The present invention relates generally to computer science, data science, application architecture, and computer data security. More specifically, techniques for proxied multi-factor authentication using credential and authentication management in scalable data networks is described.
As various computer programs ranging from operating systems to client and server-side applications to online Internet platforms to distributed and cloud computing systems, and other types of software (hereafter “software” or “applications”) increase in complexity, design, and scale, there is also an increase in problems associated with managing large amounts of data and providing data security against unauthorized access to data across a large distributed platforms and data networks.
Accessing and using applications that need to scale to support millions of clients (e.g., computers, servers, desktops, laptops, smart phones, mobile phones, cellular communication devices, tablet computers, and the like) and user accounts are often hampered by various types of operations that need to be performed in order to provide an efficient and scalable computing environment, many of which are distributed globally across numerous servers or server facilities and services, including cloud-based computing systems. Systems such as social networks and social media typically rely upon conventional solutions to address difficult operations such as data security, account security, and data privacy, but which are often limited and restrictive to users, including organizational accounts that may have many users. However, many conventional solutions for providing data security, account security, and data privacy are also problematic because of an inability to scale and support multi-client or multi-threaded operations such as authentication or login operations or to work with third party technology providers to provide data security. As a conventional example, social networks and social media are configured to provide both individual and organizational users with single-client accounts. However, if an organization has multiple users that require access to a single account for a social network, this can be problematic using conventional authentication techniques because only a single client can access a given account at any time, which is not only efficient, but stifles organizational use of valuable social media and networks to deliver, for example, commercial content such as advertising, promotions, coupons, or contextually or thematically-related content that users may find useful or valuable. Organizations with social media marketing departments, which may have one to many users are unable to effectively use powerful communication media such as social media and social networks because of technical limitations of conventional authentication solutions that render these inefficient, unscalable, and lacking in terms of organizational support.
Thus, what is needed is a solution for authenticating access to online accounts without the limitations of conventional techniques.
Various embodiments or examples (“examples”) of the invention are disclosed in the following detailed description and the accompanying drawings:
Various embodiments or examples may be implemented in numerous ways, including as a system, a process, an apparatus, a user interface, or a series of program code or instructions on a computer readable medium such as a storage medium or a computer network including program instructions that are sent over optical, electronic, electrical, chemical, wired, or wireless communication links. In general, individual operations or sub-operations of disclosed processes may be performed in an arbitrary order, unless otherwise provided in the claims.
A detailed description of one or more examples is provided below along with accompanying figures. This detailed description is provided in connection with such examples, but is not limited to any particular example. The scope is limited only by the claims and numerous alternatives, modifications, and equivalents. Numerous specific details are set forth in the following description in order to provide a thorough understanding. These details are provided for the purpose of illustrating various examples and the described techniques may be practiced according to the claims without some or all of these specific details. For clarity, technical material that is known in the technical fields and related to the examples has not been described in detail to avoid unnecessarily obscuring the description or providing unnecessary details that may be already known to those of ordinary skill in the art.
As used herein, “system” may refer to or include the description of a computer, network, or distributed computing system, topology, or architecture using various computing resources that are configured to provide computing features, functions, processes, elements, components, or parts, without any particular limitation as to the type, make, manufacturer, developer, provider, configuration, programming or formatting language, service, class, resource, specification, protocol, or other computing or network attributes. As used herein, “software” or “application” may also be used interchangeably or synonymously with, or refer to a computer program, software, program, firmware, or any other term that may be used to describe, reference, or refer to a logical set of instructions that, when executed, performs a function or set of functions within a computing system or machine, regardless of whether physical, logical, or virtual and without restriction or limitation to any particular implementation, design, configuration, instance, or state. Further, “platform” may refer to any type of computer hardware (hereafter “hardware”) and/or software using one or more local, remote, distributed, networked, or computing cloud (hereafter “cloud”)-based computing resources (e.g., computers, clients, servers, tablets, notebooks, smart phones, cell phones, mobile computing platforms or tablets, and the like) to provide an application, operating system, or other computing environment, such as those described herein, without restriction or limitation to any particular implementation, design, configuration, instance, or state. Distributed resources such as cloud computing networks (also referred to interchangeably as “computing clouds,” “storage clouds,” “cloud networks,” or, simply, “clouds,” without restriction or limitation to any particular implementation, design, configuration, instance, or state) may be used for processing and/or storage of varying quantities, types, structures, and formats of data, without restriction or limitation to any particular implementation, design, or configuration.
As used herein, data may be stored in various types of data structures including, but not limited to databases, data repositories, data warehouses, data stores, or other data structures configured to store data in various computer programming languages and formats in accordance with various types of structured and unstructured database schemas such as SQL, MySQL, NoSQL, DynamoDB™ or those developed by data facility and computing providers such as Amazon® Web Services, Inc. of Seattle, Wash., FMP, Oracle®, Salesforce.com, Inc., or others, without limitation or restriction to any particular instance or implementation. Further, references to databases, data structures, or any type of data storage facility may include any embodiment as a local, remote, distributed, networked, cloud-based, or combined implementation thereof. For example, social networks and social media (hereafter “social media”) using different types of devices may generate (i.e., in the form of posts (which is to be distinguished from a POST request or call over HTTP) on social networks and social media) data in different forms, formats, layouts, data transfer protocols, and data storage schema for presentation on different types of devices that use, modify, or store data for purposes such as electronic messaging, audio or video rendering, content sharing, or like purposes. Data may be generated in various formats such as text, audio, video (including three dimensional, augmented reality (“AR”), and virtual reality (“VR”), or others, without limitation, for use on social networks, social media, and social applications (hereafter “social media”) such as Twitter® of San Francisco, Calif., Snapchat® as developed by Snap® of Venice, Calif., Messenger as developed by Facebook®, WhatsApp®, or Instagram® of Menlo Park, Calif., VKontakte (“VK”) of St. Petersburg, Russia, Pinterest® of San Francisco, Calif., LinkedIn® of Mountain View, Calif., and others, without limitation or restriction. In some examples, data may be formatted and transmitted (i.e., transferred over one or more data communication protocols) between computing resources using various types of data communication and transfer protocols such as Hypertext Transfer Protocol (HTTP), Transmission Control Protocol (TCP)/Internet Protocol (IP), Internet Relay Chat (IRC), SMS, text messaging, instant messaging (IM), or others, without limitation. As described herein, disclosed processes implemented as software may be programmed using Java®, JavaScript®, Scala, Python™, XML, HTML, and other data formats and programs, without limitation. References to various layers of an application architecture (e.g., application layer or data layer) may refer to a stacked layer application architecture such as the Open Systems Interconnect (OSI) model or others.
Here, platform 102 is configured to implement credential and authentication management features using credential management module 108, which works cooperatively with modules 112-120. For example, logic module 120 exchanges control signals and instructions with credential management module 108. Here, credential management module 108 may be implemented using programming languages such as Java® and Scala for platform 102, which may be configured to provide credential and authentication management as well as other features. As shown and described, credential management module 108 provides control and instruction signals related to providing authentication data between various clients (e.g., clients 122-126) and data networks 128-130, all of which may be varied in quantity, type, function, and implementation without limitation or restriction to the examples shown and described. Authentication data, in some examples, may be stored in one or more of cookie data 132, session data 134, or credential data 138, and may include login data (e.g., username, password, tokens, hashes), authentication codes (i.e., alphanumeric codes that are generated by data networks 128-130 and sent to clients 122-126 when the latter elements are requesting access to the former and which requires entry by clients 122-126 through World Wide Web browsers (not shown; hereafter “browsers”), or links to third party authentication services that are presented (i.e., rendered or displayed on a graphical user interface) when queried by data networks 128-130. In other examples, authentication data may include techniques for multiple step or multiple factor (“multi-factor”) authentication data or access security or any other forms or types of data security techniques, processes, or applications that may be used to authenticate access by a client (e.g., clients 122-126) to data networks 128-130 and data published, shown, organized, managed, or otherwise accessed once authorized. Credential management module 108 may also be used to direct queries between platform 102 and clients 122-126 to data networks 128-130 to send various requests to retrieve or send authentication data, as described above, using data transfer protocols such as HTTP, HTTPs (i.e., hypertext transfer protocol secure (an extension of HTTP), TCP/IP, SMTP, or others, wired or wireless, without limitation or restriction). In some examples, credentials (e.g., account access-related data that identifies a specific account or client associated with authorized access to data networks (e.g., data networks 128-130)) and authentication data may be directed by credential management module 108 to be stored in credential data 138. As used herein, the terms “credential,” “credentials,” “credential data,” and “authentication data” may be used interchangeably.
If access to data networks 128-130 over cloud 104, in some examples, is authorized (as used herein, “authorized,” “granted,” “permitted,” “provided” are used synonymously and interchangeably without limitation), then data networks 128-130, as described in greater detail below, may provide session data 134 (e.g., control data and instructions that are used to establish a “session” or period of access between one or more of clients 122-126 and data networks 128-130) and cookie data 132 (which refers to data associated with a “cookie,” a data file issued or generated by data networks 128-130 that includes data, information, parameters, or attributes such as an expiration date/time for access to data networks 128-130) that, once received and processed by a browser on one or more of clients 122-126, permit access to data on data networks 128-130. For example, if client 122 requests access to data network 128 (e.g., Twitter®, Instagram®, Tinder®, Amazon.com®, or the like), a GET request (i.e., over HTTP) may be posted by client 122 to data network 128, but may also be sent to platform 102 and processed by credential management module 108. The GET request or other type of query requesting access and sent over cloud 104 to platform 102 be controlled for purposes of processing the responsive data sent by data network 128. In other words, if data network 128 sends an authentication code to be entered into a “pop-up window” (i.e., a window or sub-browser that appears as a displayed overlay over a browser) or a field within an interface presented within a browser, the authentication code (not shown) may be directed to be stored by credential data 138 utilizing various calls and operations supported by virtual machine 114 and class libraries 136. In some examples, virtual machine 114 may be used to provide a state in which compiled program code for an application (e.g., credential management module 108) is executed to perform the features and functions described herein.
Referring back to credential management module 108, in other examples, a GET request is not posted by clients 122-126, but instead authentication data (e.g., username, password, passcode, authentication code, or the like) may be sent as encapsulated data from one or more of clients 122-126 to one or more of data networks 128-130. Once sent, the authentication data may by directed for storage in credential data 138 by credential management module 108. In still other examples, when access is requested, one or more of clients 122-126 may send authentication data to platform 102 and credential management module 108, which is then processed and stored by the latter in credential data 138 before it is transmitted (as used herein, “transmitted” and “transferred” may be used interchangeably without limitation and are intended to refer to data transfer between various elements shown and described, without limitation to the type of data transfer or control protocol used) to one or more of data networks 128-130. Once processed and stored, credential management module 108 may retrieve authentication data from storage within an addressable memory or storage facility such as credential data 138 and sent to one or more of data networks 128-130 to provide subsequent access to one or more of clients 122-126. In other words, using the same authentication data, credential management module 108 permits multiple clients (e.g., clients 122-126) to access an account on social media without requiring each client to have an individual account, which is neither scalable nor efficient for large organizations seeking to utilize a data network (e.g., data networks 128-130) to perform various functions ranging from remote technical support to social media marketing to financial reconciliation to accounting. By permitting a singular account registration, which subsequently yields authentication data that is used to gain approved access to a data network such as those described herein, multiple client organizations regardless of size, scale, distributed computing architecture, geographical login location (i.e., a location from which a client posts a GET request to one or more of data networks 128-130), or other attributes associated with authenticating account access, can efficiently and effectively use data networks more rapidly.
Referring back to
In some examples, session data may refer to data transferred between one or more of clients 122-126 and data networks 128-130 after authentication data has been approved to permit access. Session data may include any type, form, or format of data including, in some examples, text, audio, video, multi-media, graphical, augmented reality (AR), virtual reality (VR), 3D (i.e., three dimensionally presented data), holograms, holographs, or others, without limitation. In some examples, activity tracking module 116 may be configured to track control data, signals, or instructions from logic module 120 to store some, part, all, or none of session data transferred between data networks 128-130 and clients 122-126. As used herein, “tracking” may be used interchangeably with “monitoring” and include various functions such as copying, sampling, testing, processing, hashing, tagging, or the like for purposes directed by logic module 120, which may be configured to receive user input or data over interface/communication module 118 to do so. In some examples, tracking may be performed natively (i.e., within the operating system or application environment of a browser) without requiring additional software other than an extension, as described herein, in data communication using one or more data communication protocols with platform 102. In other examples, activity tracking module 116 may be configured to track no data, in which case no session data is stored in session data 134. Here, session data for sessions between data networks 128-130 and clients 122-126 may be stored in session data 134, along with “cookies” (i.e., data files that are configured to include processed authentication data (i.e., data that is sent by data networks 128-130 to one or more of clients 122-126 for purposes of permitting access to data on data networks 128-130 for a finite or indefinite period of time (i.e., a session)) and other control data such as an expiration date and time that is used to manage access), which may be stored in a separate data repository, database, or data facility such as cookie data 132. As used herein, the terms “database,” “data repository,” “data farm,” “data facility” may be used interchangeably without limitation.
Referring back to
In some examples, assessment module 210 may be configured to work with credential module 202, authentication manager 208, data management module 214, and session handler 216 to generate assessments that are constructed based on evaluating, using user-specific rules, artificial intelligence, machine learning, or deep learning techniques, data that is being transferred between clients 122-126 (
As discussed above, credential module 202 may be configured to manage authentication data being transferred between a data network (e.g., data networks 128-130 (
Further, data management module 214 may be configured to work cooperatively with browser extension manager 212 to transfer data between data networks 128-130 (
Here, credential data and authentication data (collectively “authentication data) can be transferred over data flow paths 312-318 between credential management platform 302 and browser 308 and data network 306. In some examples, data flow paths 312-318 may be implemented as logical or actual networking paths or routes that consist of various types of routing equipment, conduits, and networking equipment used to implement wired or wireless data communications. Here, credential management platform 302 may be implemented and configured to transfer authentication data received from data network 306 to browser 308 and browser extension 304. In some examples, authentication data may be stored, once received at browser 308, in cookie data 310. In other words, authentication data may include a cookie (e.g., session cookie) from data network 306 that, once input at browser 308, may be approved (i.e., grant) access to data network 306. As shown, system 300 is an exemplary embodiment of a data flow diagram for transmitting authentication data to and from browser 308 and browser extension 304 to data network 306. Further, monitoring, tracking, sampling, caching, copying, or modifying session data transferred between data network 306 and browser 308 can be performed by credential management platform 302.
In some examples, a GET request (not shown) may be transmitted by browser 308 and browser extension 304 (the latter of which is in data communication with credential management platform 302) to data network 306 over data path 312. Upon receiving a request (e.g., GET request or call) over data path 312, credential management platform 302 (e.g., platform 102 (
For example, authentication data may be provided by credential management platform 302 to data network 306 over data flow path 314 when browser extension 304 sends a control signal to credential management platform 302 indicating that a request to access data network 306 and establish a session has been initiated by browser 308. In other examples, a copy of a request sent by browser 308 and/or browser extension 304 may be sent over data path 312 to credential management platform 302, which then sends authentication data over data path 314 using a data communication protocol. In still other examples, when a session is established session data may be transferred by data network 306 to browser 308 and/or browser extension 304 over data path 320. If a change to credentials or authentication data occurs, data network 306 can transfer that data over data path 316 to credential management platform 302, which can subsequently pass a copy of said authentication data to browser 308 via browser extension 304. In still further alternative embodiments, if authentication data is changed by data network 306, when sent to browser 308 and browser extension 304 over data path 320, a copy of the authentication data may be sent to credential management platform 302 over data path 312. In yet another alternative embodiment, authentication data sent over data path 320 by data network 306 can be received by browser extension 304, but before being cached at browser 308, the authentication data can be forwarded to credential management platform 302 and used, in other examples, to enable access to data network 306 using the techniques described herein. In other examples, system 330 and the accompanying elements may be varied in design, configuration, and function without limitation to those shown and described.
Referring back to
Alternatively, if the login data is accepted, then the intended data network generates and sends a cookie, which is received by credential management platform (e.g., platform 102 (
Alternatively, if a query (i.e., request) is not received to perform an evaluation, then a further determination is made as to whether an instruction is received to modify data stored or accessed by a credential management module (630). If said instruction is not received, then process 620 ends. If an instruction to modify stored data is received by credential management platform 302 or 402, then modification(s) requested are performed (632) and process 620 ends. Examples of modifications that may be requested by an extension include extending a session, terminating a session, requesting access to a session already in progress with another client, or multiple client authorization requests. In other examples, process 620 may be implemented differently and is not limited to the order, operations, steps, sub-processes, steps, or other elements as shown and described.
Referring back to
Referring back to
According to some examples, computing system 800 performs specific operations by processor 804 executing one or more sequences of one or more instructions stored in system memory 806. Such instructions may be read into system memory 806 from another computer readable medium, such as static storage device 808 or disk drive 810. In some examples, hard-wired circuitry may be used in place of or in combination with software instructions for implementation.
The term “computer readable medium” refers to any tangible medium that participates in providing instructions to processor 804 for execution. Such a medium may take many forms, including but not limited to, non-volatile media and volatile media. Non-volatile media includes, for example, optical or magnetic disks, such as disk drive 810. Volatile media includes dynamic memory, such as system memory 806.
Common forms of computer readable media includes, for example, floppy disk, flexible disk, hard disk, magnetic tape, any other magnetic medium, CD-ROM, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, RAM, PROM, EPROM, FLASH-EPROM, any other memory chip or cartridge, or any other medium from which a computer can read.
Instructions may further be transmitted or received using a transmission medium. The term “transmission medium” may include any tangible or intangible medium that is capable of storing, encoding or carrying instructions for execution by the machine, and includes digital or analog communications signals or other intangible medium to facilitate communication of such instructions. Transmission media includes coaxial cables, copper wire, and fiber optics, including wires that comprise bus 802 for transmitting a computer data signal.
In some examples, execution of the sequences of instructions may be performed by a single computer system 800. According to some examples, two or more computing system 800 coupled by communication link 820 (e.g., LAN, PSTN, or wireless network) may perform the sequence of instructions in coordination with one another. Computing system 800 may transmit and receive messages, data, and instructions, including program, i.e., application code, through communication link 820 and communication interface 812. Received program code may be executed by processor 804 as it is received, and/or stored in disk drive 810, or other non-volatile storage for later execution. In other examples, the above-described techniques may be implemented differently in design, function, and/or structure and are not intended to be limited to the examples described and/or shown in the drawings.
Although the foregoing examples have been described in some detail for purposes of clarity of understanding, the above-described inventive techniques are not limited to the details provided. There are many alternative ways of implementing the above-described invention techniques. The disclosed examples are illustrative and not restrictive.
Number | Name | Date | Kind |
---|---|---|---|
6041311 | Chislenko et al. | Mar 2000 | A |
6146026 | Ushiku | Nov 2000 | A |
6385611 | Cardona | May 2002 | B1 |
6684239 | Flepp et al. | Jan 2004 | B1 |
6742032 | Castellani et al. | May 2004 | B1 |
6871232 | Curie et al. | Mar 2005 | B2 |
7032030 | Codignotto | Apr 2006 | B1 |
7222156 | Gupta et al. | May 2007 | B2 |
7409710 | Uchil et al. | Aug 2008 | B1 |
7606865 | Kumar et al. | Oct 2009 | B2 |
7644057 | Nelken et al. | Jan 2010 | B2 |
7702541 | Black et al. | Apr 2010 | B2 |
7725492 | Sittig et al. | May 2010 | B2 |
7751620 | Cosoi | Jul 2010 | B1 |
7756926 | Tseng et al. | Jul 2010 | B2 |
7818758 | Bonet et al. | Oct 2010 | B2 |
7979369 | Grenier et al. | Jul 2011 | B2 |
8006187 | Bailey et al. | Aug 2011 | B1 |
8027931 | Kalaboukis | Sep 2011 | B2 |
8082308 | Filev | Dec 2011 | B1 |
8131745 | Hoffman et al. | Mar 2012 | B1 |
8171128 | Zuckerberg et al. | May 2012 | B2 |
8200527 | Thompson et al. | Jun 2012 | B1 |
8225376 | Zuckerberg et al. | Jul 2012 | B2 |
8286154 | Kaakani et al. | Oct 2012 | B2 |
8321300 | Bockius et al. | Nov 2012 | B1 |
8412657 | Grenier et al. | Apr 2013 | B2 |
8505069 | Solodovnikov et al. | Aug 2013 | B1 |
8606792 | Jackson et al. | Dec 2013 | B1 |
8615442 | Kapur et al. | Dec 2013 | B1 |
8752041 | Akiyoshi et al. | Jun 2014 | B2 |
8769417 | Robinson et al. | Jul 2014 | B1 |
8825515 | Hanson | Sep 2014 | B1 |
8886580 | Grenier et al. | Nov 2014 | B2 |
8892524 | Lee et al. | Nov 2014 | B1 |
8972428 | Dicker et al. | Mar 2015 | B2 |
9021361 | Pettinati et al. | Apr 2015 | B1 |
9105044 | Wu | Aug 2015 | B2 |
9141997 | Gaedcke et al. | Sep 2015 | B2 |
9143478 | Ramaswamy | Sep 2015 | B2 |
9229702 | Kapulkin et al. | Jan 2016 | B1 |
9282098 | Hitchcock | Mar 2016 | B1 |
9311683 | Saylor et al. | Apr 2016 | B1 |
9338186 | Wollenstein et al. | May 2016 | B2 |
9378295 | Marra et al. | Jun 2016 | B1 |
9483802 | Gaedcke et al. | Nov 2016 | B2 |
9501746 | Prakash | Nov 2016 | B2 |
9509742 | Gordon | Nov 2016 | B2 |
9519723 | Lorenz et al. | Dec 2016 | B2 |
9596206 | Bueno et al. | Mar 2017 | B2 |
9619531 | Wu | Apr 2017 | B2 |
9756098 | Kazerani et al. | Sep 2017 | B2 |
9800639 | Gordon | Oct 2017 | B2 |
9953063 | Spasojevic et al. | Apr 2018 | B2 |
10084838 | Gordon et al. | Sep 2018 | B2 |
10142386 | Gordon | Nov 2018 | B2 |
10264042 | Gordon | Apr 2019 | B2 |
20010025253 | Heintz et al. | Sep 2001 | A1 |
20010042087 | Kephart et al. | Nov 2001 | A1 |
20010047290 | Petras et al. | Nov 2001 | A1 |
20020010746 | Jilk et al. | Jan 2002 | A1 |
20020049793 | Okumura et al. | Apr 2002 | A1 |
20020070953 | Barg et al. | Jun 2002 | A1 |
20020105545 | Carter et al. | Aug 2002 | A1 |
20030028525 | Santos et al. | Feb 2003 | A1 |
20030078959 | Yeung et al. | Apr 2003 | A1 |
20030128203 | Marshall et al. | Jul 2003 | A1 |
20030135565 | Estrada | Jul 2003 | A1 |
20030225850 | Teague | Dec 2003 | A1 |
20040174397 | Cereghini et al. | Sep 2004 | A1 |
20050060643 | Glass et al. | Mar 2005 | A1 |
20050132348 | Meulemans et al. | Jun 2005 | A1 |
20050206644 | Kincaid | Sep 2005 | A1 |
20050283614 | Hardt | Dec 2005 | A1 |
20060010215 | Clegg et al. | Jan 2006 | A1 |
20060036685 | Canning et al. | Feb 2006 | A1 |
20060129602 | Witriol et al. | Jun 2006 | A1 |
20060143307 | Codignotto | Jun 2006 | A1 |
20060155581 | Eisenberger et al. | Jul 2006 | A1 |
20060206578 | Heidloff et al. | Sep 2006 | A1 |
20070083536 | Darnell et al. | Apr 2007 | A1 |
20070136354 | Chen | Jun 2007 | A1 |
20070171716 | Wright et al. | Jul 2007 | A1 |
20070226177 | Barsness et al. | Sep 2007 | A1 |
20070282800 | England et al. | Dec 2007 | A1 |
20070286528 | Podilchuk | Dec 2007 | A1 |
20080005284 | Ungar et al. | Jan 2008 | A1 |
20080033776 | Marchese | Feb 2008 | A1 |
20080034058 | Korman et al. | Feb 2008 | A1 |
20080040673 | Zuckerberg et al. | Feb 2008 | A1 |
20080103906 | Singh | May 2008 | A1 |
20080109245 | Gupta | May 2008 | A1 |
20080109491 | Gupta | May 2008 | A1 |
20080120379 | Malik | May 2008 | A1 |
20080126476 | Nicholas et al. | May 2008 | A1 |
20080133488 | Bandaru et al. | Jun 2008 | A1 |
20080178125 | Elsbree et al. | Jul 2008 | A1 |
20080189406 | Shen | Aug 2008 | A1 |
20080215591 | Howard et al. | Sep 2008 | A1 |
20080221870 | Attardi et al. | Sep 2008 | A1 |
20080263603 | Murray et al. | Oct 2008 | A1 |
20080294680 | Powell et al. | Nov 2008 | A1 |
20080306830 | Lasa et al. | Dec 2008 | A1 |
20090013043 | Tan | Jan 2009 | A1 |
20090043852 | Weir et al. | Feb 2009 | A1 |
20090089657 | Davis | Apr 2009 | A1 |
20090106080 | Carrier et al. | Apr 2009 | A1 |
20090132311 | Klinger et al. | May 2009 | A1 |
20090138472 | MacLean | May 2009 | A1 |
20090144723 | Hartin et al. | Jun 2009 | A1 |
20090157667 | Brougher et al. | Jun 2009 | A1 |
20090157708 | Bandini et al. | Jun 2009 | A1 |
20090157899 | Gagliardi et al. | Jun 2009 | A1 |
20090158265 | Davis et al. | Jun 2009 | A1 |
20090177670 | Grenier et al. | Jul 2009 | A1 |
20090181649 | Bull et al. | Jul 2009 | A1 |
20090210282 | Elenbaas et al. | Aug 2009 | A1 |
20090249451 | Su et al. | Oct 2009 | A1 |
20090292722 | Ayloo | Nov 2009 | A1 |
20090300036 | Nagasaki | Dec 2009 | A1 |
20100071052 | Mao | Mar 2010 | A1 |
20100082503 | Kantak et al. | Apr 2010 | A1 |
20100106730 | Aminian et al. | Apr 2010 | A1 |
20100119053 | Goeldi | May 2010 | A1 |
20100121707 | Goeldi | May 2010 | A1 |
20100121843 | Goeldi | May 2010 | A1 |
20100169148 | Oberhofer et al. | Jul 2010 | A1 |
20100205663 | Ward et al. | Aug 2010 | A1 |
20100223341 | Manolescu et al. | Sep 2010 | A1 |
20100246797 | Chavez et al. | Sep 2010 | A1 |
20100250683 | Hoyne et al. | Sep 2010 | A1 |
20100274732 | Grinchenko et al. | Oct 2010 | A1 |
20100281258 | Andress | Nov 2010 | A1 |
20100287512 | Gan et al. | Nov 2010 | A1 |
20100306122 | Shaffer | Dec 2010 | A1 |
20100312769 | Bailey et al. | Dec 2010 | A1 |
20110004922 | Bono et al. | Jan 2011 | A1 |
20110055217 | Kamel et al. | Mar 2011 | A1 |
20110055264 | Sundelin et al. | Mar 2011 | A1 |
20110077988 | Cates et al. | Mar 2011 | A1 |
20110113041 | Hawthorne et al. | May 2011 | A1 |
20110119593 | Jacobson et al. | May 2011 | A1 |
20110125826 | Erhart et al. | May 2011 | A1 |
20110144801 | Selker et al. | Jun 2011 | A1 |
20110153603 | Adiba et al. | Jun 2011 | A1 |
20110197146 | Goto et al. | Aug 2011 | A1 |
20110212430 | Smithmier et al. | Sep 2011 | A1 |
20110219087 | Jorasch et al. | Sep 2011 | A1 |
20110246513 | Covannon et al. | Oct 2011 | A1 |
20110289574 | Hull et al. | Nov 2011 | A1 |
20120036080 | Singer et al. | Feb 2012 | A1 |
20120054135 | Salaka et al. | Mar 2012 | A1 |
20120076367 | Tseng | Mar 2012 | A1 |
20120077158 | Jastrzembski et al. | Mar 2012 | A1 |
20120095861 | Feng et al. | Apr 2012 | A1 |
20120102021 | Hill et al. | Apr 2012 | A1 |
20120117059 | Bailey et al. | May 2012 | A1 |
20120158632 | Grenier et al. | Jun 2012 | A1 |
20120195422 | Famous | Aug 2012 | A1 |
20120208568 | Cooley | Aug 2012 | A1 |
20120232953 | Custer | Sep 2012 | A1 |
20120254321 | Lindsay et al. | Oct 2012 | A1 |
20120265806 | Blanchflower et al. | Oct 2012 | A1 |
20120271729 | Vincelette et al. | Oct 2012 | A1 |
20120284155 | Holten et al. | Nov 2012 | A1 |
20120290605 | Ickman et al. | Nov 2012 | A1 |
20120303659 | Erhart et al. | Nov 2012 | A1 |
20120317198 | Patton et al. | Dec 2012 | A1 |
20130007121 | Fontenot et al. | Jan 2013 | A1 |
20130018957 | Parnaby et al. | Jan 2013 | A1 |
20130024522 | Pierre et al. | Jan 2013 | A1 |
20130050747 | Cok et al. | Feb 2013 | A1 |
20130066876 | Raskino et al. | Mar 2013 | A1 |
20130110946 | Bradshaw | May 2013 | A1 |
20130116044 | Schwartz | May 2013 | A1 |
20130138428 | Chandramouli et al. | May 2013 | A1 |
20130159472 | Newton et al. | Jun 2013 | A1 |
20130212349 | Maruyama | Aug 2013 | A1 |
20130218801 | Rago | Aug 2013 | A1 |
20130218865 | Angulo et al. | Aug 2013 | A1 |
20130282417 | Gaedcke et al. | Oct 2013 | A1 |
20130282594 | Gaedcke et al. | Oct 2013 | A1 |
20130282603 | Gaedcke et al. | Oct 2013 | A1 |
20130282722 | Grenier et al. | Oct 2013 | A1 |
20130291058 | Wollenstein et al. | Oct 2013 | A1 |
20130298038 | Spivack et al. | Nov 2013 | A1 |
20130304726 | Sandulescu et al. | Nov 2013 | A1 |
20130304758 | Gruber et al. | Nov 2013 | A1 |
20130318156 | Friedman et al. | Nov 2013 | A1 |
20140006524 | Singh et al. | Jan 2014 | A1 |
20140032306 | Sukornyk et al. | Jan 2014 | A1 |
20140040275 | Dang et al. | Feb 2014 | A1 |
20140040377 | Friedman et al. | Feb 2014 | A1 |
20140047429 | Gaither et al. | Feb 2014 | A1 |
20140067520 | Campanile | Mar 2014 | A1 |
20140074844 | Subramanian et al. | Mar 2014 | A1 |
20140082072 | Kass et al. | Mar 2014 | A1 |
20140108675 | Wu | Apr 2014 | A1 |
20140164352 | Denninghoff | Jun 2014 | A1 |
20140173444 | Wu | Jun 2014 | A1 |
20140173501 | Wu | Jun 2014 | A1 |
20140173509 | Wu | Jun 2014 | A1 |
20140181087 | Wu | Jun 2014 | A1 |
20140181194 | Sullivan | Jun 2014 | A1 |
20140181728 | Wu | Jun 2014 | A1 |
20140184841 | Woo et al. | Jul 2014 | A1 |
20140200989 | Kassko et al. | Jul 2014 | A1 |
20140222834 | Parikh et al. | Aug 2014 | A1 |
20140244621 | Lindsay | Aug 2014 | A1 |
20140278785 | Gaedcke et al. | Sep 2014 | A1 |
20140280113 | Hohwald | Sep 2014 | A1 |
20140289034 | Wu | Sep 2014 | A1 |
20140298199 | Johnson, Jr. et al. | Oct 2014 | A1 |
20140304249 | Ayzenshtat et al. | Oct 2014 | A1 |
20140324902 | Morris et al. | Oct 2014 | A1 |
20140358911 | McCarthy et al. | Dec 2014 | A1 |
20150032492 | Ting et al. | Jan 2015 | A1 |
20150032751 | Ting et al. | Jan 2015 | A1 |
20150039705 | Kursun | Feb 2015 | A1 |
20150100537 | Grieves et al. | Apr 2015 | A1 |
20150112918 | Zheng et al. | Apr 2015 | A1 |
20150120713 | Kim et al. | Apr 2015 | A1 |
20150127453 | Tew et al. | May 2015 | A1 |
20150134457 | Cheung et al. | May 2015 | A1 |
20150134579 | Zaman et al. | May 2015 | A1 |
20150161211 | Patel et al. | Jun 2015 | A1 |
20150170294 | Goyal et al. | Jun 2015 | A1 |
20150193504 | Naidu et al. | Jul 2015 | A1 |
20150281227 | Fox Ivey | Oct 2015 | A1 |
20150286643 | Kumar et al. | Oct 2015 | A1 |
20150288522 | McCoy | Oct 2015 | A1 |
20150295869 | Li et al. | Oct 2015 | A1 |
20150310018 | Fan et al. | Oct 2015 | A1 |
20150312200 | Bray et al. | Oct 2015 | A1 |
20150381552 | Vijay et al. | Dec 2015 | A1 |
20160034551 | Huang et al. | Feb 2016 | A1 |
20160042053 | Webber | Feb 2016 | A1 |
20160057576 | Kessler et al. | Feb 2016 | A1 |
20160073166 | Hu et al. | Mar 2016 | A1 |
20160080445 | Kazerani et al. | Mar 2016 | A1 |
20160110688 | Knox et al. | Apr 2016 | A1 |
20160125157 | Wu | May 2016 | A1 |
20160132904 | Mondal et al. | May 2016 | A1 |
20160132973 | Wu | May 2016 | A1 |
20160134580 | Castera et al. | May 2016 | A1 |
20160147760 | N et al. | May 2016 | A1 |
20160151704 | Wu | Jun 2016 | A1 |
20160203221 | Rao et al. | Jul 2016 | A1 |
20160203523 | Spasojevic et al. | Jul 2016 | A1 |
20160210555 | Murphy et al. | Jul 2016 | A1 |
20160320926 | Ganin et al. | Nov 2016 | A1 |
20160321261 | Spasojevic et al. | Nov 2016 | A1 |
20160321562 | Zeng | Nov 2016 | A1 |
20160321694 | Vorozhtsov | Nov 2016 | A1 |
20160335572 | Bennett et al. | Nov 2016 | A1 |
20160352667 | Pickett et al. | Dec 2016 | A1 |
20170180294 | Milligan et al. | Jun 2017 | A1 |
20180053114 | Adjaoute | Feb 2018 | A1 |
20180091468 | Yong et al. | Mar 2018 | A1 |
20180144389 | Fredrich et al. | May 2018 | A1 |
20180152471 | Jakobsson | May 2018 | A1 |
20180219830 | O'Brien et al. | Aug 2018 | A1 |
20180329565 | Yeung et al. | Nov 2018 | A1 |
20180367484 | Rodriguez et al. | Dec 2018 | A1 |
20190114356 | Senftleber et al. | Apr 2019 | A1 |
20190116137 | Senftleber et al. | Apr 2019 | A1 |
20190116148 | Senftleber et al. | Apr 2019 | A1 |
20190158610 | Holzband et al. | May 2019 | A1 |
20190159166 | Aggarwal et al. | May 2019 | A1 |
20190228093 | Falcao et al. | Jul 2019 | A1 |
20190230151 | Falcao et al. | Jul 2019 | A1 |
Number | Date | Country |
---|---|---|
102054033 | May 2011 | CN |
2009047674 | Apr 2009 | WO |
2013158839 | Oct 2013 | WO |
2014089460 | Jun 2014 | WO |
2014153463 | Jan 2015 | WO |
2015013436 | Jan 2015 | WO |
2019075284 | Apr 2019 | WO |
2019144159 | Jul 2019 | WO |
Entry |
---|
Bista, Sanat Kumar et al., “Using Gamification in an Online Community,” CSIRO ITC Centre, Conference Paper, 2012. |
Frunzi, Victoria E., Non-Final Office Action dated Oct. 16, 2018 for U.S. Appl. No. 15/018,787. |
Kolosowski-Gager, Katherine, Final Office Action dated Feb. 11, 2019 for U.S. Appl. No. 14/627,151. |
Lithium Technologies. “Community Health Index for Online Communities.” 2009, https://www.lithium.com/pdfs/whitepapers/Lithium-Community-Health-Index_v1AY2ULb.pdf. Retrieved from the Internet Wayback Machine, dated Feb. 19, 2011. |
Netzloff, Eric R., Non-Final Office Action dated Nov. 6, 2018 for U.S. Appl. No. 14/824,021. |
Ofori-Awuah, Maame, Non-Final Office Action dated Apr. 5, 2019 for U.S. Appl. No. 14/929,209. |
Vo, Huyen X., Non-Final Office Action dated Mar. 15, 2019 for U.S. Appl. No. 15/782,642. |
Young, Lee W., Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration, dated Apr. 1, 2019 for International Application No. PCT/US2018/05545. |
Rashid, Ishrat, Non-Final Office Action dated Jun. 11, 2019 for U.S. Appl. No. 15/782,653. |
Young, Lee W.; Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration dated Jun. 24, 2019 for International Application No. PCT/US2019/014637. |
“Craigslist Online Community.” Craigslist.org. Jul. 6, 2010. |
Ahmed, Saba, Final Office Action dated Jun. 29, 2016 for U.S. Appl. No. 14/098,492. |
Ahmed, Saba, Non-Final Office Action dated Nov. 19, 2015 for U.S. Appl. No. 14/098,492. |
Arentz et al., Classifying offensive sites based on image content [online], Computer Vision and Image Understanding 94, 295-310, 2004, Retrieved from the Internet. |
Blaufeld, Justin R., Final Office Action dated Mar. 24, 2016 for U.S. Appl. No. 14/098,501. |
Blaufeld, Justin R., Non-Final Office Action dated Sep. 24, 2015 for U.S. Appl. No. 14/098,501. |
Bostock, Mike, Sankey Diagram, available at http://bost.ocks.org/mike/sankey, published May 21, 2012, 1 pg. |
Brown Jr., Nathan H., Final Office Action dated Mar. 29, 2011 for U.S. Appl. No. 11/971,856. |
Brown Jr., Nathan H., Non-Final Office Action dated Jun. 6, 2012 for U.S. Appl. No. 13/167,482. |
Brown Jr., Nathan H., Non-Final Office Action dated Mar. 24, 2014 for U.S. Appl. No. 13/780,487. |
Brown Jr., Nathan H., Non-Final Office Action dated Nov. 26, 2010 for U.S. Appl. No. 11/971,856. |
Bui, Hanh Thi Minh, Non-Final Office Action dated Mar. 13, 2015 for U.S. Appl. No. 14/012,978. |
Cannell, Larry, “Windows 7 Federated Search and SharePoint 2010” online article dated Jun. 2010 <http://blogs.gartner.com/larry-cannell/2010/09/09/windows-7-federated-search-and-sharepoint-2010/[May 15, 2016 12:36 M]. |
Chung, Mong-Shune, Non-Final Office Action dated Jan. 29, 2016 for U.S. Appl. No. 14/098,505. |
Constine, Josh, “Facebook tests notification unsubscribe button for feed posts,” Aug. 9, 2010. http://www.adweek.com/socialtime/unsubscribe-button-posts/244868. |
Dwyer, Cameron, “Five out-of-the-box ways to get Email into SharePoint” Jan. 2012, <https://camerondwyer.wordpress.com/2012/09/04/five-out-of-the-box-ways-to-get-email-into-sharepoint/[May 13, 2016 10:48:43 AM]. |
Emojipedia, (https://web.archive.org/web/20150915110235/https://emojipedia.org/fisted-hand-sign/), Date: Sep. 15, 2015; (https://web.archive.org/web/20150823012626/https://emojipedia.org/clapping-hands-sign/), Date: Aug. 23, 2015; (https://web.archive.org/web/20150829090848/https://emojipedia.org/smiling-face-with-sunglasses/), Date: Aug. 29, 2015. |
Falcao et al., U.S. Appl. No. 15/877,379, filed Jan. 22, 2018 and entitled, “Temporal Optimization of Data Operations Using Distributed Search and Server Management.” |
Falcao et al., U.S. Appl. No. 15/877,381, filed Jan. 22, 2018 and entitled, “Temporal Optimization of Data Operations Using Distributed Search and Server Management.” |
Filipczyk, Marcin R., Final Office Action dated Oct. 5, 2015 for U.S. Appl. No. 13/950,268. |
Filipczyk, Marcin R., Non-Final Office Action dated Mar. 10, 2016 for U.S. Appl. No. 13/950,268. |
Filipczyk, Marcin R., Non-Final Office action dated May 22, 2015 for U.S. Appl. No. 13/950,268. |
Friedman et al., U.S. Appl. No. 61/650,849, filed May 23, 2012 and entitled, “Dynamic Information Streams in a Social Network Platform.” |
Gaedckle et al., U.S. Appl. No. 61/636,132, filed Apr. 20, 2012 and entitled, “System and Method for Providing a Social Customer Care System.” |
Georgandellis, Andrew C., Final Office Action dated Mar. 30, 2016 for U.S. Appl. No. 13/900,878. |
Georgandellis, Andrew C., Final Office Action dated Oct. 26, 2017 for U.S. Appl. No. 13/900,878. |
Georgandellis, Andrew C., Final Office Action dated Sep. 21, 2016 for U.S. Appl. No. 14/035,166. |
Georgandellis, Andrew C., Non-Final Office Action dated Jan. 26, 2017 for U.S. Appl. No. 13/900,878. |
Georgandellis, Andrew C., Non-Final Office Action dated Jul. 11, 2016 for U.S. Appl. No. 14/035,166. |
Georgandellis, Andrew C., Non-Final Office Action dated May 23, 2017 for U.S. Appl. No. 14/035,166. |
Georgandellis, Andrew C., Non-Final Office Action dated Nov. 3, 2015 for U.S. Appl. No. 13/900,878. |
Giphy, (https://web.archive.org/web/20140813065113/http://giphy.com/search/happy), Date: Aug. 13, 2014; https://web.archive.org/web20141231135329/https://giphy.com/upload, Date: Dec. 31, 2014; https://web.archive.org/web/20150919214012/http://giphy.com/create/upload, Date: Sep. 19, 2015. |
Goldberg, Ivan R., Final Office Action dated Jan. 12, 2015 for U.S. Appl. No. 13/835,502. |
Goldberg, Ivan R., Final Office Action dated Jan. 13, 2015 for U.S. Appl. No. 13/835,250. |
Goldberg, Ivan R., Final Office Action dated Jan. 15, 2015 for U.S. Appl. No. 13/865,429. |
Goldberg, Ivan R., Non-Final Office Action dated Apr. 13, 2016 for U.S. Appl. No. 13/865,429. |
Goldberg, Ivan R., Non-Final Office Action dated Jun. 18, 2014 for U.S. Appl. No. 13/835,250. |
Goldberg, Ivan R., Non-Final Office Action dated Jun. 18, 2014 for U.S. Appl. No. 13/835,502. |
Goldberg, Ivan R., Non-Final Office Action dated Jun. 20, 2014 for U.S. Appl. No. 13/865,411. |
Goldberg, Ivan R., Non-Final Office Action dated Jun. 23, 2014 for U.S. Appl. No. 13/865,429. |
Hashemi, Mazdak, “The Infrastructure Behind Twitter: Scale”, Jan. 19, 2017, Twitter, Inc. Blog Post, https://blog.twitter.com/engineering/en_us/topics/infrastructure/2017/the-infrastructure-behind-twitter-scale.html |
Hatcher, Deirdre D., Non-Final Office Action dated Jan. 14, 2016 for U.S. Appl. No. 13/950,258. |
Holzband et al., U.S. Appl. No. 15/821,543, filed Nov. 22, 2017 and entitled, “Responsive Action Prediction Based on Electronic Messages Among a System of Networked Computing Devices.” |
Jang, Gijeong, Written Opinion of the International Searching Authority and International Search Report dated Jul. 28, 2015 for International Patent Application No. PCT/US2014/047866. |
Jou et al., “Predicting Viewer Perceived Emotions in Animated GIFs”, Nov. 3-7, 2014 (4 pages). |
Kolosowski-Gager, Katherine, Non-Final Office Action dated Jun. 29, 2018 for U.S. Appl. No. 14/627,151. |
Lithium Website, http://www.lithium.com, Dec. 11, 2010, retrieved from Internet Archive, pp. 1-9. |
M2 PressWire, “Alterian: Social media monitoring and analytics comes of age with Alterian's acquisition of market leader Techrigy,” Jul. 15, 2009, Anonymous, Norman Media Ltd, London. |
Mosley, Kyle T., Non-Final Office Action dated Dec. 28, 2017 for U.S. Appl. No. 14/852,965. |
Mosley, Kyle T., Non-Final Office Action dated Oct. 4, 2017 for U.S. Appl. No. 14/627,151. |
Netzloff, Eric R., Non-Final Office Action dated Nov. 25, 2014 for U.S. Appl. No. 13/848,706. |
Oh, Eung Gie, Written Opinion of the International Searching Authority and International Search Report dated Nov. 18, 2014 for International Patent Application No. PCT/US2014/031345. |
Olshannikov, Alex, Final Office Action dated Apr. 15, 2016 for U.S. Appl. No. 14/098,480. |
Olshannikov, Alex, Final Office Action dated Feb. 17, 2016 for U.S. Appl. No. 14/098,509. |
Olshannikov, Alex, Non-Final Office Action dated Nov. 5, 2015 for U.S. Appl. No. 14/098,480. |
Olshannikov, Alex, Non-Final Office Action dated Oct. 22, 2015 for U.S. Appl. No. 14/098,509. |
Raju, “5 Ways to Tweet More Than 140 Characters,” Dec. 28, 2008, Technically Personal, http://www.techpp.com/2008/12/28/5-ways-to-tweet-more-than-140-characters/, retrieved from Internet Archive version from Mar. 3, 2011. |
Rao et al., U.S. Appl. No. 62/049,642, filed Sep. 12, 2014 and entitled, “System and Apparatus for an Application Agnostic User Search Engine.” |
Senftleber et al., International (PCT) Patent Application No. PCT/US2018/055545, filed Oct. 12, 2018 and entitled, “Predicting Performance of Content and Electronic Messages Among a System of Networked Computing Devices.” |
Senftleber et al., U.S. Appl. No. 15/782,635, filed Oct. 12, 2017 and entitled, “Computerized Tools to Enhance Speed and Propagation of Content in Electronic Messages Among a System of Networked Computing Devices.” |
Senftleber et al., U.S. Appl. No. 15/782,642, filed Oct. 12, 2017 and entitled, “Predicting Performance of Content and Electronic Messages Among a System of Networked Computing Devices.” |
Senftleber et al., U.S. Appl. No. 15/782,653, filed Oct. 12, 2017 and entitled, “Optimizing Effectiveness of Content in Electronic Messages Among a System of Networked Computing Device.” |
Senftleber et al., U.S. Appl. No. 16/158,167, filed Oct. 11, 2018 and entitled, “Credential and Authentication Management in Scalable Data Networks.” |
Senftleber et al., U.S. Appl. No. 16/158,169, filed Oct. 11, 2018 and entitled, “Native Activity Tracking Using Credential and Authentication Management in Scalable Data Networks.” |
Senftleber et al., U.S. Appl. No. 16/194,126, filed Nov. 16, 2018 and entitled, “Multiplexed Data Exchange Portal Interface in Scalable Data Networks.” |
Spasojevic et al., U.S. Appl. No. 61/943,047, filed Feb. 21, 2014 and entitled, “Domain Generic Large Scale Topic Expertise & Interest Mining Across Multiple Online Social Networks.” |
Tabor, Amare F., Final Office Action dated Apr. 8, 2015 for U.S. Appl. No. 13/871,076. |
Tabor, Amare F., Non-Final Office Action dated Aug. 15, 2014 for U.S. Appl. No. 13/871,076. |
Thomas, Shane, Written Opinion of the International Searching Authority and International Search Report dated Aug. 16, 2013 for International Patent Application No. PCT/US2013/037107. |
Walsh, John B., Non-Final Office Action dated Mar. 24, 2017 for U.S. Appl. No. 14/702,696. |
Wollenstein et al., U.S. Appl. No. 61/639,509, filed Apr. 27, 2012 and entitled, “Systems and Methods for Implementing Custom Privacy Settings.” |
Wu, Michael, U.S. Appl. No. 61/734,927, filed Dec. 7, 2012 and entitled, “Systems and Methods for Presenting Analytic Data.” |
Wu, Michael, U.S. Appl. No. 62/072,929, filed Oct. 30, 2014 and entitled, “Systems and Methods to Monitor Health of Online Social Communities.” |
Young, Lee W., Written Opinion of the International Searching Authority and International Search Report dated May 28, 2014 for International Patent Application No. PCT/US2013/073625. |
Fiorillo, James N., Non-Final Office Action for U.S. Appl. No. 15/821,543 dated Aug. 16, 2019. |
Dinh, Khanh Q., Notice of Allowance and Fee(s) Due dated Oct. 29, 2019 for U.S. Appl. No. 15/877,379. |
Fiorillo, James N., Notice of Allowance and Fee(s) Due dated Nov. 14, 2019 for U.S. Appl. No. 15/821,543. |
Matthews, Tara, et al. “Community Insights: Helping Community Leaders Enhance the Value of Enterprise Online Communities.” Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Apr. 27-May 2, 2013, Paris, France. ACM (2013). pp. 513-522. |
Meng, Jau Shya, Non-Final Office Action dated Jan. 3, 2020 for U.S. Appl. No. 15/877,381. |
Mesa, Joel, Non-Final Office Action for U.S. Appl. No. 15/782,635 dated Oct. 4, 2019. |
Ofori-Awuah, Maame, Final Office Action dated Sep. 6, 2019 for U.S. Appl. No. 14/929,209. |
Rashid, lshrat, Final Office Action for U.S. Appl. No. 15/782,653 dated Sep. 19, 2019. |
Wang, Xiaoqing, and Shannon Lantzy. “A Systematic Examination of Member Turnover and Online Community Health.” Thirty Second International Conference on Information Systems, Shanghai (2011), pp. 1-11. |
Number | Date | Country | |
---|---|---|---|
20200120096 A1 | Apr 2020 | US |