Coerced encryption on connected devices

    公开(公告)号:US10104044B2

    公开(公告)日:2018-10-16

    申请号:US15589790

    申请日:2017-05-08

    Applicant: Dropbox, Inc.

    Inventor: Sean Byrne

    Abstract: Techniques for coercing users to encrypt synchronized content stored at their personal computing devices. In some aspects, one or more computing devices receive, from a personal computing device, an indication of whether data stored in at least a portion of a storage device of the personal computing device is protected by disk encryption. In response to determining, based on the indication, that the portion of the storage device is not protected by encryption, synchronization data for synchronizing a copy of one or more synchronized content items stored in the portion of the storage device with another copy of the synchronized content items stored at one or more server computing devices is withheld from the personal computing device until disk encryption on the personal computing device is enabled so as to coerce the user to enable disk encryption on the personal computing device.

    Detecting compromised credentials

    公开(公告)号:US09961053B2

    公开(公告)日:2018-05-01

    申请号:US15167972

    申请日:2016-05-27

    Applicant: Dropbox, Inc.

    CPC classification number: H04L63/06 H04L63/083 H04L63/14

    Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for detecting compromised credentials. In some implementations, a content management system can receive information identifying compromised login credentials (e.g., account identifier, password, etc.) from a third party server. The login credentials can be represented by a first hash value generated using a hashing algorithm. When a user logs in to the content management system the user can provide the user's account identifier and password for the content management system. The content management system can generate a second hash value from the user-supplied password using the same hashing algorithm used for the compromised login credentials. The content management system can determine whether the second hash value matches the first hash value and prompt the user to provide a new password for the user's content management system account when the second hash value matches the first hash value.

    COERCED ENCRYPTION ON CONNECTED DEVICES
    3.
    发明申请
    COERCED ENCRYPTION ON CONNECTED DEVICES 有权
    连接设备上的加密加密

    公开(公告)号:US20150358299A1

    公开(公告)日:2015-12-10

    申请号:US14828210

    申请日:2015-08-17

    Applicant: Dropbox, Inc.

    Inventor: Sean Byrne

    Abstract: Techniques for coercing users to encrypt synchronized content stored at their personal computing devices. In some aspects, one or more computing devices receive, from a personal computing device, an indication of whether data stored in at least a portion of a storage device of the personal computing device is protected by disk encryption. In response to determining, based on the indication, that the portion of the storage device is not protected by encryption, synchronization data for synchronizing a copy of one or more synchronized content items stored in the portion of the storage device with another copy of the synchronized content items stored at one or more server computing devices is withheld from the personal computing device until disk encryption on the personal computing device is enabled so as to coerce the user to enable disk encryption on the personal computing device.

    Abstract translation: 用于强制用户加密存储在其个人计算设备上的同步内容的技术。 在一些方面,一个或多个计算设备从个人计算设备接收存储在个人计算设备的存储设备的至少一部分中的数据是否被磁盘加密保护的指示。 响应于基于指示确定存储设备的部分不受加密保护,用于将存储在存储设备的该部分中的一个或多个同步内容项目的副本同步的同步数据与同步的另一个副本 存储在一个或多个服务器计算设备上的内容项目被保留在个人计算设备中,直到启用个人计算设备上的磁盘加密,以便强迫用户启用个人计算设备上的磁盘加密。

    DETECTING COMPROMISED CREDENTIALS

    公开(公告)号:US20170346797A1

    公开(公告)日:2017-11-30

    申请号:US15167972

    申请日:2016-05-27

    Applicant: Dropbox, Inc.

    CPC classification number: H04L63/06 H04L63/083 H04L63/14

    Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for detecting compromised credentials. In some implementations, a content management system can receive information identifying compromised login credentials (e.g., account identifier, password, etc.) from a third party server. The login credentials can be represented by a first hash value generated using a hashing algorithm. When a user logs in to the content management system the user can provide the user's account identifier and password for the content management system. The content management system can generate a second hash value from the user-supplied password using the same hashing algorithm used for the compromised login credentials. The content management system can determine whether the second hash value matches the first hash value and prompt the user to provide a new password for the user's content management system account when the second hash value matches the first hash value.

    COERCED ENCRYPTION ON CONNECTED DEVICES
    5.
    发明申请

    公开(公告)号:US20170244675A1

    公开(公告)日:2017-08-24

    申请号:US15589790

    申请日:2017-05-08

    Applicant: Dropbox, Inc.

    Inventor: Sean Byrne

    Abstract: Techniques for coercing users to encrypt synchronized content stored at their personal computing devices. In some aspects, one or more computing devices receive, from a personal computing device, an indication of whether data stored in at least a portion of a storage device of the personal computing device is protected by disk encryption. In response to determining, based on the indication, that the portion of the storage device is not protected by encryption, synchronization data for synchronizing a copy of one or more synchronized content items stored in the portion of the storage device with another copy of the synchronized content items stored at one or more server computing devices is withheld from the personal computing device until disk encryption on the personal computing device is enabled so as to coerce the user to enable disk encryption on the personal computing device.

    Coerced encryption on connected devices

    公开(公告)号:US09654454B2

    公开(公告)日:2017-05-16

    申请号:US14828210

    申请日:2015-08-17

    Applicant: Dropbox, Inc.

    Inventor: Sean Byrne

    Abstract: Techniques for coercing users to encrypt synchronized content stored at their personal computing devices. In some aspects, one or more computing devices receive, from a personal computing device, an indication of whether data stored in at least a portion of a storage device of the personal computing device is protected by disk encryption. In response to determining, based on the indication, that the portion of the storage device is not protected by encryption, synchronization data for synchronizing a copy of one or more synchronized content items stored in the portion of the storage device with another copy of the synchronized content items stored at one or more server computing devices is withheld from the personal computing device until disk encryption on the personal computing device is enabled so as to coerce the user to enable disk encryption on the personal computing device.

    COERCED ENCRYPTION ON CONNECTED DEVICES

    公开(公告)号:US20150040235A1

    公开(公告)日:2015-02-05

    申请号:US13957003

    申请日:2013-08-01

    Applicant: Dropbox, Inc.

    Inventor: Sean Byrne

    Abstract: Techniques for coercing users to encrypt synchronized content stored at their personal computing devices. In some aspects, one or more computing devices receive, from a personal computing device, an indication of whether data stored in at least a portion of a storage device of the personal computing device is protected by disk encryption. In response to determining, based on the indication, that the portion of the storage device is not protected by encryption, synchronization data for synchronizing a copy of one or more synchronized content items stored in the portion of the storage device with another copy of the synchronized content items stored at one or more server computing devices is withheld from the personal computing device until disk encryption on the personal computing device is enabled so as to coerce the user to enable disk encryption on the personal computing device.

    IDENTIFYING ACCOUNTS HAVING SHARED CREDENTIALS

    公开(公告)号:US20230362165A1

    公开(公告)日:2023-11-09

    申请号:US18353631

    申请日:2023-07-17

    Applicant: Dropbox, Inc.

    CPC classification number: H04L63/0884 H04L63/083 H04L63/0876

    Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for identifying accounts having shared credentials. In some implementations, a content management system can collect user login context data when a user logs in to or accesses a user account of the content management system. For example, the content management system can collect client device data, client application data, internet protocol (IP) address data, and/or other data from the user's device when the user logs in to the user account. The content management system can analyze the login context data to determine patterns that indicate that the user account login credentials are being shared among multiple users.

    Identifying accounts having shared credentials

    公开(公告)号:US11750607B2

    公开(公告)日:2023-09-05

    申请号:US17303444

    申请日:2021-05-28

    Applicant: Dropbox, Inc.

    CPC classification number: H04L63/0884 H04L63/083 H04L63/0876

    Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for identifying accounts having shared credentials. In some implementations, a content management system can collect user login context data when a user logs in to or accesses a user account of the content management system. For example, the content management system can collect client device data, client application data, internet protocol (IP) address data, and/or other data from the user's device when the user logs in to the user account. The content management system can analyze the login context data to determine patterns that indicate that the user account login credentials are being shared among multiple users.

    IDENTIFYING ACCOUNTS HAVING SHARED CREDENTIALS

    公开(公告)号:US20200014687A1

    公开(公告)日:2020-01-09

    申请号:US16576006

    申请日:2019-09-19

    Applicant: Dropbox, Inc.

    Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for identifying accounts having shared credentials. In some implementations, a content management system can collect user login context data when a user logs in to or accesses a user account of the content management system. For example, the content management system can collect client device data, client application data, internet protocol (IP) address data, and/or other data from the user's device when the user logs in to the user account. The content management system can analyze the login context data to determine patterns that indicate that the user account login credentials are being shared among multiple users.

Patent Agency Ranking