Daniel W. Crevier - Bellevue WA, US Jason F. Moore - Redmond WA, US David Citron - Redmond WA, US Jennifer I. Shen - Mountain View CA, US Gareth A. Howell - Bothell WA, US Jonathan A. Bockelman - Kirkland WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06F 15/16 G06F 3/048
US Classification:
715752
Abstract:
Collaborating on documents by e-mail may be streamlined into a unified process. In one example, a user creates a document in an online document service, and sends the document to collaborators by mailing a link to the document. The document may have permissions set so that the creator of the document, and any user on the e-mail distribution list, can read and edit the document. When a user receives the e-mail, that user may open and edit the document. Upon closing the editing application, the user may be presented with an appropriate interface to create a reply e-mail.
Arcadiy G. Kantor - Seattle WA, US Jonathan A. Bockelman - Kirkland WA, US Jeffrey E. Steinbok - Redmond WA, US Sarah M. Filman - Seattle WA, US David A. Citron - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 15/16
US Classification:
709205
Abstract:
Techniques for sharing of items from online storage (e.g., cloud storage) are described herein. In some embodiments, sharing links can be configured as group opt-in links designed to provide recipients with an option to join a group having permissions on a corresponding shared item. A sharing link to an item may be generated and provided to a user for distribution to recipients in various ways. When selected by recipients, the sharing link causes an option to be exposed to the recipients to opt-in to a group having permissions on a corresponding item. Group membership is determined by recipients that exercise the option and recipients that opt-in are granted permissions on the item established for the group. Subsequently, an owner of the item/group may view a list of recipients who have opted-in as members and manage corresponding permissions on an individual basis.
Arcadiy G. Kantor - Seattle WA, US Jonathan A. Bockelman - Kirkland WA, US Jeffrey E. Steinbok - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 17/00
US Classification:
715205
Abstract:
Techniques for sharing of items from online storage (e.g., cloud storage) are described herein. In one approach, distinct sharing links to an item can be generated for multiple different publish targets through a single publishing user interface exposed to a user. Through the publishing user interface, a user may submit a request having a selection of different social networks and/or other sites/targets to receive a sharing link for an item. In response to the request, a distinct sharing link is generated for each selected recipient and the generated sharing links are published to appropriate targets. Thus, a user is able to easily send links for a shared item to multiple targets through a single request and can separately manage permissions associated with each distinct sharing link.
Arcadiy G Kantor - Seattle WA, US Jonathan A. Bockelman - Kirkland WA, US Jeffrey E. Steinbok - Redmond WA, US Sarah M. Filman - Seattle WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 21/24
US Classification:
726 28
Abstract:
Techniques for sharing of items from online storage (e.g., cloud storage) are described herein. In at least some embodiments, sharing links can be configured as one-time sharing links that provide recipients with limited, one-time access to a shared item for the purpose of selecting or registering an account to use for subsequent access to the item. Recipients are able to select accounts they find most convenient for accessing a shared item without the owner/sharer of the item necessarily having contact information for those accounts or sending a link to the accounts. Selection of a one-time link initiates an authentication sequence that selectively provides an option to select a particular account. Once the one-time sharing link is redeemed, the one-time sharing link is invalidated for subsequent access to the item.
Joseph Andrew Bono - Kirkland WA, US Jeffrey E. Steinbok - Redmond WA, US Brian M. Perrin - Redmond WA, US Rebecca L. Pezely - Seattle WA, US Eileen S. Hash - Kirkland WA, US Gyorgy K. Schadt - Redmond WA, US David A. Citron - Redmond WA, US Jonathan A. Bockelman - Kirkland WA, US Daniel W. Crevier - Bellevue WA, US Michael F. Matsel - Seattle WA, US Amy J. Beauford - Carnation WA, US Shabbir A. Shahpurwala - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 9/32 G06F 21/00
US Classification:
726 7
Abstract:
Techniques are described to provide revocable object access. In an implementation, a user may provide content and an object (e.g., a picture) to be published with the content. The object is uploaded to a storage location, and a uniform resource locator (URL) that includes a token is generated for the object. The token is registered in an access control list (ACL), and token permission settings in the ACL are utilized to control access to the object. The URL may be embedded in the content. When a viewer requests the content, the object may be retrieved from the storage location using the URL. The user may revoke access to the object by changing the token permission settings in the ACL.
- Redmond WA, US Jonathan Alexander BOCKELMAN - Kirkland WA, US Marcelo Albuquerque MAS - Redmond WA, US Joseph Arthur METZGER - Kirkland WA, US
International Classification:
G06F 17/30
Abstract:
A system enabling smart versioning of files is provided. Techniques disclosed herein enable a system to snap to new versions of a file based on one or more measures of user interactions with the file. For instance, a system can create a new version number for a file based on an amount of time a user has spent editing the file, a number of saves that have occurred, and/or a quantity of data applied to edits of the file. The techniques disclosed herein can also utilize telemetry data to fine tune weightings that are applied to data measuring specific types user activity to provide results that best serve a range of use scenarios and file types. By providing version numbers of a file that are based on user interactions, a system can provide more meaningful version numbers that are aligned with the contents of a file.
- Redmond WA, US Jason F. MOORE - Redmond WA, US David CITRON - Redmond WA, US Jennifer I. SHEN - Mountain View CA, US Gareth A. HOWELL - Bothell WA, US Jonathan A. BOCKELMAN - Kirkland WA, US
International Classification:
H04L 12/58 H04L 29/12 G06Q 10/10
Abstract:
Collaborating on documents by e-mail may be streamlined into a unified process. In one example, a user creates a document in an online document service, and sends the document to collaborators by mailing a link to the document. The document may have permissions set so that the creator of the document, and any user on the e-mail distribution list, can read and edit the document. When a user receives the e-mail, that user may open and edit the document. Upon closing the editing application, the user may be presented with an appropriate interface to create a reply e-mail.
Identifying The Best Suitable Application To Open A File Shared Via A Link
- Redmond WA, US Daron SPEKTOR - Seattle WA, US Hui HUANG - Bellevue WA, US Jonathan Alexander BOCKELMAN - Kirkland WA, US Peter EBERHARDY - Seattle WA, US Alisa Yujin SO - Kirkland WA, US Kevin Kaiwon LAM - Kirkland WA, US
International Classification:
H04L 29/08
Abstract:
The techniques enable a device to identify a best suitable application to open a resource such as a file. The file can be shared via a link or can be attached to a communication. The link comprises a uniform resource locator (URL) or is in some way associated with an underlying URL. The URL includes a pattern, or a portion that identifies a domain (e.g., a hostname) and/or a portion that identifies a type of file that is to be accessed and opened. Upon activation of the link, the device analyzes the URL to determine the pattern. The device then obtains, from a service associated with the URL, a ranked list of applications that are authorized to open the file. Moreover, the device performs, at run-time, a negotiation with the service to determine which application is best suited to open the file.