Automatic configuration and management of user permissions based on roles and user activity
摘要:
The techniques disclosed herein provide automatic escalation and de-escalation of roles and permissions based on user activity of a communication system. Initial event parameters, such as an event attendee list and a meeting type, can be established by a user input. The system can then determine an initial set of roles and permissions for each attendee. A system can then monitor user activity associated with the event to generate a queue of activities. When the system detects that one or more activities satisfies given criteria, the system can escalate or de-escalate the roles and permissions for specific attendees. By dynamically controlling granular levels of permissions in a timely manner based on the detection of specific activities, a system can improve the security of stored data as well as improve the efficiency of detected collaborative event scenarios.
信息查询
0/0