Patent application number | Description | Published |
20090288149 | SYSTEM AND METHOD FOR POOL-BASED IDENTITY AUTHENTICATION FOR SERVICE ACCESS WITHOUT USE OF STORED CREDENTIALS - A computer-implemented system and method for pool-based identity authentication for service access without use of stored credentials is disclosed. The method in an example embodiment includes providing provisioning information for storage in a provisioning repository; receiving a service request from a service consumer, the service request including requester identifying information; generating an authentication request to send to an authentication authority, the authentication request including requester identifying information; receiving validation of an authenticated service request from the authentication authority; and providing the requested service to the service consumer. | 11-19-2009 |
20100169963 | SYSTEMS AND METHODS TO ROTATE SECURITY ASSETS USED FOR SECURE COMMUNICATIONS - Systems and methods to rotate security assets used to for secure communications are disclosed. The system includes receiving a first certificate that includes a first subject name for the remote servers. The first certificate further includes a first public key. Next, the system receives a second certificate that includes the first subject name for the remote servers. The second certificate further includes a second public key that is different from the first public key. Next, the system stores the first and second certificates in a trust module. Next, the system receive a third certificate from a first server included in the plurality of remote servers. Next, the system identifies the first server is trusted. The identifying is based on the third certificate matching any one of the first certificate and the second certificate. Finally, the system establishes a secure communication session with the first server based on the identifying the first server is trusted. | 07-01-2010 |
20120159585 | SYSTEM AND METHOD FOR POOL-BASED IDENTITY AUTHENTICATION FOR SERVICE ACCESS WITHOUT USE OF STORED CREDENTIALS - A computer-implemented system and method for pool-based identity authentication for service access without use of stored credentials is disclosed. The method in an example embodiment includes providing provisioning information for storage in a provisioning repository; receiving a service request from a service consumer, the service request including requestor identifying information; generating an authentication request to send to an authentication authority, the authentication request including requestor identifying information; receiving validation of an authenticated service request from the authentication authority; and providing the requested service to the service consumer. | 06-21-2012 |
20140282980 | SYSTEM AND METHOD FOR POOL-BASED IDENTITY AUTHENTICATION FOR SERVICE ACCESS WITHOUT USE OF STORED CREDENTIALS - A computer-implemented system and method for pool-based identity authentication for service access without use of stored credentials is disclosed. The method in an example embodiment includes providing provisioning information for storage in a provisioning repository; receiving a service request from a service consumer, the service request including requestor identifying information; generating an authentication request to send to an authentication authority, the authentication request including requestor identifying information; receiving validation of an authenticated service request from the authentication authority; and providing the requested service to the service consumer. | 09-18-2014 |
20150039896 | SYSTEM AND METHOD FOR POOL-BASED IDENTITY GENERATION AND USE FOR SERVICE ACCESS - A computer-implemented system and method for pool-based identity generation and use for service access is disclosed. The method in an example embodiment includes seeding an identity generator with a private key; retrieving independently verifiable data corresponding to a service consumer; using the independently verifiable data to create signed assertions corresponding to the service consumer; generating a non-portable identity document associated with the service consumer, the identity document including the signed assertions; signing the identity document with the private key; and conveying the signed identity document to the service consumer via a secure link. | 02-05-2015 |
Patent application number | Description | Published |
20150177938 | PROVIDING ACCESS TO A CLOUD BASED CONTENT MANAGEMENT SYSTEM ON A MOBILE DEVICE - A user device has a processing module and a UI module. The processing module may have a permanent connection to the UI module, and an intermittent connection to a content management system over a data network. User requested actions are executed within the UI module. For each such action, a parallel request is sent to the content management system when network connectivity allows. Results of the user requested actions are presented within the UI module as if they had been implemented on the content management system. The user may thus interact with content as if all user requested actions have occurred substantially simultaneously with the request. When network connectivity allows, confirmation is received in the processing module from the content management system that the actions have been implemented, and the state of the user requested actions in the UI module is matched with that on the content management system. | 06-25-2015 |
20150180914 | SYSTEMS AND METHODS FOR CREATING SHARED VIRTUAL SPACES - Systems and methods are provided for creating shared virtual spaces (“rooms”). A room may be created when a user first shares images with another user. A user may send a request to a content management system to share one or more images with various contacts. In response, a room is created by the content management system in which a copy of each image is stored. Images added to a room are copied to a separate “rooms” database, and “locked,” being saved in the room for a period of time, which may be indefinitely. Changes made by the user to a room via a user device may be displayed as soon as indicated, without waiting for the information to be sent to a system server or its state to be made consistent with that of the user device. Room activity notifications may be sent to members in various ways. | 06-25-2015 |
20150180980 | SYSTEMS AND METHODS FOR PRESERVING SHARED VIRTUAL SPACES ON A CONTENT MANAGEMENT SYSTEM - Systems and methods are provided for creating shared virtual spaces (“rooms”). In some embodiments, a share request to share a content item from a sharer to at least one sharee may be received. In response, a first virtual space may be created on the sharer's user account and each of the at least one sharee's user accounts on the content management system. A first identifier may be assigned to the content item, where the first identifier associates the sharer and each sharee as a member of the first virtual space. The first shared virtual space may then be preserved in a second shared virtual space stored on the content management system. | 06-25-2015 |
20150244794 | SYSTEMS AND METHODS FOR PROVIDING A USER WITH A SET OF INTERACTIVITY FEATURES LOCALLY ON A USER DEVICE - Providing a user with an interactive user interface that may fully enable interactions regardless of connectivity status may be provided. In some embodiments, one or more content items may be selected by a user of the user devices and may be queued for upload to a content management system. The content items may be organized into one or more collections of content items with other content items already stored in a user account on the content management system, such as images having similar geo-temporal characteristics. A set of interactivity features may be available to the user for interacting with the queued content item. This may provide the user with the seamless feeling as if the content items have been uploaded to the content management system and the user may be interacting with the content items on the content management system, even if the upload has not been completed. | 08-27-2015 |
20150244836 | SYSTEMS AND METHODS FOR EPHEMERAL EVENTING - Embodiments are provided for ephemeral eventing. Ephemeral eventing may involve sending metadata portions associated with content items from a user device to a content management system prior to uploading the content portions of the content items. The content management system may then assign the content items to one or more events. The event assignments may then be sent back to the user device, allowing the content items to be locally displayed according to their events as if the content items had already been uploaded to the content management system. | 08-27-2015 |
20150358224 | SYSTEMS AND METHODS FOR EPHEMERAL EVENTING - Embodiments are provided for ephemeral eventing. Ephemeral eventing may involve sending metadata portions associated with content items from a user device to a content management system prior to uploading the content portions of the content items. The content management system may then assign the content items to one or more events. The event assignments may then be sent back to the user device, allowing the content items to be locally displayed according to their events as if the content items had already been uploaded to the content management system. | 12-10-2015 |
20160117344 | USER RE-ENGAGEMENT WITH ONLINE PHOTO MANAGEMENT SERVICE - An online photo management service that stores a collection of photos belonging to a user can send re-engagement messages to the user that can include photos automatically selected from the collection. The selection can be based on a scoring algorithm that rates the photos according to a set of attributes and computes a score based on the attributes and a set of weights. Based on user responses to re-engagement messages, the weights can be tuned to more reliably select photos likely to result in user re-engagement with the stored collection of photos. | 04-28-2016 |