METHODS AND SYSTEMS FOR SINGLE SIGN-ON WHILE PROTECTING USER PRIVACY
First Claim
1. A method for enabling applications to reference user information, the method comprising:
- receiving, from an application, a first request for a first user identifier that references a user of the application;
sending a second request for the first user identifier to a server, wherein the second request includes a second user identifier that references the user and a second authentication token for the second user identifier, and the second user identifier and the second authentication token are not accessible by the user;
receiving, from the server, the first user identifier and a first authentication token for the first user identifier, wherein the first user identifier corresponds to the second identifier; and
providing the first user identifier and the first authentication token to the application.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of enabling applications to reference user information is provided, including receiving a request for a user identifier that references a user of the application and sending a second request for the user identifier to a server. The second request may include a second user identifier that references the user and a second authentication token for the second user identifier. Furthermore, the second user identifier and the second authentication token are not accessible by the user. The method includes receiving the user identifier and an authentication token for the first user identifier. The user identifier corresponds to the second identifier; and providing the user identifier and authentication token to the application. A method of enabling an application to identify users associated with a user of the application is provided; the method may include receiving, from the server, user identifiers that reference one or more users scoped to the application.
-
Citations
20 Claims
-
1. A method for enabling applications to reference user information, the method comprising:
-
receiving, from an application, a first request for a first user identifier that references a user of the application; sending a second request for the first user identifier to a server, wherein the second request includes a second user identifier that references the user and a second authentication token for the second user identifier, and the second user identifier and the second authentication token are not accessible by the user; receiving, from the server, the first user identifier and a first authentication token for the first user identifier, wherein the first user identifier corresponds to the second identifier; and providing the first user identifier and the first authentication token to the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for enabling an application to identify one or more users associated with a first user of the application, the method comprising:
-
receiving, from an application, contact information that can be used to identify one or more users; receiving, from the application, a request for one or more user identifiers that reference the one or more users; sending, to a server, the contact information and the request for one or more user identifiers that reference the one or more users; receiving, from the server, the one or more user identifiers that reference one or more users, and a correlation between the one or more user identifiers and the one or more users; and providing the one or more user identifiers and the correlation between the one or more user identifiers and the one or more users to the application. - View Dependent Claims (10)
-
-
11. A method of enabling an application to identify one or more users associated with a first user of the application, the method comprising:
-
receiving, from an application, a request for one or more user identifiers that reference one or more users in the first user'"'"'s contact list, wherein the first user'"'"'s contact list is not accessible to the application; sending, to a server, the request for one or more user identifiers that reference one or more users in the first user'"'"'s contact list; receiving, from the server, the one or more user identifiers that reference one or more users; and providing the one or more user identifiers to the application. - View Dependent Claims (12)
-
-
13. A method for discovering address books in network-based software applications, the method comprising:
-
querying an address book in the client device; providing the address book to a server; selecting vetted addresses from the server; querying user identifiers (IDs) for e-mail and phone numbers in the address book; and providing a contact-to-user ID mapping to the client device. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method for creating e-mail user lists, the method comprising:
-
requesting user permission for information discover and discovery scope in an address book; making the address book discoverable; adding the user to an e-mail list stored in a server; and receiving a user interface from the server to generate e-mails. - View Dependent Claims (20)
-
Specification