Methods and systems for single sign-on while protecting user privacy
First Claim
1. A method for identifying common users of a network-based software application, the method comprising, at a daemon executing on a client device:
- receiving, from the network-based software application, a request to identify one or more contacts within an address book that are registered with the network-based software application;
providing, to a server device, a first set of information associated with at least one contact from the one or more contacts within the address book;
receiving, from the server device, a unique identifier that corresponds to the at least one contact, wherein the unique identifier indicates that the at least one contact is registered with the network-based software application based at least in part on matching the first set of information with a second set of information stored at the server device; and
providing the unique identifier to the network-based software application, wherein the network-based software application utilizes the unique identifier to provide functionality associated with the at least one contact without exposing both the first and second sets to the network-based software application.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of enabling applications to reference user information is provided, including receiving a request for a user identifier that references a user of the application and sending a second request for the user identifier to a server. The second request may include a second user identifier that references the user and a second authentication token for the second user identifier. Furthermore, the second user identifier and the second authentication token are not accessible by the user. The method includes receiving the user identifier and an authentication token for the first user identifier. The user identifier corresponds to the second identifier; and providing the user identifier and authentication token to the application. A method of enabling an application to identify users associated with a user of the application is provided; the method may include receiving, from the server, user identifiers that reference one or more users scoped to the application.
17 Citations
20 Claims
-
1. A method for identifying common users of a network-based software application, the method comprising, at a daemon executing on a client device:
-
receiving, from the network-based software application, a request to identify one or more contacts within an address book that are registered with the network-based software application; providing, to a server device, a first set of information associated with at least one contact from the one or more contacts within the address book; receiving, from the server device, a unique identifier that corresponds to the at least one contact, wherein the unique identifier indicates that the at least one contact is registered with the network-based software application based at least in part on matching the first set of information with a second set of information stored at the server device; and providing the unique identifier to the network-based software application, wherein the network-based software application utilizes the unique identifier to provide functionality associated with the at least one contact without exposing both the first and second sets to the network-based software application. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer readable storage medium configured to store instructions that, when executed by a processor included in a computing device, cause the computing device to carry out steps that include:
-
receiving, from a network-based software application, a request to identify one or more contacts within an address book that are registered with the network-based software application; providing, to a server device, a first set of information associated with at least one contact from the one or more contacts within the address book; receiving, from the server device, a unique identifier that corresponds to the at least one contact, wherein the unique identifier indicates that the at least one contact is registered with the network-based software application based at least in part on matching the first set of information with a second set of information stored at the server device; and providing the unique identifier to the network-based software application, wherein the network-based software application utilizes the unique identifier to provide functionality associated with the at least one contact without exposing both the first and second sets to the network-based software application. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computing device, comprising:
-
a processor; and a memory configured to store instructions that, when executed by the processor, cause the computing device to carry out steps that include; receiving, from a network-based software application, a request to identify one or more contacts within an address book that are registered with the network-based software application; providing, to a server device, a first set of information associated with at least one contact from the one or more contacts within the address book; receiving, from the server device, a unique identifier that corresponds to the at least one contact, wherein the unique identifier indicates that the at least one contact is registered with the network-based software application based at least in part on matching the first set of information with a second set of information stored at the server device; and providing the unique identifier to the network-based software application, wherein the network-based software application utilizes the unique identifier to provide functionality associated with the at least one contact without exposing both the first and second sets to the network-based software application. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification