Patent application number | Description | Published |
20130231930 | METHOD AND APPARATUS FOR AUTOMATICALLY FILTERING AN AUDIO SIGNAL - A computer implemented method and apparatus for automatically filtering an audio input to make a filtered recording comprising: identifying words used in an audio input, determining whether each identified word is contained in a dictionary of banned words, and creating a filtered recording as an audio output, wherein each word identified in the audio input that is found in the dictionary of banned words, is automatically deleted or replaced in the audio output used to make the filtered recording. | 09-05-2013 |
20140173753 | CONTROLLING CONSUMPTION OF HIERARCHICAL REPOSITORY DATA - One exemplary embodiment involves receiving, from an administrator device, a first request to provide a set of privileges to at least one of a set of users and a set of user groups to access private resources referenced by a path of a networked hierarchical repository, the set of privileges including at least one authorized access privilege. The embodiment also involves modifying a metadata associated with the private resources to indicate the set of privileges to provide to the at least one of the set of users and the set of user groups, the metadata associated with the private resources being modified to at least indicate the authorized access privilege. Additionally, the embodiment involves receiving a second request for authorized access to a set of resources associated with the networked hierarchical repository and providing the authorized access based on whether the metadata associated with the set of resources indicates to provide the authorized access. | 06-19-2014 |
20140198174 | Augmenting Web Conferences via Text Extracted from Audio Content - Systems and methods for augmenting web conference sessions with multimedia content based on text extracted from audio content transmitted during the web conference. In one embodiment, a conference application or other application can receive audio content from at least one client participating in a web conference. The web conference can connect multiple clients for live sharing of audio and video. The conference application can also extract at least one text item from the audio content. The conference application can also generate augmented electronic content by combining electronic content received via the web conference with additional electronic content based on the at least one text item. The conference application can also provide the augmented electronic content via the web conference. | 07-17-2014 |
20150033297 | DYNAMICALLY MAPPING USERS TO GROUPS - Methods and systems for authenticating users and assigning authenticated users to groups are provided. A method receives a user credential and email address. The method forwards an authentication request including the email address and credential to a remote authentication provider. Based in part on the presence of a full user name in a received response, the method determines that the user is authenticated. Another method extracts a domain name from a received email address of an authenticated user. In response to determining that the domain name is associated with a group, the method assigns the user to the group. A system includes memory with instructions for assigning an authenticated user to a group. The system receives the user's email address and extracts a domain name from the email address. In response to determining that the domain name is associated with a group, the system assigns the user to the group. | 01-29-2015 |
20150101030 | User Collision Detection and Handling - Techniques for user collision detection and handling are described. According to various embodiments, a network resource provides content, services, and so forth, for consumption by authenticated users. To perform authentication tasks, the network resource leverages authentication services. Since a network resource may utilize multiple authentication services, collisions between users may occur. For instance, a user identifier for a user authenticated by one authentication service may match a user identifier for a different user authenticated by a different authentication service. Thus, techniques discussed herein are employed to detect such collisions and to handle the collisions such that users are differentiated from one another for authentication and resource access purposes. | 04-09-2015 |
20150149530 | Redirecting Access Requests to an Authorized Server System for a Cloud Service - In some embodiments, a first server system of a cloud service can receive a bearer token for accessing the cloud service. The bearer token can be generated based on authenticating a remote client in communication with the first server system. The first server system can determine that a resource of the cloud service is hosted by a second server system of the cloud service rather than the first server system. The resource can be identified using the bearer token. The first server system can provide the bearer token to the remote client along with redirect information for accessing the second server system. The second server system can in respond to receiving the bearer token from the remote client by establishing a session with the remote client. The remote client can access the resource via the session with the second server system. | 05-28-2015 |
20150150109 | AUTHENTICATED ACCESS TO A PROTECTED RESOURCE USING AN ENCODED AND SIGNED TOKEN - Techniques are disclosed for authenticated access to a protected resource. A third party application receives a request to access a protected resource, including a bearer token encoded in an HTTP Authorization request header field. The bearer token includes a client identification value that is encrypted and signed in a predefined syntax. The third party application determines whether the bearer token conforms to the predefined bearer token syntax, such as a JavaScript Object Notation Web Token syntax. If the bearer token conforms to the bearer token syntax, the client identification value is extracted from the bearer token. The client identification value is compared to a predefined list of authorized client identification values associated with the protected resource. If the client identification value matches any of the values on the list of authorized values, the bearer token is validated, which permits the third party application to access to the protected resource. | 05-28-2015 |
20150156190 | DYNAMICALLY MAPPING USERS TO GROUPS - Methods and systems for authenticating users and assigning authenticated users to groups are provided. A method receives a user credential and email address. The method forwards an authentication request including the email address and credential to a remote authentication provider. Based in part on the presence of a full user name in a received response, the method determines that the user is authenticated. Another method extracts a domain name from a received email address of an authenticated user. In response to determining that the domain name is associated with a group, the method assigns the user to the group. A system includes memory with instructions for assigning an authenticated user to a group. The system receives the user's email address and extracts a domain name from the email address. In response to determining that the domain name is associated with a group, the system assigns the user to the group. | 06-04-2015 |
20150254441 | Authentication for Online Content using an Access Token - Techniques for authentication for online content using an access token are described. According to various embodiments, online content (e.g., webpages and other types of web content) can be served across a variety of different online resources. According to one or more embodiments, an access token is leveraged to enable a user to authenticate with multiple different distributed content resources for access to online content, and without requiring the user to input authentication credentials for each of the content resources. | 09-10-2015 |
20150295916 | Scoped Access to User Content - Techniques for scoped access to user content are described. According to one or more embodiments, an access token is generated that includes an indication of a scope of permitted access to user content. The access token, for example, can specify scope by identifying a particular category and/or instance of content to which access is permitted. In at least some embodiments, a uniform resource identifier (URI) is used to specify the scope within the access token. When the access token is used to request user content, the URI can be mapped directly to a particularly category and/or instance of content. In at least some embodiments, direct mapping obviates the requirement for intermediate mapping and/or translation of the access token to identify requested user content. | 10-15-2015 |
20150296181 | AUGMENTING WEB CONFERENCES VIA TEXT EXTRACTED FROM AUDIO CONTENT - Systems and methods for augmenting web conference sessions with multimedia content based on text extracted from audio content transmitted during the web conference. In one embodiment, a conference application or other application can receive audio content from at least one client participating in a web conference. The web conference can connect multiple clients for live sharing of audio and video. The conference application can also extract at least one text item from the audio content. The conference application can also generate augmented electronic content by combining electronic content received via the web conference with additional electronic content based on the at least one text item. The conference application can also provide the augmented electronic content via the web conference. | 10-15-2015 |