Patent application number | Description | Published |
20120117156 | Network-based quick connect meeting service - A network-accessible service enables participating end users to collaborate with one another over a network. End users have computing devices (e.g., computers, mobile phone, tablet devices, or the like) that include hardware and software to enable the device to access a network, such as the public Internet, a Wi-Fi network connected to the Internet, a 3G or higher wireless network connected to the Internet, a private network, or the like. The network-accessible service provides a publicly-available site (such as a Web site) or a local software application from which a first participating end user initiates a “meeting,” e.g., by selecting a “share” button. In response, the site or software application provides an HTTP link that includes a “meeting” code, which may be a one-time unique code. The first participating end user then shares the link with whomever he or she desires to collaborate. Upon receiving the link (e.g., by e-mail, instant message, SMS, MMS, orally, or the like), a second participating end user joins the meeting “on-the-fly” by simply selecting the link or navigating to the site and entering the “meeting” code (in a “join” field). The service connects the second participating end user to the meeting immediately and without requiring any registration, software download, or the like. | 05-10-2012 |
20120324368 | Object transfer method using gesture-based computing device - A file transfer method is operative in a mobile computing device having a display interface that supports gesture-based control operations. The mobile computing device includes a remote access client. One or more other computers associated with the user each maintain connections to a Web-based remote access service. The user desires to copy and/or move resources between first and second of his or her connected computers. According to the file transfer method, after receipt of data indicating a first gesture requesting a copy or move operation with respect to the resource in the file system, an overview of one or more target devices is displayed. The overview is a folder level view of all folders and files located on the target devices, which are the one or more other computers also having a connection (or capable of having a connection) to the Web-based remote access service. In addition to displaying the folder-level view, an additional display element is shown. This display element is a representation of the resource from which the copy or move operation has been requested. The display element is displayed as an overlay, and it is adapted to be selectively positioned (by the user) in the overview using a gesture. Thereafter, and upon receipt of data indicating a second gesture that has caused the representation to be positioned over an available transfer location within a computer connected to the Web-based remote access service, the copy or move operation is completed. | 12-20-2012 |
20130073865 | Identifying peers by their interpersonal relationships - According to this disclosure, a user is identified (and selectively granted access to protected resources) by using information that describes the user's interpersonal relationships. This information typically is stored in a datastore, such as a digital address book, an online profile page, or the like. The user's digital address book carries an “acquaintance pattern” that changes dynamically in time. This pattern comprises the information in the user's contact list entries. In this approach, the entropy inherent in this information is distilled into a unique acquaintance digest (or “fingerprint”) by normalizing the contact list data, and then applying a cryptographic function to the result. | 03-21-2013 |
20130110999 | Creating an optimized distribution network for the efficient transfer of data between endpoints | 05-02-2013 |
20130111068 | Creating an optimized distribution network for the efficient transfer of data between endpoints using crossover connections | 05-02-2013 |
20130111217 | Storing user data in a service provider cloud without exposing user-specific secrets to the service provider | 05-02-2013 |
20130167221 | Motion-based authentication for a gesture-based computing device - A motion-based authentication method is operative in a mobile computing device having a display interface and that includes an accelerometer. Normally, the device software includes a locking mechanism that automatically locks the display interface after a configurable timeout. The authentication method operates to un-lock the display interface (and thus allow the user access to the device) by movement of the device in a predetermined series of physical movements and without display-based entry of a password or other access code on the display itself. In this manner, the user can un-lock the device without display-based entry of a password (on the display itself) by simply holding the device and performing the necessary movement(s) to generate the unique code. | 06-27-2013 |
20140201282 | Network-based quick connect meeting service - A network-accessible service enables participating end users to collaborate with one another over a network. End users have computing devices that include hardware and software to enable the device to access a network. The service provides a publicly-available site or a local software application from which a first participating user initiates a “meeting,” e.g., by selecting a “share” button. In response, the site or software application provides an HTTP link that includes a “meeting” code, which may be a one-time unique code. The first participating user then shares the link with whomever he or she desires to collaborate. Upon receiving the link, a second participating user joins the meeting “on-the-fly” by simply selecting the link or navigating to the site and entering the “meeting” code. The service connects the second participating user to the meeting immediately and without requiring any registration, software download, or the like. | 07-17-2014 |
20150046835 | Object transfer method using gesture-based computing device - A mobile device has a display that supports gesture-based control operations. Computers maintain connections to a remote access service. The user desires to copy and/or move resources between first and second of his connected computers. After receipt of data indicating a first gesture requesting an operation with respect to the resource, an overview of one or more target devices is displayed. The overview is a folder level view of all folders and files located on the target devices. In addition, an additional display element is shown. This element is a representation of the resource from which the operation has been requested. The element is displayed as an overlay, and it is adapted to be selectively positioned in the overview using a gesture. Upon receipt of data indicating a second gesture positioning the representation over an available location within a computer connected to the service, the operation is completed. | 02-12-2015 |
20150046999 | Identifying peers by their interpersonal relationships - According to this disclosure, a user is identified (and selectively granted access to protected resources) by using information that describes the user's interpersonal relationships. This information typically is stored in a datastore, such as a digital address book, an online profile page, or the like. The user's digital address book carries an “acquaintance pattern” that changes dynamically in time. This pattern comprises the information in the user's contact list entries. In this approach, the entropy inherent in this information is distilled into a unique acquaintance digest (or “fingerprint”) by normalizing the contact list data, and then applying a cryptographic function to the result. | 02-12-2015 |