VALIDATING SHARED FILES
    1.
    发明申请

    公开(公告)号:US20220217001A1

    公开(公告)日:2022-07-07

    申请号:US17141602

    申请日:2021-01-05

    Abstract: A computing device may receive a file previously uploaded by another device, and may validate the received file using data including a first value encrypted based on a document (e.g., a digital certificate or identification certificate) of the uploading device. The computing device may determine the validity of the certificate based on a certificate of a remote computing device to which the file was uploaded, and may decrypt the first value using a key of the certificate of the uploading device. The computing device may determine a second value for the received file and may determine validity of the received file based on a match of the first value and the second value.

    METHOD FOR SECONDARY AUTHENTICATION

    公开(公告)号:US20220368686A1

    公开(公告)日:2022-11-17

    申请号:US17320506

    申请日:2021-05-14

    Abstract: Described embodiments provide systems and methods for validating a request to perform an action to access at least one file. A computing device can receive a request from the client, the request being to perform an action to access at least one file and including a first computed value indicative of one or more previous actions on files. The computing device may compare the first computed value to a second computed value maintained by the computing device independently from the first computed value. The second computed value may be indicative of the one or more previous actions on the files. The computing device may perform secondary authentication in addition to primary authentication for the client, responsive to an indication of trustworthiness of the client or the file according to the comparison of the first computed value to the second computed value.

    Network sensitive file transfer
    3.
    发明授权

    公开(公告)号:US11201909B1

    公开(公告)日:2021-12-14

    申请号:US17014167

    申请日:2020-09-08

    Abstract: Methods and systems for transmitting files based on network conditions are described herein. Network conditions of a network that connects a first computing device and a second computing device may be determined. A usage pattern of one or more users may be determined. Based on the network conditions, a first priority level of a first file, and/or the usage pattern, a first file may be sent from the first computing device to the second computing device. Based on the network conditions, a second priority level of a second file, and/or the usage pattern, a delay period may be determined for the second file, and transmission of the second file may be delayed. The first computing device may send a summary of the second file to the second computing device.

    Validating shared files
    4.
    发明授权

    公开(公告)号:US11677567B2

    公开(公告)日:2023-06-13

    申请号:US17141602

    申请日:2021-01-05

    CPC classification number: H04L9/3263 H04L9/088

    Abstract: A computing device may receive a file previously uploaded by another device, and may validate the received file using data including a first value encrypted based on a document (e.g., a digital certificate or identification certificate) of the uploading device. The computing device may determine the validity of the certificate based on a certificate of a remote computing device to which the file was uploaded, and may decrypt the first value using a key of the certificate of the uploading device. The computing device may determine a second value for the received file and may determine validity of the received file based on a match of the first value and the second value.

    Method for secondary authentication

    公开(公告)号:US11706203B2

    公开(公告)日:2023-07-18

    申请号:US17320506

    申请日:2021-05-14

    Abstract: Described embodiments provide systems and methods for validating a request to perform an action to access at least one file. A computing device can receive a request from the client, the request being to perform an action to access at least one file and including a first computed value indicative of one or more previous actions on files. The computing device may compare the first computed value to a second computed value maintained by the computing device independently from the first computed value. The second computed value may be indicative of the one or more previous actions on the files. The computing device may perform secondary authentication in addition to primary authentication for the client, responsive to an indication of trustworthiness of the client or the file according to the comparison of the first computed value to the second computed value.

    Network Sensitive File Transfer
    6.
    发明申请

    公开(公告)号:US20220078227A1

    公开(公告)日:2022-03-10

    申请号:US17515684

    申请日:2021-11-01

    Abstract: Methods and systems for transmitting files based on network conditions are described herein. Network conditions of a network that connects a first computing device and a second computing device may be determined. A usage pattern of one or more users may be determined. Based on the network conditions, a first priority level of a first file, and/or the usage pattern, a first file may be sent from the first computing device to the second computing device. Based on the network conditions, a second priority level of a second file, and/or the usage pattern, a delay period may be determined for the second file, and transmission of the second file may be delayed. The first computing device may send a summary of the second file to the second computing device.

Patent Agency Ranking