摘要:
End users of a multi-factor authentication service can utilize an account management service, and third-party website can register to utilize the multi-factor authentication service. Registering a third-party website can comprise the multi-factor authentication service receiving a valid digital identity certificate for the third-party website, and receiving an agreement to terms of use of the multi-factor authentication service for the third-party website. Once received, the multi-factor authentication service can enable the third-party website to utilize the service (e.g., switch the service on, or send an authorization key to the third-party website). Further, registering a user to the multi-factor authentication service can comprise determining availability of service, and providing a location-specific access code. Additionally, registering the user can comprise registering the user's mobile device, for example, to provide multi-factor authentication. Also, an Internet-based user account management user interface can be provided that allows a user to view transactions on their account, and an ability to shut off a designated mobile device's ability to authenticate.
摘要:
Systems and methods for implementing online and offline applications are described. Such systems and methods may in some cases provide the same programming interface, regardless of whether the application is online or offline. Such systems and methods may also or instead in some cases provide additional or other possible capabilities, including installation without elevated privileges, simplified data synchronization, sharing of applications and application data, access to data from other applications, and richer client functionality than may be provided by an application such as a web browser.
摘要:
A connection between a secure shared space and an external system is created with a connector tool. The connector tool code is included in an independent agent called a “bot” that is created by a software developer. Bots run in the background in an automated and unattended manner in a specialized enterprise integration server. Each bot has a unique identity and runs under an account assigned to the enterprise integration server. A bot can be invited to a shared space much as another collaborator. Bots can also invite others to shared spaces. All bots running in the enterprise integration server are administered by a centralized administrative control. This allows account and identity policies to be established and global behaviors, including authentication settings, startup options and scope to be determined centrally. The centralized control allows simple installation, configuration and deployment and administrative control of bot operation and access. It also allows for logging and monitoring of system behavior.
摘要:
A conventional operating system folder or directory based file system is implemented with, or enhanced to provide, attributes of shared collaborative workspaces. In particular, the conventional file system is connected to either a server based or a distributed collaboration system and the user interface of the operating system file system is augmented to allow it to control aspects of the collaboration system. Each folder or directory can be synchronized and treated as a “workspace” that can be viewed and shared with other users or groups of users. Folder can also be provided with “awareness” information that indicates collaborators that are present and those that are sharing the workspace.
摘要:
A user entering information in an application might desire functionality not supported by that application. Based on an input or a subset of the input, a functionality associated with a different application can be automatically applied within a current application. Sometimes, a particular application or mode of communication can be used to send information and reply information can be sent in a different mode of communication. The communications can be automatically associated or related to each other. A user can be presented with information relating to both communications, upon request, although the communications might be associated with different modes of communication. Constraints or parameters can be placed on a subsequent communication by either a sender or a recipient.
摘要:
Systems, methods, and user interfaces for gathering and using awareness information with common awareness functionality accessible to multiple applications are disclosed. Such systems, methods, and user interfaces may aggregate awareness information from multiple sources and provide awareness data and other derived information to multiple destinations. In some implementations, such systems and methods may provide additional functionality related to awareness information, such as common user interfaces that display awareness information or mechanisms for determining the relevance of particular pieces of awareness information.
摘要:
Systems, methods, and data structures associated with the detection and resolution of duplicate data that might result when using multiple synchronization protocols are described. These techniques may use different types of identification data associated with data that is synchronized, as well as a defined set of operations that may be performed by one or more endpoints to identify and remove duplicated data.
摘要:
A system that employs an explicitly and/or implicitly trained model in order to return entity-specific computer-based search results is provided. The innovation can provide for a customized search model that focuses search in connection with achieving information that is meaningful with respect to goals of an entity. The model can be used to modify a search query in accordance with a goal of the entity or to generate the search query thereby returning meaningful and/or targeted results to the user. The system can automatically gather entity-related data thereafter determining or inferring a goal as well as training the model. Moreover, the system can selectively configure (e.g., order, rank, filter) and render results to a user based upon the model.
摘要:
Provided is mechanism for guiding computer searches (e.g. web, Internet, intranet . . . ). Machine learning and reasoning mechanisms are employed together with a search engine to facilitate intelligent guidance of queries and results based on a query and responses to computer generated inquires.Also, disclosed is a mechanism that enables users to validate computer-based information. Users can receive a validity metric associated with computer generated or provided results indicative of the veracity of such results. Validation systems and methods are disclosed to facilitate determining the veracity of results including those that employ humans (e.g., referrals, voting . . . ) and/or automated means (e.g. source analysis, data mining. . . ).
摘要:
Architecture is provided that facilitates user-controlled access to user profile information. A user is allowed to selectively expose (or mask) portions of his/her profile to third parties. Additionally, advertisers and/or content providers can offer incentives or enticement in response to the acceptance of which a user exposes larger portions of their profile. The architecture comprises a system that facilitates profile management utilizing a profile component that facilitates creation and storage of an electronic profile of a user, and a control component under control of the user for controlling access to the profile. Machine learning and reasoning is provided to make inferences and automate aspects thereof.