Dynamically generating sharing boundaries

    公开(公告)号:US11361097B2

    公开(公告)日:2022-06-14

    申请号:US16553073

    申请日:2019-08-27

    Applicant: Box, Inc.

    Inventor: Alok Ojha

    Abstract: A collaboration system provides network access to a plurality of content objects. The collaboration system facilitates collaboration interactions between particular users by allowing or denying network access to the plurality of content objects based on user invitations. A computing module observes and records user-to-user or user-to-content collaboration invitations over the plurality of content objects. On an ongoing basis, a collaboration network graph is constructed and maintained, with updates to the collaboration network graph being continually applied based on observed collaboration interactions. On demand, such as upon receipt of a user request for access to a content object, the updated collaboration network graph is consulted so as to generate a then-current sharing boundary. If the user that raised the user request is within the generated then-current sharing boundary, then access to the content object is granted, otherwise further processing is invoked to determine if the user should nevertheless be granted access.

    POLICY-BASED USER DEVICE SECURITY CHECKS
    22.
    发明申请

    公开(公告)号:US20200089892A1

    公开(公告)日:2020-03-19

    申请号:US16553063

    申请日:2019-08-27

    Applicant: Box, Inc.

    Inventor: Alok Ojha

    Abstract: A collaboration system manages a plurality of content objects that are shared by multiple users at corresponding user devices in corresponding computing environments. Policies that govern interactions over the plurality of content objects are established. A content object upload request from a first user belonging to a first enterprise is processed by the collaboration system and then the content object is shared with a second user of a second enterprise. Security characteristics pertaining to the second user, and/or the second enterprise, and/or the second user's devices are initially unknown or unverified. As such, upon receiving interaction events raised by a user device of the second user, a set of interaction attributes associated with the interaction events are gathered. One or more trust policies are applied to the interaction attributes to evaluate security conditions that correspond to the interaction events. A response is generated based on the evaluated security conditions.

    ACTIVITY-BASED CONTENT OBJECT ACCESS PERMISSIONS

    公开(公告)号:US20200065509A1

    公开(公告)日:2020-02-27

    申请号:US16552956

    申请日:2019-08-27

    Applicant: Box, Inc.

    Inventor: Alok Ojha

    Abstract: Methods, systems and computer program products for content management systems. The techniques of the methods, systems and/or computer program products automatically determine activity-based content object access permissions and/or make a recommendation of activity-based content object access permissions. A machine learning model is formed from observations of user interactions over a plurality of content objects. The model is continually updated based on ongoing observation and analysis of user interaction events. When a collaborative relationship is formed between an invitor and one or more invitees, the activity-based permissions model is accessed to determine a set of access permissions to assign to the collaborative relationship. A single collaborative relationship may cover many collaboration objects. In some cases, a set of access permissions are automatically assigned to the collaborative relationship. In other cases, a set of access permissions is presented to the invitor as a recommendation. A user can accept or reject any recommendation.

Patent Agency Ranking