The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Jun. 12, 2018
Filed:
Aug. 27, 2015
Box, Inc., Los Altos, CA (US);
Drew Barrett Branden, San Francisco, CA (US);
Daniel Theurer, Mountain View, CA (US);
Aniket Shivajirao Patil, Milpitas, CA (US);
Lev Kantorovskiy, Mountain View, CA (US);
Sean Andrew Rose, San Francisco, CA (US);
Rachel Kay Lambert, San Francisco, CA (US);
Timothy Martin Heilig, Palo Alto, CA (US);
Peter Otto Rexer, San Carlos, CA (US);
Rory Arend Paap, Palo Alto, CA (US);
Charles Boyd Burnette, Wake Forest, NC (US);
Vikram Sudhir Sardesai, San Jose, CA (US);
Dominic Anton Grillo, Mountain View, CA (US);
Wayne Cheng, Fremont, CA (US);
Lyall Yatsun Chun, San Jose, CA (US);
Steve Hackney, Mountain View, CA (US);
Box, Inc., Redwood City, CA (US);
Abstract
Systems for managing user-level security in a cloud-based service platform. A server in a cloud-based environment is configured to interface with storage devices that store objects that are accessible over a network by two or more users. An enterprise entity is identified using an enterprise identifier associated with the enterprise, and an application service is associated with an application identifier. An application service request comprising a user identifier and the application identifier is received, and authentication is determined based on the combination of the user identifier and a pre-authenticated application identifier. Once the application service request is authenticated, then specific aspects of the service request are authorized. The integrity of the application identifier is confirmed by locating a secure association of the given application identifier to a pre-shared enterprise identifier. Logging, auditing and other functions can be performed at the user level using the user identifier for user-level tracking.