Patent application number | Description | Published |
20140282903 | MANAGING IDENTITY PROVIDER (IdP) IDENTIFIERS FOR WEB REAL-TIME COMMUNICATIONS (WebRTC) INTERACTIVE FLOWS, AND RELATED METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA - Embodiments include managing Identity Provider (IdP) identifiers for Web Real-Time Communications (WebRTC) interactive flows, and related methods, systems, and computer-readable media. In one embodiment, a method for managing IdPs comprises selecting, by a WebRTC client executing on a computing device, one or more preferred IdP identifiers indicated by one or more preferences from a plurality of IdP identifiers corresponding to a plurality of IdPs for providing identity assertions during an establishment of a WebRTC interactive flow. The method further comprises obtaining one or more identity assertions from respective ones of the plurality of IdPs corresponding to the one or more preferred IdP identifiers. The method also comprises providing, during the establishment of the WebRTC interactive flow, the one or more identity assertions. In this manner, an entity may specify the IdP used for identity authentication, and the number of identity assertions provided during initiation of the WebRTC interactive flow. | 09-18-2014 |
20140372909 | MEETING ROSTER AWARENESS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for providing meeting roster awareness for participants in a conference. An example system configured to practice this method can first identify participants in a conference, and retrieve, from a source external to the conference, information describing relationships between the participants. Then the system can compute, based on the information, a relationship graph assigning a relationship strength for at least two of the participants. The system provides an indication of the relationship strength to one of the participants, such as providing an indication of relationships of which other participants are not aware. Sources external to the conference can include a social network, a communication history, an organizational chart, a directory, or group membership, for example. | 12-18-2014 |
20140379634 | APPLICATION-TO-REPOSITORY DATA MAPPING IN DATA REPOSITORIES, AND RELATED METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA - Application-to-repository data mapping in data repositories is disclosed herein. Related methods, systems, and computer-readable media are also disclosed. In this regard, in one embodiment, a method for providing application-to-repository data mapping in a data repository is provided. The method comprises receiving, by a data repository, a definition of a named data object from an application. The method further includes generating a mapping of the named data object to a data element stored in the data repository. The method also comprises storing the mapping as application metadata in a predefined data structure in the data repository. The method additionally comprises providing, to the application, access to the data element based on the mapping of the named data object to the data element. The data repository thus provides a metadata architecture minimizing the impact of changes to the data repository, while also simplifying sharing of data among applications. | 12-25-2014 |
20150046790 | OVERLAY OF PRIVATE DATA ON WEB PAGES - A connection is made to a first web page. Content of the first web page is displayed to the first user. Information about the first web page is received from the first user. A view of the first web page is modified and presented to the first user based on the information. The information is not sent to the web server associated with the first web page. Instead, the information is stored in a location that is associated with an organization that is associated with the first user. The organization is not associated with the web server. A connection is made to the first web page based on input from a second user. The second user is also associated with the organization. Based on the second user being associated with the organization, the stored information is retrieved and presented to the second user. | 02-12-2015 |
20150058418 | PROVIDING DATA RESOURCE SERVICES WITHIN ENTERPRISE SYSTEMS FOR RESOURCE LEVEL SHARING AMONG MULTIPLE APPLICATIONS, AND RELATED METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA - Providing data resource services within enterprise systems for resource level sharing among multiple applications, and related methods, systems, and computer-readable media are disclosed. In one embodiment, a method for providing a data resource service within an enterprise system is provided. The method includes receiving a user data request from a web application having application logic located outside of an enterprise system to access user data stored in memory within the enterprise system. The method further includes accessing the user data stored in the memory within the enterprise system in response to the user data request from the web application. The method also includes providing access to the user data stored in the memory within the enterprise system to the web application in response to the user data request. | 02-26-2015 |
20150120879 | PROVIDING ORIGIN INSIGHT FOR WEB APPLICATIONS VIA SESSION TRAVERSAL UTILITIES FOR NETWORK ADDRESS TRANSLATION (STUN) MESSAGES, AND RELATED METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA - Providing origin insight via Session Traversal Utilities for Network Address Translation (STUN) messages for web applications, and related methods, systems, and computer-readable media are disclosed herein. In one embodiment, a method for providing origin insight for web applications via STUN messages comprises determining an origin identifier for a web application attempting to send a STUN message to a STUN server; generating the STUN message incorporating the origin identifier for the web application; and transmitting the STUN message to the STUN server. In another embodiment, a method for providing STUN services to web applications comprises receiving a STUN message from a web client, and extracting an origin identifier for a web application. Provision of a STUN service to the web application is determined based on the origin identifier. If the STUN service should not be provided, the STUN message is rejected or disregarded; otherwise the STUN message is processed. | 04-30-2015 |
20150121250 | PROVIDING INTELLIGENT MANAGEMENT FOR WEB REAL-TIME COMMUNICATIONS (WebRTC) INTERACTIVE FLOWS, AND RELATED METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA - Intelligently managing Web Real-Time Communications (WebRTC) interactive flows, and related systems, methods, and computer-readable media are disclosed herein. In one embodiment, a system for intelligently managing WebRTC interactive flows comprises at least one communications interface, and an associated computing device comprising a WebRTC client. The WebRTC client is configured to receive a user input gesture directed to one or more visual representations corresponding to one or more WebRTC users, and determine a context for the WebRTC client based on a current state of the WebRTC client. The WebRTC client is further configured to obtain one or more identity attributes associated with the one or more WebRTC users, and provide one or more WebRTC interactive flows including the one or more WebRTC users based on the context, the user input gesture, and the one or more identity attributes. | 04-30-2015 |
20150188902 | CONTROLLING ACCESS TO TRAVERSAL USING RELAYS AROUND NETWORK ADDRESS TRANSLATION (TURN) SERVERS USING TRUSTED SINGLE-USE CREDENTIALS - Embodiments disclosed provide access to Traversal Using Relays around Network Address Translation (TURN) servers using trusted single-use credentials, and related methods, systems, and computer-readable media. In one embodiment, a method comprises receiving, by a TURN authentication agent, a request for a TURN server credential. Responsive to determining that the request is authorized, the agent generates a trusted single-use credential and transmits it to the requestor. Using this trusted single-use credential allows untrusted clients to access a TURN server without exposing a userid/password combination. In another embodiment, a method comprises receiving, by the TURN server, a request for a TURN service. The server challenges the request, and receives a userid and a password. Responsive to determining that the userid and the password constitute a trusted single-use credential and responsive to determining that the request is authorized, the server provides the TURN service for the requestor. | 07-02-2015 |