CONDUCTING SESSIONS WITH CAPTURED IMAGE DATA OF PHYSICAL ACTIVITY AND UPLOADING USING TOKEN-VERIFIABLE PROXY UPLOADER
First Claim
1. A computer-implemented method comprising:
- receiving at a hosted services server, a token request transmitted from an end-user communication device, requesting an upload token from the hosted services server configured to authorize transmission of a first media file to a hosted proxy server;
upon validating a user of the end-user communication device using end-user credentials to the hosted services server, transmitting the upload token to the end-user communication device;
receiving at the hosted services server, a token validation call from the hosted proxy server; and
transmitting a validation message from the hosted services server to the hosted proxy server configured to authorize transmission of the first media file from the hosted proxy server to a media sharing site using credentials of the hosted services server.
1 Assignment
0 Petitions
Accused Products
Abstract
A token-verifiable proxy uploader is disclosed. A token request may be transmitted from an end-user communication device for requesting an upload token from a hosted services server that is configured to authorize transmission of a first media file to a hosted proxy server. The upload token may be transmitted to the end-user communication device. Validation of the user of the end-user communication device may be conducted without the end-user device providing any credentials to the media sharing site and in which the end-user device is does not transmit any credentials specific to the media sharing site as part of the validation. The token validation call may be in response to the hosted proxy server receiving the upload token and either: (1) the first media file from the end-user communication device; or (2) a request from the end-user communication device to upload the first media file to the hosted proxy server.
-
Citations
17 Claims
-
1. A computer-implemented method comprising:
-
receiving at a hosted services server, a token request transmitted from an end-user communication device, requesting an upload token from the hosted services server configured to authorize transmission of a first media file to a hosted proxy server; upon validating a user of the end-user communication device using end-user credentials to the hosted services server, transmitting the upload token to the end-user communication device; receiving at the hosted services server, a token validation call from the hosted proxy server; and transmitting a validation message from the hosted services server to the hosted proxy server configured to authorize transmission of the first media file from the hosted proxy server to a media sharing site using credentials of the hosted services server. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method comprising:
-
receiving at a proxy server, an upload token and a file, wherein the token is configured to authenticate the file for storage at a remote file sharing location, wherein the file and the token were each transmitted from a first end-user communication device of a first plurality of end-user communication devices, wherein the token was generated in response to verifying credentials from the end-user communication device with respect to a first service without the first end-user device or a user of the first device providing any credentials to the file sharing location; validating the token before attempting to transmit the file for storage at the remote file sharing location; after validating the token, transmitting the file to the file share location using credentials to the file share location that are not available to the first end-user communication device and wherein the file sharing location does not receive any credentials specific to the first user or the first end-user communication device with respect to the first service; and independently storing the file or a portion thereof on the proxy server, wherein the file stored on the remote file share location is retrievable by any one of a second plurality of end-user communication devices that is distinct and non-overlapping with respect to the first plurality of end-user communication devices, and the file stored on the proxy server is not retrievable by any of the second plurality of end-user communication devices. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A computer-implemented method comprising:
-
receiving at a hosted proxy server a token and a file for storage at a file sharing location, that were transmitted from an end-user communication device of a first user, wherein the token was generated in response to verifying credentials from the end-user communication device to a hosted services server and without the end-user device or the first user providing any credentials specific to the file sharing location; requesting verification from the hosted services server that the token is valid before attempting to transmit the file for storage at the file sharing location; after verifying the token, transmitting the file to the file share location using credentials to the file share location that are not available to the first user of the end-user communication device and wherein the file sharing location does not receive any credentials specific to the first user or the end-user communication device with respect to the hosted services server; and transmitting a unique identifier configured to permit access by at least the first user to at least one of the hosted services server or the end-user communication device. - View Dependent Claims (14, 15, 16, 17)
-
Specification