AUTHORIZING AN UNTRUSTED CLIENT DEVICE FOR ACCESS ON A CONTENT MANAGEMENT SYSTEM
First Claim
1. A synchronized online content management system comprising:
- a processor;
a first module configured to control the processor to receive a request from a first client device to access content in the synchronized online content management system;
a second module configured to control the processor to send a code to the first client device, the code configured for playback on the first client device;
a third module configured to control the processor to receive the code from a second client device, the second client device authorized to access content associated with an account on the synchronized online content management system;
a fourth module configured to control the processor to push data to the first client device, the data configured based on an instruction received from the second client device.
4 Assignments
0 Petitions
Accused Products
Abstract
A method, system, and manufacture for authorizing an untrusted client device for access on a content management system. The content management system receives a request from an untrusted client device to access content on the content management system. The content management system sends an authentication key to the untrusted client device. The content management system then receives the authentication key from a trusted client device. Based on the matching authentication key, the content management system transmits data to the untrusted client device in accordance with any additional instructions that the trusted client device may have sent.
-
Citations
20 Claims
-
1. A synchronized online content management system comprising:
-
a processor; a first module configured to control the processor to receive a request from a first client device to access content in the synchronized online content management system; a second module configured to control the processor to send a code to the first client device, the code configured for playback on the first client device; a third module configured to control the processor to receive the code from a second client device, the second client device authorized to access content associated with an account on the synchronized online content management system; a fourth module configured to control the processor to push data to the first client device, the data configured based on an instruction received from the second client device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-implemented method comprising:
-
in response to requesting access to content in a content management system, receiving a code; presenting, via a processor, the code in a manner perceivable by a client device; and receiving data from the content management system, the data configured based on an instruction by the client device provided to the content management system. - View Dependent Claims (8, 9)
-
-
10. A computer-implemented method comprising:
-
perceiving, via a processor, a code presented by a client device; sending the code to a content management system; and sending a request to the content management system to transmit a content item to the client device. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A manufacture comprising:
-
a non-transitory computer-readable storage medium; and a computer executable instruction stored on the non-transitory computer-readable storage medium which, when executed by a computing device, causes the computing device to perform a method comprising; in response to receiving a request from a first client device to access content on a server, transmitting to the first client device a first authentication key configured for presentation; receiving a second authentication key from a second client device; and when the second authentication key matches the first authentication key, transmitting data to the first client device, the data configured based on the content and an instruction received from the second client device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification