Pre-authorizing a client application to access a user account on a content management system
First Claim
1. A method comprising:
- receiving, at a content management system from a first application on a client device, an installation request to install a second application on the client device;
determining whether the installation request is associated with an authenticated user account at the content management system;
when the installation request is associated with the authenticated user account, tagging an installer of the second application with an identification tag associated with the authenticated user account;
transmitting, to the client device, the installer tagged with the identification tag;
receiving, from the client device, a pre-authorization request associated with the second application, the pre-authorization request including the identification tag;
based on the identification tag in the pre-authorization request, determining that the second application is pre-authorized to access the authenticated user account; and
logging the second application into the authenticated user account at least partly in response to determining that the second application is pre-authorized to access the authenticated user account.
3 Assignments
0 Petitions
Accused Products
Abstract
A content management system can tag a client installer with an information tag linking the client installer to a user account. The client installer can be configured to install the client-side application on the client device and pass the identification tag to the installed client-side application. The client-side application can transmit the identification tag to the content management system, which can use the identification tag to identify the linked user account and log the client-side application into the user account. The content management system can implement several verification measures such as limiting the number of times and when an identification tag can be used, as well as IP addresses that can use the identification tag. The content management system can also use data cached by the web-browser application to determine if the web-browser application was used to access the user account in the past.
5 Citations
21 Claims
-
1. A method comprising:
-
receiving, at a content management system from a first application on a client device, an installation request to install a second application on the client device; determining whether the installation request is associated with an authenticated user account at the content management system; when the installation request is associated with the authenticated user account, tagging an installer of the second application with an identification tag associated with the authenticated user account; transmitting, to the client device, the installer tagged with the identification tag; receiving, from the client device, a pre-authorization request associated with the second application, the pre-authorization request including the identification tag; based on the identification tag in the pre-authorization request, determining that the second application is pre-authorized to access the authenticated user account; and logging the second application into the authenticated user account at least partly in response to determining that the second application is pre-authorized to access the authenticated user account. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A content management system comprising:
-
one or more processors; and at least one memory containing instructions that, when executed by the one or more processors, cause the content management system to; receive, from a first application on a client device, an installation request to install a second application on the client device; determine whether the installation request is associated with an authenticated user account at the content management system; when the installation request is associated with the authenticated user account, tag an installer of the second application with an identification tag associated with the authenticated user account; transmit, to the client device, the installer tagged with the identification tag; receive, from the client device, a pre-authorization request associated with the second application, the pre-authorization request including the identification tag; based on the identification tag in the pre-authorization request, determine that the second application is pre-authorized to access the authenticated user account; and log the second application into the authenticated user account at least partly in response to determining that the second application is pre-authorized to access the authenticated user account. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium containing instructions that, when executed by one or more processors, cause the one or more processors to:
-
receive, at a content management system, from a first application on a client device, an installation request to install a second application on the client device; determine whether the installation request is associated with an authenticated user account at the content management system; when the installation request is associated with the authenticated user account, tagging an installer of the second application with an identification tag associated with the authenticated user account; transmit, to the client device, the installer tagged with the identification tag; receive a pre-authorization request associated with the second application, the pre-authorization request including the identification tag; based on the identification tag in the pre-authorization request, determine that the second application is pre-authorized to access the authenticated user account; and authorize the second application to access the authenticated user account on the content management system at least partly in response to determining that the second application is pre-authorized to access the authenticated user account. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification