-
41.
公开(公告)号:US20200287946A1
公开(公告)日:2020-09-10
申请号:US16883645
申请日:2020-05-26
Applicant: Box, Inc.
Inventor: Annie Pearl , James Huamonte , Brian Tran , Tiffany Low , Pierre-Alexandre Masse , Ted Blosser
Abstract: Scalable architectures, systems, and services are provided herein for generating jobs by applying user-specified metadata rules to metadata events. More specifically, the scalable architecture described herein uses metadata to drive automations and/or polices in a cloud-based environment. In one embodiment, the architecture integrates a metadata service with an event-based automation engine to automatically trigger polices and/or automations based on metadata and/or changes in metadata changes. The metadata service can include customizable and/or pre-build metadata templates which can be used to automatically apply a metadata framework (e.g., particular fields) to files based on, for example, the upload or placement of a particular file in a particular folder. The architecture also provides for advanced metadata searching and data classification.
-
公开(公告)号:US10757208B2
公开(公告)日:2020-08-25
申请号:US16136200
申请日:2018-09-19
Applicant: Box, Inc.
Inventor: Sesh Jalagam , Victor De Vansa Vikramaratne
Abstract: Systems for curating and presenting relevant collaboration activity to newly-added users in a cloud-based content management platform. A method embodiment commences by observing and recording user events that correspond to interactions between any number of users and any number of content objects. When a new person who does not have an event history is added, his/her user profile is updated to indicate he/she is a new user, and a start-up proxy user is identified. The proxy user refers to either a real user that is in some way similar to the newly-added user, or the proxy user is a virtual user as amalgamated from previously recorded user history records. The events in the history records of the proxy user are associated with the newly-added user. When the newly-added user interacts with a user interface of the cloud-based content management platform, feed entries are generated and presented to the newly-added user.
-
公开(公告)号:US10740473B2
公开(公告)日:2020-08-11
申请号:US15950885
申请日:2018-04-11
Applicant: Box, Inc.
Inventor: Christopher Vasselli , Irving Yunchi Ruan
Abstract: Disclosed is an approach to implement a new layer of security within mobile devices using an encryption SDK, which implements a standalone component for applications to encrypt, decrypt, and view sensitive data on the device. A security layer is implemented on the device, wherein the security layer manages encryption for data retrieved onto the device from a cloud-based environment. Encrypted content is then generated at the security layer before storing the encrypted content by receiving the content object from the cloud-based environment and encrypting the content object with an encryption key that is password protected. The encrypted content is stored within an encrypted filesystem for presenting the content on the device.
-
公开(公告)号:US10708323B2
公开(公告)日:2020-07-07
申请号:US16049555
申请日:2018-07-30
Applicant: Box, Inc.
Inventor: Anne Elizabeth Hiatt Pearl , Jenica Nash Blechschmidt , Natalia Vinnik , Robert Kyle Waldrop , Sam Michael Devlin , Steven Luis Cipolla , Sesh Jalagam
Abstract: Systems for managing content in a cloud-based service platform. A server in a cloud-based environment is interfaced with storage devices that hold one or more stored objects accessible by two or more users. The stored objects comprise folders and files as well as other objects such as workflow objects that are associated with the folders or the files. The workflow objects comprise workflow metadata that describes a workflow as a set of workflow tasks to be carried out in a progression. Processing of a workflow task and/or carrying out a portion of the progression includes modification of shared content objects. The processing or modification events are detected through workflow events, which in turn cause one or more workflow responses to be generated. Workflow responses comprise updates to the workflow metadata to record progression through the workflow and/or workflow responses comprise updates to any one or more of the stored objects.
-
公开(公告)号:US10599671B2
公开(公告)日:2020-03-24
申请号:US14158626
申请日:2014-01-17
Applicant: Box, Inc.
Inventor: Griffin Dorman , Florian Jourda , Kunal Parmar , Dave Sawyer , Ben Smith
IPC: G06F17/30 , G06F16/27 , G06F16/178
Abstract: Embodiments of the present disclosure include systems and methods of conflict resolution, retry condition management and/or handling of problem files in the synchronization architecture of the cloud-based platform. One embodiment of the disclosed technology detects conflicts between incompatible changes made on opposite file systems based on file system sync results when executing a sync event on the file system. In one embodiment, the disclosed technology applies self-healing strategies when unexpected failures occur. For example, if a synchronization action fails repeatedly, an external action (e.g., from user, file system, etc.) can return the system back to a consistent state again.
-
46.
公开(公告)号:US20200092298A1
公开(公告)日:2020-03-19
申请号:US16553106
申请日:2019-08-27
Applicant: Box, Inc.
Inventor: Alok Ojha , David Vengerov , Benjamin Draffin , Sesh Jalagam
Abstract: Methods, systems and computer program products for computing system security. Techniques for classifying a potentially unauthorized user as an authorized user involve comparisons of two or more access request times that occur at different computing devices in different geographical locations. Based on those comparisons and the distance between the geographical locations of the different computing devices, a determination is made as to whether or not travel (e.g., via overland travel, via air travel, etc.) between those different geographical locations can be reasonably accomplished within a given time period. If it is determined that the required time for travel between the different geographical locations is greater than the time between the access request times—thus suggesting a spoofing attack or other malfeasance—then the potentially unauthorized (i.e., only potentially malfeasant) access can still be deemed as an authorizable access request by analyzing browser configurations and activity patterns of the potentially unauthorized user.
-
公开(公告)号:US20200065313A1
公开(公告)日:2020-02-27
申请号:US16553144
申请日:2019-08-27
Applicant: Box, Inc.
Inventor: Kishan Bharat Patel , Varun Parmar , Benjamin John Kus , Hieu Minh Nguyen , John Huffaker
Abstract: Methods, systems and computer program products for managing content objects in a content management system. A metadata template is assigned to a content object of the content management system. Extensible metadata pertaining to the content object is allocated in accordance with the assigned metadata template. Various operations over the content object result in population of the allocated extensible metadata. When the content object is subjected to a workflow, the execution flow and/or the form of responses associated with execution of the workflow are informed by the populated extensible metadata. A single content object can take on an association with multiple sets of extensible metadata and each set of extensible metadata can take on association with a respective workflow.
-
公开(公告)号:US10514962B2
公开(公告)日:2019-12-24
申请号:US14929980
申请日:2015-11-02
Applicant: Box, Inc.
Inventor: Ryan Matthew Knotts , Jeremy Spiegel , Christopher Vasselli
Abstract: Disclosed is a method and mechanism to implement a communication channel between a web application and a locally running application on a computing system. A local communications server is employed to pass messages between the web application and a local application using a local comm server. The local comm server communicates with the local application over a named pipe that is dedicated to a specific web session and/or application.
-
公开(公告)号:US10452667B2
公开(公告)日:2019-10-22
申请号:US13937101
申请日:2013-07-08
Applicant: Box, Inc.
Inventor: Tamar Bercovici
IPC: G06F16/248 , G06Q10/10
Abstract: Systems and methods are disclosed for identifying users of a collaboration system as search results. In one embodiment, the system performs a text-based content search of content items to identify relevant content. The disclosed system stores metadata associated with the content that includes various user information. The user information can be used to facilitate identification of relevant individuals (users or collaborators) as search results, in addition to or in lieu of, relevant content.
-
公开(公告)号:US20190109376A1
公开(公告)日:2019-04-11
申请号:US16195727
申请日:2018-11-19
Applicant: Chi-Box, Inc.
Inventor: Lorie Peters Lauthier , Norman Boyce
CPC classification number: H01Q1/526 , A61B5/04 , A61B5/6887 , A61M2230/65 , A61N1/00 , A61N2/02 , H01Q1/38 , H01Q1/521 , H01Q7/00 , H04B7/06 , H04B7/15
Abstract: Systems and methods for capture, recording, and regeneration of subtle energy resonance signals are described herein. A system for capturing and recording the signals may include an antenna array disposed within an electromagnetic shield, a signal processor, and a memory coupled to at least one processor. The antenna array may include at least one antenna comprising a conductive disk and an amplifier circuit board, the antenna array detecting and receiving subtle energy resonance signals from a source. The signal processor converts the analog signals into digital signals, which are then stored into the memory. The electromagnetic shield houses the antenna array and minimizes electromagnetic interference with the received signal. Such a controlled environment ensures the purity of the recorded subtle energy resonance signals for regeneration. Regeneration is accomplished with a second antenna coupled to a digital regeneration device for short-range broadcasting, affecting manifestations of subtle energy resonance in a subject.
-
-
-
-
-
-
-
-
-