Patent application number | Description | Published |
20130081101 | POLICY COMPLIANCE-BASED SECURE DATA ACCESS - Access control techniques relate to verifying compliance with security policies before enabling access to the computing resources. An application is provided on a client that generates verification codes using an authentication seed. Prior to granting the client the authentication seed necessary to generate a verification code, a server may perform a policy check on the client. Some embodiments ensure that the client complies with security policies imposed by an authenticating party by retrieving a number of parameter values from the client and then determining whether those parameter values comply with the security policies. Upon determining that the client complies, the authentication seed is issued to the client. In some embodiments, the authentication seed is provided such that a policy check is performed upon the generation of a verification code. The client is given access to secure information when the client is determined to comply with the security policies. | 03-28-2013 |
20130085880 | IMPLEMENTATION OF SECURE COMMUNICATIONS IN A SUPPORT SYSTEM - A support system negotiates secure connections on behalf of multiple guest systems using a set of credentials associated with the guest systems. The operation of the secure connection may be transparent to the guest system such that guest system may send and receive messages that are encrypted or decrypted by the support system, such as a hypervisor. As the support system is in between the guest system and a destination, the support system may act as a local endpoint to the secure connection. Messages may be altered by the support system to indicate to a guest system which communications were secured. The credentials may be managed by the support system such that the guest system does not require access to the credentials. | 04-04-2013 |
20150304294 | ENTITY TO AUTHORIZE DELEGATION OF PERMISSIONS - Systems and methods are described for delegating permissions to enable account access. The systems utilize a delegation profile that can be created within a secured account of at least one user. The delegation profile includes a name, a validation policy that specifies principals which may be external to the account and which are permitted to assume the delegation profile, and an authorization policy that indicates the permitted actions within the account for those principals which are acting within the delegation profile. Once the delegation profile is created, it can be provided to external principals or services. These external principals or services can use the delegation profile to obtain credentials for performing various actions in the account using the credentials of the delegation profile. | 10-22-2015 |
20150347763 | IMPLEMENTATION OF SECURE COMMUNICATIONS IN A SUPPORT SYSTEM - A support system negotiates secure connections on behalf of multiple guest systems using a set of credentials associated with the guest systems. The operation of the secure connection may be transparent to the guest system such that guest system may send and receive messages that are encrypted or decrypted by the support system, such as a hypervisor. As the support system is in between the guest system and a destination, the support system may act as a local endpoint to the secure connection. Messages may be altered by the support system to indicate to a guest system which communications were secured. The credentials may be managed by the support system such that the guest system does not require access to the credentials. | 12-03-2015 |
20150365394 | STATELESS AND SECURE AUTHENTICATION - Authenticated requests can be sent without requiring the requests to include or potentially expose secret information used for the authentication process. A client device use a security credential such as a key to sign a request to be sent to a recipient. When the request is received, the recipient determines whether the request was signed using the correct key for the sender. In some embodiments a client token is included with the request that statelessly encodes the key, enabling a recipient capable of decoding the client token to determine the key and compare that key to the signature of the request. The sender can store the secret information in a secure location, such as a browser security module, such that the secret information is not exposed to the browser or script executing on the client device. | 12-17-2015 |
Patent application number | Description | Published |
20090013018 | Automatic calculation with multiple editable fields - A simplified transaction data management system using automatic calculation with multiple editable fields is provided. The system enables a user to manage transactions with a simplified interface, with multiple editable fields and automatic calculation of other fields based on mathematical relations with inputs that are received in any of the other editable fields. For example, either net amounts subject to a tax or gross amounts including the tax may be entered for a transaction, and the other value is automatically computed and displayed. Either value may subsequently be re-entered, and the other value may again automatically be computed and displayed, replacing the earlier input and output. | 01-08-2009 |
20090037809 | SERVER BASED CONTROL OF AD PLACEMENT IN CLIENT SOFTWARE - A system and methods for server based control of ad placement in client software wherein a server controls the area in which advertisements appear in the client software application. A user interface associated with the client software area reclaims an area where the advertisement was displayed after the advertisement is disabled. Different types or classes of advertisements may be displayed within a single area in user interface of the application. | 02-05-2009 |
20120258691 | ADAPTIVE NOTIFICATIONS - A simplified notification scheme that looks at past behavior of accepting or rejecting messages and modifies whether and/or how future similar notifications are displayed. For example, if a user consistently ignores or rejects a pop-up notification, the system can modify whether or not such a pop-up notification is displayed again. In one specific embodiment, a wireless network can be detected by a mobile phone. The phone can determine whether or not a pop-up notification related to the wireless-network detection should be displayed based on past behavior of the user. | 10-11-2012 |
20130297452 | PAYMENT PROCESSING FOR CLIENT DEVICES - A method of payment using a client device is disclosed. The payment can be made through a payment method service that can control the payment flow and options available to the user of a client device. Using the payment method service, new payment options with new data schemas and/or new process flows can be used by the client device, but without any need to update software stored on the client device. The payment method service can utilize the look and feel of the client device, such that the user views payment options in the native UI of the client device. | 11-07-2013 |
20130339166 | USER-CONFIGURABLE ACTIVATION OF CARD APPLETS - Card applets associated with an electronic wallet are activated and deactivated based on user-defined rules. Based on the rules and a device state, a card emulation state and card applet states are modified to enable or disable completion of transactions. The transactions are between a computing device and a reader such as a point-of-sale terminal. In some embodiments, a user designates a plurality of the card applets as fast cards capable of completing a transaction via near-field communication (NFC) interaction without user input at a time of the transaction. | 12-19-2013 |
20140101009 | AUTOMATIC CALCULATION WITH MULTIPLE EDITABLE FIELDS - A simplified transaction data management system using automatic calculation with multiple editable fields is provided. The system enables a user to manage transactions with a simplified interface, with multiple editable fields and automatic calculation of other fields based on mathematical relations with inputs that are received in any of the other editable fields. For example, either net amounts subject to a tax or gross amounts including the tax may be entered for a transaction, and the other value is automatically computed and displayed. Either value may subsequently be re-entered, and the other value may again automatically be computed and displayed, replacing the earlier input and output. | 04-10-2014 |
20140148094 | SHARING OF INFORMATION COMMON TO TWO MOBILE DEVICE USERS OVER A NEAR-FIELD COMMUNICATION (NFC) LINK - A method for exchanging information between two communication devices includes communicating first identity information from a first communication device to a second communication device over a short-range communication link in response to an event. A second identity is received from the second communication device over the short-range communication link. The first identity information identifies a user of the first communication device and the second identity information identifies a user of the second communication device. Based on the first and second identity information, information is obtained specifying at least one attribute of the first and second users that they have in common. | 05-29-2014 |
20150082189 | PROVIDING VISUALIZATIONS FOR CONVERSATIONS - Technologies are generally described for providing a system for visualizing items and conversations in a communication application. Conversations are presented as a list of items in the communication application. A quantity of presented items is limited based on a size of a client device employed for viewing the items. Visualizations are applied to the presented items to attempt to maximize a number of items that are presented while providing information about the items to enable a user to preview content and take actions on the items. The visualizations include different templates applied to each item based on a type of item and content associated with the item, and the templates may be are dynamically updated based on user interactions with the items. The templates for items are determined by applying a set of rules and factors to each item to determine a most appropriate visualization for each item. | 03-19-2015 |
20150106741 | MANAGING CONVERSATIONS - Technologies are generally described for providing a system to facilitate efficient management and prioritization of conversations, such as emails, in a communication application. Conversations may be prioritized according to user preferences, and an inbox may be rearranged to display important conversations in a user defined order. Conversations may also be associated together so that they may appear together and flow together in the inbox. Additionally, the system may enable a user to delay display of a conversation until a later time based on various criteria such as location, time, and client device. A user may also move important emails to the top of an inbox for prominent display. The system may perform the actions automatically based on observed user behavior. Furthermore, the system may enable touch interactions for interacting with and managing the conversations, and quick controls may be provided for executing commands to perform actions associated with the conversations. | 04-16-2015 |
20150302334 | QUICK DRAFTS OF ITEMS IN A PRIMARY WORK QUEUE - Techniques disclosed herein facilitate the use of the primary work queue within an information management application as a centralized access point for creating and viewing multiple types of new draft items such as a note, to-do, or message item. An information management application can receive a new item request through its user interface and initiate a new draft item in response to the new item request. A view of new draft item can then be surfaced in a primary work queue of the information management application. The item type of the new draft item may be different than other item types in the primary work queue. | 10-22-2015 |
Patent application number | Description | Published |
20090276471 | Automatically Capturing and Maintaining Versions of Documents - Tools and techniques are described for automatically capturing and maintaining versions of documents. These tools may provide methods that include receiving documents from a server, and receiving indications of revisions to the documents at client systems. The methods may also automatically determine whether to capture representations of states of the documents before entry of the revisions, in the absence of explicit user commands to capture these representations. | 11-05-2009 |
20090307274 | DELAYED MERGE - Various technologies and techniques are disclosed for performing delayed merge operations. A copy of a master version of a document is retrieved from a server. User changes to the copy of the document are received through a client application. When changes have occurred to the master version of the document since user changes were made to the copy of the document, a merge operation needs performed. When the client application is ready to perform a merge operation upon saving changes to the server, then the merge operation is performed to the master version of the document on the server. When the client application is not ready to perform the merge operation, then information regarding changes made to the copy of the document by the client application is saved to the server for later merging by a separate delayed merge operation performed by one or more peers. | 12-10-2009 |
20090313552 | ONLINE/OFFLINE PROTO LINK BEHAVIOR AND PROTO PAGE CONFLICT RESOLUTION - Architecture that facilitates offline/online interaction with online collaboration documents or pages such as for wikis and/or notebooks. More specifically, for every proto link employed in a page, a unique object ID is provided. The client, whether online or offline, uses the object ID as the page's object ID when a target page is created at the time of resolving the associated proto link (e.g., when a user clicks on a proto link to navigate to the proto page). When an offline client connects to an online state, changes are synchronized (synced). All the pages created offline from the same proto link will have the same object ID and the content of the pages are then synced correctly under the same page ID and name. | 12-17-2009 |
20140101525 | ONLINE/OFFLINE PROTO LINK BEHAVIOR AND PROTO PAGE CONFLICT RESOLUTION - Architecture that facilitates offline/online interaction with online collaboration documents or pages such as for wikis and/or notebooks. More specifically, for every proto link employed in a page, a unique object ID is provided. The client, whether online or offline, uses the object ID as the page's object ID when a target page is created at the time of resolving the associated proto link (e.g., when a user clicks on a proto link to navigate to the proto page). When an offline client connects to an online state, changes are synchronized (synced). All the pages created offline from the same proto link will have the same object ID and the content of the pages are then synced correctly under the same page ID and name. | 04-10-2014 |
Patent application number | Description | Published |
20080252932 | Techniques to synchronize information between fidelity domains - Techniques to synchronize information between fidelity domains are described. A computer system may include a first application program having a low fidelity domain, and a second application program having a high fidelity domain. The second application program may include a fidelity synchronization module to synchronize modifications between a low fidelity version of a document made using the first application program and a high fidelity version of the document made using the second application program using a three-way merge. Other embodiments are described and claimed. | 10-16-2008 |
20090276698 | Document Synchronization Over Stateless Protocols - Example systems, methods, and data structures are directed at synchronizing documents. One example data structure includes receiving a request from a first client to edit a document, and sending short-term check out metadata to the first client to begin an editing session. The data structure includes a plurality of cells and a plurality of data objects defining content of the document. Each data object is associated with one of the cells and has an object identifier that uniquely identifies the data object within the associated cell, and is configured to communicate with other cells and with objects within the associated cell. In addition, each of the cells is defined so that each other cell remains unaffected by changes to data objects of the cell. | 11-05-2009 |
20090313331 | MERGING VERSIONS OF DOCUMENTS USING MULTIPLE MASTERS - Tools and techniques are described for merging versions of documents using multiple masters. These tools may provide methods that include syncing a first peer system with at least a second peer system, with the first and second peer systems receiving respective instances of a document for collaborative editing. The first and second peer systems may maintain respective version histories associated with the document, with these version histories capturing and storing revisions occurring locally at the first and second peer systems. The first and second peer systems may exchange version histories, and merge these version histories. | 12-17-2009 |
20120204090 | DOCUMENT SYNCHRONIZATION OVER STATELESS PROTOCOLS - Example systems, methods, and data structures are directed at synchronizing documents. One example data structure includes receiving a request from a first client to edit a document, and sending short-term check out metadata to the first client to begin an editing session. The data structure includes a plurality of cells and a plurality of data objects defining content of the document. Each data object is associated with one of the cells and has an object identifier that uniquely identifies the data object within the associated cell, and is configured to communicate with other cells and with objects within the associated cell. In addition, each of the cells is defined so that each other cell remains unaffected by changes to data objects of the cell. | 08-09-2012 |