Abstract:
System and method for creating a secure channel for inter-application communication based on the messaging system called Intents in the Android OS are disclosed. In one embodiment, an application for accessing a cloud-based storage platform triggers the broadcast of a custom Intent to all applications on a mobile device to detect an authorized application that is capable of interacting with the application. Once an authorized application is chosen, the application opens a secure channel for communication with the authorized application and passes encrypted data stream to the to the secure channel for access by the authorized application.
Abstract:
Systems and methods for secure file portability between mobile applications in a cloud-based environment or cloud-based collaboration and file sharing environment. In one embodiment, a server-based key generation service generates an encryption key that is unique to each file transfer transaction between mobile applications accessed via a mobile device. Data packages leaving a mobile application are then encrypted using the encryption key to provide secure file portability between mobile applications. In another embodiment, a background service triggered by a mobile application detects when a user is logged out of the mobile application and revalidates the user session with the mobile application to maintain portability of files between mobile applications. The background service presents a minimal user interface to get the user's credentials for the mobile application, without the user having to switch to the mobile application, and obtains an authentication token from a remote server using the user's credentials.
Abstract:
Systems and methods for supporting metadata for work items stored in a web-based content management system with collaboration environment are disclosed. Users uploading work items to a folder are not required to provide metadata for the work items. Collaborators of the folder can provide metadata to work items within the folder.
Abstract:
Systems and methods for maintaining and updating file system shadows by a synchronization client of a cloud-based platform. In some embodiments, an executor of the synchronization client can execute an action on an item in the local file system which changes the state of the item from an old state to a new state. The synchronization client updates the file system shadows with the new state of the item via an interface to facilitate generation of a synchronization event for the change to the item, that would otherwise go undetected if the change to the item was immediately reversed. In some embodiments, methods for providing shadow consistency and enhancing concurrent access to shadows are implemented by the synchronization client in maintaining and updating the file system shadows.
Abstract:
A cloud-based platform (e.g., cloud-based collaboration and/or storage platform/service) is described that permits advanced searches with advanced filtering mechanisms to be performed by administrators or other authorized individuals, across an organization, enterprise, or other select groups of entities in a cloud environment, such as a cloud-based collaborative environment. Various types, categories, metadata, and filters can be specified for use in the advanced search within select folders, users' folders, or across a larger set/group of folders and/or users.
Abstract:
A cloud-based platform (e.g., cloud-based collaboration and/or storage platform/service) is described that provides administrators with better visibility into content and activity across an enterprise account via advanced search tools and activity reports. Administrator tools are also provided that allow for actively managing content and passively monitoring content with real-time alerts sent to the administrator if usage of the cloud-based platform changes within the enterprise account. A reporting API is also supported by the cloud-based platform to permit the platform's activity logs to be retrieved by a third-party platform. Additionally, administrators are provided with the option to select two-step login verification of enterprise account users.
Abstract:
Systems and methods for disabling the self-referential appearance of a mobile application in an Intent via a background thread are disclosed. On the Android platform, an application such as a mobile application for providing access to a cloud environment or cloud based service including cloud-based storage and/or collaborative services, can serve as both a source and a target for a given Intent. In one implementation, such a mobile application that can receive and send the same Intent, can include a background service that detects when the Intent is about to be issued, and unregisters the application to prevent the application from receiving the Intent. When a target application for handling the Intent is identified, the background service re-registers the application to receive the Intent.
Abstract:
Embodiments of the present disclosure include systems and methods for upload and/or download streaming encryption to/from an online service, or cloud-based platform or environment. The encryption process includes the following parts: Upload encryption, download decryption, and a central piece of infrastructure called the Interval Key Server (IKS). During both upload and download, the encryption and decryption processes are performed while the files are being uploaded/downloaded, (e.g., the files are being encrypted/decrypted as they are being streamed).
Abstract:
Techniques are disclosed for using a third-party application to access or edit a file within a cloud-based environment within a cloud-based platform or environment. In one embodiment, a method includes, in response to a request to access the content in the cloud-based environment, providing the third-party application with a login view to verify an identity of a user. The login view is generated from a server hosting the environment. The method further includes, upon the verification of the user's identity, providing the requested content to the third-party application.
Abstract:
Methods, systems, and computer program products for electronic signature systems. Multiple components are operatively interconnected to carry out operations for securing e-signatures applied to content objects. A data processing system that interacts with user devices over a network that carries e-signature events raised by the user devices is configured to implement a content management system (CMS) that maintains a single CMS e-signature object within an object storage repository. The single CMS e-signature object is representative of multiple different versions or renditions of CMS objects. Upon an e-sign event, the data processing system modifies the single CMS e-signature object. Human cognition is aided by presentation of two different and independently operable graphical user interface (GUI) renderings, wherein a first rendering presents the single CMS e-signature object and wherein a second rendering displays at least some of the multiple different versions or renditions or properties that constituent the single CMS e-signature object.