EP2834954A1 - A method and apparatus for requesting access to files - Google Patents
A method and apparatus for requesting access to filesInfo
- Publication number
- EP2834954A1 EP2834954A1 EP12721943.4A EP12721943A EP2834954A1 EP 2834954 A1 EP2834954 A1 EP 2834954A1 EP 12721943 A EP12721943 A EP 12721943A EP 2834954 A1 EP2834954 A1 EP 2834954A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- owner
- user
- access rights
- program
- enterprise
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
Definitions
- the present disclosure generally relates to requesting access rights to files, and more specifically to requesting access rights to files in an organization enterprise.
- One exemplary embodiment of the disclosed subject matter is a method for requesting access rights for an object of a computerized system comprising installing in the computerized system a code that associates an object with an owner of the object, thereby enabling to automatically request access rights for the object from an owner of the object, wherein the method is carried out by an at least one computer of the computerized system.
- Another exemplary embodiment of the disclosed subject matter is an apparatus for requesting access rights for an object comprising an at least one computer having a program, the program configured with a code that associates an object with an owner of the object, thereby enabling to automatically request access rights for the object from an owner of the object, and a pointing device.
- the term 'enterprise' implies a computerized system comprising a plurality of computers communicating therebetween and having and/or sharing a data storage, where the enterprise is also referred to as a 'computerized system' and the data storage also referred to as a 'storage'.
- the communications between the computes may be direct and/or indirect.
- the data storage comprises one or more data storage devices.
- an enterprise comprises several computers in a range between about 10 computers and about 1000 computers or more.
- an enterprise comprises less than 10 computers, not precluding having one computer as, for example, a mainframe computer.
- Object implies a data object, such as a file or folder, stored on the storage of the enterprise and also referred to as an object of the enterprise.
- the term 'user' or Operator' implies a person, and/or a program operating on behalf of the person, that uses a resource of an enterprise, such as a computer of the enterprise.
- a user or operator is also referred to as user of the enterprise or operator of the enterprise, respectively.
- the term 'access right' or 'rights' or 'sufficient rights' imply authorization for a user to access an object of an enterprise, whereas insufficient rights imply not having an authorization to access the object such as for opening or reaching the object for viewing.
- permissions implies any kind of authorization including, possibly, sufficient and/or insufficient rights.
- the authorization or permissions, and/or other properties of objects are set by the management or administration of the enterprise and/or by owners of objects of the enterprise and/or by operators with special high level authorization, also known as super-users or administrators.
- the term 'owner' of an object implies a user that has authority and/or access rights to an object so that he or she may grant or authorize access to the object to users not having sufficient rights for the object.
- a person and/or a program and/or any entity operative or operating on behalf on an owner of an object and authorized to grant rights to the object is also considered or regarded as the owner.
- the access may be granted on an ad-hoc basis or any other basis such as time-limited, user dependent of permanently.
- Fig. 1 schematically illustrates an enterprise comprising one or more computers, illustrated as three computers representing any number of computers, according to exemplary embodiments of the disclosed subject matter;
- Fig. 2 schematically illustrates a display of a tree structure of objects in an enterprise accompanied by a pop-up dialog for rights request, according to exemplary embodiments of the disclosed subject matter
- FIG. 3A outlines operations for requesting access rights for an object for which a user does not have access rights, according to exemplary embodiments of the disclosed subject matter.
- FIG. 3B outlines operations by a user requesting access rights for and object for which the user does not have access rights, according to exemplary embodiments of the disclosed subject matter.
- One technical problem dealt by the disclosed subject matter is handily requesting access rights to an object of an enterprise responsive to encountering the object for which the user does not have access rights, which for brevity is also referred to, without limiting, as a 'forbidden object'.
- One technical solution according to the disclosed subject matter is a computer operating a program configured to present, such as on a display device, a presentation structure adapted for requesting access rights to an object upon triggering or activation a forbidden object.
- the presentation structure or a component of a user-interface or a graphical-user-interface such as a dialog-box, a form, or any other presentation structure such as a button.
- GUI graphical-user-interface
- the presentations structure is also referred to a 'dialog' or a 'pop-up dialog'.
- the dialog is formed such that the user can accept the dialog, for example, by clicking on a ⁇ ' button in the dialog, or by any other way such as double-click on the dialog.
- the owner of the object Responsive to accepting the dialog, the owner of the object is notified such a by sending an email to the owner, and, consequently, the owner may grant access rights for the objects to the user.
- a potential technical effect of the disclosed subject matter is a convenient handy method for automatically requesting access rights for a forbidden object in an enterprise responsive to browsing objects of the enterprise.
- a program or application or a file-system of the enterprise is adapted by a separate program code, also referred to as a 'code', that associates objects with contact data of an owner thereof and further, optionally, with one or more other information such as identification of the object.
- a dialog is presented to the user by the code, for example, as a pop-up dialog.
- referring to a presented object implies also and/or as an alternative, referring to a representation of the object and/or a link thereto, such as by a symbol that embeds a link to the object.
- the dialog presents identification of the object such as the full path thereof, and optionally the owner of the object.
- the owner responsive acceptance of the dialog, such as by an 'Enter' key, the owner is automatically informed or notified that the user requests access rights to the object, without the user having to perform the chores of locating the owner and identifying the object and requesting the access rights to the object.
- activation of the forbidden object automatically notifies the owner of the object that the user requests access rights to the object, without having to accept a dialog, and/or the dialog is presented for a certain time interval for feedback or confirmation that a request for access rights for the identified forbidden object was performed.
- the activation of the forbidden object is based on the code, and involves pointing at the forbidden object by a pointing device such as a mouse or a finger with a touch screen.
- a pointing device such as a mouse or a finger with a touch screen.
- the activation is customizable. For example, dedicated clink type such a right-button of a mouse or double-click with a finger on a touch screen or a combination of keyboard key and a mouse button such as 'alt/left-button'.
- objects of the enterprise are related to owners thereof and their respective contact information such as in data structures, such as index or database, as part of the administrative data maintained in the enterprise. Accordingly, the association of the forbidden object with contact information of the owners is based on querying the administrative information of the enterprise.
- the code is installed or integrated in the enterprise and/or part thereof such as a program by an installation procedure such as known in the art.
- the code is installed or integrated in the enterprise by a mechanism of a plug-in or an addon such as known in the art.
- the code is installed or integrated in the enterprise by a script such as Flash (Adobe Inc) or JavaScript (Oracle Inc.) or ActiveX (Microsoft Inc.).
- a user may automatically request access rights from an owner of a forbidden object without knowing or being unaware who the owner of the forbidden object is and/or contact information thereof.
- the owner of the object is notified, such as sending an email to the owner or any other method such as SMS, Instant Messaging, or a telephone call.
- the owner grants the user access rights to the forbidden object by email or any other method such as SMS, Instant Messaging or by releasing the forbidden object via the enterprise facilities for access by the user, optionally for a certain time period and, optionally, notifying the user to that effect.
- Fig. 1 schematically illustrates an enterprise 100 comprising one or more computers, illustrated as three instances of a computer 104, representing any number of computer 104, as indicated by dashed lines 114.
- Enterprise 100 further comprises one or more data storage devices, illustrated as two instances of a data storage device 102, representing any number of data storage device 102, as indicated by dashed lines 112.
- Data storage device 102 generally stores objects or data entities such as files or database records or users definitions or similar elements, collectively referred to also as objects.
- the instances of computer 104 are connected or linked or coupled therebetween and to the instances of data storage device 102, the connection or linkage illustrated and represented by a network 106.
- Fig. 2 schematically illustrates a display of a tree structure 200 of objects in an enterprise, such as enterprise 100, accompanied by a pop-up dialog 210 for rights request, according to exemplary embodiments of the disclosed subject matter.
- the dashed lines in tree structure 200 indicate some, if any, continuation of the tree structure.
- a user browsing the enterprise such as in a server 212 denoted as 'Admin', may encounter a forbidden object 202, denoted as a file or folder 'xyz'.
- the user may activate or trigger forbidden object 202, such as by pointing with a mouse on forbidden object 202 and pressing right-button, and a pop-up dialog 210 is presented.
- Pop-up dialog 210 comprises object identification 204 of forbidden object 202, and, optionally, also name 206 of the owner of forbidden object 202.
- the user may accept the request by activating a button 208, denoted as 'Accept', such as by double-click on button 208 and/or pressing 'Enter' key. Having accepted the request, pop-up dialog 210 disappears.
- the owner such as 'IT Manager', receives a notification that the user has requested access to forbidden object 202, and the owner may provide the access rights for forbidden object 202 to the user.
- forbidden object 202 instead of and/or in addition to identification 204 of forbidden object 202, the representation of forbidden object 202 is highlighted such as in a special color or a texture or a pattern.
- the user is not allowed to know who the owner is, and in such a case, name 206 is not included in pop-up dialog 210.
- pop-up dialog 210 comprises only button 208.
- pop-up dialog 210 comprises a button 214 denoted as 'Accept Tree'.
- a multiplicity of forbidden objects may be selected, for example, by repeatedly clicking by a left-button of a mouse, and subsequently triggering the multiplicity of forbidden objects such as by a right-button of a mouse.
- a dialog appear, optionally comprising the identifications of the multiplicity of forbidden objects and further, optionally, the respective owners of the multiplicity of forbidden objects. Accepting the dialog the respective owners of the multiplicity of forbidden objects are notified that access rights are requested for the multiplicity of forbidden objects, and the owners may respond by providing the requested rights.
- a dialog appears notifying the user that he or she does not have access rights to the object.
- triggering or activation the object comprises hovering on the object with a pointing device such as a mouse, without any further operation such as right- button click.
- the pointing device includes a finger and/or other member of the user.
- the owner of a forbidden object should provide an explanation and/or rationale why the owner grant access rights to a forbidden object.
- FIG. 3A outlines operations for requesting access rights for an object for which a user does not have access right, according to exemplary embodiments of the disclosed subject matter.
- a code that enables or facilitates requesting access rights for an object is installed.
- the code is installed in an enterprise, such a enterprise 100, in one or more of the programs of the enterprise such as file system thereof or any other program that can display and/or browse the objects of the enterprise, such as a search program.
- the code is installed as an add-on code or a plug-in code or a script and/or otherwise cooperating and/or integrated with the enterprise program and/or programs.
- a dialog such as a pop-up dialog, is presented responsive to triggering a representation of an object for which a user does not have access rights.
- the triggering of the representation of the object may be carried out by pointing at the object such a by a mouse and applying a preset or a reserved operation such as right- button of a mouse.
- operation 306 responsive to accepting the dialog an owner of the object for which the user does not have access rights is automatically notified that access rights are requested.
- the code enables selecting a plurality of objects for which a user does not have access rights and accepting a dialog for the plurality of objects the owner or owners of the respective objects are notified that access rights are requested for the objects.
- operation 304 and operation 306 may be repeated as indicated by an arrow 308.
- FIG. 3B outlines operations by a user requesting access rights for an object for which the user does not have access rights, according to exemplary embodiments of the disclosed subject matter.
- a user optionally, identifies a representation of an object for which the user does not have access rights.
- the user triggers the representation of the object for which a user does not have access rights. For example, pointing by a mouse the representation of the object and applying a preset or a reserved operation such as right-button of a mouse or hovering over the representation of the object.
- the user accepts a dialog that appears responsive to triggering the representation of the object for which the user does not have access rights, thereby automatically notifying an owner of the object for which the user does not have access rights that access rights are requested by the user.
- the user may select a plurality of objects for which a user does not have access rights and in a similar manner request the owner or owners of the objects access rights thereto.
- a user may request access rights from an owner of an object wherein the user does not know who the owner is and, furthermore, optionally, the user is not allowed to know who the owner is and/or to know how to contact the owner.
- an enterprise such as enterprise 100
- the methods described herein may be used for any computerized system, including a single computer.
- a method for requesting access rights for an object of a computerized system comprising installing in the computerized system a code that associates an object with an owner of the object, thereby enabling to automatically request access rights for the object from an owner of the object, wherein the method is carried out by an at least one computer of the computerized system.
- enabling to automatically request access rights for the object comprises enabling to automatically notify the owner responsive to triggering a presented representation of the object.
- the user is unaware who the owner of the object is.
- the user is unaware about contact information of the owner.
- triggering the presented representation of the object comprises pointing by a pointing device at the presented representation of the object.
- triggering the presented representation of the object further comprises operating the pointing device.
- notifying the owner comprises at least one of sending an email to the owner, sending SMS to the owner, instant messaging the owner, telephoning the owner, or any combination thereof.
- the code is at least one of an add-on program, a plug-in program, a script or any combination thereof.
- associating the object with the owner of the object is based on data maintained in the computerized system.
- an apparatus for requesting access rights for an object comprising an at least one computer having a program, the program configured with a code that associates an object with an owner of the object, thereby enabling to automatically request access rights for the object from an owner of the object, and a pointing device.
- enabling to automatically request access rights for the object comprises enabling to automatically notify the owner responsive to triggering a presented representation of the object.
- a user of the apparatus does not have access rights for the object.
- the user is unaware who the owner of the object is.
- the user is unaware about contact information of the owner.
- triggering the presented representation of the object comprises pointing by the pointing device at the presented representation of the object.
- triggering the presented representation of the object further comprises operating the pointing device.
- notifying the owner comprises at least one of sending an email to the owner, sending SMS to the owner, instant messaging the owner, telephoning the owner, or any combination thereof.
- the code is at least one of an add-on program, a plug-in program, a script or any combination thereof.
- associating the object with the owner of the object is based on data maintained in the apparatus.
- 'processor' or 'computer', or system thereof are used herein as ordinary context of the art, such as a general purpose processor or a micro-processor, RISC processor, or DSP, possibly comprising additional elements such as memory or communication ports.
- the terms 'processor' or 'computer' or derivatives thereof denote an apparatus that is capable of carrying out a provided or an incorporated program and/or is capable to controlling and/or accessing data storage apparatus and/or other apparatus such as input and output ports.
- the terms 'processor' or 'computer' denote also a plurality of processors or computers connected, and/or linked and/or otherwise communicating, possibly sharing one or more other resources such as a memory.
- the terms 'software', 'program', 'software procedure' or 'procedure' or 'software code' or 'code' may be used interchangeably according to the context thereof, and denote one or more instructions or directives or circuitry for performing a sequence of operations that generally represent an algorithm and/or other process or method.
- the program is stored in or on a medium such as RAM, ROM, or disk, or embedded in a circuitry accessible and executable by an apparatus such as a processor or other circuitry.
- the processor and program may constitute the same apparatus, at least partially, such as an array of electronic gates, such as FPGA or ASIC, designed to perform a programmed sequence of operations, optionally comprising or linked with a processor or other circuitry.
- the term computerized apparatus or a similar one denotes an apparatus having one or more processors operable or operating according to a program.
- a module represents a part of a system such as a part program operating together with other parts on the same unit, or a program component operating on different unit, and a process represents a collection of operations for achieving a certain outcome.
- configuring and/or 'adapting' for an objective, or a variation thereof, implies using at least a software and/or electronic circuit and/or auxiliary apparatus designed and/or implemented and/or operable or operative to achieve the objective.
- a device storing and/or comprising a program and/or data constitutes an article of manufacture. Unless otherwise specified, the program and/or data are stored in or on a non- transitory medium.
- each block in the flowchart or block diagrams may represent a module, segment, or portion of program code, which comprises one or more executable instructions for implementing the specified logical function(s).
- illustrated operations may occur in deferent order or as concurrent operations instead of sequential operations to achieve the same or equivalent effect.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/IL2012/050117 WO2013150509A1 (en) | 2012-04-02 | 2012-04-02 | A method and apparatus for requesting access to files |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2834954A1 true EP2834954A1 (en) | 2015-02-11 |
Family
ID=46124591
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP12721943.4A Withdrawn EP2834954A1 (en) | 2012-04-02 | 2012-04-02 | A method and apparatus for requesting access to files |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP2834954A1 (en) |
CN (1) | CN104335222A (en) |
IN (1) | IN2014DN08127A (en) |
WO (1) | WO2013150509A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106295391B (en) * | 2015-06-09 | 2021-02-19 | 联想(北京)有限公司 | Information processing method and electronic equipment |
US11100152B2 (en) | 2017-08-17 | 2021-08-24 | Target Brands, Inc. | Data portal |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7308498B1 (en) * | 2003-02-13 | 2007-12-11 | Microsoft Corporation | System and method for automating a request for access to a restricted computer accessible resource |
US7574746B2 (en) * | 2005-03-31 | 2009-08-11 | International Business Machines Corporation | Access validation and management of access permissions to referenced shared resources in a networked environment |
US8561146B2 (en) | 2006-04-14 | 2013-10-15 | Varonis Systems, Inc. | Automatic folder access management |
US7984512B2 (en) * | 2007-06-14 | 2011-07-19 | Microsoft Corporation | Integrating security by obscurity with access control lists |
US20100175113A1 (en) * | 2009-01-05 | 2010-07-08 | International Business Machine Corporation | Secure System Access Without Password Sharing |
-
2012
- 2012-04-02 WO PCT/IL2012/050117 patent/WO2013150509A1/en active Application Filing
- 2012-04-02 EP EP12721943.4A patent/EP2834954A1/en not_active Withdrawn
- 2012-04-02 IN IN8127DEN2014 patent/IN2014DN08127A/en unknown
- 2012-04-02 CN CN201280072218.7A patent/CN104335222A/en active Pending
Non-Patent Citations (2)
Title |
---|
None * |
See also references of WO2013150509A1 * |
Also Published As
Publication number | Publication date |
---|---|
CN104335222A (en) | 2015-02-04 |
WO2013150509A1 (en) | 2013-10-10 |
IN2014DN08127A (en) | 2015-05-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101601062B (en) | The purchase of the independent functional part of software product | |
CN104573552B (en) | A kind of method and device of hiden application icon | |
JP5867635B2 (en) | Tag management system, tag management method, information providing system, information providing method, and devices used therefor | |
CN111695156A (en) | Service platform access method, device, equipment and storage medium | |
CN104639721A (en) | Method and device for providing application information in mobile terminal device | |
CN112134786B (en) | Contact person establishing method, client and system in network security level protection | |
US20080256458A1 (en) | Data Access Control System for Shared Directories and Other Resources | |
CN108549799B (en) | Android permission management method and device, terminal and computer storage medium | |
US8271387B2 (en) | Method and apparatus for providing limited access to data objects or files within an electronic software delivery and management system | |
CN103699830A (en) | Operating system unlocking method and operating system unlocking device | |
CN112131559A (en) | Role-based authority control method, device, equipment and medium | |
CN111857498B (en) | Data interaction method and device and electronic equipment | |
US9747459B2 (en) | Method and apparatus for requesting access to files | |
CN108292350A (en) | That supports Syndicating search is automatically brought into operation detection to protected field | |
US20240345854A1 (en) | Task creation method and apparatus, electronic device and storage medium | |
CN105354448B (en) | Authorization management method and device | |
US20210006553A1 (en) | Personal data application and personal data application control method | |
WO2013150509A1 (en) | A method and apparatus for requesting access to files | |
CN116266482A (en) | Equipment software upgrading method and device | |
US9767296B2 (en) | Requesting access to restricted objects by a remote computer | |
CN111752398A (en) | Verification code input method and device, electronic equipment and readable storage medium | |
CN112580065A (en) | Data query method and device | |
CN113448593B (en) | Automatic deployment method and device for diagnosis and treatment system platform application and electronic equipment | |
CN115981527A (en) | User permission hierarchical management method and device, electronic equipment and readable storage medium | |
US20140068458A1 (en) | Method and device for management of a message and attachment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20141009 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: BASS, DAVID Inventor name: KORKUS, OHAD Inventor name: FAITELSON, YAKOV |
|
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20171130 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20210903 |