Invitation links with enhanced protection
First Claim
1. A method for providing invitation links to access a protected resource, comprising:
- creating a plurality of invitation links for accessing the protected resource, each of the invitation links of the plurality includes a secret invitation code encoded therein, the secret invitation code of each of the invitation links of the plurality being different from the secret invitation code any of the other invitation links of the plurality;
sending, to at least one invitee, at least one of the invitation links for accessing the protected resource, wherein the secret invitation code is unique to each invitee, the invitation link is sent to the at least one invitee through a primary communication channel;
upon detecting an attempt to access the protected resource via at least one of the plurality of invitation links, determining whether the encoded secret invitation code matches a known secret invitation code;
upon determining that the secret invitation code matches the known secret invitation code, performing a verification process to authenticate the invitee via a secondary channel of communication, the verification process including transmitting via the secondary channel of communication a verification challenge including information upon which the verification process is based; and
upon determining that the verification process has been passed, granting access to the protected resource;
wherein the protected resource is stored in a cloud storage system and is one of at least a file and a folder.
7 Assignments
0 Petitions
Accused Products
Abstract
A method and system for providing invitation links with enhanced protection are presented. The method includes sending, to at least one invitee, at least one invitation link for accessing the protected resource, wherein the at least one invitation link includes a secret invitation code encoded therein, wherein the secret invitation code is unique to each invitee, the invitation link is sent to the at least one invitee through a primary communication channel; upon detecting an attempt to access the at least one invitation link, determining whether the encoded secret invitation code matches a known secret invitation code; upon determining that the secret invitation code matches the known secret invitation code, performing a verification process to authenticate the invitee via a secondary channel of communication; and upon determining that the verification process has been passed, granting access to the protected resource.
13 Citations
24 Claims
-
1. A method for providing invitation links to access a protected resource, comprising:
-
creating a plurality of invitation links for accessing the protected resource, each of the invitation links of the plurality includes a secret invitation code encoded therein, the secret invitation code of each of the invitation links of the plurality being different from the secret invitation code any of the other invitation links of the plurality; sending, to at least one invitee, at least one of the invitation links for accessing the protected resource, wherein the secret invitation code is unique to each invitee, the invitation link is sent to the at least one invitee through a primary communication channel; upon detecting an attempt to access the protected resource via at least one of the plurality of invitation links, determining whether the encoded secret invitation code matches a known secret invitation code; upon determining that the secret invitation code matches the known secret invitation code, performing a verification process to authenticate the invitee via a secondary channel of communication, the verification process including transmitting via the secondary channel of communication a verification challenge including information upon which the verification process is based; and upon determining that the verification process has been passed, granting access to the protected resource; wherein the protected resource is stored in a cloud storage system and is one of at least a file and a folder. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 21, 22)
-
-
12. A non-transitory computer readable medium having stored thereon instructions for causing one or more processing units to execute a method of:
-
providing invitation links to access a protected resource, comprising; creating a plurality of invitation links for accessing the protected resource, each of the invitation links of the plurality includes a secret invitation code encoded therein, the secret invitation code of each of the invitation links of the plurality being different from the secret invitation code any of the other invitation links of the plurality; sending, to at least one invitee, at least one of the invitation links for accessing the protected resource, wherein the secret invitation code is unique to each invitee, the invitation link is sent to the at least one invitee through a primary communication channel; upon detecting an attempt to access the protected resource via at least one of the plurality of invitation links, determining whether the encoded secret invitation code matches a known secret invitation code; upon determining that the secret invitation code matches the known secret invitation code, performing a verification process to authenticate the invitee via a secondary channel of communication, the verification process including transmitting via the secondary channel of communication a verification challenge including information upon which the verification process is based; and upon determining that the verification process has been passed, granting access to the protected resource; wherein the protected resource is stored in a cloud storage system and is one of at least a file and a folder.
-
-
13. A system for providing invitation links to access a protected resource with enhanced protection, comprising:
-
a processing unit; and a memory, the memory containing instructions that, when executed by the processing unit, configure the system to; create a plurality of invitation links for accessing the protected resource, each of the invitation links of the plurality includes a secret invitation code encoded therein, the secret invitation code of each of the invitation links of the plurality being diffe rent from the secret invitation code any of the other invitation links of the plurality; send, to at least one invitee, at least one of the invitation links for accessing the protected resource, wherein the secret invitation code is unique to each invitee, the invitation link is sent to the at least one invitee through a primary communication channel; upon detecting an attempt to access the protected resource via at least one of the plurality of invitation links, determine whether the encoded secret invitation code matches a known secret invitation code; upon determining that the secret invitation code matches the known secret invitation code, perform a verification process to authenticate the invitee via a secondary channel of communication, the verification process including transmission via the secondary channel of communication a verification challenge including information upon which the verification process is based; and upon determining that the verification process has been passed, grant access to the protected resource; wherein the protected resource is stored in a cloud storage system and is one of at least a file and a folder. - View Dependent Claims (14, 15)
-
-
16. A method for a secured registration process, comprising:
-
creating a plurality of invitation links for accessing the secured registration process, each of the invitation links of the plurality includes a secret invitation code encoded therein, the secret invitation code of each of the invitation links of the plurality being different from the secret invitation code any of the other invitation links of the plurality; sending, to at least one invitee, at least one invitation link for registering for a service, wherein the secret invitation code is unique to each invitee, the at least one invitation link is sent to the at least one invitee through a primary communication channel; upon detecting an attempt to access the secured registration process via at least one of the plurality of invitation links, determining whether the encoded secret invitation code matches a known secret invitation code; upon determining that the known secret invitation code matches a known secret invitation code, displaying a registration process; and performing a verification process to authenticate the invitee via a secondary channel of communication, the verification process including transmitting via the secondary channel of communication a message including a verification challenge containing information upon which the verification process is based. - View Dependent Claims (17, 18, 23, 24)
-
-
19. A system for a secured registration process, comprising:
-
a processing unit; and a memory, the memory containing instructions that, when executed by the processing unit, configure the system to; create a plurality of invitation links for accessing the secured registration process, each of the invitation links of the plurality includes a secret invitation code encoded therein, the secret invitation code of each of the invitation links of the plurality being different from the secret invitation code any of the other invitation links of the plurality; send, to at least one invitee, at least one invitation link for registering fora service, wherein the at least one invitation link includes a secret invitation code encoded therein, wherein the secret invitation code is unique to each invitee, the at least one invitation link is sent to the at least one invitee through a primary communication channel; upon detecting an attempt to access the secured registration process via at least one of the plurality of invitation links, determine whether the encoded secret invitation code matches a known secret invitation code; upon determining that the known secret invitation code matches a known secret invitation code, display a registration process; and perform a verification process to authenticate the invitee via a secondary channel of communication, the verification process including transmission via the secondary channel of communication a message including a verification challenge containing information upon which the verification process is based. - View Dependent Claims (20)
-
Specification