Patent application number | Description | Published |
20090319780 | ESTABLISHING SECURE DATA TRANSMISSION USING UNSECURED E-MAIL - In one embodiment, a host entity may create a trusted connection with a guest entity. The host entity may encrypt a trusted connection invitation for an external guest entity using a proof of possession of a trusted token for the external guest entity. The host entity may transmit the encrypted trusted connection invitation to the external guest entity. A guest entity may decrypt the trusted token, and then use the proof of possession to decrypt the trusted connection invitation. | 12-24-2009 |
20090319781 | SECURE MESSAGE DELIVERY USING A TRUST BROKER - An email security system is described that allows users within different organizations to securely send email to one another. The email security system provides a federation server on the Internet or other unsecured network accessible by each of the organizations. Each organization provides identity information to the federation server. When a sender in one organization sends a message to a recipient in another organization, the federation server provides the sender's email server with a secure token for encrypting the message to provide secure delivery over the unsecured network. | 12-24-2009 |
20110202759 | CERTIFICATE REMOTING AND RECOVERY - Certificate remoting and recovery may be provided. A computer may identify required security certificates and determine whether at least one required security certificate is not available. If the certificate is not available, the computer may identify a peer server and request the missing certificate from the peer server. The computer may also be operative to receive certificate management instructions from other computers. | 08-18-2011 |
20130080521 | RESOLVING CONTACTS IN CONFLICT THROUGH SUGGESTION - A communication application resolves contacts in conflict through a suggestive user interface. The communication application retrieves a contact that includes conflicting information with an existing contact from an external resource through a data service. External resources include social networks, e-mail servers, local address providers, etc. The user application employs a sliding scale algorithm to recognize the contact that includes the conflicting information according to a variety of categories including source of the contact, level of interaction and number of matching identifiers between the user and the contact. Subsequently, the communication application presents a suggestion to link the contact that includes the conflicting information with the existing contact to the user in a linking user interface. Upon a user acceptance of the suggestion, the communication application links the contact that includes the conflicting information to the existing contact. | 03-28-2013 |
20130080914 | STORAGE AND EXPOSURE OF UNIFIED CONTACTS BASED ON MATCH CRITERIA - Individual contact information from a variety of sources are linked into a unified contact view to provide consistent user experience across platforms, while contact data is tracked in a distributed fashion. A communication application unifying multiple sources of contact data into a single logical view may communicate to a user that the unification has occurred. Through granular change tracking and data linkage, the user may be empowered to both understand and correct any system action. Match criteria for contact information may be exposed in individual contact views and in the unified contact view clarifying to the user matching and conflicting contact information. | 03-28-2013 |
20130086008 | USE OF MAILBOX FOR STORING METADATA IN CONFLICT RESOLUTION - Metadata associated with contact unification, which may involve conflict resolution and de-duplication, is stored in a user's mailbox for optimizing future automated unification operations, sharing of information between different clients and services, and providing relational data that can be used for other applications. User interactions regarding unification such as rejection or acceptance of automated actions, usage of created unified contacts, as well as data from external applications and services may be analyzed and stored in the mailbox. Such metadata may then be used to resolve conflicts the same user or other users in future contact unification operations and shared with other applications and services through a predefined schema such that those applications and services can update their data as well. | 04-04-2013 |
20130097124 | AUTOMATICALLY AGGREGATING CONTACT INFORMATION - A communication application automatically aggregates contact information. The communication application classifies contact information retrieved from data sources as either duplicate or complimentary contact information to a contact. The communication application aggregates the contact information and the contact into a unified contact object by eliminating the duplicate contact information and adding the complimentary contact information. The application presents the unified contact object through a user interface. | 04-18-2013 |
20140245000 | SECURE MESSAGE DELIVERY USING A TRUST BROKER - An email security system is described that allows users within different organizations to securely send email to one another. The email security system provides a federation server on the Internet or other unsecured network accessible by each of the organizations. Each organization provides identity information to the federation server. When a sender in one organization sends a message to a recipient in another organization, the federation server provides the sender's email server with a secure token for encrypting the message to provide secure delivery over the unsecured network. | 08-28-2014 |