Identification verification mechanisms for a third-party application to access content in a cloud-based platform
First Claim
Patent Images
1. A method for providing a third-party application with access to encrypted content in a cloud-based environment, the method comprising:
- in response to a request to access the encrypted content of a workspace in the cloud-based environment, providing the third-party application with an identity verification of a user if the user is not already logged into the workspace, wherein the identity verification is generated from a server hosting the cloud-based environment;
upon the verification of the user'"'"'s identity, transmitting an authentication token to the third-party application, the authentication token allowing the third-party application to access the encrypted content of the workspace in the cloud-based environment without verifying the user'"'"'s identity, wherein the authentication token includes a decryption key to decrypt the encrypted content;
providing the requested encrypted content to the third-party application;
decrypting the encrypted content with the decryption key included with the authentication token; and
in response to receiving a request to store content in the workspace from the third-party application, preventing the third-party application from storing the content, wherein the content is exclusive of the requested encrypted content.
4 Assignments
0 Petitions
Accused Products
Abstract
Techniques are disclosed for using a third-party application to access or edit a file within a cloud-based environment within a cloud-based platform or environment. In one embodiment, a method includes, in response to a request to access the content in the cloud-based environment, providing the third-party application with a login view to verify an identity of a user. The login view is generated from a server hosting the environment. The method further includes, upon the verification of the user'"'"'s identity, providing the requested content to the third-party application.
-
Citations
19 Claims
-
1. A method for providing a third-party application with access to encrypted content in a cloud-based environment, the method comprising:
-
in response to a request to access the encrypted content of a workspace in the cloud-based environment, providing the third-party application with an identity verification of a user if the user is not already logged into the workspace, wherein the identity verification is generated from a server hosting the cloud-based environment; upon the verification of the user'"'"'s identity, transmitting an authentication token to the third-party application, the authentication token allowing the third-party application to access the encrypted content of the workspace in the cloud-based environment without verifying the user'"'"'s identity, wherein the authentication token includes a decryption key to decrypt the encrypted content; providing the requested encrypted content to the third-party application; decrypting the encrypted content with the decryption key included with the authentication token; and in response to receiving a request to store content in the workspace from the third-party application, preventing the third-party application from storing the content, wherein the content is exclusive of the requested encrypted content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 11, 12)
-
-
10. A system for providing a third-party application to access to encrypted content in a cloud-based environment, the system comprising:
-
one or more processors; memory circuitry coupled to the processors and having stored thereon instructions which, when executed by at least one of the processors, causes the system to; in response to a request to access the encrypted content of a workspace in the cloud-based environment, provide the third-party application with an identity verification of a user based on whether the user is logged into the workspace in the cloud-based environment, wherein the identity verification is generated from a server hosting the cloud-based environment; upon the verification of the user'"'"'s identity, transmit an authentication token to the third-party application, the authentication token allowing the third-party application to access the encrypted content of the workspace in the cloud-based environment without verifying the user'"'"'s identity, wherein the authentication token includes a decryption key to decrypt the encrypted content; provide the requested encrypted content to the third-party application; decrypt the encrypted content with the decryption key included with the authentication token; and in response to receiving a request to store content in the workspace from the third-party application, prevent the third-party application from storing the content, wherein the content is exclusive of the requested encrypted content.
-
-
13. A non-transitory machine readable storage medium encoded with instructions for performing a method for providing a third-party application with access to encrypted content in a cloud-based environment, the instructions comprising:
-
in response to a request to access the encrypted content of a workspace in the cloud-based environment, provide the third-party application with an identity verification of a user if the user is not already logged into the workspace, wherein the identity verification is generated from a server hosting the cloud-based environment; upon the verification of the user'"'"'s identity, transmit an authentication token to the third-party application, the authentication token allowing the third-party application to access the encrypted content of the workspace in the cloud-based environment without verifying the user'"'"'s identity, wherein the authentication token includes a decryption key to decrypt the encrypted content; provide the requested encrypted content to the third-party application; decrypt the encrypted content with the decryption key included with the authentication token; and in response to receiving a request to store content in the workspace from the third-party application, prevent the third-party application from storing the content, wherein the content is exclusive of the requested encrypted content. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification