DROPBOX, INC. Patent applications |
Patent application number | Title | Published |
20150347497 | CONDENSING EVENT MARKERS - Systems, methods, and computer-readable storage media for analyzing the recorded interactions of users within a shared dataspace, where the shared dataspace is provided by an a synced online content management system. As each user adds and deletes files in the shared dataspace, the content management system can record each interaction. The content management system can then analyze the recorded interactions, creating collapsed summaries of the interactions, and generate notifications that can be presented to users. Various thresholds can be used to determine when the recorded interactions are condensed, and when notifications associated with those condensed interactions are presented to users. | 12-03-2015 |
20150347490 | ENHANCING EVENT SUMMARIES OF SYNCED ONLINE CONTENT MANAGEMENT SYSTEM INTERACTIONS - Disclosed are systems, methods, and computer-readable storage media for enhancing event summaries of synced online content management system interactions. Users can identify one or more of the collapsed events markers that have pointers to the original, uncondensed, event markers. Upon identifying the one or more collapsed event markers, users can add additional data, via the pointers, to the original, uncondensed, event markers that were used to generate the collapsed event marker. The content management system can then perform a new analysis of the shared dataspace, analyzing the event markers using pre-existing data and the newly added data to create additional collapsed event markers, modify previously generated collapsed event markers, or remove/replace collapsed event markers. These enriched collapsed event markers can then newly presented to the user. | 12-03-2015 |
20150331881 | MANAGING MESSAGES BASED ON EXPIRATION DATES - Messages can be managed based on expiration dates. For instance, a message having an expiration date can be removed from the recipient's inbox until the expiration date becomes imminent, automatically restored to the inbox when the expiration date becomes imminent, and automatically expired from the inbox (e.g., by deleting the message) after the expiration date has passed. Expirable messages can be identified based on user input and/or automatic extraction of expiration-date information from the message. Visual indicators can be used to distinguish a message whose expiration date is imminent from other messages in the inbox. | 11-19-2015 |
20150326620 | MEDIA PRESENTATION IN A VIRTUAL SHARED SPACE - Various embodiments of the present technology involve the sharing of media items via a virtual shared space. For example, a user could create and share a slideshow to other users in a presentation mode that includes establishing a shared screen session for simultaneous viewing of the images. Further, while in the presentation mode, interaction with the images by each user could be shown on each device. For example, if a user zooms in on an object, another user will see a magnification of the object. Additionally, if the other user subsequently zooms out, the first user will see a minimization of the object. In another example, an audio message describing one or more images of a slideshow could be provided for playback at a later time when establishing a shared screen session is not available. | 11-12-2015 |
20150309698 | BROWSING AND SELECTING CONTENT ITEMS BASED ON USER GESTURES - The present disclosure is directed toward systems and methods that provide users with efficient and effective user experiences when browsing, selecting, or inspecting content items. More specifically, systems and methods described herein provide users the ability to easily and effectively select multiple content items via a single touch gesture (e.g., swipe gesture). Additionally, systems and methods disclosed herein can allow users to select various content items in a selection interface, preview a content item, and return to the selection interface with the previous selections remaining in tact. Still further, systems and methods described herein allow users to transition between a content graphical user interface and a selection interface based on touch gestures with content items. | 10-29-2015 |
20150304265 | BROADCAST NOTIFICATION SYSTEM - An online content management service can manage distribution of event notifications to client devices based on notification keys. Client devices can register with the content management service to receive event notifications associated with one or more specific notification keys of interest. The content management service can receive information about events, determine a notification key for each event, and selectively send notifications to clients that are registered for that notification key. The content management service can store event notifications for client devices that are generated during a period when the client device is not in communication with the content management service and can send the missed event notifications to the client device when the client device reestablishes communication with the content management service. | 10-22-2015 |
20150304264 | CONTEXT AWARE SERIALIZATION - Certain embodiments of the present invention relate to techniques for serializing account and message management actions performed at a message management service for synchronization with a messaging service. A message management service can receive requests from a client device and/or a messaging service to perform actions on resources for an email message account. The actions can include account-related actions, folder-related actions, message thread-related actions, and/or message-related actions. Message management service can implement techniques for serializing actions that conflict, such as actions on a resource (e.g., a message account, a message, a folder, or a message thread) that conflict with other actions on the same resource and/or other resources that have a dependency relationship. By performing serialization, message management service can prevent conflicting actions from being performed concurrently, while enabling non-conflicting actions to be performed in parallel, thereby improving performance for execution of actions. | 10-22-2015 |
20150295851 | AUTHORIZATION REVIEW SYSTEM - A computer system can provide user interfaces and back-end operations to facilitate review of the web requests. The system can detect whether an operation of an application called by a web request includes a review tag or a call to a review method. If a review tag or a call to a review method is detected, the middleware can initiate a review process that can include receiving input from a client device associated with a human reviewer. Upon receiving approval by the reviewer, the web request can be generated using a saved version of the original web request and executed. Thus, this review process can run without requiring that code for reviewing the web request be contained within the web request or the application called by the web request. | 10-15-2015 |
20150288775 | Browser Display Of Native Application Presence And Interaction Data - A client application of a device receives presence information and other interaction information from other devices synchronized to a set of content items. The interaction information indicates interactions of at least one other device with respect to a synchronized content item. The client application displays a browser depicting the synchronized content items and permitting navigation among organizational elements. The browser also displays the interaction information associated with the content items received from the other devices. The browser displays the interaction information with respect to particular content items or for an organizational element. The browser may also include an activity feed displaying interaction information specific to a content item or relating to a synchronized folder or organizational element. This permits a user to view, at a browser, activity and interactions of other users with respect to content items using native applications on another device. | 10-08-2015 |
20150288774 | Displaying Presence In An Application Accessing Shared And Synchronized Content - A client application of a device collects presence information and other interaction information from an application viewing a content item synchronized with a content management system. The interaction information indicates interactions of a device with respect to a content item. The client application receives presence information from other devices synchronized to the content item and displays a presence indicator in a user interface element. The presence indicator is displayed relative to a user interface element of the application viewing the content item. The displayed presence information may inform the user that other users are editing or viewing the content item, and may permit the user to receive notifications when another user's presence has changed to a particular status. | 10-08-2015 |
20150288757 | Managing Presence Among Devices Accessing Shared And Synchronized Content - A content management system receives presence information from a client application on a device indicating interaction information of a user relative to a content item synchronized to the content management system. The interaction information includes presence information describing presence information of a native application interacting with the content item. The presence information indicates whether the native application opened, is viewing, or is editing the content item. The presence information may specify a user interface element and process associated with the presence information. The content management system stores presence records describing the presence information and uses the presence records to generate and transmit a presence status associated with a user. When a new version of a content item is received, the content management system may also use the presence records to determine an action to perform with the user interface window associated with the prior version. | 10-08-2015 |
20150288756 | Determining Presence In An Application Accessing Shared And Synchronized Content - A device collects presence information and other interaction information from an application viewing a content item synchronized with a content management system. The interaction information indicates interactions of a device with respect to a content item, and includes presence information obtained from a native application such as whether the content item is being viewed by the user on a user interface element or the user interface element is modifying the content item. A presence management module receives presence events indicating possible change of presence with respect to a user interface window associated with a process and a synchronized content item. Such presence events include a change in focus of a user interface element indicating that a user is viewing the content item, and changes to a content item indicating a user is editing the content item. | 10-08-2015 |
20150288744 | ENRICHING CONTACT DATA BASED ON CONTENT SHARING HISTORY IN A CONTENT MANAGEMENT SYSTEM - A content management system enriches contact records obtained from a client device using user records stored on the content management system. The content management system receives contact records from a client device authorized on a user account of the content management system. The content management system compares contact records with user profiles stored on the content management system. The content management system matches contact records with user profiles of user accounts with which at least one sharing event occurred between the user account and the user account on which the client device is authorized. The content management system identifies a matching user profile corresponding to the contact record. The content management system determines modification information for modifying the contact record based upon the matching user profile. | 10-08-2015 |
20150281353 | LOCAL SERVER FOR SYNCED ONLINE CONTENT MANAGEMENT SYSTEM - A client device can implement a client-side application for a server-side online content management system. The client-side application can communicate with the server-side online content management system to sync data stored locally on the client-side with data stored on the server-side. A local web server can be implemented on the client device to work in conjunction with the client-side application, such that the local web server can access the data stored locally. The client device can run a web browser that communicates with the local web server. A user of the client device can use the web browser to connect to the local web server to access the synced data stored locally on the client-side. Advantages of accessing the data stored locally using the web browser via the local web server include performance improvements, offline access to the data, and use of native client applications to interact with the data. | 10-01-2015 |
20150281156 | DYNAMIC FILTER GENERATION FOR MESSAGE MANAGEMENT SYSTEMS - Filtering rules for incoming messages can be dynamically generated by a message management service based on patterns in the user's behavior. The message management service can analyze event records associating user actions with features of messages to detect correlations between message features and resulting actions, including correlations across multiple messaging accounts belonging to the same user. Based on correlations, the message management service can provide a suggested rule to the user's client device, and the user can accept or decline the suggestion. | 10-01-2015 |
20150256504 | DISTRIBUTED SYNCHRONIZATION DATA IN A MESSAGE MANAGEMENT SERVICE - A message management service that acts as intermediary between a messaging service and a client device can generate a synchronization data bundle for a message that includes an external message identifier usable to retrieve the message from the messaging service. The message management service can send the synchronization data bundle to the client along with the message, and the client can store the synchronization data bundle for each message in its local data store. The client can later return the synchronization data bundle to the message management service, which can use information contained therein to facilitate synchronization and related operations. | 09-10-2015 |
20150254320 | USING COLOCATION HINTS TO FACILITATE ACCESSING A DISTRIBUTED DATA STORAGE SYSTEM - The disclosed embodiments relate to a system that uses colocation hints to facilitate storing data blocks in a distributed data storage system, which includes a plurality of data centers. During operation, the system receives a write request from a client to write a data block to the distributed data storage system, wherein the write request includes a colocation hint that identifies a colocation group associated with the data block. In response to the write request, the system uses the colocation hint to identify one or more data centers associated with the colocation group. Next, the system writes copies of the data block to the one or more identified data centers. In this way, the system situates copies of data blocks associated with the colocation group in the same data centers when possible. | 09-10-2015 |
20150249647 | ADVANCED SECURITY PROTOCOL FOR BROADCASTING AND SYNCHRONIZING SHARED FOLDERS OVER LOCAL AREA NETWORK - A method, system, and manufacture for securely broadcasting shared folders from one client device to other client devices and synchronizing the shared folders over a local area network. A first client device, associated with a content management system, generates a secure identifier for a shared folder, using a shared secret key that is associated with the shared folder. The first client device announces the secure identifier over a local area network to other client devices on the local area network including a second client device. The first client device receives a synchronization request for the shared folder from the second client device. After authenticating, using the shared secret key, that the second client device has authorization to access the shared folder, the first client device synchronizes the shared folder with the second client device over the local area network. | 09-03-2015 |
20150244836 | SYSTEMS AND METHODS FOR EPHEMERAL EVENTING - Embodiments are provided for ephemeral eventing. Ephemeral eventing may involve sending metadata portions associated with content items from a user device to a content management system prior to uploading the content portions of the content items. The content management system may then assign the content items to one or more events. The event assignments may then be sent back to the user device, allowing the content items to be locally displayed according to their events as if the content items had already been uploaded to the content management system. | 08-27-2015 |
20150244833 | SYSTEMS AND METHODS FOR MANAGING CONTENT ITEMS HAVING MULTIPLE RESOLUTIONS - Systems, methods, and non-transitory computer readable media for managing content items having multiple resolutions may be provided. In some embodiments, a user device may send a request to access one or more images from a content management system. The one or more images may be categorized on the user device by an expected use that determines that the one or more images be in a first version. A second version of the one or more images may be received while a background download of the first version of the one or more images may be performed. In some embodiments, the first version may correspond to a high-resolution image whereas the second version may correspond to a lower resolution image. | 08-27-2015 |
20150244794 | SYSTEMS AND METHODS FOR PROVIDING A USER WITH A SET OF INTERACTIVITY FEATURES LOCALLY ON A USER DEVICE - Providing a user with an interactive user interface that may fully enable interactions regardless of connectivity status may be provided. In some embodiments, one or more content items may be selected by a user of the user devices and may be queued for upload to a content management system. The content items may be organized into one or more collections of content items with other content items already stored in a user account on the content management system, such as images having similar geo-temporal characteristics. A set of interactivity features may be available to the user for interacting with the queued content item. This may provide the user with the seamless feeling as if the content items have been uploaded to the content management system and the user may be interacting with the content items on the content management system, even if the upload has not been completed. | 08-27-2015 |
20150242443 | SYSTEMS AND METHODS FOR SELECTING CONTENT ITEMS TO STORE AND PRESENT LOCALLY ON A USER DEVICE - Systems, methods, and non-transitory computer readable media for dynamically selecting and sending content items to a user device based on various network and device conditions are provided. In some embodiments, a listing of images stored within a user account on a content management system may be generated, and a selection probability value may be assigned to each image within the listing. An available capacity level on the user device may be determined, and images may be dynamically selected to be sent to the user device based on the determined available capacity level and each image's selection probability value. In some embodiments, each image's selection probability value may be based on one or more factors. For example, images that have been recently viewed, recently added to a collection of images, and/or shared within a shared virtual space created by the user, may receive higher selection probability values than other images. In some embodiments, the selected images may be ranked in order of priority for transmission to the user device and sent to the user device in order of rank. | 08-27-2015 |
20150242404 | SELECTIVELY EMPHASIZING DIGITAL CONTENT - One or more embodiments increase the visual appeal and organization of presenting digital content items. In particular, one or more embodiments improve the visual appeal of a presentation of digital content items by emphasizing one or more digital content items within the presentation of digital content items. For instance, one or more digital content items may be emphasized within a graphical user interface including a gallery of digital content items. The emphasized digital content items can be selected based on a score reflecting a particular characteristic of the digital content item and/or a metric of user interest in the digital content item. Digital content items with relatively high scores as compared to other digital content items may be emphasized when presented in conjunction with the other digital content items. | 08-27-2015 |
20150242110 | NAVIGATING GALLERIES OF DIGITAL CONTENT - One or more embodiments of the present disclosure include a content navigation system that allows a user to search, browse, and otherwise experience a collection of digital content items. For example, the content navigation system can provide a graphical user interface including a scroll element. One or more embodiments of the scroll element can include various navigational functions that provide a user-friendly interface for browsing and experiencing a collection of digital content items. Furthermore, the content navigation system can provide methods and systems for a user to easily configure the way in which the digital content items are organized within the user interface, thereby customizing the user's browsing experience. | 08-27-2015 |
20150237102 | PRE-TRANSCODING CONTENT ITEMS - A content management system pre-transcodes portions of content items provided for storage. When a content item is uploaded to the content management system for storage, the content management system stores the content item in an original format. The content management system transcodes a portion of the content item from the original format to a streaming format. The content management system stores the transcoded portion and makes the content item available for access. When a client device requests the content item from the content management system, the content management system first sends by streaming to the client device the stored transcoded portion in the streaming format. During the sending of the transcoded portion, the content management system transcodes a remainder of the content item that has not been transcoded to the streaming format. The content management system sends the transcoded remainder of the content item to the client device. | 08-20-2015 |
20150237090 | STREAMING OF VARIABLE LENGTH CONTENT SEGMENTS - A content management system streams variable length segments of content items to client devices. The content management system stores a content item and makes the item available for access by one or more client devices. When a client device requests the content item from the content management system, the content management system sends the content item to the device by streaming the content item in segments. Specifically, the content management system partitions the content item into a sequence of variable length segments. An initial portion of the sequence includes rapid start segments that are configured as being the smallest segments in length from the sequence. A subsequent portion of the sequence includes the remaining segments having longer length(s). The content management system streams the segments to the client device in sequential order and in a streaming format. | 08-20-2015 |
20150222615 | AUTHORIZING AN UNTRUSTED CLIENT DEVICE FOR ACCESS ON A CONTENT MANAGEMENT SYSTEM - A method, system, and manufacture for authorizing an untrusted client device for access on a content management system. The content management system receives a request from an untrusted client device to access content on the content management system. The content management system sends an authentication key to the untrusted client device. The content management system then receives the authentication key from a trusted client device. Based on the matching authentication key, the content management system transmits data to the untrusted client device in accordance with any additional instructions that the trusted client device may have sent. | 08-06-2015 |
20150222580 | DIRECTING TO SHARED CONTENT - A sharer account of a content management system may share a link to a non-synchronized (i.e., read-only) version of a content item, with a recipient that already has access to a synchronized (i.e., read-write) version of the content item. This can possibly be due to the sharer forgetting that the recipient already has access to the synchronized version, the sharer finding it more convenient to share the link, and/or due to various other reasons. The present disclosure can determine that the recipient, with whom the link is shared, already has access to the synchronized version of the shared content item. The recipient can be notified that he already has access to the synchronized version and can be provided with an option to access the synchronized version (which can be stored locally at the recipient's device and/or stored online at the recipient's account with the content management system). | 08-06-2015 |
20150222431 | RANDOM IDENTIFIER GENERATION FOR OFFLINE DATABASE - Various embodiments of the present technology involve creating a secure unique identifier for a content item to be used in a synchronized content management system while off-line with the synchronized content management system. In some embodiments, securing the unique identifier involves generating a random key and applying a hash function to an input to generate a hash. The synchronized content management system can require a user to send both the secure identifier and the key to the content management system in order to register the content item with the content management system. Accordingly, a malicious user who only has access to the secure identifier cannot use it to identify the key. This prevents a malicious user who has obtained the secure identifier, but does not have access to the key from registering a malicious document using the original user's secure identifier. | 08-06-2015 |
20150207844 | Content Item Synchronization By Block - A content management system synchronizes content items across client computing systems. The content items are transmitted to the content management system and managed as blocks of data with a fixed size. When a new content item is added to synchronized data at a client, the client transmits the blocks and a blocklist to the content management system. The content management system uses the blocklist to determine blocks expected to be received at the content management system and the client begins to transmit blocks of the content item to the content management system. When blocks received at the content management system match expected blocks, the content management system notifies receiving clients to begin receiving blocks for the content item, prior to receipt of all blocks on the blocklist at the content management system. This enables content items to begin synchronization across clients prior to actual entry of the content item into the content management system. | 07-23-2015 |
20150207769 | DEFERRING MESSAGES USING CONTROL CODES IN MESSAGES - A user operating a messaging client can use control codes to defer messages for later action. For example, a user can defer a message by forwarding the message to herself and including in a field of the message a control code indicating that the message should be deferred until a particular condition is met. A message management service can receive the forwarded message, detect the control code, and defer the forwarded message, the original message, or both, e.g., by temporarily moving the message(s) to a deferred-message store until the condition is met. | 07-23-2015 |
20150199440 | ENHANCING PERFORMANCE OF MESSAGE SEARCH AND RETRIEVAL - A message management service can enable a client to search and retrieve of messages from one or more messaging services. The message management service can stage delivery of results to the client to reduce response time for identification of messages satisfying a query. Initially, the message management service can send information descriptive of results, which the client can display. The message management service can send subsequent responses including supplemental information associated with a result and/or actual messages. | 07-16-2015 |
20150199408 | SYSTEMS AND METHODS FOR A HIGH SPEED QUERY INFRASTRUCTURE - In an analytics system, an analyst can analyze data by submitting queries, e.g., through an interface to a database. The analytics system can implement multiple query systems that are each configured to query the database. Query systems can be optimized for handling particular types of queries or for querying particular data. As such, some query systems can process certain queries more quickly and/or more efficiently than other query systems. To take advantage of this, when a query is received, query classification rules can be applied to the query. Based on the query classification, a query system can be selected to process the query, and the query can be sent to the selected query system for processing. | 07-16-2015 |
20150193347 | PREDICTIVE CACHING AND FETCH PRIORITY - Predicting what content items a user finds important and sending those items to a cache on the user's device at times when doing so will not drain resources and will not result in expensive data rates. Applying a ranking function that examines recency and other content metadata associated with the user's content items stored in a synchronized content management system. Determining how much of a ranked list of content items to cache and deciding when is a good time to send content items to the local cache. | 07-09-2015 |
20150188886 | IDENTIFYING AND BLOCKING PROHIBITED CONTENT ITEMS IN A CONTENT MANAGEMENT SYSTEM - To identify whether a content item is prohibited, a content management system can generate a content item fingerprint for the content item and then compare the generated content item fingerprint to a blacklist of content item fingerprints for prohibited content items. If the generated content item fingerprint matches any of the content item fingerprints included in the blacklist, the content management system can determine that the content item is prohibited. The content management system can deny requests to share prohibited content items and/or requests to assign prohibited content items to a user account on the content management system. The content management system can generate the content item fingerprint using the content item as input in a fingerprinting algorithm that was used to generate the content item fingerprints on the blacklist. | 07-02-2015 |
20150180984 | SYSTEMS AND METHODS FOR MAINTAINING LOCAL VIRTUAL STATES PENDING SERVER-SIDE STORAGE ACROSS MULTIPLE DEVICES AND USERS AND INTERMITTENT NETWORK CONNECTIONS - Systems, methods, and non-transitory computer readable media are provided for maintaining local virtual states pending server-side storage across multiple devices and users and intermittent network connections. In exemplary embodiments, content added by a user to his or her account locally on a user device may be displayed, and all interactivity therewith may be facilitated, as if the content had already been created on the content management system. In content management system applications that support shared virtual spaces, changes made by the user from his or her user device to the shared virtual space (including creation of a new shared virtual space) may be displayed locally as soon as the change has been made, not waiting for the information to be transmitted to the server or its state to be made consistent with that of the mobile device. | 06-25-2015 |
20150180980 | SYSTEMS AND METHODS FOR PRESERVING SHARED VIRTUAL SPACES ON A CONTENT MANAGEMENT SYSTEM - Systems and methods are provided for creating shared virtual spaces (“rooms”). In some embodiments, a share request to share a content item from a sharer to at least one sharee may be received. In response, a first virtual space may be created on the sharer's user account and each of the at least one sharee's user accounts on the content management system. A first identifier may be assigned to the content item, where the first identifier associates the sharer and each sharee as a member of the first virtual space. The first shared virtual space may then be preserved in a second shared virtual space stored on the content management system. | 06-25-2015 |
20150180914 | SYSTEMS AND METHODS FOR CREATING SHARED VIRTUAL SPACES - Systems and methods are provided for creating shared virtual spaces (“rooms”). A room may be created when a user first shares images with another user. A user may send a request to a content management system to share one or more images with various contacts. In response, a room is created by the content management system in which a copy of each image is stored. Images added to a room are copied to a separate “rooms” database, and “locked,” being saved in the room for a period of time, which may be indefinitely. Changes made by the user to a room via a user device may be displayed as soon as indicated, without waiting for the information to be sent to a system server or its state to be made consistent with that of the user device. Room activity notifications may be sent to members in various ways. | 06-25-2015 |
20150180846 | PRE-AUTHORIZING A CLIENT APPLICATION TO ACCESS A USER ACCOUNT ON A CONTENT MANAGEMENT SYSTEM - A content management system can tag a client installer with an information tag linking the client installer to a user account. The client installer can be configured to install the client-side application on the client device and pass the identification tag to the installed client-side application. The client-side application can transmit the identification tag to the content management system, which can use the identification tag to identify the linked user account and log the client-side application into the user account. The content management system can implement several verification measures such as limiting the number of times and when an identification tag can be used, as well as IP addresses that can use the identification tag. The content management system can also use data cached by the web-browser application to determine if the web-browser application was used to access the user account in the past. | 06-25-2015 |
20150178516 | RESTRICTING ACCESS TO CONTENT - Various embodiments restrict or enable access to content items of an account based on login information or content request properties. For example, a synchronized online content management system can receive a request including one or more content request properties from a client device to access a user account. Access rules for the user account can be obtained and applied based on the content request properties to generate an access status. In one instance, the client device is provided with full account access if the access status indicates that the client device is an authorized device. In another instance, if the client device is an unauthorized device, at least one aspect of access to the user account is restricted. | 06-25-2015 |
20150177954 | SHARING CONTENT ITEMS FROM A COLLECTION - Embodiments are provided for forming share bars including collections of content items. In some embodiments, a user interface may be displayed on a display interface of a user device. The user interface may include a first region including a collection of content items and a second region including one or more contact icons. A first gesture may be detected on the display interface that selects one or more content items from the collection of content items and places the one or more content items in a first share bar associated with a first contact of the one or more contacts. One or more share options may be provided to share the first share bar with a first contact corresponding to the first contact icon. | 06-25-2015 |
20150177938 | PROVIDING ACCESS TO A CLOUD BASED CONTENT MANAGEMENT SYSTEM ON A MOBILE DEVICE - A user device has a processing module and a UI module. The processing module may have a permanent connection to the UI module, and an intermittent connection to a content management system over a data network. User requested actions are executed within the UI module. For each such action, a parallel request is sent to the content management system when network connectivity allows. Results of the user requested actions are presented within the UI module as if they had been implemented on the content management system. The user may thus interact with content as if all user requested actions have occurred substantially simultaneously with the request. When network connectivity allows, confirmation is received in the processing module from the content management system that the actions have been implemented, and the state of the user requested actions in the UI module is matched with that on the content management system. | 06-25-2015 |
20150177937 | SYSTEMS AND METHODS FOR DISPLAYING AN IMAGE CAPTURING MODE AND A CONTENT VIEWING MODE - Embodiments are also provided for displaying an image capturing mode and a content viewing mode. In some embodiments, one or more live images may be received from an image capturing component on a mobile device. A user interface may display the live images on a touch-sensing display interface of the mobile device. A first gesture may also be detected with the touch-sensing display interface. In response to detecting the first gesture, at least a portion of a collection of content items may be displayed within a first region of the user interface, and/or the one or more live images may be displayed within a second region of the user interface. | 06-25-2015 |
20150177922 | SYSTEMS AND METHODS FOR FORMING SHARE BARS INCLUDING COLLECTIONS OF CONTENT ITEMS - Embodiments are provided for forming share bars including collections of content items. In some embodiments, a user interface may be displayed on a display interface of a user device. The user interface may include a first region including a collection of content items and a second region. A first gesture may be detected with the display interface that selects a first content item from the displayed collection of content items. In response to detecting the first gesture, a first thumbnail of the first content item may be created and placed in the second region. A share option may be provided within the second region that may enable a user of the user device to share any content items that may have a corresponding thumbnail in the second region. | 06-25-2015 |
20150163326 | APPROACHES FOR REMOTELY UNZIPPING CONTENT - Various embodiments provide a method for enabling access to content of a compressed content item from a variety of computing devices. For example, upon receiving a compressed content item, an online content management system can decompress the compressed content item. A copy of the decompressed content item, in this example, can then be sent to one or more computing devices associated with the online content management system through a user account. Accordingly, when the compressed content item is uploaded and decompressed by the online content management system, a folder, for example, containing content associated with the online content management system is synced across each device associated with the user account with the decompressed content item, thereby, enabling the decompressed content item to be available on each device. | 06-11-2015 |
20150163286 | RAPID APPLICATION DEVELOPMENT USING A CONTENT MANAGEMENT SYSTEM - An online content management system enables rapid application development by an application developer using an application development system to create a content application configured to execute on a client device. A designated folder on the application development system is designated for sharing with the client device. Configuration data containing parameters for controlling the operation of the content application is stored in the designated folder. The content application on the client device reads the configuration data from the designated location and applies the parameters on execution and thereafter. When the configuration data is modified on the application development system, the modified data is synchronized by the content management system to the client device. The content application on the client device reads the modified configuration data and applies the modified parameters during execution. | 06-11-2015 |
20150163261 | CONTENT PREVIEW INCLUDING SHARABLE INFORMATION - A user of a content management system can store one or more content items at the user's account with the system. In some instances, the system can generate and present a preview of a content item of interest (e.g., a content item selected by the user). In addition to the preview of the content item, the system can generate and present a web address or other machine-readable code referring to (or otherwise associated with) the preview of the content item. Various embodiments of the present disclosure can enable the web address or other machine-readable code to be sharable and to provide access to the content item (or a copy thereof). For example, the user who is previewing the content item can share the web address of the preview with one or more other users. The one or more users can then access the content item via the web address. | 06-11-2015 |
20150161466 | SYSTEMS AND METHODS FOR AUTOMATED IMAGE CROPPING - Systems and methods in accordance with embodiments of the invention automatically crop images based upon the location of one or more regions of interest (ROIs) identified within the cropped image. In one embodiment, an image cropping application configures a processor to utilize at least one object detector to identify at least one region of interest within an image. A plurality of candidate cropped images within the image are selected and for each candidate cropped image, an output is generated by weighting each of the at least one region of interest contained within the candidate cropped image as a function of its position within the candidate cropped image. A crop location can then be selected based upon the candidate cropped image having the largest output. | 06-11-2015 |
20150160974 | JOB-PROCESSING SYSTEMS AND METHODS WITH INFERRED DEPENDENCIES BETWEEN JOBS - An analytics system that executes processing jobs infers dependencies between jobs to be executed based on identification of dependencies between a “sink” job and a source data object on which the sink job depends. Given a job definition for the sink job that identifies a source data object, the system can identify a “source” job that produces the source data object and can infer a dependency of the sink job on the source job. The system can schedule executions of the source and sink jobs such that the source job completes (or completes generation of the source data object) before the sink job is launched. | 06-11-2015 |
20150160969 | AUTOMATED INVALIDATION OF JOB OUTPUT DATA IN A JOB-PROCESSING SYSTEM - A computing system can provide user interfaces and back-end operations to facilitate review and invalidation of executed jobs. The system can provide an interface that allows the operator to review quality-control information about a completed job. Once the operator identifies a job as invalid, the operator can be presented with further options, such as whether to invalidate only the reviewed job or the job and all its descendants. The operator can also review antecedent jobs to an invalid job (e.g., in order to trace the root of the problem) and can selectively invalidate antecedent jobs. | 06-11-2015 |
20150156274 | SYSTEMS AND METHODS FOR MANAGING SHARED CONTENT BASED ON SHARING PROFILES - Content items stored in an online content management service can be organized and shared. Content items can be associated with sharing profiles that include various sharing-specific metadata, such as details of how an item is shared or with whom it is shared. In some embodiments, the metadata stored in the sharing profiles can be used to organize shared content into shared folders automatically and/or to sort a list of content items. | 06-04-2015 |
20150153935 | RESERVATION SYSTEM - A reservation system associated with an app installed on a user device can be used to regulate access to network-based features of a primary software service offered by the app. Network-based features can include providing access to online content items. Regulating access to these features can prevent overloading the backend service components that provide the network-based features. Growing the user base in a controlled fashion can benefit the user experience. A waitlist with a countdown can be used for users that have installed the app, but who are not yet allowed access to the network-based features of the primary software service. A user interface can display a reservation status (e.g., how many people are in front of the user in line, how many people are behind the user in line, and the like). This can increase user anticipation of the app features and reduce user attrition. | 06-04-2015 |
20150149500 | MULTI-LEVEL LOOKUP ARCHITECTURE TO FACILITATE FAILURE RECOVERY - The disclosed embodiments relate to a data storage system that facilitates efficiently recovering from storage device failures. Upon receiving a request to retrieve a data block from the data storage system, the system uses a hash that identifies the data block to look up a bucket and an associated cell containing the data block. Note that the bucket aggregates a large number of data blocks and is located in the associated cell that comprises a set of object storage devices (OSDs). Within the cell, the system uses the bucket to look up an OSD that contains the bucket in a local bucket database (BDB) for the cell. Within the OSD, the system uses the bucket and the hash to look up an offset and a length for the data block in a write-ahead log that stores data blocks for the bucket. Finally, the system returns the data block from the determined offset. | 05-28-2015 |
20150149407 | GENERATING AND SHARING METADATA FOR INDEXING SYNCHRONIZED CONTENT ITEMS - Embodiments of the invention generate and share metadata for indexing synchronized content items. A server generates metadata for indexing synchronized content items and manages sharing of the metadata with client devices in accordance with user preferences that may be embodied in metadata generation and sharing management rules. For example, a content item stored at the server has been designated to be synchronized across at least a first client. The server generates metadata for indexing the content item and sends the metadata to at least a second client. | 05-28-2015 |
20150142897 | MANAGING TEXT MESSAGES - Message management services for text messages can include converting, modifying, or copying a text message so as to create an email that a corresponds to the text message; adding a subject line to a corresponding email to facilitate grouping, threading, and searching; linking a corresponding email to the original text message to enable a text-message reply to a corresponding email; email-address-lookup services to enable an email reply to a corresponding email; and so on. | 05-21-2015 |
20150135337 | SYSTEMS AND METHODS FOR MONITORING AND APPLYING STATISTICAL DATA RELATED TO SHAREABLE LINKS ASSOCIATED WITH CONTENT ITEMS STORED IN AN ONLINE CONTENT MANAGEMENT SERVICE - Shareable links can be created to share content items and information pertaining to activity on those shareable links can be monitored and stored in an online content management service. Based on this activity information, actions can be executed. These actions can include sending notifications regarding link activity, disabling shareable links, and/or updating activity thresholds related to the shareable links. Using the activity information, popular shared content items can be identified and recommendations for sharing unshared content items can be provided to the user. Additionally, advertisements can be tailored to the relative popularity of the shared content items. | 05-14-2015 |
20150135097 | FILE-LEVEL COMMENTING - Various embodiments provide a commenting system for multiple users to provide and share comments to shared content items. For example, users can share a web link to a collection of content items, such as documents, spreadsheets, photos, and any other media, with other users stored in an online content management system. To enable such functionality, the online content management system can expose an application programming interface to enable third-party service providers to develop and attach a comment interface to content items. Accordingly, such a commenting system can provide a comment interface for concurrent display alongside a respective content item in which users can provide comments to shared content items or to use as notes for their personal content items. | 05-14-2015 |
20150134808 | SYSTEMS AND METHODS FOR MONITORING AND APPLYING STATISTICAL DATA RELATED TO SHAREABLE LINKS ASSOCIATED WITH CONTENT ITEMS STORED IN AN ONLINE CONTENT MANAGEMENT SERVICE - Shareable links can be created to share content items and information pertaining to activity on those shareable links can be monitored and stored in an online content management service. Based on this activity information, predetermined actions can be executed. These actions can include sending notifications regarding link activity, disabling shareable links, and/or updating sharing limitations related to the shareable links. Using the activity information, popular shared content items can be identified and recommendations for sharing unshared content items can be provided to the user. Additionally, advertisements can be tailored to the relative popularity of the shared content items. | 05-14-2015 |
20150134722 | CONTENT ITEM PRESENTATION SYSTEM - In one aspect, a content item presentation server sends, to a first client of the server, browser-executable instructions implementing a presentation application. The instructions are configured to present, at the first client, at least a portion of a content item in the presentation application with at least one user control of the presentation application for navigating the content item in a particular manner disabled. After sending the instructions, the server receives, from a second client of the server, a first command to navigate the content item in the particular manner. In response to receiving the first command, the server sends, to the first client, a second command to navigate the content item in the particular manner thereby causing the presentation application to automatically navigate, at the first client, the content item in the particular manner. | 05-14-2015 |
20150134679 | LOCATION-INDEPENDENT LINKS TO CONTENT AT ONLINE CONTENT MANAGEMENT SYSTEMS - The disclosed embodiments provide a system that facilitates access to content. During operation, the system tracks a content item at an online content management system using an identifier for the content item. Next, the system uses the identifier to provide a link to the content item, wherein the link enables access to the content item from an electronic device independently of a location of the content item within the online content management system. | 05-14-2015 |
20150134624 | CONTENT ITEM PURGING - Methods, systems, and computer readable media for content item purging functionality are provided. A contact item purger, such as may be incorporated within a local client application of a content management system, leverages its knowledge as to which items have been uploaded to the content management system, and how long content items have been stored on the user device, to propose items for local deletion and thus reclaiming storage on the user device. A contact item purger may run on one or more devices of a user associated with an account on a content management system upon various triggering events, and may run with or without user interaction, thus maintaining available user device memory capacity at all times. | 05-14-2015 |
20150120763 | FILTERING CONTENT USING SYNCHRONIZATION DATA - The disclosed embodiments provide a system that facilitates access to content. During operation, the system provides access to a set of content items associated with at least one user account in a synchronized content management system through a file chooser on an electronic device. Next, the system provides one or more filters for viewing the content items through the file chooser, wherein the one or more filters are based at least in part on synchronization data associated with the set of content items. | 04-30-2015 |
20150113077 | SECURE SENT MESSAGE IDENTIFIER - A message management service allows a user to access and manage messages from various message services. The user can access the message management service using a message management client application executing on a client device and can draft messages using the message management client application and send the messages through the different message services. The message management service can add information to messages sent using the message management client application that can be used to identify and organize the messages. A secure sent-message identifier can be added to messages sent by the message management service to reliably indicate that the messages were sent by the message management service. | 04-23-2015 |
20150113076 | MESSAGE THREAD IDENTIFICATION AND MANAGEMENT - Systems and methods for identifying threads of related messages. A computer can associate messages with threads by storing a thread identifier (thread ID) identifying a thread and associating the thread ID with a message identifier (message ID) of each known message that belongs to the thread. The computer can inspect a message to determine whether the message identifies a reference message. Before assigning a thread ID to the message or a reference message, the computer can determine whether a message ID for either message is stored in association with a thread ID. If a thread ID is stored for a message ID of either message, the computer can assign the thread ID to message IDs of other reference messages. If a thread ID is not stored for a message ID of either message or is different for either message, store a common thread ID in association with both messages. | 04-23-2015 |
20150100419 | Dynamically Customizing User Quotas - An online content management system determines a new account configuration to offer to a user, including the price and/or size of a user's quota of storage space in an account on the online content management system, based on usage characteristics of the account. An account management module tracks account usage. The account management module analyzes the account usage and applies a model to predict the willingness of the user to pay for a new account configuration. Responsive to the results of the prediction, the new account configuration is offered to the user. The user's feedback on the offered new account configuration is tracked. If the user accepts the offer, the user's account details are updated accordingly. If the user rejects the offer, this feedback may be added as input into future predictions of that user's willingness to pay for a new account configuration. | 04-09-2015 |
20150095451 | FACILITATING ACCESS TO CONTENT FROM GROUP INTERACTIONS - The disclosed embodiments provide a system that facilitates access to content. During operation, the system detects uploading of the content within a group interaction among a set of users. Next, the system aggregates the content into a centralized location. Finally, the system enables access to the content at the centralized location by one or more of the users. | 04-02-2015 |
20150088817 | HEURISTICS FOR SELECTING AND SAVING CONTENT TO A SYNCED ONLINE CONTENT MANAGEMENT SYSTEM - Embodiments are provided for using heuristics for selecting and saving content to a synced online content management system. In some embodiments, one or more content items and/or indices thereto may be received within a first application. For example, a user may receive a photograph within a text message application. In some embodiments, a first defined gesture may be detected by a user device and in response, a second application may open. In some embodiments, a second defined gesture may be detected, and in response a (a) store, (b) share, and/or (c) an assign to a collection, operation may be performed within the second application. Alternatively, these operations may be performed within the second application based on at least one predefined rule (without a second gesture required). | 03-26-2015 |
20150088646 | SYSTEMS AND METHODS FOR GENERATING INTELLIGENT ACCOUNT RECONFIGURATION OFFERS - Embodiments are provided for generating intelligent account reconfiguration offers to users of a content management system. The content management system may monitor how a user utilizes available features and/or storage space to determine whether the user would be amenable to an offer to reconfigure their user account. Such account reconfiguration offers may include an offer to alter the amount of storage space and/or features available to the user account. The storage space and/or features offered as part of an intelligent account reconfiguration offer may be specific to one particular type of content category, or, for example, may be a function of activity in multiple content categories, based on analysis of historical user data across the entire content management system | 03-26-2015 |
20150074044 | GRAPH-BASED DATA MODELS FOR PARTITIONED DATA - The disclosed embodiments provide a system that manages access to data. During operation, the system provides a graph-based data model of the data, wherein the graph-based model comprises a set of nodes and a set of directed edges among the nodes. Next, the system stores the graph-based data model in a set of partitions, wherein each partition from the set of partitions includes one or more nodes from the set of nodes and all outgoing edges from the one or more nodes. Finally, the system enables lookup of a set of outgoing edges associated with a source node from the one or more nodes. | 03-12-2015 |
20150071549 | SCANBOX - Embodiments are provided for content item classification. In some embodiments, an image for classification is received, a compact representation for the image having values indicative of pixel values within the received image is generated, a plurality of angle measurements for possible edges of at least one potential document within the received image are determined, and the image is classified using said compact representation and said plurality of angle measurements | 03-12-2015 |
20150058289 | FACILITATING DATA MIGRATION BETWEEN DATABASE CLUSTERS WHILE THE DATABASE CONTINUES OPERATING - A system for migrating data items from a source cluster to a destination cluster in a database system. During operation, while the database continues to process live database traffic, the system records a current position in an operation log for the database, wherein the operation log comprises a sequential record of operations applied to the database. Next, the system retrieves data items from the source cluster, and inserts the copies of the retrieved data items into the destination cluster. The system also applies a sequence of updates, starting from the recorded position in the operation log, to the copies of the data items in the destination cluster. Finally, after the sequence of updates is applied, the system performs a cut-over operation that diverts the live database traffic from the data items on the source cluster to the copies of the data items on the destination cluster. | 02-26-2015 |
20150052430 | GESTURES FOR SELECTING A SUBSET OF CONTENT ITEMS - Systems, methods, and non-transitory computer readable mediums for selecting a subset of content items from a plurality of content items on a user device using various gestures are provided. Such methods may include displaying a plurality of content items on a touch-sensing display interface of a user device, detecting a first tactile gesture on the touch-sensing display interface, the first tactile gesture engaging a selection mode, detecting a second tactile gesture on the touch-sensing display interface, the second touch gesture selecting and placing at least one of the plurality of content items in a subset of content items, and in response to the detected gestures, performing an action with the subset of content items. | 02-19-2015 |
20150040235 | COERCED ENCRYPTION ON CONNECTED DEVICES - Techniques for coercing users to encrypt synchronized content stored at their personal computing devices. In some aspects, one or more computing devices receive, from a personal computing device, an indication of whether data stored in at least a portion of a storage device of the personal computing device is protected by disk encryption. In response to determining, based on the indication, that the portion of the storage device is not protected by encryption, synchronization data for synchronizing a copy of one or more synchronized content items stored in the portion of the storage device with another copy of the synchronized content items stored at one or more server computing devices is withheld from the personal computing device until disk encryption on the personal computing device is enabled so as to coerce the user to enable disk encryption on the personal computing device. | 02-05-2015 |
20150040068 | REFERRAL SLIDER - Various embodiments generally relate to user interface elements informative of referral incentives. In some embodiments, contact information may be obtained for contacts associated with a user of a content management system. Various amounts of additional storage space available to the user upon acceptance of referral requests sent by or on behalf of the user to the contacts may be determined. One or more graphic indicator of various types may be displayed to the user indicating one or more of: amounts of additional storage space obtainable through successful new referrals, the user's current storage space, and the relative sizes of the user's current storage space and the amounts of additional storage space. | 02-05-2015 |
20150039847 | BALANCING DATA DISTRIBUTION IN A FAULT-TOLERANT STORAGE SYSTEM - The disclosed embodiments relate to a system for managing replicated copies of data items in a storage system. During operation, the system obtains a current configuration of the storage system, wherein the current configuration specifies locations of replicated copies of data items. Next, the system analyzes the current configuration to identify possible movements of copies of data items among locations in the storage system. The system then assigns utilities to the identified movements, wherein a utility assigned to a movement reflects a change in reliability resulting from the movement. Finally, the system selects a utility-maximizing set of movements and performs the utility-maximizing set of movements to improve the reliability of the storage system. | 02-05-2015 |
20150039738 | TECHNIQUES FOR MANAGING UNSYNCHRONIZED CONTENT ITEMS AT UNLINKED DEVICES - Techniques are described herein for managing unsynchronized content items when the personal computing devices storing the unsynchronized content items are unlinked from a content item synchronization service. The techniques involve treating synchronized content items differently from unsynchronized content items. For example, after a personal computing is unlinked from the service, synchronized content items may be removed or deleted from the personal computing device and unsynchronized content items encrypted and/or moved to another data storage location. | 02-05-2015 |
20150032829 | IDENTIFYING RELEVANT CONTENT IN EMAIL - Message management services can include processing an email to identify relevant content from among all content in the email and converting the identified relevant content into a simple, easy-to-read format. For example, message management services can apply multiple parsing strategies to an email. Each strategy can attempt to parse the email to identify relevant content and to output results that include any identified relevant content and an associated confidence score. The results having the highest confidence score can be selected. The identified relevant content included in the selected results can be converted into a flat string with stylings and links for displaying relevant content of the email in a simple, easy-to-read format. | 01-29-2015 |
20150032692 | PRIORITIZING CONTENT ITEM SYNCHRONIZATION BASED ON SHARING - Content items queued for synchronization between a client device and a content management system can be automatically prioritized to improve the sharing process. That is, the content items can be prioritized based on whether a share link has been created to the content item. A share link can enable a user to access the shared content item from a content management system. Content items that have been shared using a share link can be given higher priority to be synchronized prior to content items that have not been shared. The queued content items can be synchronized in the synchronization order resulting from the prioritization. Further, multiple shared content items queued for synchronization can be sub-prioritized based on one or more sub-prioritization criteria. | 01-29-2015 |
20150026675 | LIGHT INSTALLER - A light installer can be utilized to improve the installation process of a client-side application. A light installer can be an installer containing only the necessary information to initiate the installation process, such as information necessary for prompting the user for required data and authorizations, communicating with the content management system, downloading additional resources, and installing the client-side application. The light installer can minimize user interaction time by obtaining all necessary user authorizations early in the installation process, thereby enabling the light installer to install all components of the client-side application without further authorization from the user. Further, the light installer can be tagged with data identifying a user account associated with the client device that can be used for reporting, pre-populating data during the installation process, customizing the installation process, pre-authorizing the client-side application, etc. | 01-22-2015 |
20150026257 | MUSIC BOX - Embodiments are provided for a media player. In some embodiments, locally stored media player data is obtained from a first device on at least one of a device setting, a media player setting, and a media player state of a media player module of a web application, the data is stored in a data store of a content management system for a first account, and based on the media player data, locally stored data is selectively synchronized on a second device associated with the first account to provide a continued experience with media on the second device. | 01-22-2015 |
20150019311 | CONTACT IMPORTER - Embodiments are provided for importing contacts. A contact importer leverages the various contacts associated with a user of a content management service to find potential new users and/or customers. A contact importer may run on one or more devices of a user associated with an account on a content management system, and import various contacts of that user to a contact list. The list may be culled to weed out non-human contacts, and processed so as to assign an affinity score to each contact, expressing a degree of affinity to the user. Incentives may be offered to the user for either sending or approving an invitation to a contact to register with the content management system, paid upon the invitee successfully registering. Different incentives may be offered for an accepted invitation from various contacts or classes thereof. | 01-15-2015 |
20150012616 | Saving Third Party Content to a Content Management System - A content management system interacts with a content provider to store content items of the content provider within content storage of the content management system, where it is available to the users. Before obtaining and/or storing a content item of a content provider, the content management system determines whether it already has stored that content item, either for the same user or for other users of the content management system. In one embodiment, the content management system may include content subscription functionality that manages subscriptions of users to content of a content provider. In one embodiment, the subscription functionality handles the establishment of requested subscriptions, which includes identifying groups of users who have the same subscriptions, and also handles obtaining new content items provided by the content providers as part of those subscriptions. | 01-08-2015 |
20150012488 | Structured Content Item Synchronization - A content management system defines a synchronization application programming interface (API) used by applications executing on client devices to synchronize content items after the content items are changed. Functions of the API specify changes to the content items in terms of semantically-meaningful locations within the content items, rather than physical file locations. The content management system can represent the state of a content item in terms of change descriptors that reference the semantic locations of the API. The content management system can then distribute the change descriptors to the client devices, which refer to the semantic locations of the change descriptors when determining how to reconcile changes made by other client devices. | 01-08-2015 |
20140351346 | PROVIDING INFORMATION FOR SHARED CONTENT - Various embodiments can enable a content item associated with a sharer account of a content management system to be shared with a recipient account of the content management system. The content item can be analyzed to determine at least some information about the content item, which can include one or more properties associated with the content item, one or more representations of one or more content portions present in the content item, or any combination thereof. A communication can notify the recipient account that the sharer account has shared the content item with the recipient account. The communication can further comprise the determined information about the content item, which can include the one or more properties and/or the one or more representations of the content portions. This information can enable the recipient to make a better decision regarding whether or not to accept the share invitation. | 11-27-2014 |
20140337458 | MANAGING A LOCAL CACHE FOR AN ONLINE CONTENT-MANAGEMENT SYSTEM - The disclosed embodiments relate to techniques for managing a local cache on a computing device that stores content items for an online content-management system. These techniques generally operate by gathering information that is available on the computing device (such as information about user actions, information about which applications are executing, and information about the location of the computing device) and using this information to identify relevant content items that are likely to be accessed in the near future. This enables the system to perform cache-management operations at the local cache to facilitate rapidly accessing the relevant content items through the local cache. | 11-13-2014 |
20140337327 | SUPPORTING ENHANCED CONTENT SEARCHES IN AN ONLINE CONTENT-MANAGEMENT SYSTEM - The disclosed embodiments relate to techniques for supporting enhanced content-item searches in an online content-management system. These techniques generally operate by gathering information that is available in the online content-management system (such as how often each content item has been updated, how many users have accessed the content item, and how many identical copies of the content item are stored in the online content-management system) and using this information to identify relevant content items that are likely to be important to a user. This enables the online content-management system to perform searching operations that return relevant content items to the user. | 11-13-2014 |
20140337278 | MANAGING CONFLICTED COPIES - Various embodiments provide a method of managing and preventing conflicted copies of a content item. For example, as changes are made to a content item, either by multiple users simultaneously or by a single user utilizing multiple devices, conflicted copies can be inadvertently created. These conflicted copes are multiple copies of the same content item where each copy may separately contain unique changes. Heuristics can be used to help users more easily avoid or manage these conflicted copies. In one example, a user could be notified and shown the difference between copies to either accept or reject changes. Further, users could also be notified when modifying a content item on a device that has not been synchronized in a determined period of time, or when the content item is known to be modified but the changes have yet to be synchronized to the device. | 11-13-2014 |
20140331301 | TOGGLE BETWEEN ACCOUNTS - Techniques are described for enabling administrators of teams that use a particular service to specify which sign-on options, of multiple possible sign-on options, are assigned to the members of the teams to which the administrators belong. For example, an administrator may assign a first sign-on option, which only allows users to use native authentication, to one set of members of the team. At the same time, the administrator may assign a second sign-on option, which only allows users to use third-party single-sign-on authentication, to another set of members of the same team. | 11-06-2014 |
20140331126 | Animating Edits to Documents - A notes system is presented with a content management system. The notes system manages creation and distribution of edits to notes to users sharing the notes. The notes are stored as a series of edits at the notes system. When an edit to a note is received, the edit is propagated to users subscribed to a note by a backend server responsible for managing the note. The shared users are notified through application servers associated with each shared user. The notes server includes various indices for searching the notes and allows notes to be searched quickly to organize viewing by a user of notes and identification of relevant material in the notes. The stored edits are used to display edits to a note to a user by replaying the accessed note to the user. | 11-06-2014 |
20140330911 | Note Browser - A notes system is presented with a content management system. The notes system manages creation and distribution of edits to notes to users sharing the notes. The notes are stored as a series of edits at the notes system. When an edit to a note is received, the edit is propagated to users subscribed to a note by a backend server responsible for managing the note. The sharing users are notified through application servers associated with each sharing user. The notes server includes various indices for searching the notes and allows notes to be searched quickly to organize viewing by a user of notes and identification of relevant material in the notes. The stored edits are used to display edits to a note to a user by replaying the accessed note to the user. | 11-06-2014 |
20140330857 | Suggested Search Based on a Content Item - A note sharing system is presented with a content management system. Note sharing system manages creation and distribution of edits to notes to users sharing notes. Notes are stored as a series of edits at note sharing system. When an edit to a note is received, the edit is propagated to users subscribed to a note by a backend server responsible for managing the note. The sharing users are notified through notes servers associated with each sharing user. Notes server includes various indices for searching notes and allows notes to be searched quickly to organize viewing by a user of notes and identification of relevant material in notes. The stored edits are used to display edits to a note to a user by replaying the accessed note to the user. | 11-06-2014 |
20140330776 | IMPORTING CONTENT ITEMS - Content items stored on a client device can be imported to a content management system. The client device can be configured to search on the client device for specified file extensions to identify content items to be imported. The search can be of the entire memory, or alternatively, locations known to likely include content items. For example, the search can be based on folders known to be used by content management applications to store content items. Upon identifying content items, an import interface can be presented to the user that enables the user to select whether to proceed with the import. Further, the import interface can enable the user to select import parameters such as the type of import and which content items to import. A user can be enabled to select a subset of content items based on a variety of gathered metadata associated with the content items. | 11-06-2014 |
20140325016 | AUTOMATIC ACCOUNT SELECTION - A content item uploaded to a content management system from a client device can be assigned to one of multiple user accounts on which the client device is authorized. The user account can be selected based on account selection rules dictating selection of a user account based on various factors. For example, the account selection rules can dictate selection of a user account based on the type of user account; the type of content item; the client device that created the content item; the time the content item was created, modified, or uploaded; the location the content item was created, modified, or uploaded; etc. The account selection rules can be specified by a user or be heuristics based on general assumptions, data gathered regarding the user, and/or historical data gathered from content items already assigned to the user accounts. The content item can be assigned to the selected user account. | 10-30-2014 |
20140317054 | TECHNIQUES FOR ADMINISTERING COMINGLED CONTENT ITEMS - Techniques for assisting owners to remotely administer their digital content items stored at non-owners' personal computing devices. The techniques involve identifying owned content items from among content items stored in a synchronization replica that is synchronized with synchronization replicas at the non-owners' personal computing devices. The techniques further involve allowing owners to remotely perform certain administrative actions on owned content items. For example, in response to a command initiated at an owner's personal computing device, a network signal or signals can be sent to a synchronization agent installed on the non-owners' personal computing devices to automatically remove all owned content items from the synchronization replicas at the non-owners' personal computing devices. For example, the generation and sending of such signal can be performed by an online content item storage and synchronization service that synchronizes a server-stored synchronization replica with the synchronization replicas at the non-owners' personal computing devices. | 10-23-2014 |
20140317031 | APPLICATION RECOMMENDATION - Various embodiments of the disclosed technology can obtain information about associations between users (e.g., user accounts) of a content management system and applications compatible with the content management system. Various embodiments can also obtain information about a plurality of attributes associated with usage of the content management system by the users (e.g., user accounts). In some embodiments, the attributes can include a device property, a usage pattern, an account property, a content item property, a profile property, a preference property, or a domain property. Moreover, data about social connections of the users (e.g., user accounts) can also be obtained. Based, at least in part, on at least one of the information about the associations, the information about the plurality of attributes, or the data about the social connections, one or more applications can be recommended to a selected user (e.g., a selected user account). | 10-23-2014 |
20140304618 | SHARED CONTENT ITEM COMMENTING - Various embodiments provide a commenting system for multiple users to provide and share comments to shared documents. For example, users can share a web link to a collection of content items, such as documents, spreadsheets, photos, and any other media, with other users stored in an online content management system. The commenting system can provide a comment interface displayable alongside a respective content item and the comments can be saved for each user and the content item with associated comments can be synced across the multiple users. The comments can scroll independently of the content in a content item or the comments can be linked to a location therein and the scrolling of the comments can be linked to the scrolling of the content item such that corresponding comments are displayed. | 10-09-2014 |
20140304384 | UPLOADING LARGE CONTENT ITEMS - Disclosed are systems, methods, and non-transitory computer-readable storage media for uploading a content item to a content management system in fixed size data blocks. A client device can split a content item into fixed size data blocks and create a unique identifier for each of the fixed size data blocks. The unique identifiers can be and transmitted to the content management system to determine which fixed size data blocks are already stored on the content management system. The client device can create a unique identifier for a fixed size data block by using at least a portion of the fixed size data block as input in a hashing algorithm. The resulting hash output can be the unique identifier. The content management system can search for the unique identifiers in a content item index that lists the unique identifier for each fixed size data block stored on the content management system. | 10-09-2014 |
20140298491 | TECHNIQUES FOR RECOVERING MISSING DEVICES - Techniques are provided for assisting owners to recover missing devices. The missing device automatically performs certain actions proactively in response to detecting conditions that indicate that the device has been lost or stolen. Conditions that indicate the device has been lost or stolen (“triggering conditions”) may include that a password failure has occurred more than a predetermined number of times. Any number and type of recovery-assisting actions may be taken, in response to triggering conditions, to assist owners in recovering a missing device. For example, a device may generate a record that indicates the current location of the device, and synchronize the record with an online service or some other device. The generation and synchronization of such records may be repeated on a periodic basis until either (a) the device becomes disabled, or (b) a user enters an appropriate password. | 10-02-2014 |
20140298041 | PORTABLE COMPUTING DEVICE WITH METHODOLOGIES FOR CLIENT-SIDE ANALYTIC DATA COLLECTION - A portable computing device with methodologies for client-side analytic data collection are described. In one embodiment, for example, a method performed by a portable computing device having volatile and non-volatile memory includes obtaining a plurality of events to be logged; serializing the events to be logged; storing the serialized events in the volatile memory; encrypting the serialized events to produce serialized and encrypted events; storing the serialized and encrypted events in the non-volatile memory; decrypting the serialized and encrypted events to produce serialized and decrypted events; storing the serialized and decrypted events in the volatile memory; compressing the serialized and decrypted events to produce compressed, serialized, and decrypted events; encrypting the compressed, serialized, and decrypted events to produce encrypted, compressed, and serialized events and storing the encrypted, compressed, and serialized events in the non-volatile memory. | 10-02-2014 |
20140289868 | SHARABLE CONTENT ITEM LINKS WITH USE RESTRICTIONS - Shareable content items links with use restrictions. In one embodiment, for example, a method comprises: receiving, from a client computing device used by a link submitter, a request to access a server-stored content item at a sharable link; denying the access requested by the link submitter based on one or more use restrictions associated with the shareable link; prompting the link submitter to request approval to access to the server-stored content item at the shareable link; responsive to receiving approval for the link submitter to access the server-stored content item at the shareable link, modifying the use restrictions associated with the shareable link to allow the link submitter to access the server-stored content item at the shareable link. | 09-25-2014 |
20140289810 | SHARABLE CONTENT ITEM LINKS WITH USE RESTRICTIONS - Sharable content item links with use restrictions. In one embodiment, for example, a method comprises: receiving, from a client computing device used by an authenticated link submitter, a first request to access a server-stored content item at a sharable link; wherein the link submitter is authenticated according to a first authentication factor; responsive to receiving the first request, prompting the link submitter to enter/submit a second authentication factor; and providing access to the server-stored content item at the shareable link responsive to receiving the second authentication factor from the link submitter. | 09-25-2014 |
20140289360 | LOCAL SERVER FOR SYNCED ONLINE CONTENT MANAGEMENT SYSTEM - A client device can implement a client-side application for a server-side online content management system. The client-side application can communicate with the server-side online content management system to sync data stored locally on the client-side with data stored on the server-side. A local web server can be implemented on the client device to work in conjunction with the client-side application, such that the local web server can access the data stored locally. The client device can run a web browser that communicates with the local web server. A user of the client device can use the web browser to connect to the local web server to access the synced data stored locally on the client-side. Advantages of accessing the data stored locally using the web browser via the local web server include performance improvements, offline access to the data, and use of native client applications to interact with the data. | 09-25-2014 |
20140282901 | MANAGING SHARED CONTENT WITH A CONTENT MANAGEMENT SYSTEM - Embodiments are provided for managing shared content with a content management system. In some embodiments, a request is received for a history of content shares for an authenticated account, at least one content share is retrieved for the authenticated account, the at least one content share having at least one shared item and at least one recipient identifier, information on the at least one content share on a user interface is displayed, and a request is received to modify the at least one content share and updating the at least one content share in response to the request. | 09-18-2014 |
20140280463 | IMPLEMENTING A CONSISTENT ORDERING OF OPERATIONS IN COLLABORATIVE EDITING OF SHARED CONTENT ITEMS - Systems, methods, and computer-readable storage media for ordering editing operations in collaborative editing of shared content items. The content management system can receive an edit operation from a first client for a content item that is shared for collaborative editing between the first client and a second client. In response to receiving the operation, the system can send an update to the first client including a previous operation received from the second client prior to receiving the operation from the first client, wherein the update can instruct the first client to perform a transform operation to transform a parameter of the operation according to an effect of the previous operation received from the second client. The system can then receive a result of the transform operation from the first client and update the shared content item based on the previous operation and the result of the transform operation. | 09-18-2014 |
20140279842 | INFERRING A SEQUENCE OF EDITING OPERATIONS TO FACILITATE MERGING VERSIONS OF A SHARED DOCUMENT - The disclosed embodiments relate to a system that infers a sequence of editing operations that were applied to a document to produce an updated version of the document. During operation, the system computes a minimum edit distance between the document and the updated version of the document. During this process, the system associates a block cost with each contiguous block of characters that is changed by an editing operation and also a character cost with each character that is changed. Next, the system uses information stored during the computation to determine the sequence of editing operations which were used to achieve the minimum edit distance. The system communicates the sequence of editing operations to a remote computing device, wherein the remote computing device uses an operational transformation technique to transform the sequence of editing operations before applying the transformed sequence of editing operations to a remote version of the document. | 09-18-2014 |
20140270571 | SHUFFLE ALGORITHM AND NAVIGATION - Embodiments are disclosed for randomly and pseudo-randomly presenting images to a user. An exemplary method includes receiving a first set of images from a user, receiving a second set of conditions that an image must satisfy, creating a subset of the first set of images that satisfies the second set of conditions, selecting a random element of said subset, and displaying said random element to a user. The conditions define the breadth or narrowness of the subset of images from which a random element is chosen. The conditions may be system set, user configured, or any combination, and a user may repeat the process, or may choose to view a new image that has one or more affinities to the last randomly chosen image presented. Affinities function in similar manner to the conditions of a pseudo-random selection, but generally serve to narrow the available set of photos to a greater extent. Conditions or affinities may be, for example, time based, location based, event based, based on a relationship of the user to a person appearing in the last displayed photo, or based upon various other defined connections or commonalities. | 09-18-2014 |
20140270550 | PRESENTATION AND ORGANIZATION OF CONTENT - Embodiments are provided for organization and presentation of content. In some embodiments, a plurality of images and a plurality of similarity rules for image categorization are received. For each image in the plurality of images, that image and each remaining image from the plurality is compared by: applying each similarity rule to the image and a remaining image from the plurality to obtain a numeric result, and recording the numeric result for the pair of images in a numeric representation, the numeric representation embodying similarities. The numeric representation is used as a reference for clustering the plurality of images into clusters of similar images, and each image is stored with a marker denoting a cluster to which it has been assigned. | 09-18-2014 |
20140270547 | PRESENTATION AND ORGANIZATION OF CONTENT - Embodiments are provided for organization and presentation of content. In some embodiments, a plurality of images and a plurality of similarity rules for image categorization are received. For each image in the plurality of images, the image from the plurality and each remaining image from the plurality is compared by: applying each similarity rule to the image and a remaining image from the plurality to obtain a numeric result, and recording the numeric result for the two images in a numeric representation, the numeric representation embodying similarities found between each of the plurality of images. The numeric representation is used as a reference for clustering the plurality of images into clusters of similar images, and each image is stored with a marker denoting a cluster to which it has been assigned. | 09-18-2014 |
20140270530 | DUPLICATE/NEAR DUPLICATE DETECTION AND IMAGE REGISTRATION - Embodiments are disclosed for detecting duplicate and near duplicate images. An exemplary method includes receiving an original image, preparing the image for fingerprinting, and calculating an image fingerprint, the fingerprint expressed as a sequence of numbers. The method further includes comparing the image fingerprint thus obtained with a set of previously stored fingerprints obtained from a set of previously stored images, and determining if the original image is either a duplicate or a near duplicate of an image in the set if the dissimilarity between the two fingerprints is less than a defined threshold T. Once a duplicate or near duplicate is detected, various defined actions may be taken, including culling the less desirable image or referring the redundancy to a user. | 09-18-2014 |
20140269911 | BATCH COMPRESSION OF PHOTOS - Embodiments are provided for batch compression of photos. In some embodiments, first and second images are selected, each image comprising a plurality of individual blocks and each individual block is defined by at least one matrix whose values are indicative of pixel data within the individual block. For each individual block of the second image, comparing a chosen individual block of the second image to each individual block within at least one region of the first image. The comparing including calculating a difference block between the chosen block of the second image and a chosen block within the at least one region of the first image, the difference block comprising a difference between corresponding matrix values of the two blocks being compared, and calculating a sum for the calculated difference block as a similarity metric for the two blocks being compared. A similar difference block is provided from the calculated difference blocks for inclusion in a difference representation based on the corresponding sum, the similar difference block operable with the chosen block within the at least one region of the first image to reconstruct the chosen individual block of the second image, and compressing the difference representation and the first image, where the difference representation is operable with the first image to reconstruct the second image, and transmitting the compressed information. | 09-18-2014 |
20140258473 | SHARING A CONTENT ITEM - A content item on a content management system can be shared using a generated sharing link. The sharing link can be a custom network address, such as a uniform resource locator (URL), which allows the content item to be accessed without authentication. The sharing index and a content path of the content items can be listed in a sharing index used to identify the content upon a request initiated by the sharing link. The content management system can generate a content link to a content item upon receiving a sharing input from a user indicating the user wants to share a content item. Alternatively, in some embodiments, sharing links can be pre-generated by the content management system and stored on the client device. The sharing link can stored directly to a data buffer on the client device, such as a clipboard, where it can be accessed by the user. | 09-11-2014 |
20140258418 | CONTENT ITEM SHARING AND SYNCHRONIZATION SYSTEM WITH TEAM SHARED FOLDERS - A content item sharing and synchronization system providing team shared folders is described. Users of the system have access to the team shared folder simply by being a member of a team. A team account manager of the team can grant access to the team shared folder simply by inviting selected users to the team. Similarly, the team account manager can revoke access to the team shared folder simply by removing a user from the team. Unlike typical network file server folders, separate access control list management for the team shared folder apart from user team membership management is not needed to grant and revoke access to the team shared folder, thereby reducing administrative steps necessary to effectively manage access to the team shared folder. | 09-11-2014 |
20140244618 | SEARCH INTERFACE FOR AN ONLINE CONTENT MANAGEMENT SYSTEM - The disclosed embodiments provide a system that facilitates searching an online content management system for content items associated with a user. During operation, the system receives a call from a client application at a search interface in the online content management system, wherein the client application is operating on behalf of the user. In response to the call, the system performs a lookup in a per-user index within the online content management system, wherein the per-user index facilitates looking up information about content items associated with the user in the online content management system. The system then returns the information obtained during the lookup to the client application. The client application can then use the retrieved information to facilitate an interaction between the client application and the user. | 08-28-2014 |
20140237019 | SERVER-SIDE TRANSCODING OF MEDIA FILES - The disclosed embodiments relate to a file-communication system that enables a user to stream high-quality media (for example, from their Dropbox™) During operation, the system streams the media at an initial quality level to a client via a channel. For example, the quality level may be one of a set of quality levels associated with different transcoding operations. Then, the system determines or obtains an indicator of performance for the channel. Based on the indicator, the system spawns an additional transcoding operation at a different quality level than is available in the set of quality levels. The resulting media at the different quality level is then streamed from the system to the client via the channel. | 08-21-2014 |
20140223347 | MESSAGING CLIENT APPLICATION INTERFACE - A user interface for a messaging client application can include a message list. By executing various input operations on a representation of a message in the message list, the user can take an action on the message. For example, a user operating a pointing device can perform a drag operation on a representation of the message in the message list, and the action to be taken on the message can be indicated by the direction and distance of the drag. Visual feedback can be provided during the drag operation to indicate the action that will be taken if the user ends the drag at the current location. | 08-07-2014 |
20140215551 | CONTROLLING ACCESS TO SHARED CONTENT IN AN ONLINE CONTENT MANAGEMENT SYSTEM - Systems and methods for controlling access to shared content in an online content management system, include receiving a request to access a content item from a requester, wherein the content item is stored in a synchronized online content management system. The example method then includes determining that the requester is in an approved list of requestors and granting access to the content item. In one variation, the request to access the content item includes activation of a shared link. In another variation, the request to access the content item includes access to a shared folder in the synchronized online content management system. In a third variation, determining that the requester is in an approved list of requesters includes determining that the requester is logged into a primary and secondary account, and that the requester is in an approved list for the secondary account. | 07-31-2014 |
20140201289 | NOTIFICATION FEED ACROSS MULTIPLE CLIENT DEVICES - Event notifications can be provided to a user across multiple client devices or platforms. If a user takes action on one device, notifications on all devices can be updated to reflect the action. For example, notifications can be indexed by topic and time sequence (or other sequence), and multiple notifications related to the same topic can be consolidated at a server or the client so that current information can be presented to the user. | 07-17-2014 |
20140195638 | SYNCHRONIZED CONTENT LIBRARY - The disclosed technology addresses the need in the art for synchronizing a content library between a content management system and client devices. Each content item in a user's content library is stored on the content management system and a record of each change to the content library is recorded in a content journal. A client device transmits a synchronization request that a portion of the content journal representing unsynchronized changes be processed to update the content library on the client device. The synchronization request includes a content library identifier and a content journal number identifying the content entry in the content journal last processed by the client device. Synchronization commands are sent based on the content entries not processed by the client device. Updated synchronization data representing the processed content entries is sent to the client device after synchronization is completed. | 07-10-2014 |
20140195550 | ACCESSING AUDIO FILES FROM AN ONLINE CONTENT MANAGEMENT SYSTEM - The disclosed embodiments relate to a system that facilitates accessing audio files associated with a user from an online content management system. During operation, the online content management system receives a function call from a client to list audio files associated with the user. In response to the function call, the system filters through operations for files associated with the user to identify audio files. Next, the system returns metadata for the identified audio files associated with the user to the client. In some embodiments, filtering through the operations involves filtering an operation log to identify operations performed on audio files associated with the user, wherein the operations occurred since a preceding call to the function. | 07-10-2014 |
20140195516 | SYSTEMS AND METHODS FOR PRESENTING CONTENT ITEMS IN A COLLECTIONS VIEW - Systems, methods, and computer-readable media are provided for managing, creating, and presenting a virtual collection. In some embodiments, a content management system can receive a request to display a virtual collection of content items from a first user account, whereupon at least one content identifier stored for the virtual collection can be retrieved. The at least one content identifier can identify at least one content item in data storage. Subsequently, updated information can retrieved for the at least one content item, including at least one of an updated location within a file system hierarchy or a modification to the at least one content item by a second user account, for example. An updated content item can then be selectively provided for display with the virtual collection in accordance with accessibility to the content item permitted by the second user account. | 07-10-2014 |
20140195514 | UNIFIED INTERFACE FOR QUERYING DATA IN LEGACY DATABASES AND CURRENT DATABASES - Systems, methods, and computer-readable storage media for a unified interface for querying data that may reside in one of a legacy database or a current database. Rather than performing a risky or potentially time-consuming database migration, new data is stored in the current database and the existing data remains in the legacy database. Users submit database queries through a query interface that hides or abstracts the complexity of the current and legacy databases from the users. Thus, while two separate databases exist on the back end, users do not know and do not need to know of that complexity when submitting a database query. The query interface can determine which database contains the requested data, convert the database query to the appropriate format, if necessary, for that database, and execute the converted query. | 07-10-2014 |
20140189355 | ENCRYPTING GLOBALLY UNIQUE IDENTIFIERS AT COMMUNICATION BOUNDARIES - Systems, methods, and computer-readable storage media for encrypting communications containing or referencing globally unique identifiers to prevent unauthorized access to content item data, such as through spoofing or ancillary information leakage. An example system configured to practice the method identifies a communication, between a storage environment and a client device, associated with a globally unique identifier for a content item stored in at least one of the storage environment and the client device. The content item can be addressable via a globally unique identifier. Prior to transmitting the communication, the system can encrypt a portion of the communication containing the globally unique identifier using an encryption key based on a client-specific key and a secret version-specific key to yield an encrypted communication, and transmit the encrypted communication to the client device. | 07-03-2014 |
20140189118 | MAINTAINING CONSISTENT GLOBALLY UNIQUE IDENTIFIERS VIA AN ASYNCHRONOUS INTERFACE - Systems, methods, and computer-readable storage media for maintaining consistent globally unique identifiers (GUIDs) for content items accessible via an asynchronous interface in a multi-user network-based content management environment (storage environment). The example content management system can make a content item within a data storage available to an authorized user via the asynchronous interface, and receive, from a client device, content item change information derived from data generated by an operating system function at the client device. Then the content management system can analyze the content item change information to determine a corresponding action at the content management system, and implement the corresponding action on the server side. The content management system can optionally provide a confirmation of the corresponding action to the client device. | 07-03-2014 |
20140189063 | CONTENT DELIVERY VIA AN ONLINE SYNCHRONIZED CONTENT MANAGEMENT SYSTEM - Systems, methods, and computer-readable media for content delivery. The system first receives subscription information associated with an account. Next, the system detects a content delivery triggering event, wherein the content delivery triggering event triggers a delivery of a next content item selected for delivery based at least in part on the subscription information. In response to the content delivery triggering event, the system then delivers the next content item to the account, wherein the account is configured to synchronize with a device associated with the account. The system can synchronize with the device to deliver the next content item to the device. | 07-03-2014 |
20140189061 | SYSTEM AND METHOD FOR REGULATING THE UPLOAD OF FILES FOR A MOBILE DEVICE - A content management server that uploads files from a mobile device to a cloud-based storage location based on a battery level associated with the mobile device. The content management system receives mobile device operating information and regulates the upload of files based on the mobile device operating information. In various embodiments, the mobile device operating information includes battery information. If the mobile device battery level drops below a first predetermined level, the content management system regulates the upload of files. Once the upload of files is regulated, the content management system continues to monitor the mobile device operating information. If the content management system determines that the mobile device battery level exceeds a second predetermined level, the content management system resumes the file upload process. | 07-03-2014 |
20140189051 | MAINTAINING CONCURRENCY AND CONSISTENCY OF GLOBALLY UNIQUE IDENTIFIERS - Systems, methods, and computer-readable storage media for ensuring data consistency and concurrency for globally unique identifiers (GUIDs) and associated content items via locking. A content management system configured to practice the method can receive, from a client device, a request to perform a content item operation in a storage environment that affects a GUID. Then the content management system can acquire a first mutex for a namespace associated with the content item operation, such as an application-level lock, and acquire a second mutex for the GUID, such as a row-level lock in a database table. After acquiring the locks, the content management system can perform the content item operation according the request, and update the GUID based on the content item operation. Then the content management system can release the mutexes and provide a confirmation to the client device in response to the request. | 07-03-2014 |
20140189037 | SYSTEMS AND METHODS FOR PREDICTIVE CACHING OF DIGITAL CONTENT - A system for predictively caching digital content in which the system is configured to: (1) receive, from a user of a client device, a request to access at least one particular digital file stored on a remote server; (2) select at least one other digital file to cache locally on the client device based on at least one file-accessing tendency of the user; (3) download the at least one other digital file from the remote server to the client device; and (4) save the downloaded digital file to memory associated with the client device for later access by the user. A file-accessing tendency of the user may include the manner in which the user typically scrolls or otherwise cycles through images or other files. The system may determine the user's file-accessing tendencies based on, for example, the user's location, native language, past content-accessing practices, and/or specified user preferences. | 07-03-2014 |
20140188869 | MIGRATING CONTENT ITEMS - Disclosed are systems, methods, and non-transitory computer-readable storage media for migrating content items from a source user account to a target user account. A user can specify content items in the source user account to be migrated to an existing or new target user account. A new content entry including an account identifier of the target account and a pointer to the content item can be created for each migrated content item. Further, a determination can be made as to whether a sharing link to each content item exists, and if so, the content pointer of the old content entry is modified to forward or redirect to the new content entry. An active flag associated with the old content entry can be set to false or 0 to indicate that the old content entry is no longer active. | 07-03-2014 |
20140188868 | PREDICTIVE MODELS OF FILE ACCESS PATTERNS BY APPLICATION AND FILE TYPE - The speed at which files can be accessed from a remote location is increased by predicting the file access pattern based on a predictive model. The file access pattern describes the order in which blocks of data for a given file type are read by a given application. From aggregated data across many file accesses, one or more predictive models of access patterns can be built. A predictive model takes as input the application requesting the file access and the file type being requested, and outputs information describing an order of data blocks for transmitting the file to the requesting application. Accordingly, when a server receives a request for a file from an application, the server uses the predictive model to determine the order that the application is most likely to use the data blocks of the file. The data is then transmitted in that order to the client device. | 07-03-2014 |
20140188796 | APPLICATION RECOMMENDATION USING STORED FILES - The disclosed technology can enable files to be stored with a networked environment. The files can be associated with information (e.g., properties) such as a file name, a file type, a date/time at which a respective file was last accessed, a number of times a respective file was accessed, data representing the contents of a respective file, and other information. Based at least in part on analyzing the information, the disclosed technology can select or identify a file and/or a file property (e.g., a file type) that the disclosed technology predicts to be most relevant to the user. The disclosed technology can then recommend applications based at least in part on the selected or identified file and/or file property (e.g., file type). | 07-03-2014 |
20140188790 | GLOBALLY UNIQUE IDENTIFIERS IN AN ONLINE CONTENT MANAGEMENT SYSTEM - Systems, methods, and computer-readable storage media for implementing globally unique identifiers (GUIDs) in a multi-user network-based content management environment, from the perspective of a server creating a GUID for a content item, and serving requests based on the GUID. A content management system can identify a content item at a location within the data storage. Each user of the content management system can be associated with a respective user account having an amount of storage space within the storage environment. The content management system can model a user account as a collection of content item objects and globally unique identifiers that are independent of a directory-based hierarchy of content items. | 07-03-2014 |
20140181935 | SYSTEM AND METHOD FOR IMPORTING AND MERGING CONTENT ITEMS FROM DIFFERENT SOURCES - Systems, methods, and computer-readable storage media for importing and merging photos from different sources are disclosed. The system receives credentials from a user, who has an account with a content management system. The credentials are associated with content item storage entities such as photo repositories. The system accesses the photo repositories, using the plurality of credentials if authorization is required for data access. The system identifies source photo data in each of the photo repositories, and duplicates the source photo data in the content management system account to create consolidated photo data. | 06-26-2014 |
20140181697 | SYSTEMS AND METHODS FOR FACILITATING COMMUNICATION BETWEEN USERS OF A CONTENT MANAGEMENT SERVICE - Computer systems and methods, according to various embodiments, allow users with shared access to a shared file or folder to communicate with one another via online chat. In particular embodiments, the system is configured to facilitate a chat session among all users that have shared access to a particular file or folder in response to a particular user selecting a “chat” button (or other suitable chat initiation element) associated with the shared file or folder. After a chat session is complete, the system may archive the chat session for later viewing and use. | 06-26-2014 |
20140181436 | ISOLATING DATA STORAGE MIRRORING OPERATIONS - Systems, methods, and computer-readable storage media for isolating mirroring operations when interacting with a data storage space, and more specifically to directing data to be stored in two locations, where storing the data in the second location does not slow or impede storing the data in the first location. Upon receiving a request to store data, the system can determine a first storage space and a second storage space in which to store the data. Instructions can be prepared for storing the data in the first storage space while at the same time preparing instructions for storing identical data in the second storage space. The system can communicate the instructions to both storage systems, with the first storage space immediately beginning the storage process while the second storage space places the instructions into a queue for later processing. | 06-26-2014 |
20140181258 | COMMUNICATING LARGE AMOUNTS OF DATA OVER A NETWORK WITH IMPROVED EFFICIENCY - Disclosed herein are systems, methods, and computer-readable storage media for communicating large amounts of data. A system can first receive a request for data and determines if the data requested is above a threshold size. If the data is above the threshold size, the system can then prepare a message containing header information following a standard file transfer protocol. The system can also prepare metadata indicating a storage location and a size of the data requested. The message and the metadata can then be separately communicated to the requester. Upon receiving the metadata, a data stream can initiate the transfer of the data from the storage location to the requester, where the data stream removes unnecessary or redundant header information during the transfer from the storage location. | 06-26-2014 |
20140181223 | AUTOMATIC ROUTING OF ELECTRONIC FILE ATTACHMENTS IN A FILE MANAGEMENT SYSTEM - Attachments received at an email account are processed according to a processing rule that is selected using, for example, a sender's email address, the sender's domain, or metadata in the email. A feature triggers the processing rule that then removes the attachment from the received email and stores the attachment in a rule-indicated directory. Processing rules can be defined by the email sender or by the email recipient. Changes to the attachment can be synchronized across multiple user devices and user accounts using a file sharing application. | 06-26-2014 |
20140181213 | PRIORITIZING STRUCTURAL OPERATIONS AND DISTRIBUTING CHANGES IN A SYNCED ONLINE CONTENT MANAGEMENT SYSTEM - Disclosed are systems, methods, and non-transitory computer-readable storage media for prioritizing structural operations and distributing changes in a synced online content management system. An exemplary method can include receiving, from a first client device, a first structural operation for a particular content item and an account within the online content management system. The method can also include receiving, from a second client device, a competing structural operation for the particular content item and the account. The method can then include prioritizing the first structural operation from the first client device over the competing structural operation from the second client device based on predetermined factors. The method can then include executing the first structural operation for the particular content item and the account. The exemplary method can then include distributing the prioritized first structural operation to all synced devices for execution. | 06-26-2014 |
20140181198 | SYSTEMS AND METHODS FOR ADDING DIGITAL CONTENT TO CONTENT MANAGEMENT SERVICE ACCOUNTS - Systems and methods for adding digital content associated with a first user account within a content management system to a second user account within the content management system. In various embodiments, the system may be configured to allow a user to add digital content to an account within a content management system associated with the user when the user receives a shared link to access digital content associated with an account within the content management system belonging to another user. The system may be configured to add the digital content to the user account by associating the digital content with the user's account. In various embodiments, the system may be configured to add the digital content to the user's account by creating an entry in a server-side file journal associated with the user's account, where the entry includes one or more file reference strings associated with the digital content. | 06-26-2014 |
20140181159 | SYSTEM AND METHOD FOR ORGANIZING FILES BASED ON AN IDENTIFICATION CODE - A system for determining a time that a file was created and associating an ID with the file based on the file creation time is disclosed. The system adjusts the creation time by a time zone offset. In the case of image files, the file creation time may be based on information associated with the image: (1) by the camera that took the picture (exchangeable image file data); (2) when the photo was last modified in memory (file modification time data); (3) based on the raw date and time the photo file was created (file date-time data); and (4) when the photo was imported onto a client device. The system may rename the file with this adjusted creation time to create a standardized name. As a result, the standardized name provides a filename nomenclature that is based on the actual or estimated time of when the file was created. | 06-26-2014 |
20140181157 | INTELLIGENT CONTENT ITEM IMPORTING - Systems, methods, and computer-readable storage media for importing a new content item, such as a photo, document, video, email, or application, into a content item repository. A content item repository can contain a set of existing content item groups, and each content item group can include at least one content item. The system can calculate a profile for a new content item to be imported. Upon determining, based on the calculated profile, that the new content item exceeds a similarity threshold for an existing content item group, the system can insert the new content item into the content item group. Upon determining, based on the calculated profile, that the new content item does not exceed the similarity threshold for any existing content item group, the system can create a new content item group and insert the new content item therein. | 06-26-2014 |
20140181155 | SYSTEMS AND METHODS FOR DIRECTING IMAGED DOCUMENTS TO SPECIFIED STORAGE LOCATIONS - Systems and methods for substantially automatically storing imaged documents in particular file storage locations. In various embodiments, the system is configured to automatically store an imaged document in a particular file storage location based, at least in part, on at least one machine-readable indicia (e.g., a bar code, such as a linear or matrix bar code) that is included within the document. In particular embodiments, the system is configured to store the documents under particular file names or as particular file types associated with the indicia. The system may also be adapted to automatically assemble multiple imaged documents into a single document based, for example, on respective page numbers that are associated with the machine-readable indicia, or that are included within the images themselves. | 06-26-2014 |
20140181137 | PRESENTING DATA IN RESPONSE TO AN INCOMPLETE QUERY - Disclosed are systems, methods, and non-transitory computer-readable storage media for executing a database query based on an incomplete query. An example system configured to practice the method receives a web request, wherein a uniform resource locator (URL) of the web request provides an argument, and extracts the argument from the URL as a parameter for a database query. The system identifies an unspecified parameter in the database query, and selects a likely value for the unspecified parameter. Then the system executes the database query using the parameter and the likely value, and incorporates at least part of the query result in a web page served in response to the web request. The system can cache the web request and the likely value for the unspecified parameter for later use. | 06-26-2014 |
20140181090 | SYSTEMS AND METHODS FOR OPTIMIZING FILE DISPLAY FOR USERS - A system for optimizing the manner in which a listing of files is displayed to a user. In various embodiments, the system is configured to display the files based at least in part on a number of times the user has shared the files with other users of the system. In other embodiments, the system is configured to display the files based at least in part on the number of times the user has accessed the files or the number of times users with whom the files have been shared have accessed the files. In particular embodiments, the system displays files based at least in part on an amount of time that the user has accessed the files, that any user of the system has accessed the files, or that other users with whom that user has shared the files have accessed the files. | 06-26-2014 |
20140181057 | SYSTEM AND METHOD FOR PREVENTING DUPLICATE UPLOADS OF MODIFIED PHOTOS IN A SYNCHRONIZED CONTENT MANAGEMENT SYSTEM - A method and system for automatically rotating image files and preventing duplicate uploads in a remote file storage system is described. The system receives an image file. The system calculates a hash value associated with newly uploaded files. The system then automatically rotates the images based on orientation data associated with the files (if included). The system then compares the hash value(s) associated with the new file(s) with the hash values from the existing files stored on the remote file storage system. If the hash values of any of the new files to be uploaded match a hash value on the hash value list, then the system prevents the new files from being uploaded to the remote file storage system. | 06-26-2014 |
20140181053 | CONDENSING EVENT MARKERS - Systems, methods, and computer-readable storage media for analyzing the recorded interactions of users within a shared dataspace, where the shared dataspace is provided by an a synced online content management system. As each user adds and deletes files in the shared dataspace, the content management system can record each interaction. The content management system can then analyze the recorded interactions, creating collapsed summaries of the interactions, and generate notifications that can be presented to users. Various thresholds can be used to determine when the recorded interactions are condensed, and when notifications associated with those condensed interactions are presented to users. | 06-26-2014 |
20140181014 | PRESERVING CONTENT ITEM COLLECTION DATA ACROSS INTERFACES - Systems, methods, and computer-readable storage media for preserving collection data across interfaces are disclosed. The system can generate, for a collection of content items stored in multiple user accounts in a synced online content management system, an index of the content items in the collection. The index can store, a content item identifier and a file location, for each content item. Upon detecting that a content item in the collection is moved to a new file location, the system can retrieve a collection identifier from metadata associated with the content item. The system can then locate the index for the collection associated with the collection identifier based on the collection identifier retrieved from the metadata associated with the content item. The system can then update the file location stored at the index for the content item to identify the new file location. | 06-26-2014 |
20140181008 | ENHANCING EVENT SUMMARIES OF SYNCED ONLINE CONTENT MANAGEMENT SYSTEM INTERACTIONS - Disclosed are systems, methods, and computer-readable storage media for enhancing event summaries of synced online content management system interactions. Users can identify one or more of the collapsed events markers that have pointers to the original, uncondensed, event markers. Upon identifying the one or more collapsed event markers, users can add additional data, via the pointers, to the original, uncondensed, event markers that were used to generate the collapsed event marker. The content management system can then perform a new analysis of the shared dataspace, analyzing the event markers using pre-existing data and the newly added data to create additional collapsed event markers, modify previously generated collapsed event markers, or remove/replace collapsed event markers. These enriched collapsed event markers can then newly presented to the user. | 06-26-2014 |
20140173726 | METHODS AND SYSTEMS FOR PREVENTING UNAUTHORIZED ACQUISITION OF USER INFORMATION - The embodiments provide methods and systems for detecting and preventing phishing of a user's information, such as their username and password. In one embodiment, a website detects as a threshold matter whether the user has arrive at the site due to an automatic redirection from a prior visited site or by the user having clicked on a link to the website from the previous site. If this threshold is met, then the prior website is evaluated based on various criteria to determine if it appears to be a phishing site. If phishing is suspected, then the user may be notified and various other protective actions may be performed. | 06-19-2014 |
20140173230 | APPLICATION PROGRAMMING INTERFACES FOR DATA SYNCHRONIZATION WITH ONLINE STORAGE SYSTEMS - The disclosed embodiments provide a system that manages access to data associated with an online storage system. During operation, the system enables synchronization of the data between an electronic device and the online storage system through an application programming interface (API) with an application on the electronic device. Next, the system uses the API to provide a synchronization state of the data to the application, wherein the synchronization state comprises at least one of a download state, an upload state, an idle state, a transfer progress, a cached state, and an error state. | 06-19-2014 |
20140165156 | USING A SESSION CONTINUITY TOKEN TO ACCESS AN ONLINE CONTENT MANAGEMENT SYSTEM - The disclosed embodiments relate to a session continuity feature that allows a user to access an online content management system through different instances of a third-party application located on different computing devices without having to log in to the online content management system separately from each computing device. When the user signs on to the online content management system, the session continuity mechanism provides a session continuity token to the third-party system. When the user subsequently accesses an instance of the third-party application located on another computing device, the third-party system provides the session continuity token to the new instance of the third-party application. This enables the user to access the online content management system through the new instance of the third-party application without having to sign on again. | 06-12-2014 |
20140164535 | SAVING MESSAGE ATTACHMENTS TO AN ONLINE CONTENT MANAGEMENT SYSTEM - The disclosed embodiments relate a messaging system, such as an email system, a text-messaging system or an instant-messaging system, that enables a user to save a message attachment to an online content management system (for example, to their Dropbox™). The system receives a call from a messaging system associated with the user to save a message attachment to the online content management system, wherein the call includes a link to the message attachment. In response to the call, the system commences downloading the message attachment to the online content management system. While the message attachment is downloading, the system provides a selection interface to enable the user to select a destination for the message attachment within the online content management system. After the user selects the destination and after the message attachment finishes downloading, the system saves the message attachment to the selected destination in the online content management system. | 06-12-2014 |
20140164534 | SYSTEM FOR SENDING A CONTENT ITEM THROUGH AN ONLINE CONTENT MANAGEMENT SYSTEM - The disclosed embodiments provide a system that facilitates sending a content item to a recipient through an online content management system. During operation, the system receives a command to send a message including the content item to the recipient, wherein the command may or may not specify that the content item is to be sent through the online content management system. In response to the command, the system sends the content item through the online content management system to the recipient. During this sending process, the system uploads the content item to the online content management system, wherein the uploading process returns a link to the uploaded content item. Next, the system sends the message including the link to the recipient, which enables the recipient (or a client that is acting on behalf of the recipient) to access the content item from the online content management system. | 06-12-2014 |
20140143738 | SYSTEM AND METHOD FOR APPLYING GESTURE INPUT TO DIGITAL CONTENT - A system and method for managing messages within an application interface that includes receiving a message stream; providing a navigational menu to a set of message streams; detecting an initiated gesture item for at least one message within a view of the navigational menu; tracking gesture-state within a progressive order of gesture-states; identifying an action of the gesture-state wherein the action corresponds to the current view and relative ordering of the navigational menu; and applying the message sorting action on the message according to a final gesture-state. | 05-22-2014 |
20140143683 | SYSTEM AND METHOD FOR ORGANIZING MESSAGES - A system and method for sorting messages within an interface including providing a navigational menu with at least three menu options of at least three message collections, the menu options ordered according to an ordered horizontal virtual arrangement of a set of message collections; upon receiving user selection of one of the menu options, activating the message collection corresponding to the user selected menu option, which comprises—displaying the message collection of the selected menu option and virtually positioning the remaining set of message collections off screen; within the active message collection of the set of message collections, detecting a gesture swipe in a horizontal direction; selecting a sorting option corresponding to a message collection virtually positioned in the horizontal direction relative to the active message collection; and transferring the message to the message collection of the selected sorting option. | 05-22-2014 |
20140143358 | SYSTEM AND METHOD FOR SERVING A MESSAGE CLIENT - A system and method for synchronizing messages between client application instances and a message service provider includes a connection service communicatively coupled to a plurality of client messaging application instances; a first intermediary transfer layer with an inbound message data queue that queues message updates of a client application instance and an outbound message data queue that queues message updates and notifications from a mailbox service layer; a mailbox service layer communicatively coupled to the connection service through the first intermediary transfer layer; a second intermediary transfer layer with an mailbox message data queue that contains queued message data directed at the mailbox service layer and a message service data queue that contains queued message updates directed at a message service layer; and a message service layer configured for message interactions with an outside message service provider. | 05-22-2014 |
20140122995 | CONTINUOUS CONTENT ITEM VIEW ENHANCED THROUGH SMART LOADING - Systems, methods, and computer-readable storage media for a continuous photo view on a browser-type application are disclosed. The system can receive a request to display a set of images associated with a user account. The system can generate a web page based on a size of the content items, the web page having a respective placeholder for each of the content items in an area of the web page that is relative to a visible portion of the web page, wherein the web page can provide a continuous presentation of the content items on a device, and wherein the web page can be configured to dynamically load and unload content items based on a current position of the web page. | 05-01-2014 |
20140122994 | EVENT-BASED CONTENT ITEM VIEW - Systems, methods, and computer-readable storage media for an event-based photo view in a browser are disclosed. The system can receive a request to display a set of content items associated with a user account. The system can generate a web page based on a size of the set of files, the web page providing a continuous presentation of the set of files at the web page on a device, wherein a visible portion of the web page includes a presentation of files, and wherein the files are mapped to an area in the web page that is associated with a current position within the web page. The web page can include an events-based navigation feature. The system can transmit the web page to device for display at the device. | 05-01-2014 |
20140122592 | IDENTIFYING CONTENT ITEMS FOR INCLUSION IN A SHARED COLLECTION - Systems, methods, and computer-readable storage media for managing pooled collections of content items, such as photos, in a content management system. An example system can first receive, from a first user device, images uploaded to a first account at a synchronized online content management system, and cluster at least some of the images as a collection. The system can receive, from the first user, a request to share the collection with a second user having a second account at the content management system, and generate, in response to the request, a pooled collection at the content management system from the collection. The system can transmit an invitation to the second user to join the pooled collection, and, upon acceptance, link the pooled collection to the second user account so that the first user and the second user have access to images in the persistent pooled collection and have permission to contribute content to the pooled collection. | 05-01-2014 |
20140122451 | SYSTEM AND METHOD FOR PREVENTING DUPLICATE FILE UPLOADS FROM A MOBILE DEVICE - A method and system for preventing duplicate file uploads in a remote content management system is described. The user device receives a hash value list associated with the files stored in the remote content management system. The user device calculates a hash value associated with new files to be uploaded. The system then compares the hash value(s) associated with the new file(s) to be uploaded with the hash value list received from the remote file storage system. If the hash values of any of the new files to be uploaded match a hash value on the hash value list, then the system prevents the new files from being uploaded to the remote file storage system. | 05-01-2014 |
20140122447 | SYSTEM AND METHOD FOR PREVENTING DUPLICATE FILE UPLOADS IN A SYNCHRONIZED CONTENT MANAGEMENT SYSTEM - A method and system for preventing duplicate file uploads in a remote content management system is described. The user device receives a hash value list associated with the files stored in the remote content management system. The user device calculates a hash value associated with new files to be uploaded. The system then compares the hash value(s) associated with the new file(s) to be uploaded with the hash value list received from the remote file storage system. If the hash values of any of the new files to be uploaded match a hash value on the hash value list, then the system prevents the new files from being uploaded to the remote file storage system. | 05-01-2014 |
20140115116 | SYSTEMS AND METHODS FOR DOWNLOADING FILES - Systems according to various embodiments use a file download widget to facilitate the download of one or more files from one or more servers associated with a website. In particular embodiments, the file download widget may be used to facilitate the download of one or more particular files that are associated with the widget directly to a content management system, such as a synched or non-synched cloud-based content management system. In various embodiments, this may: (1) allow the user to download files for later use without storing the downloaded files on the user's computing device; and (2) allow the user to complete the download of files by initiating the transfer of files and then logging off of the website (and/or powering down their computing device) before the transfer of files is complete, which may result in a more convenient and enjoyable download process. | 04-24-2014 |
20140108956 | SYSTEMS AND METHODS FOR UPLOADING FILES TO A SERVER - A file upload widget is provided on a website to enable the upload of files to a website from an account within a content management system. The file upload widget may be used to: (1) allow a user to select files from a content management system, such as a synced online content management system; and (2) initiate the upload of the files directly from the content management system to the website. In various embodiments, this may: (1) allow the user to upload files that are not stored locally on the computing device being used to access the file upload widget; and (2) allow the user to complete the upload of files by initiating the transfer of files and then logging off of the website (and/or powering down their computing device) before the transfer of files is complete, which may result in a more convenient and enjoyable upload process. | 04-17-2014 |
20140108955 | SYSTEMS AND METHODS FOR DISPLAYING FILE AND FOLDER INFORMATION TO A USER - A system for displaying the listings of files and/or folders in one of a plurality of different views (e.g., gallery view or list view). In particular embodiments, the system determines which of the views to display in the listings in based on: (1) the types of files to be displayed; (2) a specified preference of a content sharer; and/or (3) a specified preference of a content recipient. Various embodiments are particularly useful for displaying lists of files that a content sharer shares with a content recipient via a URL within the context of a synched file sharing system. | 04-17-2014 |
20140089070 | SYSTEM AND METHOD OF DETECTING FRAUD IN THE PROVISION OF A DEAL FOR A SERVICE ON A MOBILE DEVICE - A system and method for detecting and accounting for the improper use of a deal code on a mobile device. When the user initially configures the mobile device, the third-party provider receives information from the mobile device that includes user information, mobile device information, a deal code associated with a third-party service, information about an application program preloaded on the mobile device associated with the service, and a hash value that is at least partially calculated based on the foregoing. The third-party service provider calculates a second hash value at least partially based on the received information and based on other predetermined information and compares the first hash value to the second hash value. Based on the comparison, the system determines if use of the deal code is improper and, if so, tracks the user and mobile device information to prevent improper use of the deal code. | 03-27-2014 |
20140082101 | SYSTEM AND METHOD OF FACILITATING COMMUNICATIONS BETWEEN MEMBERS OF A SOCIAL NETWORKING GROUP - A social networking system that enables a member of social networking site to search for other members whose group profiles satisfy one or more search criteria. The system further enables the member to select one or more of the members whose profile satisfies the search criteria, and enables a communication between the member and the selected members. Thus, the member may send a communication to all members whose profiles satisfy the search criteria, or to a subset of those members whose profiles satisfy the search criteria. The communication may be an e-mail, an invitation, a chat message, a private positing on a public message board, a text message or any other suitable type of communication. | 03-20-2014 |
20140082073 | SYSTEM AND METHOD OF CREATING UNIQUE PROFILES ON A SOCIAL NETWORKING SITE - A social networking system enables users to join multiple user groups and create separate profiles for each group they join on the site. Each profile has a default set of user fields and a set of customized, administrator-created fields. Members of a group may create a profile when joining a particular group and may create the profile using a custom profile template generated for each group. Thus, if the same user joins a second group, they can create a new profile for the second group based on a profile template that is unique to the second group. The system may use information from the first profile to auto-populate the second profile if the second profile includes one or more of the same fields as the first profile. However, users may be able to edit the auto-populated information in the second profile to make it more specific to the second group. | 03-20-2014 |
20140068401 | BOOKMARKING SHARED FILE AND FOLDER LINKS - A document management system that is adapted to allow users to share files or folders by: (1) creating a link to the files or folders; and (2) sharing the link with other users. In particular embodiments, the system is adapted to keep track of any links generated by, sent by, and/or received by a particular user. The system may display a listing of the links upon request by a user, so that the user may re-use or deactivate the links, or modify attributes of the links. Having a centralized listing of the links may be particularly advantageous in helping a user keep track of the files and folders that they have shared and received. | 03-06-2014 |
20140067865 | GLOBAL LINK PROVIDING MODIFICATION RIGHTS TO A SHARED FOLDER - A computer-implemented system and method of sharing files between a link sharer and a link recipient over a network. A folder sharing link is generated in response to a request by a link sharer, where the link provides a link recipient the ability to modify the contents of the folder. In response to receiving an indication that the generated link has been activated by a link recipient, the system either automatically grants modification rights to the folder or requests manual approval from the link sharer to grant modification rights to the link recipient. Once modification rights have been granted, the system adds the shared folder to the link recipient's account within the context of a document management system. | 03-06-2014 |
20140006168 | DETERMINING THE RELEVANCE OF OFFERS | 01-02-2014 |
20130311557 | SYSTEMS AND METHODS FOR DISPLAYING FILE AND FOLDER INFORMATION TO A USER - A system for displaying the listings of files and/or folders in one of a plurality of different views (e.g., gallery view or list view). In particular embodiments, the system determines which of the views to display in the listings in based on: (1) the types of files to be displayed; (2) a specified preference of a content sharer; and/or (3) a specified preference of a content recipient. Various embodiments are particularly useful for displaying lists of files that a content sharer shares with a content recipient via a URL within the context of a synched file sharing system. | 11-21-2013 |
20130269010 | PATTERN ENTROPY PASSWORD STRENGTH ESTIMATOR - A password evaluation system is provided for determining the password strength of a password. A password is provided for evaluation. The password is parsed and substrings are identified from the password. Each substring is associated with a pattern that can generate the substring. The substrings are scored to determine a substring strength measure for the substring. The substrings are combined to identify non-overlapping substring combinations, which together make up the password. The combinations are assigned a combination strength score based in part on the substring strength of the substrings contained in the substring combinations. The substring combination with the lowest combination strength measure is identified and the associated combination strength measure is used as the password strength measure for the password. | 10-10-2013 |
20120331108 | FILE SHARING VIA LINK GENERATION - Users specify that a file set comprising their files, folders, or other content owned by the users should be made accessible via a link, such as a uniform resource locator (URL). The system which stores and provides access to the files accordingly creates a link that specifies the file set to be made accessible. The users may distribute the link to recipients with whom the file set is to be shared, and the distribution may be performed in any manner that the users choose. | 12-27-2012 |