Patent application number | Description | Published |
20090138808 | Method and apparatus for providing attributes of a collaboration system in an operating system folder-based file system - A conventional operating system folder or directory based file system is implemented with, or enhanced to provide, attributes of shared collaborative workspaces. In particular, the conventional file system is connected to either a server based or a distributed collaboration system and the user interface of the operating system file system is augmented to allow it to control aspects of the collaboration system. Each folder or directory can be synchronized and treated as a “workspace” that can be viewed and shared with other users or groups of users. Folder can also be provided with “awareness” information that indicates collaborators that are present and those that are sharing the workspace. | 05-28-2009 |
20100100725 | PROVIDING REMOTE USER AUTHENTICATION - Providing a remote computer user authentication service involves providing a reference to a user authentication service in a host server's source code (e.g., website source code). Further, integration code that may be used in an application programming interface (API) on the host server for interaction with a user authentication service can be provided. Additionally, a user interface (UI) for user authentication on the host server, and an authentication-test message on the host server using the UI may be provided. Also, providing authentication can comprise sending an authentication-request message to a mobile device designated by the user; and/or can comprise the user responding with information from the authentication-test message. The host server can be notified of the user's authentication after a correct response is received by the user authentication service. | 04-22-2010 |
20100100945 | USER AUTHENTICATION MANAGEMENT - End users of a multi-factor authentication service can utilize an account management service, and third-party website can register to utilize the multi-factor authentication service. Registering a third-party website can comprise the multi-factor authentication service receiving a valid digital identity certificate for the third-party website, and receiving an agreement to terms of use of the multi-factor authentication service for the third-party website. Once received, the multi-factor authentication service can enable the third-party website to utilize the service (e.g., switch the service on, or send an authorization key to the third-party website). Further, registering a user to the multi-factor authentication service can comprise determining availability of service, and providing a location-specific access code. Additionally, registering the user can comprise registering the user's mobile device, for example, to provide multi-factor authentication. Also, an Internet-based user account management user interface can be provided that allows a user to view transactions on their account, and an ability to shut off a designated mobile device's ability to authenticate. | 04-22-2010 |
20110029976 | PROCESSING SINGLETON TASK(S) ACROSS ARBITRARY AUTONOMOUS SERVER INSTANCES - Large scale internet services may be implemented using multiple discrete server instances. Some tasks of the large scale internet services may be singleton tasks, which may be advantageously processed by a sub-set of the server instances (e.g., merely one instance). Accordingly, as provided herein, a singleton task may be processed in a reliable manner based upon one or more instances of a protocol executed across a set of arbitrary autonomous server instances. In one example, the protocol may determine whether a lease for a singleton task is valid or expired. If the lease is expired, then an attempt to claim the lease may be performed by updating a current lease expiration with a new lease expiration. If the attempt is successful, then the singleton task may be processed until the new lease expiration expires. | 02-03-2011 |
20110179180 | COMMUNICATION SESSIONS AMONG DEVICES AND INTERFACES WITH MIXED CAPABILITIES - Users of various devices may participate in communication sessions, but only if the interfaces and components of such devices feature a minimum set of capabilities involved in the communication session type; e.g., in order to participate in a teleconference, the device of every user has to be capable of sending and receiving audio. Instead, a communication session server may automatically convert session items received from each user into interface-specific representations for each other user, based on the capabilities of the interface and device of the other user. For example, speech recognition may transform speech to text output; speech synthesis may transform text input to speech; and video recognition may identify individuals and gestures in a video stream and represent this information as text. The server may therefore host a “mixed” communication session, where each user may fully participate irrespective of the capabilities of the chosen device and interface. | 07-21-2011 |
20110197032 | CACHE COORDINATION BETWEEN DATA SOURCES AND DATA RECIPIENTS - A data recipient configured to access a data source may exhibit improved performance by caching data items received from the data source. However, the cache may become stale unless the data recipient is informed of data source updates. Many subscription mechanisms are specialized for the particular data recipient and/or data source, which may cause an affinity of the data recipient for the data source, thereby reducing scalability of the data sources and/or data recipients. A cache synchronization service may accept requests from data recipients to subscribe to the data source, and may promote cache freshness by notifying subscribers when particular data items are updated at the data source. Upon detecting an update of the data source involving one or more data items, the cache synchronization service may request each subscriber of the data source to remove the stale cached representation of the updated data item(s) from its cache. | 08-11-2011 |
20110314156 | MEMORABLE RESOURCE NAMES - Among other things, one or more techniques and/or systems are disclosed for generating a human memorable resource name. Both a first part of the resource name and a second part of the resource name are generated, where both parts respectively comprise a memorable alphanumeric string (e.g., easily remembered). The first and second parts of the resource name are combined with an intervening separator symbol to generate the first resource name, comprising the first part, the symbol, and the second part. The first resource name is compared against a desired threshold to determine if it can be used as the name for the resource. If the first resource name does not meet the threshold a second resource name is generated for the resource. | 12-22-2011 |
20130042309 | USER AUTHENTICATION MANAGEMENT - End users of a multi-factor authentication service can utilize an account management service, and third-party website can register to utilize the multi-factor authentication service. Registering a third-party website can comprise the multi-factor authentication service receiving a valid digital identity certificate for the third-party website, and receiving an agreement to terms of use of the multi-factor authentication service for the third-party website. Once received, the multi-factor authentication service can enable the third-party website to utilize the service (e.g., switch the service on, or send an authorization key to the third-party website). Further, registering a user to the multi-factor authentication service can comprise determining availability of service, and providing a location-specific access code. Additionally, registering the user can comprise registering the user's mobile device, for example, to provide multi-factor authentication. Also, an Internet-based user account management user interface can be provided that allows a user to view transactions on their account, and an ability to shut off a designated mobile device's ability to authenticate. | 02-14-2013 |