PRE-AUTHORIZING A CLIENT APPLICATION TO ACCESS A USER ACCOUNT ON A CONTENT MANAGEMENT SYSTEM
First Claim
1. A method comprising:
- while a client device is authorized to access a user account on a content management system, receiving, by a processor of the content management system, an installation request to install a client-side application on the client device, the installation request originating from a web-browser application running on the client device;
generating an identification tag for the installation request;
transmitting a client installer tagged with the identification tag and a web browser identifier identifying the web browser application from which the installation request originated, wherein the client installer is configured to;
install the client-side application on the client device,generate an authentication key; and
upon the client-side application being successfully installed on the client device, cause the web-browser application to transmit an authorization message to the content management system, the authorization message including;
data cached by the web browser application,the identification tag, andthe authentication key;
receiving the authentication message from the client device;
associating the authentication key with the installation request; and
upon receiving a pre-authorization request including the identification tag and the authentication key, authorizing the client-side application to access the user account on the content management system.
4 Assignments
0 Petitions
Accused Products
Abstract
A content management system can tag a client installer with an information tag linking the client installer to a user account. The client installer can be configured to install the client-side application on the client device and pass the identification tag to the installed client-side application. The client-side application can transmit the identification tag to the content management system, which can use the identification tag to identify the linked user account and log the client-side application into the user account. The content management system can implement several verification measures such as limiting the number of times and when an identification tag can be used, as well as IP addresses that can use the identification tag. The content management system can also use data cached by the web-browser application to determine if the web-browser application was used to access the user account in the past.
7 Citations
20 Claims
-
1. A method comprising:
-
while a client device is authorized to access a user account on a content management system, receiving, by a processor of the content management system, an installation request to install a client-side application on the client device, the installation request originating from a web-browser application running on the client device; generating an identification tag for the installation request; transmitting a client installer tagged with the identification tag and a web browser identifier identifying the web browser application from which the installation request originated, wherein the client installer is configured to; install the client-side application on the client device, generate an authentication key; and upon the client-side application being successfully installed on the client device, cause the web-browser application to transmit an authorization message to the content management system, the authorization message including; data cached by the web browser application, the identification tag, and the authentication key; receiving the authentication message from the client device; associating the authentication key with the installation request; and upon receiving a pre-authorization request including the identification tag and the authentication key, authorizing the client-side application to access the user account on the content management system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A content management system comprising:
-
a processor; and a memory containing instructions that, when executed, cause the processor to; receive an installation request to install a client-side application on a client device; determine that the installation request is associated with a user account; generate an identification tag for the installation request; transmit, to the client device, a client installer tagged with the identification tag, wherein the client installer is configured to install the client-side application on the client device; receive a pre-authorization request including the identification tag; determine that the pre-authorization request was received within a predetermined amount of time after the identification tag was generated; and authorize the client-side application to access the user account. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer-readable medium containing instructions that, when executed by a computing device, cause the computing device to:
-
receive an installation request to install a client-side application on a client device; determine that the installation request is associated with a first user account and a second user account; generate an identification tag for the installation request; transmit, to the client device, a client installer tagged with the identification tag, wherein the client installer is configured to install the client-side application on the client device; receive a pre-authorization request including the identification tag; determine that at least one verification measure is satisfied; and authorize the client-side application to access the first user account and the second user account. - View Dependent Claims (17, 18, 19, 20)
-
Specification