The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Oct. 27, 2020

Filed:

Sep. 25, 2017
Applicant:

Symphony Communication Services Holdings Llc, Palo Alto, CA (US);

Inventors:

David M'Raihi, San Carlos, CA (US);

Aaron Scales, Palo Alto, CA (US);

Bruce Skingle, Palo Alto, CA (US);

Glenn Anderson, San Jose, CA (US);

Benjamin Liu, Fremont, CA (US);

Paul Teyssier, Palo Alto, CA (US);

Daniel Nathanson, Millbrae, CA (US);

Assignee:
Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04L 9/32 (2006.01); H04L 29/08 (2006.01);
U.S. Cl.
CPC ...
H04L 63/0884 (2013.01); H04L 9/321 (2013.01); H04L 9/3213 (2013.01); H04L 63/0807 (2013.01); H04L 67/141 (2013.01); H04L 63/062 (2013.01); H04L 63/126 (2013.01);
Abstract

An organization that wishes its messages to be secure (the 'communicating organization') uses services of a secure communications infrastructure to securely exchange communications among its users. The secure communications infrastructure allows granting to third-party applications the permission to act on behalf of the users when using the secure communications infrastructure. This delegation may be accomplished at a very granular level, specifying the particular applications that are authorized to act on behalf of a user, the particular operations that those applications are authorized to perform, and/or in which contexts the applications may perform the operations. An agent component acts as an intermediary between third-party applications and the core of the secure communications infrastructure. This permits the third-party application to take actions on behalf of the user, while also preventing the third-party applications from obtaining the security-specific data that could lead to a breach of security.


Find Patent Forward Citations

Loading…