Method and apparatus for managing and displaying contact authentication in a peer-to-peer collaboration system
3 Assignments
0 Petitions
Accused Products
Abstract
Proper user-to-data associations are maintained in shared spaces created in a peer-to-peer collaborative system by means of a simplified and minimal user interface that permits users to easily authenticate other members of a shared space. In particular, support is provided for automatically building authenticated relationships even if users do not take the time to authenticate other users. When a user enters a shared space and views the contacts in that space, the display names of each contact are accompanied by distinctive icons that identify that authentication status of that contact. A mechanism is provided for resolving conflicts between contacts with the same display names to prevent confusion and contact “spoofing.” Security policies can be established to provide a uniform approach to authentication. These policies can be set by a user or, alternatively, the policies can be set by an administrator.
-
Citations
65 Claims
-
1. (canceled)
-
3. (canceled)
-
5-8. -8. (canceled)
-
14. (canceled)
-
21-42. -42. (canceled)
-
43. A method of operating a computing device providing an endpoint in a peer-to-peer collaboration system in which each user has an identity and a display name, the method comprising:
-
in response to communicating with a first user, recording the first user as a contact in a contact data store in memory associated with the computing device, the recording comprising storing at least an identity and display name of the first user; in response to receiving a communication from a second user; determining whether the display name of the second user is equivalent to the display name of a user in the contact data store; when the display name of the second user is equivalent to the display name of a stored contact in the contact data store, and the identity of the user is different than the identity of the contact with the matching display name, generating a warning on a display associated with the computing device. - View Dependent Claims (2, 4, 9, 10, 11, 12, 13, 44, 45, 46, 47, 48, 49, 50)
-
-
51. A method of operating a computing device providing an endpoint in a peer-to-peer collaboration system in which each user has an identity and a display name, the method comprising:
-
receiving an input setting a security policy from a user of the computing device and/or a system administrator; in response to an event that triggers a function that includes display of a display name of a first user; determining an authentication level of the first user, the authentication level comprising an authentication level being selected from a set comprising a certified level, an authenticated level, and an unauthenticated level, the certified level being higher then the authenticated level and the authenticated level being higher than the unauthenticated level; selectively responding to the event based on the authentication level and the security policy, the security policy having at least an allow option, a restrict option and a warn option, and the selectively responding comprising; when the security policy option is determined to be allow, presenting on a graphical user interface the display name of the first user in conjunction with performance of the function in response to the event; when the security policy option is determined to be warn and the authentication level is less than or equal to a threshold level, presenting on the graphical user interface the display name of the first user in conjunction with performance of the function, the presenting including presenting a warning on the authentication level of the first user; and when the security policy option is set to restrict and the authentication level is less than or equal to the threshold level, omitting performance of the function. - View Dependent Claims (15, 16, 17, 18, 19, 20, 52, 53, 54, 55, 56)
-
-
57. A computer storage medium comprising computer-executable instructions that, when executed on a computing device providing an endpoint in a peer-to-peer collaboration system in which each user has an identity and a display name, perform a method comprising:
-
in response to communicating with a first user, recording the first user as a contact in a contact data store in memory associated with the computing device, the recording comprising storing at least an identity and display name of the first user; in response to receiving a communication from a second user; determining whether the display name of the second user is equivalent to the display name of a user in the contact data store; and when the display name of the second user is equivalent to the display name of a stored contact in the contact data store, but the identity of the user is different than the identity of the contact with the matching display name, generating a warning on a display associated with the computing device.
-
-
58. A computer storage medium comprising computer-executable instructions that, when executed on a computing device providing an endpoint in a peer-to-peer collaboration system in which each user has an identity and a display name, perform a method comprising:
in response to an event that triggers a function that includes display of a display name of a first user; determining an authentication level of the first user, the authentication level comprising an authentication level selected from a set comprising a certified level, an authenticated level, and an unauthenticated level, the certified level being higher then the authenticated level and the authenticated level being higher than the unauthenticated level; selectively responding to the event based on the authentication level and a security policy, the security policy having at least an allow option, a restrict option and a warn option, and the selectively responding comprising; when the security policy option is determined to be allow, presenting on a graphical user interface the display name of the first user in conjunction with of a function performed in response to the event; when the security policy option is determined to be warn and the authentication level is less than or equal to a threshold level, presenting on the graphical user interface the display name of the first user in conjunction with performance of the function, the presenting including presenting a warning on the authentication level of the first user; and when the security policy option is set to restrict and the authentication level is less than or equal to the threshold level, omitting performance of the function.
-
59. A computer storage medium comprising computer-executable instructions that, when executed on a computing device providing an endpoint in a peer-to-peer collaboration system in which each user has an identity and a display name, perform a method comprising:
in response to an event adapted to trigger a function associated with a first user different than a user of the computing device; determining an authentication level of the first user, the authentication level comprising an authentication level being selected from a set comprising a certified level, an authenticated level, and an unauthenticated level, the certified level being higher then the authenticated level and the authenticated level being higher than the unauthenticated level; selectively responding to the event based on the authentication level and a security policy, the security policy having at least an allow option, a restrict option and a warn option, and the selectively responding comprising; when the security policy option is set to restrict and the authentication level is less than or equal to the threshold level, blocking performance of the function. - View Dependent Claims (60, 61, 62, 63, 64, 65)
Specification