embodiments, wherein, based on the data retained in computerized system, object is associated with the owner of object.
A kind of device of access rights of request object is also provided according to the disclosure, comprise indicating equipment and at least one has the computing machine of program, the possessory code of the relevant object of this application configuration and object, thus the access rights allowing to the owner's request object from trend object.
In certain embodiments, the request automatically that allows to comprises the access rights of described object, allows in response to the expression of the object triggering display and automatically notifies the owner.
In certain embodiments, the user of device does not have the access rights of object.
In certain embodiments, user does not know that who is the owner of object.
In certain embodiments, user does not know possessory contact details.
In certain embodiments, the expression triggering the object of display comprises, and is pointed to the expression of object by indicating equipment.
In certain embodiments, the expression triggering the object of display comprises operation instruction equipment further.
In certain embodiments, notify that the described owner comprises, send electronics postal to the owner, send SMS to the owner, transfer immediate news to the owner, to send a telegraph in the owner at least one mode or its combination in any to notify the owner.
In certain embodiments, code is at least one in appendage, plug-in card program and script or its combination in any.
In certain embodiments, wherein, based on the data retained in device, object is associated with the owner of object.
Term " processor " or " computing machine ", or its system, in this article for as this area general environment, such as general processor or microprocessor, risc processor, or DSP, may comprise the element of additional such as storer or communication port.Optional or additional, term " processor " or " computing machine " or derivatives thereof refer to and can perform program that is that provide or that merge and/or can control and/or visit data memory storage and/or other devices (device of such as input and output port).Term " processor " or " computing machine " also indicate processor or the computing machine of multiple connection and/or link and/or communication, may share the resource of other such as storeies one or more.
Term " software ", " program ", " software process " or " process " or " software code " or " code " can exchange according to its environment and use, and have marked one or more instruction of the sequence of operation for performing general proxy algorithm and/or other programs or method or order or circuit.This program is stored in the medium of such as RAM, ROM or disk, or be embedded in may have access to and can by the device of such as processor or other circuit perform can in executive circuit.
Processor and program can form identical device at least in part, and such as electronic gate array, such as FPGA or ASIC, be designed to executive routine series of operations, optionally comprise or connection handling device or other circuit.
Term computer gasifying device or similar expression represent the device of the one or more processors had according to program be operable or operation.
As used herein, be not limited to this, the part of module representative system such as with the subprogram of other part instrumentations in same unit, or the program assembly operated on different units, and process representative is for obtaining the set of the operation of determination result.
Term " configuration " and/or " adjustment " to object, or its modification, represent the software and/or electronic circuit and/or attachment device that use and at least design and/or implement and/or can operate or operate to obtain object.
Device storage and/or comprise the composition program of product item and/or data.Except as otherwise noted, this program and/or data are stored in non-transient medium.
When disclosing electric or electronic equipment, suppose to use suitable power supply to make its work.
Process flow diagram and block diagram describe the system of the various embodiments according to disclosure theme, the framework that may implement of method and computer program product, function or operation.In this, each piece in process flow diagram or block diagram can represent module, section or portion of program code, and it comprises one or more executable instruction for realizing specific logical function.Also it may be noted that in some Alternate embodiments, illustrated operation can occur in sequence with different or replace sequential operation to obtain identical or equivalent effect with operation simultaneously.
The corresponding structure of all devices below in claim or step and functional element, material, action and equivalent are intended to comprise for performing and any structure of other functions be combined as element required by specially requiring, material or action.As used herein, singulative " one (a, an) " and " being somebody's turn to do (the) " also comprises its plural form, clearly illustrates in addition unless the text has.Further, be appreciated that term " comprise (comprises) " and/or " including (comprising) " and/or " having " uses in this description time, specify and occur certain feature, entirety, step, operation, element and/or assembly, but do not get rid of occur or additional one or more other feature, entirety, step, operation, element, assembly and/or its combination.
" adjustment " of term " configuration " as used herein and/or object, or its modification, represent and use with design and/or the material of mode and/or the assembly of implementing and/or can operate or operate to obtain object.
Except as otherwise noted, term used herein should not be construed as restriction, and is only the object describing specific embodiment, instead of wants to be intended to the theme disclosed in restriction.When the determination embodiment of disclosure theme is illustrated and describes, it is clear that the disclosure is not limited to the embodiments described herein.Do not get rid of multiple amendment, change, change, substitute and equivalent.

Claims (20)

1., for asking a method for the access rights to the object in computerized system, comprising:
In computerized system, install code, this code makes the owner of object and described object be associated, thus allows to the access rights of owner's request to described object from object described in trend,
Wherein the method is computer-implemented by least one in described computerized system.
2. method according to claim 1, wherein, the request automatically that allows to comprises the access rights of described object, allows in response to the expression of the described object triggering display and automatically notifies the described owner.
3. method according to claim 1, wherein, the user of described computerized system does not have the access rights to described object.
4. method according to claim 3, wherein, described user does not know whom the owner of described object is.
5. method according to claim 3, wherein, described user does not know described possessory contact details.
6. method according to claim 2, wherein, the expression triggering the described object of display comprises, and is pointed to the expression of the object of display by indicating equipment.
7. method according to claim 6, wherein, the expression triggering the described object of display comprises the described indicating equipment of operation further.
8. method according to claim 2, wherein, notify that the described owner comprises, send Email to the described owner, send SMS to the described owner, transfer immediate news to the described owner, send a telegraph at least one mode in the described owner or its combination in any.
9. method according to claim 1, wherein, described code is at least one in appendage, plug-in card program and script or its combination in any.
10. method according to claim 1, is wherein associated the owner of described object with described object based on the data retained in computerized system.
The device of the access rights of 11. 1 kinds of request objects, comprising:
At least one computing machine, it has program, and described application configuration has the code be associated with the owner of described object by object, thus allows to the access rights of owner's request to described object from object described in trend; And
Indicating equipment.
12. methods according to claim 11, wherein, the request automatically that allows to comprises the access rights of described object, allows in response to the expression of the described object triggering display and automatically notifies the described owner.
13. methods according to claim 11, wherein, the user of described device does not have the access rights to described object.
14. methods according to claim 13, wherein, described user does not know whom the owner of described object is.
15. methods according to claim 13, wherein, described user does not know described possessory contact details.
16. methods according to claim 12, wherein, the expression triggering the described object of display comprises, and is pointed to the expression of the object of display by indicating equipment.
17. methods according to claim 16, wherein, the expression triggering the described object of display comprises the described indicating equipment of operation further.
18. methods according to claim 12, wherein, notify that the described owner comprises, send Email to the described owner, send SMS to the described owner, transfer immediate news to the described owner, send a telegraph at least one mode in the described owner or its combination in any.
19. methods according to claim 11, wherein, described code is at least one in appendage, plug-in card program and script or its combination in any.
20. methods according to claim 11, wherein, are associated the owner of described object with described object based on the data retained in described device.
CN201280072218.7A 2012-04-02 2012-04-02 A method and apparatus for requesting access to files Pending CN104335222A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IL2012/050117 WO2013150509A1 (en) 2012-04-02 2012-04-02 A method and apparatus for requesting access to files

Publications (1)

Publication Number Publication Date
CN104335222A true CN104335222A (en) 2015-02-04

Family

ID=46124591

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201280072218.7A Pending CN104335222A (en) 2012-04-02 2012-04-02 A method and apparatus for requesting access to files

Country Status (4)

Country Link
EP (1) EP2834954A1 (en)
CN (1) CN104335222A (en)
IN (1) IN2014DN08127A (en)
WO (1) WO2013150509A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106295391A (en) * 2015-06-09 2017-01-04 联想(北京)有限公司 A kind of information processing method and electronic equipment

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11100152B2 (en) 2017-08-17 2021-08-24 Target Brands, Inc. Data portal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1842029A (en) * 2005-03-31 2006-10-04 国际商业机器公司 Management method of access permission and access validation to referenced shared resources in a networked environment
US7308498B1 (en) * 2003-02-13 2007-12-11 Microsoft Corporation System and method for automating a request for access to a restricted computer accessible resource
CN101681492A (en) * 2007-06-14 2010-03-24 微软公司 Come integrated security by ambiguity with Access Control List (ACL)
CN102265579A (en) * 2009-01-05 2011-11-30 国际商业机器公司 Secure system access without password sharing

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8561146B2 (en) 2006-04-14 2013-10-15 Varonis Systems, Inc. Automatic folder access management

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7308498B1 (en) * 2003-02-13 2007-12-11 Microsoft Corporation System and method for automating a request for access to a restricted computer accessible resource
CN1842029A (en) * 2005-03-31 2006-10-04 国际商业机器公司 Management method of access permission and access validation to referenced shared resources in a networked environment
CN101681492A (en) * 2007-06-14 2010-03-24 微软公司 Come integrated security by ambiguity with Access Control List (ACL)
CN102265579A (en) * 2009-01-05 2011-11-30 国际商业机器公司 Secure system access without password sharing

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106295391A (en) * 2015-06-09 2017-01-04 联想(北京)有限公司 A kind of information processing method and electronic equipment

Also Published As

Publication number Publication date
EP2834954A1 (en) 2015-02-11
WO2013150509A1 (en) 2013-10-10
IN2014DN08127A (en) 2015-05-01

Similar Documents

Publication Publication Date Title
US11372963B2 (en) Client login method and apparatus and storage medium
CN105493054B (en) It is protected using the rapid data of double file system
US10068104B2 (en) Conditional redaction of portions of electronic documents
US9111110B2 (en) Retroactive shared content item links
CN104639721A (en) Method and device for providing application information in mobile terminal device
CN104660688B (en) A kind of method and apparatus obtaining log-on message
KR101169801B1 (en) Method and device for managing history of file
CN109118160B (en) Information sharing method, device, terminal equipment and medium
CN104217150A (en) Method and device for calling application
WO2011121275A2 (en) Data input
CN106650490B (en) The login method and device of cloud account
CN114641768A (en) Controlling access to cloud resources in data using cloud-enabled data tagging and dynamic access control policy engine
CN105847130A (en) Instant messaging application chatting record processing method and device
CN105808094A (en) Application calling method and terminal
US8810812B2 (en) Method and system for consolidating and managing rendering jobs
CN104335222A (en) A method and apparatus for requesting access to files
KR101614890B1 (en) Method of creating multi tenancy history, server performing the same and storage media storing the same
CN104657125A (en) Information processing method and electronic device
KR20140070408A (en) A method and device for preventing logging of computer on-screen keyboard
CN114816646B (en) Shortcut operation method, device, terminal and storage medium suitable for network disk drive letter
CN110968386B (en) Navigation bar processing method and system
CN113641360B (en) Configuration method, device, equipment and storage medium of system front end
CN106648280B (en) Task management interaction method and device
US9747459B2 (en) Method and apparatus for requesting access to files
CN104461266A (en) Screen unlock method, screen unlock device and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150204

RJ01 Rejection of invention patent application after publication