The availability and popularity of web-based content and services is ever increasing. For example, users are increasingly using online storage services that provide storage “in the cloud” for content items (e.g., documents, application files, photos, mobile uploads, audio/video files, etc.). Storage in the cloud makes it convenient for users to access their files over a network from anywhere using various different kinds of devices (e.g., computer, mobile phone, tablet, etc.). Due in part to this convenience, users may also seek ways in which to share content items from their online storage with others.
Traditionally, though, online storage services provide limited tools for sharing items particularly in the case of sharing items to multiple sites, groups, and/or individuals. For instance, a user may have to individually configure an email or message for each intended recipient of a shared item and/or may have to manually provide a shared item as an attachment. In some cases, a user may even have to download a stored item locally before they can share the item through email or another messaging system. Thus, traditional techniques for sharing items from online storage may be quite inconvenient.
Techniques for sharing of items from online storage (e.g., cloud storage) are described herein. Sharing links for items maintained in online storage available from a service provider can be generated and distributed in various ways. The sharing links may provide recipients with access to shared items online from storage associated with the sender. The sender is able to manage permissions associated with different sharing links sent to different recipients on an individual basis.
In one or more implementations, sharing links can be configured as one-time sharing links that provide recipients with limited, one-time access to a shared item for the purpose of selecting or registering an account to use for subsequent access to the item. In this manner, recipients are able to select accounts they find most convenient for accessing a shared item without the owner/sharer of the item necessarily having contact information for those accounts or sending a link to the accounts. Selection of a one-time link may initiate an authentication sequence that incorporates an option to select a particular account if appropriate. Once the one-time sharing link is redeemed, the one-time sharing link is invalidated for subsequent access to the item.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
The detailed description is described with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The use of the same reference numbers in different instances in the description and the figures may indicate similar or identical items.
Overview
Traditionally, online storage services provide limited tools for sharing items particularly in the case of sharing items to multiple sites, groups, and/or individuals. For instance, a user may have to manually attach items to messages and/or publish an item to multiple different services/sites that the user wants to receive the item. Thus, traditional techniques for sharing items from online storage may be inconvenient.
Techniques for sharing of items from online storage (e.g., cloud storage) are described herein. In one approach, distinct sharing links to an item can be generated for multiple different publish targets through a single publishing user interface exposed to a user. Through the publishing user interface, a user may submit a request having a selection of different social networks and/or other sites/targets to receive a sharing link for an item. In response to the request, a distinct sharing link is generated for each selected recipient and the generated sharing links are published to appropriate targets. Thus, a user is able to easily send links for a shared item to multiple targets through a single request and can separately manage permissions associated with each distinct sharing link.
In another approach, sharing links can be configured as group opt-in links designed to provide recipients with an option to join a group having permissions on a corresponding shared item. An owner of an item may distribute a group opt-in link publicly and does not have to predetermine the group size or individual members. Recipients of the link can choose whether to join the group or not. The group opt-in link may provide limited access to join the group and then members who join the group may gain enhanced permissions to the shared item. The owner of the item is able to see individuals who have opted-in and manage corresponding permissions on an individual basis.
In another approach, sharing links can be configured as one-time sharing links that provide recipients with limited, one-time access to a shared item for the purpose of selecting or registering an account to use for subsequent access to the item. The owner/sharer of the item may use any available contact information to send one-time sharing links. A recipient is then able to use the link to select an account the recipient would like to use to access the shared item. The owner/sharer does not need to send the link to the selected account or even have contact information for the account. Once the one-time sharing link is redeemed to select an account, the link may be invalidated for subsequently gaining enhanced permission to the item.
In the following discussion, an example operating environment is first described that may employ the techniques described herein. The discussion of the example operating environment includes a discussion of an example user interface to facilitate interaction with online storage. Next, example details and techniques are described which may be implemented in the example environment as well as other environments. Consequently, performance of the techniques is not limited to the example environment and the example environment is not limited to performance of the example techniques. Lastly, example systems and devices are described that may be employed to implement one or more embodiments.
Example Operating Environment
A computing device may be configured in a variety of ways. For example, a computing device may be configured as a computer that is capable of communicating over the network 110, such as a desktop computer, a mobile station, an entertainment appliance, a set-top box communicatively coupled to a display device, a wireless phone, a game console, and so forth. Thus, the computing device may range from full resource devices with substantial memory and processor resources (e.g., personal computers, game consoles) to a low-resource device with limited memory and/or processing resources (e.g., traditional set-top boxes, hand-held game consoles). Additionally, although a single computing device is shown in some instances, the computing device may be representative of a plurality of different devices, such as multiple servers utilized by a business to perform operations such as by the service provider 106 and/or social network service 108, and so on.
Although the network 110 is illustrated as the Internet, the network may assume a wide variety of configurations. For example, the network 110 may include a wide area network (WAN), a local area network (LAN), a wireless network, a public telephone network, an intranet, and so on. Further, although a single network 110 is shown, the network 110 may be configured to include multiple networks.
The client device 102 is further illustrated as including an operating system 112. The operating system 112 is configured to abstract underlying functionality of the underlying device to applications 114 that are executable on the client device 102. For example, the operating system 112 may abstract processing, memory, network, and/or display functionality such that the applications 114 may be written without knowing “how” this underlying functionality is implemented. The application 114, for instance, may provide data to the operating system 112 to be rendered and displayed by a display device as illustrated without understanding how this rendering will be performed.
The client device 102 is also illustrated as including a communication module 116. The communication module 116 represents functionality to enable various communications over the network 110. For example, the communication module 116 may be implemented as a browser or other suitable application to obtain and output webpages and/or other user interfaces from the service provider 106 over the network 110. The communication module 116 may also represent a component of another application used to obtain one or more resources from the service provider 102.
The service provider 106 is depicted as storing a resource manager 118 that represents functionality operable by the service provider 106 to manage various resources 120 that may be made available over the network 108. For example, various resources 120 may be provided via webpages or other user interfaces 122 that are communicated over the network for output by one or more clients via a communication module 116 or other client application. The resource manager 118 may manage access to the resources 120, performance of the resources, and configuration of user interfaces 122 to provide the resources 120, and so on. The service provider 106 may represent one or more server devices used to provide the various resources 120.
Generally, resources 120 made accessible by a service provider 106 may include any suitable combination of services and/or content typically made available over a network by one or more providers. Some examples of services include, but are not limited to, a search service, an email service, an instant messaging service, an online productivity suite, and an authentication service to control access of clients to the resources 120. Content may include various combinations of text, multi-media streams, documents, application files, photos, audio/video files animations, images, web pages, web applications, device applications, content for display by a browser or other client application, and the like.
One particular example of a resource 120 that may be provided by a service provider 106 is a collaboration service 124 as depicted in
Clients may access the collaboration service 124 and other resources 120 provided by a service provider 106 through user accounts represented by client account data 130 of
Additionally, the sharing link 128 can encode data that defines or references permissions for a corresponding item. The permissions designate access levels and corresponding actions for content items. For instance, different access levels may be established to control who is able to perform actions such as read-only, print, publish, view, edit, one-time access, move, and/or copy, to name a few examples. In one approach, the service provider 106 maintains a table or other database that can be used to match a sharing key 204 to corresponding permissions on content items. Such permission data may be maintained as part of the file structure for online storage 126 along with individual files. This may include maintaining access control lists (ACLs) that may be referenced by or otherwise mapped to sharing keys 204. Additionally or alternatively, permissions can be encoded directly within a sharing link using an access parameter or other suitable field that is indicative of a corresponding permission level. The collaboration service 124 may be configured to reference and interpret the access parameter in a sharing link 128 and enforce corresponding permissions when the sharing link 128 is used to gain access to an item.
To provide the interaction with online storage, the user interface 122 may expose a file management portion 304 to enable navigation, viewing, and management of content items stored “in the cloud” in association with a user/account. A file management portion 304 can be configured in any suitable way to enable the interaction with online storage, such as representing content items in a list, showing different icons or tiles for stored items, using a preview pane, and so forth. In the depicted example, the file management portion 304 is shown as a “My Files” list for a logged in user “Robyn.” The list of content items represents files available to Robyn from her online storage 126 through the collaboration service 124 including documents, folders, photos, and other types of content mentioned previously. The list of content items shows names for individual files and folders as well as basic information associated with each item, such as the example date and sharing columns depicted in
An item details portion 306 is also shown that may be configured to provide more detailed information regarding a selected item, which in this example presents details for a “Reunion” folder selected from the list of content items. In addition, the user interface 122 includes a sharing portion 308 that represents functionality to review and manage sharing options for content items. In this example, the sharing portion 308 is incorporated as part of the item detail portion 306. Alternatively, a sharing portion 308 may be provided as a separate portion or even a separate page that is accessible via a link, menu item, or other navigation instrumentality exposed in the user interface 122. The sharing portion 308 is configured to provide various options for sharing of selected items. This may include creating sharing links 128, viewing and setting permissions for items, publishing links to a social network service 108 or other external web service/site, distributing links using various messaging systems, and so forth.
Thus, a user interface 122 such as the example just described may be employed to facilitate various interactions to access online storage 126 and/or share items. In accordance with sharing link techniques described herein, distinct links to a content item may be generated for different publish targets. In addition, links may be shared to an arbitrary group through a corresponding sharing link 128. In this case, sharing link 128 is configured to expose an option for recipients to opt into the group having permissions on the item. Thus, recipients explicitly opt into the group before gaining full permission to the item. In another example, a recipient of a link may be able to choose a particular account to use for access a shared item. This may occur through a one-time link that may be redeemed once to access the item and associate a selected account for subsequent access to the shared item. Further details regarding each of these examples are discussed in turn below in different sections titled “Distinct Links for Publish Targets,” “Group Opt-In Links,” and “Shared Item Account Selection,” respectively.
Thus, having considered the foregoing discussion of an example operating environment and an example user interface for interaction with online storage, consider now details regarding techniques to employ sharing links in accordance with one or more embodiments.
Distinct Links for Publish Targets
This section describes techniques for publishing of sharing links 128 to different selected publish targets. In portions of the following discussion, reference will be made to the example environment 100 of
A request is obtained to create distinct links for selected publish targets to share an item from online storage associated with a user account (block 402). The request, for instance, may be formed via a user interface 122 output at a client device 102 for interaction with online storage 126 associated with a user. Thorough the user interface 122, an item to share as well as different targets may be selected. This may occur through a publish control or page link provided as part of the user interface 122. At least some of the targets may be social network services or other partner sites to which the user wishes to publish a link for the selected item.
The request may be formatted in any suitable way to encode information describing the selected item and targets. For example, the request may be configured as a hyper-text transfer protocol (HTTP) request using JavaScript, XML, HTML and/or other scripting languages. The request may include variables, parameters, and/or other suitable identifiers used to submit the item and targets for handling by a service provider 106. Thus, the request may be formatted to encode the user selections in some manner and then submitted, which causes the client device 102 to communicate the request to a service provider 106. In one example, a collaboration service 124 implemented by the service provider 106 is configured to obtain the request and process the request to generate corresponding sharing links 128. In at least some embodiments, the collaboration service 124 may expose an application programming interface (API) that can be called with the request via script within a webpage or other user interface 122 to initiate creation of sharing links 128. In addition or alternatively, any client-server architecture and/or communication protocols suitable for passing requests/responses between a client device 102 and service provider 106 may be employed to implement the techniques related to sharing links described herein.
In particular, the request is parsed to identify the selected publish targets (block 404). For instance, the collaboration service 124 is able to interpret the request and extract information contained therein to identify selected publish targets. The collaboration service 124 also obtains from the request an identifier of the particular item to be shared with the publish targets. This information enables the collaboration service 124 to construct sharing links 128 as described previously.
For instance, a distinct sharing link is generated for each publish target identified (block 406) and the generated sharing links are added to permissions on the item (block 408). Here, the collaboration service 124 constructs a different link for each identified target. Each link may include a navigation path 202 to the item and a sharing key 204 as discussed above. The navigation path 202 to the item may be the same for each link. The sharing key 204, though, may be generated as a unique identifier that is different for each link and corresponding target. In one example, the sharing key 204 is configured as a token that is different for each link.
Permissions to a shared item can also be encoded within the generated sharing links. As mentioned, the token or other sharing key 204 may be mapped to permissions on the item using ACLs that define the permissions. Thus, to encode permissions the collaboration service 124 may update the ACLs to reflect respective permissions designated for each of the generated sharing links. Using this technique, the system can store a mapping of permission for a sharing link that may or may not be apparent to the recipient(s) of the sharing link. In another approach, the sharing key 204 itself can be used to designate the permissions that the corresponding link grants to recipients/users of the link. In this case, the collaboration service 124 may be configured to interpret the sharing key 204 when a link is used to determine and enforce corresponding permissions.
The sharing links are published to the publish targets (block 410). For example, the collaboration service 124, in addition to creating the links, may be configured to publish links to various partner sites. Such partner sites may expose network accessible application programming interface (APIs) that can be invoked to publish information to user accounts. For instance, a post link or post picture API may be provided to post content to a social network service 108. The collaboration service 124 may be configured to form calls in appropriate formats designated by different supported partner sites via such APIs or otherwise. This enables a user of the collaboration service 124 to interact once to select an item and publish target, submit a single request, and then turn over handling to the collaboration service 124 to create the appropriate links and post the links to corresponding publish targets. Accordingly, the user is able to avoid individual creation and manually post links to different targets.
Representations of the distinct sharing links are presented in association with the item in a user interface for viewing and managing the online storage (block 412) and individual management of the distinct sharing links associated with each publish target is enabled (block 414). Since distinct sharing links are created for different targets, the links may be used and managed separately from one another. Thus, the collaboration service 124 may separately represent the distinct sharing links for an item within a user interface presented to review and manage stored items. For example, different sharing links may be listed via a sharing portion 308 of a user interface 122 as discussed in relation to
In at least some embodiments, the interface 502 may be accessible by selection of a link, menu item, or other navigation control provided in the example user interface of
Here, the example user interface 122 is operable to create distinct sharing links 128 for the “Reunion” folder of
The example user interface 122 of
Group Opt-In Links
This section describes techniques for sharing links 128 configured to provide an option to opt-in to a group having permissions on an item. In portions of the following discussion, reference will again be made to the example environment 100 of
In one approach, the collaboration service 124 creates a link in response to the request that includes a navigation path 202 and a sharing key 204 as previously discussed. After generating the link, the collaboration service 124 communicates the link back to the client device 102 for presentation to the user. For instance, the collaboration service 124 may configure a webpage or other suitable user interface 122 including the link and return the webpage for output at the client in response to the request.
The collaboration service 124 may also configure the link to cause a group opt-in option to be exposed when the link is selected (e.g., clicked or navigated to) by recipients. This may occur in a variety of ways. For example, the sharing key 204 may be used as an identifier that prompts the collaboration service 124 to present an appropriate option to join a group when a link is used to gain access to the item. ACLs maintained by the collaboration service 124 may be used to designate that a particular sharing key is configured to cause the group opt-in option. The collaboration service 124 may use the sharing key 204 (or an identifier contained therein) to look-up permissions and properties of the corresponding link in the ACLs. Based on this matching of the sharing key 204 to ACLs, the collaboration service 124 is able to determine whether the link is a configured for the group opt-in option.
In addition or alternatively, the collaboration service 124 may examine the sharing key 204 or another field contained within the link and determine directly from the examination that the link is configured for the group opt-in option. For example, a particular string or value associated with sharing key 204 may be used as a toggle to selectively indicate whether the group opt-in option is activated. Thus, the collaboration service 124 may set the toggle to activate the group opt-in option when generating a sharing link, which then prompts the collaboration service 124 to present the appropriate option when the link is used by a recipient.
The sharing link is distributed to one or more recipients (block 704). The sharing link may be communicated to a user and/or distributed to recipients in various ways. For example, the sharing link 128 generated per block 702 may be presented in a user interface 122 that enables a user to view and/or copy the link. The user may then distribute the link to selected recipients in any suitable way. For example, the user may copy the link into a message and send the link to selected recipients as an email, instant message, text message, and so forth. Further, the user may take action to post the link to web services/sites, such as adding the link to a user profile page with a social network service 108. The link may also be distributed using other techniques such as by word of mouth, in ads, in written communications (electronic and/or physical), and so forth. In addition to providing a link that can be copied, a user interface 122 may also be configured to facilitate distribution of the link using one or more techniques as discussed further in relation to
Note that distinct links as discussed above can also be created to activate the group opt-in option. If the user so chooses, the sharing link 128 generated per block 702 may be distributed to multiple publish targets using techniques discussed in relation to
Responsive to selection of the sharing link by recipients, an option is exposed for the recipients to opt into a group having permissions on the item (block 706). As mentioned above, the collaboration service 124 may examine a selected link to detect a sharing key 204 or other identifier that is indicative of the group opt-in option. A determination that the group opt-in option is active prompts the service to present the appropriate option when the link is used by a recipient. In some cases, a comparison is made to ACLs that encode whether the group opt-in option is active or inactive for corresponding links. The collaboration service 124 may also identify that the group opt-in option is active based on a particular value, string, or toggle field incorporated within a sharing link 128 when the link is created.
When the group opt-in option is appropriate, the collaboration service 124 operates to present the option to the recipient. This may occur in a variety of ways. For example, an opt-in interface or dialog may be output for display by a client device 102. The opt-in interface or dialog presents recipients with the option to join the group and enables a recipient to explicitly opt-in to the group having permissions on the item. Additionally, a recipient may be asked to select an account to associate with the item/group in accordance with techniques discussed below in relation to
More generally, note that the different techniques related to sharing links described in different sections herein may be combined in various ways. Thus, techniques described for distinct links, group opt-in links, and one-time sharing links may be implemented individually and/or may be combined in some scenarios to create sharing links configured for multiple purposes.
Recipients that exercise the option are added to the group having permissions on the items (block 708). In particular, permissions defined in an ACL or otherwise for an item are updated to reflect addition of recipients that opted in as members. This may involve associating account identifiers and/or credentials for the recipients that opt-in with the group, permissions, and/or corresponding item to make the recipients members of the group.
As noted group membership is determined by those that exercise the group opt-in option and therefore the group is not necessarily predetermined in membership or size. The owner of the item/group does not have to manually select each member to create the group and does not need to have contact information for individual people. Rather, the owner simply gets a link per block 702 and can post the link to a public site or otherwise distribute the link. In this case, the link is effectively public and anyone who possesses the link may use the link to gain access to at least the group opt-in option for the item.
The group opt-in option may implement a tiered access level approach in which permissions on the item change from a first level of access before opting-in to a second level of access after opting-in. Initially, a link may be associated with initial, basic permissions on the item. The initial permissions may be set by default and/or may be designated by the user. In general, the initial permissions available through the sharing link grant limited or no access to the item. For instance, the initial permissions may be set to limit access to viewing of the item or viewing just a preview of the item. Alternatively, access may be limited to obtaining and acting on the group opt-in option for the item. Opting in causes permissions to change from the initial, basic permissions to enhanced permissions on the item that are established for the group. For example, the enhanced permissions available through the group may be set to enable editing in addition to viewing the item. Thus, various different access levels may be associated with an item prior to opting-in through the sharing link and after opting-in through the group.
Representations of recipients that have opted-in are presented in association with the item in a user interface for viewing and managing the online storage (block 710) and management of the recipients individually and separate from management of the sharing link is enabled (block 712).
As with the distinct sharing links for different targets discussed previously, links configured for group opt-in and members within the group may be managed separately from one another. Thus, the collaboration service 124 may separately represent a group link and group members for an item within a user interface presented to review and manage stored items. For example, representations of different group members and/or a group opt-in link may be listed via a sharing portion 308 of a user interface 122 as discussed in relation to
Here the example user interface 122 is again operable to provide a sharing link 128 for the “Reunion” folder of
The example user interface 122 of
The distribute portion 808 may be included to provide various options to share the link. For example, the example distribute portion 808 provides options to distribute by email or instant messaging. Selection of these options may be used to automatically create an appropriate message that includes the link through the service provider 106, a default messaging program, a third party messaging service, and so forth. In addition, a post option is provided that may enable publication of the link to different sites. In at least some cases, the post option may link to an interface similar to the example of
The done control 810, when selected, may cause the interface to be closed out and navigation back to a home page or start page for the collaboration service 124, such as returning to the example interface shown in
In addition, a deactivate control 906 is provided that is operable to deactivate a distributed link. When deactivated the link is no longer usable to opt-in to the group. In at least some embodiments, deactivating the link or changing permissions associated with the link does not affect users that have already been added to the group. Thus, the individual users may be managed individually and separately from the sharing link itself. In another approach, invalidating the link or changing permissions will populate the changes to any members of the group.
Shared Item Account Selection
This section describes techniques for sharing links 128 configured to enable a recipient to select a particular account the recipient would like to use to access a corresponding shared item. In portions of the following discussion, reference will again be made to the example environment 100 of
Selected recipients are determined for a sharing link to an item maintained in online storage (block 1002). One way this may occur is through a user interface provided to enable sending of a link to one or more recipients. For example, the collaboration service 124 may output a user interface 122 accessible by a client device 102 over a network 110. The user interface 122 may be output in response to a selection of a send a link control to share a particular content item. The user interface 122 enables a user to select one or more recipients, input known contact info, and/or submit a request to send a link to the one or more recipients. The collaboration service 124 may receive and process the request to identify intended recipients. This may involve parsing the request to extract contact info for the one or more recipients.
Different one-time sharing links are generated for each of the selected recipients (block 1004). Here, the collaboration service 124 may create a different one-time link for each individual recipient. This may occur substantially in the same manner as creating distinct links for different publish targets as discussed in relation to
Once appropriate one-time sharing links are generated, the collaboration service 124 may then send notifications having a unique one-time sharing link to each designated recipients. The collaboration service 124 may send notifications through different messaging service including for example email, instant messaging, text messaging, and so forth. In some cases, the collaboration service 124 may send notifications through associated partner sites such as social networks, in which case recipient is notified through messaging functionality provided by the partner sites.
As mentioned, links designated in some manner as one-time sharing links enable recipients to get limited, one-time access to a shared item for the purpose of selecting or registering an account to use for subsequent access to the item. In this manner, recipients are able to select accounts they find most convenient for accessing a shared item without the owner/sharer of the item necessarily having contact information for those accounts or sending a link to the accounts.
To do so, an option for a recipient to select an account to use for access to the item is exposed responsive to a selection of the sharing link by the recipient (block 1006). An option to select an account may be provided in various ways and at different times. For example, an account selection user interface or dialog may be presented that enables selection of a particular account at an appropriate time during an authentication sequence. Through the dialog, a user may be prompted to select a current account, choose a different account, and/or create a new account to use for accessing the shared item. An example dialog is discussed below in relation to
The timing for presenting the account selection option may be dependent upon access permissions associated with the one-time sharing link. For example, a link may be configured to require sign-in before any access to the item is provided. If this is the case, an authentication sequence that incorporates the option to select an account may be initiated right away when a link is used. On the other hand, if some level of access, such as view only access, is granted by a link, then selection of the link does not cause initiation of the authentication sequence right away. Instead, appropriate access to the item is granted and the recipient of the link may view the item. When the recipient attempts an action that requires sign-in and/or different access privileges, the authentication sequence incorporating the option to select an account may be initiated at that time. One example authentication sequence that can be employed to control access to items and account selection is discussed below in relation to
Permissions on the item are associated with the selected account (block 1008) and the link is invalidated for subsequent use to gain permissions on the object (block 1010). Thus, when an option to select an account is exercised using a one-time sharing link, the selected account is granted permissions on the item. This can occur by associating the account with the item through an ACL or otherwise.
Similar to the tiered access level approach discussed above in relation to the group opt-in option, different access levels may be used in conjunction with one-time sharing links. Here, a first level of access may be associated with a one-time sharing link before the link is redeemed. For instance, an unredeemed link may be associated with initial, basic permissions for unauthenticated users that allow a user simply to view the item. Again, the initial permissions may be set by default and/or may be designated by the user. In general, the initial permissions grant limited or no access to the item. Redeeming the link by selection of an account causes permissions to change from the initial, basic permissions to enhanced permissions established for authenticated users when the link is created. For example, the enhanced permissions may be set to enable editing in addition to viewing the item. Thus, various different access levels may be associated with an item using the one-time sharing link and granted to a user of the link after redeeming the link.
Once a one-time sharing link is redeemed, the collaboration service 124 invalidates the link for subsequent access to the item. For instance, an ACL may be updated to reflect that the one-time sharing link has been redeemed. This may occur by revoking the sharing key 204 associated with the link or in another suitable manner that revokes privileges for the one-time sharing link. The one-time sharing link will no longer be valid to access the item or gain permissions to the item. Instead, permissions are now associated with the selected account, which can be used for subsequent access to the item.
Consider now
If the link does not involve a sign-in, access to the item is enabled with unauthenticated permissions (block 1106). The unauthenticated permissions represent initial, basic permissions set by default or by user selections when the one-time sharing link is created. Thereafter, the system may monitor to detect action that does involve the sign-in (block 1108). It should be noted that unauthenticated access can be disabled by forcing link redemption. In this case, the owner may designate at the time of link creation that a sharing link be redeemed before permissions are granted. Effectively, the link is configured without unauthenticated permissions and a recipient may be unable to even view an item before redeeming the associated link.
Both when the link requires sign-in per block 1104 and when action requiring sign-in is detected per block 1108, a determination is made as to whether the user is already signed-in (block 1110). If the user is not already signed-in, the user is redirected to login (block 1112) and the user is authenticated to a selected account (block 1114). This may occur through the collaboration service 124 and/or an authentication service accessible via the service provider 102 using any suitable authentication techniques. In general, the user provides credentials (e.g., username and password) to access and account which are verified to ensure that the user is who they claim to be. In at least some embodiments the user may be prompted to log-in to an account the use would like to use for access to the item at this point. In addition or alternatively, an account selection prompt may also occur later within the authentication sequence as described below.
After authenticating the user per block 1114 and also when user is already signed-in per block 1110, a determination is made as regarding whether the user already has authenticated access to the shared item (block 1116). If so, the one-time sharing link is redeemed (block 1118) and access to the shared item is provided with authenticated permissions (block 1120). In this case, an assumption may be made that the user prefers to use the current account that already has permissions on the shared item. As such, access is granted without prompting to select a different account. In an alternate approach, a switch account option may be provided to enable the user to switch accounts even if the user already has authenticated access per block 1116. However, in the depicted example access is granted through the current account already having access and if not already the case, the link is redeemed and invalidated for subsequent use.
Otherwise, if the user does not have authenticated access per block 1116, a determination of the validity of the one-time sharing link is made (block 1122). Here a check is made to ensure that the link has not been previously redeemed. If the one-time sharing link is not valid, access is denied (block 1124) and an error message may be presented indicating that the one-time sharing link is not valid to gain access to the shared item.
On the other hand, when the one-time sharing link is determined to be valid, a check is made regarding whether an optional auto-redeem option is set (block 1126). The auto-redeem option can be selectively set as a design parameter to control whether one-time sharing links are redeemed automatically or through an account selection dialog. In addition or alternatively, a configurable parameter for the auto-redeem option may be associated with items and/or user accounts. In this example, the configurable parameter may be set by an item owner and/or individually for accounts of link recipients. If the auto-redeem option is set, the flow proceeds back to blocks 1118 and 1120 where the one-time sharing link is automatically redeemed and access to the shared item is provided with authenticated permissions. This may occur without outputting a prompt to the user.
If the auto-redeem option is not set, though, an account selection dialog (e.g. redeem dialog) prompting the user to select an account is output (block 1128). Based on input obtained via the account selection dialog, a determination is made regarding whether to use the current account or select another account (block 1130). If the current account is selected, the flow again proceeds back to blocks 1118 and 1120 where the one-time sharing link is redeemed and access to the shared item is provided with authenticated permissions. Otherwise, the flow proceeds back to block 1112 where the user is redirected to login and authentication to a different account may occur. Blocks 1112-1130 may therefore be repeated for the different account until the current account is selected at block 1130.
Here the example user interface 122 is again operable to provide a sharing link 128 for the “Reunion” folder of
The example user interface 122 of
Here, the account selection dialog 1302 includes a current account indication 1304 that indicates an account to which the user is currently authenticated. The user may select a continue control 1306 provided by the dialog to use the current account for access to the corresponding shared item. If the user so chooses, the user may select a switch accounts control 1308 also provided by the dialog to select a different account. Selection of the switch accounts control 1308 causes a redirection to a log-in process to select the different account and/or provide corresponding credentials to authenticate to the account.
Having considered some example details regarding various techniques to create and use sharing links, consider now a discussion of example systems and device that may be employed to implement the various techniques in one or more embodiments.
Example System and Device
In the example multiple device environment 1400, multiple devices are interconnected through a central computing device. The central computing device may be local to the multiple devices or may be located remotely from the multiple devices. In one embodiment, the central computing device may be a cloud of one or more server computers that are connected to the multiple devices through a network, the Internet, or other data communication link. In one embodiment, this interconnection architecture enables functionality to be delivered across multiple devices to provide a common and seamless experience to a user of the multiple devices. Each of the multiple devices may have different physical requirements and capabilities, and the central computing device uses a platform to enable the delivery of an experience to the device that is both tailored to the device and yet common to all devices. In one embodiment, a class of target devices is created and experiences are tailored to the generic class of devices. A class of devices may be defined by physical features, types of usage, or other common characteristics of the devices.
In various implementations, the computing device 102 may assume a variety of different configurations, such as for computer 1402, mobile 1404, and television 1406 uses. Each of these configurations includes devices that may have generally different constructs and capabilities, and thus the computing device 102 may be configured according to one or more of the different device classes. For instance, the computing device 102 may be implemented as the computer 1402 class of a device that includes a personal computer, desktop computer, a multi-screen computer, laptop computer, netbook, and so on.
The computing device 102 may also be implemented as the mobile 1404 class of device that includes mobile devices, such as a mobile phone, portable music player, portable gaming device, a tablet computer, a multi-screen computer, and so on. The computing device 102 may also be implemented as the television 1406 class of device that includes devices having or connected to generally larger screens in casual viewing environments. These devices include televisions, set-top boxes, gaming consoles, and so on. The techniques described herein may be supported by these various configurations of the computing device 102 and are not limited to the specific examples the techniques described herein. This is illustrated through inclusion of the communication module 116 on the client device 102. For instance different devices may include different communication modules 116 (e.g., browsers) adapted for the particular device and through which various resources 120 of the platform 1410 can be accessed, including the collaboration service 124 and online storage 126 described herein.
The cloud 1408 includes and/or is representative of a platform 1410 for resources 120. The platform 1410 abstracts underlying functionality of hardware (e.g., servers) and software resources of the cloud 1408. The resources 120 may include applications and/or data that can be utilized while computer processing is executed on servers that are remote from the computing device 102. Resources 120 can be provided as a service over the Internet and/or through a subscriber network, such as a cellular or Wi-Fi network.
The platform 1410 may abstract resources and functions to connect the computing device 102 with other computing devices. The platform 1410 may also serve to abstract scaling of resources to provide a corresponding level of scale to encountered demand for the resources 120 that are implemented via the platform 1410. Accordingly, in an interconnected device embodiment, implementation of functionality of the functionality described herein may be distributed throughout the multiple device environment 1400. For example, the functionality may be implemented in part on the computing device 102 as well as via the platform 1410 that abstracts the functionality of the cloud 1408.
The example computing device 1502 includes one or more processors 1504 or processing units, one or more computer-readable media 1506 which may include one or more memory and/or storage components 1508, one or more input/output (I/O) interfaces 1510 for input/output (I/O) devices, and a bus 1512 that allows the various components and devices to communicate one to another. Computer-readable media 1506 and/or one or more I/O devices may be included as part of, or alternatively may be coupled to, the computing device 1502. The bus 1512 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. The bus 1512 may include wired and/or wireless buses.
The one or more processors 1504 are not limited by the materials from which they are formed or the processing mechanisms employed therein. For example, processors may be comprised of semiconductor(s) and/or transistors (e.g., electronic integrated circuits (ICs)). In such a context, processor-executable instructions may be electronically-executable instructions. The memory/storage component 1508 represents memory/storage capacity associated with one or more computer-readable media. The memory/storage component 1508 may include volatile media (such as random access memory (RAM)) and/or nonvolatile media (such as read only memory (ROM), Flash memory, optical disks, magnetic disks, and so forth). The memory/storage component 1508 may include fixed media (e.g., RAM, ROM, a fixed hard drive, etc.) as well as removable media (e.g., a Flash memory drive, a removable hard drive, an optical disk, and so forth).
Input/output interface(s) 1510 allow a user to enter commands and information to computing device 1502, and also allow information to be presented to the user and/or other components or devices using various input/output devices. Examples of input devices include a keyboard, a touchscreen display, a cursor control device (e.g., a mouse), a microphone, a scanner, and so forth. Examples of output devices include a display device (e.g., a monitor or projector), speakers, a printer, a network card, and so forth.
Various techniques may be described herein in the general context of software, hardware (fixed logic circuitry), or program modules. Generally, such modules include routines, programs, objects, elements, components, data structures, and so forth that perform particular tasks or implement particular abstract data types. An implementation of these modules and techniques may be stored on or transmitted across some form of computer-readable media. The computer-readable media may include a variety of available medium or media that may be accessed by a computing device. By way of example, and not limitation, computer-readable media may include “computer-readable storage media” and “communication media.”
“Computer-readable storage media” may refer to media and/or devices that enable persistent and/or non-transitory storage of information in contrast to mere signal transmission, carrier waves, or signals per se. Thus, computer-readable storage media refers to non-signal bearing media. Computer-readable storage media also includes hardware elements having instructions, modules, and/or fixed device logic implemented in a hardware form that may be employed in some embodiments to implement aspects of the described techniques.
The computer-readable storage media includes volatile and non-volatile, removable and non-removable media and/or storage devices implemented in a method or technology suitable for storage of information such as computer readable instructions, data structures, program modules, logic elements/circuits, or other data. Examples of computer-readable storage media may include, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, hard disks, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, hardware elements (e.g., fixed logic) of an integrated circuit or chip, or other storage device, tangible media, or article of manufacture suitable to store the desired information and which may be accessed by a computer.
“Communication media” may refer to a signal bearing medium that is configured to transmit instructions to the hardware of the computing device, such as via a network. Communication media typically may embody computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as carrier waves, data signals, or other transport mechanism. Communication media also include any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media include wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared, and other wireless media.
Combinations of any of the above are also included within the scope of computer-readable media. Accordingly, software, hardware, or program modules, including the resources 120, collaboration service 124, applications 114, communication module 116, and other program modules, may be implemented as one or more instructions and/or logic embodied on some form of computer-readable media.
Accordingly, particular modules, functionality, components, and techniques described herein may be implemented in software, hardware, firmware and/or combinations thereof. The computing device 1502 may be configured to implement particular instructions and/or functions corresponding to the software and/or hardware modules implemented on computer-readable media. The instructions and/or functions may be executable/operable by one or more articles of manufacture (for example, one or more computing devices 1502 and/or processors 1504) to implement techniques related to sharing links, as well as other techniques. Such techniques include, but are not limited to, the example procedures described herein. Thus, computer-readable media may be configured to store or otherwise provide instructions that, when executed by one or more devices described herein, cause various techniques related to sharing links.
Although the invention has been described in language specific to structural features and/or methodological acts, it is to be understood that the invention defined in the appended claims is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as example forms of implementing the claimed invention.
This application is a Continuation of, and claims priority to U.S. patent application Ser. No. 13/229,214, filed Sep. 9, 2011, entitled “SHARED ITEM ACCOUNT SELECTION,” which application is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
4421997 | Forys | Dec 1983 | A |
5825352 | Bisset et al. | Oct 1998 | A |
5856822 | Du et al. | Jan 1999 | A |
5943043 | Furuhata et al. | Aug 1999 | A |
6008636 | Miller et al. | Dec 1999 | A |
6021495 | Jain | Feb 2000 | A |
6091406 | Kambara et al. | Jul 2000 | A |
6323846 | Westerman et al. | Nov 2001 | B1 |
6360254 | Linden et al. | Mar 2002 | B1 |
6377936 | Henrick | Apr 2002 | B1 |
6542936 | Mayle | Apr 2003 | B1 |
6671406 | Anderson | Dec 2003 | B1 |
6741237 | Benard et al. | May 2004 | B1 |
6856259 | Sharp | Feb 2005 | B1 |
6959362 | Wall et al. | Oct 2005 | B2 |
6977646 | Hauck et al. | Dec 2005 | B1 |
7039871 | Cronk | May 2006 | B2 |
7053887 | Kraus et al. | May 2006 | B2 |
7174649 | Harris | Feb 2007 | B1 |
7254775 | Geaghan et al. | Aug 2007 | B2 |
7295191 | Kraus et al. | Nov 2007 | B2 |
7362313 | Geaghan et al. | Apr 2008 | B2 |
7375454 | Takasaki | May 2008 | B2 |
7536386 | Samji et al. | May 2009 | B2 |
7580556 | Lee et al. | Aug 2009 | B2 |
7592999 | Rosenberg et al. | Sep 2009 | B2 |
7619618 | Westerman et al. | Nov 2009 | B2 |
7627652 | Commons | Dec 2009 | B1 |
7711450 | Im et al. | May 2010 | B2 |
7725014 | Lam et al. | May 2010 | B2 |
7728821 | Hillis et al. | Jun 2010 | B2 |
7746325 | Roberts | Jun 2010 | B2 |
7797115 | Tasher et al. | Sep 2010 | B2 |
7812828 | Westerman et al. | Oct 2010 | B2 |
7907750 | Ariyur et al. | Mar 2011 | B2 |
7938009 | Grant et al. | May 2011 | B2 |
7978182 | Ording et al. | Jul 2011 | B2 |
8061223 | Pan | Nov 2011 | B2 |
8217909 | Young | Jul 2012 | B2 |
8311513 | Nasserbakht | Nov 2012 | B1 |
8314780 | Lin et al. | Nov 2012 | B2 |
8493355 | Geaghan et al. | Jul 2013 | B2 |
8702662 | Boyle | Apr 2014 | B2 |
8738706 | Grieve et al. | May 2014 | B1 |
8825597 | Houston | Sep 2014 | B1 |
9317147 | Welch et al. | Apr 2016 | B2 |
20020147929 | Rose | Oct 2002 | A1 |
20020156848 | Grouse | Oct 2002 | A1 |
20020156897 | Chintalapati et al. | Oct 2002 | A1 |
20030061520 | Zellers et al. | Mar 2003 | A1 |
20030164820 | Kent | Sep 2003 | A1 |
20030200465 | Bhat | Oct 2003 | A1 |
20040207606 | Atwood et al. | Oct 2004 | A1 |
20050012724 | Kent | Jan 2005 | A1 |
20050063566 | Beek et al. | Mar 2005 | A1 |
20050086296 | Chi et al. | Apr 2005 | A1 |
20050097440 | Lusk | May 2005 | A1 |
20050195978 | Babic et al. | Sep 2005 | A1 |
20060097991 | Hotelling et al. | May 2006 | A1 |
20060175485 | Cramer | Aug 2006 | A1 |
20060235803 | Romney | Oct 2006 | A1 |
20060259957 | Tam et al. | Nov 2006 | A1 |
20070073776 | Kalalian | Mar 2007 | A1 |
20070081726 | Westerman et al. | Apr 2007 | A1 |
20080041639 | Westerman et al. | Feb 2008 | A1 |
20080062140 | Hotelling et al. | Mar 2008 | A1 |
20080068229 | Chuang | Mar 2008 | A1 |
20080109912 | Rivera | May 2008 | A1 |
20080114882 | Christenson | May 2008 | A1 |
20080134343 | Pennington | Jun 2008 | A1 |
20080150909 | North et al. | Jun 2008 | A1 |
20080158185 | Westerman | Jul 2008 | A1 |
20080180399 | Cheng | Jul 2008 | A1 |
20080208963 | Eyal | Aug 2008 | A1 |
20080209329 | DeFranco | Aug 2008 | A1 |
20080211778 | Ording et al. | Sep 2008 | A1 |
20080211782 | Geaghan et al. | Sep 2008 | A1 |
20080262920 | O'Neill et al. | Oct 2008 | A1 |
20080278453 | Reynolds et al. | Nov 2008 | A1 |
20080284899 | Haubmann et al. | Nov 2008 | A1 |
20080309624 | Hotelling | Dec 2008 | A1 |
20080309629 | Westerman et al. | Dec 2008 | A1 |
20090009483 | Hotelling et al. | Jan 2009 | A1 |
20090012940 | Ives et al. | Jan 2009 | A1 |
20090046073 | Pennington et al. | Feb 2009 | A1 |
20090096753 | Lim | Apr 2009 | A1 |
20090141046 | Rathnam et al. | Jun 2009 | A1 |
20090157206 | Weinberg et al. | Jun 2009 | A1 |
20090160763 | Cauwels et al. | Jun 2009 | A1 |
20090174679 | Westerman | Jul 2009 | A1 |
20090234876 | Schigel et al. | Sep 2009 | A1 |
20090241701 | Pan | Oct 2009 | A1 |
20090250268 | Staton et al. | Oct 2009 | A1 |
20090251435 | Westerman et al. | Oct 2009 | A1 |
20090267903 | Cady et al. | Oct 2009 | A1 |
20090273584 | Staton et al. | Nov 2009 | A1 |
20090300020 | Chen | Dec 2009 | A1 |
20090303202 | Liu et al. | Dec 2009 | A1 |
20090312009 | Fishel | Dec 2009 | A1 |
20100010998 | Wagner | Jan 2010 | A1 |
20100042682 | Kaye | Feb 2010 | A1 |
20100053099 | Vincent et al. | Mar 2010 | A1 |
20100073318 | Hu et al. | Mar 2010 | A1 |
20100088372 | Shridhar | Apr 2010 | A1 |
20100103118 | Townsend et al. | Apr 2010 | A1 |
20100103121 | Kim et al. | Apr 2010 | A1 |
20100121657 | Rosenberger | May 2010 | A1 |
20100134429 | You et al. | Jun 2010 | A1 |
20100192211 | Bono et al. | Jul 2010 | A1 |
20100193258 | Simmons et al. | Aug 2010 | A1 |
20100214233 | Lee | Aug 2010 | A1 |
20100231508 | Cruz-Hernandez et al. | Sep 2010 | A1 |
20100241711 | Ansari et al. | Sep 2010 | A1 |
20100265827 | Horn et al. | Oct 2010 | A1 |
20100277505 | Ludden et al. | Nov 2010 | A1 |
20100302211 | Huang | Dec 2010 | A1 |
20100309139 | Ng | Dec 2010 | A1 |
20100315266 | Gunawardana et al. | Dec 2010 | A1 |
20100315366 | Lee et al. | Dec 2010 | A1 |
20100315372 | Ng | Dec 2010 | A1 |
20110018822 | Lin et al. | Jan 2011 | A1 |
20110022414 | Ge et al. | Jan 2011 | A1 |
20110025629 | Grivna et al. | Feb 2011 | A1 |
20110042126 | Spaid et al. | Feb 2011 | A1 |
20110047590 | Carr et al. | Feb 2011 | A1 |
20110050620 | Hristov | Mar 2011 | A1 |
20110055062 | Juntilla | Mar 2011 | A1 |
20110055912 | Fusari | Mar 2011 | A1 |
20110080348 | Lin et al. | Apr 2011 | A1 |
20110084929 | Chang et al. | Apr 2011 | A1 |
20110106477 | Brunner | May 2011 | A1 |
20110115709 | Cruz-Hernandez | May 2011 | A1 |
20110126280 | Asano | May 2011 | A1 |
20110131633 | MacAskill | Jun 2011 | A1 |
20110141054 | Wu et al. | Jun 2011 | A1 |
20110153463 | Lovelace | Jun 2011 | A1 |
20110173547 | Lewis et al. | Jul 2011 | A1 |
20110214148 | Gossweiler, III | Sep 2011 | A1 |
20110261005 | Joharapurkar et al. | Oct 2011 | A1 |
20110265017 | Stovicek | Oct 2011 | A1 |
20110267481 | Kagei | Nov 2011 | A1 |
20110276396 | Rathod | Nov 2011 | A1 |
20110289143 | Polis | Nov 2011 | A1 |
20110298709 | Vaganov | Dec 2011 | A1 |
20110298745 | Souchkov | Dec 2011 | A1 |
20110299734 | Bodenmueller | Dec 2011 | A1 |
20110304577 | Brown et al. | Dec 2011 | A1 |
20110304590 | Su et al. | Dec 2011 | A1 |
20110313996 | Strauss | Dec 2011 | A1 |
20110314101 | Redmon et al. | Dec 2011 | A1 |
20110320380 | Zahn | Dec 2011 | A1 |
20120030624 | Migos | Feb 2012 | A1 |
20120032891 | Parivar | Feb 2012 | A1 |
20120065779 | Yamaguchi et al. | Mar 2012 | A1 |
20120068957 | Puskarich et al. | Mar 2012 | A1 |
20120075331 | Mallick et al. | Mar 2012 | A1 |
20120105334 | Aumiller et al. | May 2012 | A1 |
20120117156 | Anka | May 2012 | A1 |
20120124615 | Lee | May 2012 | A1 |
20120131490 | Lin et al. | May 2012 | A1 |
20120146956 | Jenkinson | Jun 2012 | A1 |
20120151377 | Schultz | Jun 2012 | A1 |
20120185933 | Belk | Jul 2012 | A1 |
20120187956 | Uzelac et al. | Jul 2012 | A1 |
20120188176 | Uzelac et al. | Jul 2012 | A1 |
20120188197 | Uzelac et al. | Jul 2012 | A1 |
20120191394 | Uzelac et al. | Jul 2012 | A1 |
20120206377 | Zhao et al. | Aug 2012 | A1 |
20120206380 | Zhao et al. | Aug 2012 | A1 |
20120223894 | Zhao et al. | Sep 2012 | A1 |
20120259773 | Hoffman | Oct 2012 | A1 |
20120260158 | Steelberg | Oct 2012 | A1 |
20120265841 | Ross | Oct 2012 | A1 |
20120268416 | Pirogov et al. | Oct 2012 | A1 |
20120280934 | Ha et al. | Nov 2012 | A1 |
20120317208 | Sousa | Dec 2012 | A1 |
20120319992 | Lee | Dec 2012 | A1 |
20120331108 | Ferdowsi | Dec 2012 | A1 |
20130016045 | Zhao et al. | Jan 2013 | A1 |
20130063167 | Jonsson | Mar 2013 | A1 |
20130066975 | Kantor et al. | Mar 2013 | A1 |
20130067303 | Kantor | Mar 2013 | A1 |
20130113751 | Uzelac et al. | May 2013 | A1 |
20130197862 | Uzelac et al. | Aug 2013 | A1 |
20130238129 | Rose et al. | Sep 2013 | A1 |
20130345864 | Park | Dec 2013 | A1 |
Number | Date | Country |
---|---|---|
101545938 | Sep 2009 | CN |
101982783 | Mar 2011 | CN |
201828476 | May 2011 | CN |
201903594 | Jul 2011 | CN |
202093112 | Dec 2011 | CN |
202171626 | Mar 2012 | CN |
202196126 | Apr 2012 | CN |
102436334 | May 2012 | CN |
19939159 | Mar 2000 | DE |
2284654 | Feb 2011 | EP |
2003303051 | Oct 2003 | JP |
2006268412 | Oct 2006 | JP |
2008538628 | Oct 2008 | JP |
2010134602 | Jun 2010 | JP |
2010191807 | Sep 2010 | JP |
1020010019445 | Mar 2001 | KR |
1020050094359 | Sep 2005 | KR |
1020070007963 | Jan 2007 | KR |
100763057 | Oct 2007 | KR |
1020080019949 | Mar 2008 | KR |
1020080066416 | Jul 2008 | KR |
100941441 | Feb 2010 | KR |
1020100067178 | Jun 2010 | KR |
1020100077298 | Jul 2010 | KR |
1020100129015 | Dec 2010 | KR |
1020100135982 | Dec 2010 | KR |
101007049 | Jan 2011 | KR |
1020110005946 | Jan 2011 | KR |
1020110011337 | Feb 2011 | KR |
1020110016349 | Feb 2011 | KR |
101065014 | Sep 2011 | KR |
20050003155 | Jan 2015 | KR |
2006042309 | Apr 2006 | WO |
2013063042 | May 2013 | WO |
Entry |
---|
“Public or Private Articles”, Retrieved from <<http://web.archive.org/web/20111112135351/http://www.presspublisher.com/features/public-or-private-articles/>>, Retrieved Date: Aug. 11, 2011, 3 Pages. |
“AO Touch Screen Tester”, Retrieved from <<http://www.aocs.com/Projects/touch%20screen%20tester%20project.html>>, Dec. 31, 2010, 1 Page. |
“Setting Sharing Permissions for Google Docs and Google Sites”, Retrieved from <<http://www.library.kent.edu/files/SMS_Google_Sharing_Permissions.pdf>>, Retrieved Date: Aug. 8, 2011, 8 Pages. |
“Share Office documents in SkyDrive”, Retrieved from <<http://web.archive.org/web/20110827203301/http://office.microsoft.com/en-us/web-apps-help/share-office-documents-in-skydrive-HA101820121.aspx>>, Retrieved Date: Aug. 8, 2011, 3 Pages. |
“Shared Folder Permissions”, Retrieved from <<http://web.archive.org/web/20111020095512/http://www.tech-faq.com/shared-folder-permissions.html>>, Retrieved Date: Aug. 8, 2011, 7 Pages. |
Shimizu, Ryo, “Smartphone Automatic Testing Robot at UEI Booth”, Retrieved from <<http://www.youtube.com/watch?v=f-Q4ns-b9sA>>, May 9, 2012, 2 Pages. |
“STM23S-2AN NEMA 23 Integrated Drive+Motor”, Retrieved from: <<http://web.archive.org/web/20101203080637/http://www.applied-motion.com/products/integrated-steppers/stm23s-2an>>, Jan. 24, 2012, 3 Pages. |
Pratt, Susan, “Factors Affecting Sensor Response”, Retrieved from <<http://www.analog.com/static/imported-files/application_notes/5295737729138218742AN830_0.pdf>>, Dec. 2005, pp. 1-8. |
“Technology Comparison: Surface Acoustic Wave, Optical and Bending Wave Technology”, Retrieved from <<http://multimedia.3m.com/mws/mediawebserver?mwsld=66666UuZjcFSLXTtnXT2NXTaEVuQEcuZgVs6EVs6E666666-&fn=DST-0pticai-SAW%20Tech%20Brief.pdf>>, Jan. 2009, pp. 1-4. |
“Touch Panel Inspection & Testing Solution”, Retrieved from <<http://wiki.advantech.com/images/6/60/MA_brochure-1021-L_7.pdf>>, Retrieved Date: Dec. 31, 2010 , 1 Page. |
Terpstra, Brett, “BetterTouchTool Makes Multi-touch Infinitely More Useful, for Free”, Retrieved from <<http://www.tuaw.com/2010/01/05/bettertouchtool-makes-multitouch-infinitely-more-useful-for-fr/>>, Jan. 5, 2010, 4 Pages. |
Toto, Serkan, “Video: Smartphone Test Robot Simulates Countless Flicking and Tapping”, Retrieved from <<https://techcrunch.com/2010/12/21/video-smartphone-test-robot-simulates-countless-flicking-and-tapping/>>, Dec. 21, 2010, 2 Pages. |
“Touch Panel Semi-Auto Handler Model 3810”, Retrieved from <<http://www.chromaus.com/datasheet/3810_en.pdf>>, Dec. 31, 2010, 2 Pages. |
“MicroNav Integration Guide Version 3.0”, Retrieved from <<http://www.steadlands.com/data/interlink/micronavintguide.pdf>>, Dec. 31, 2003, 11 Pages. |
Buffet, Y, “Robot Touchscreen Analysis”, Available at <<http://web.archive.org/web/20100425023244/http://ybuffet.posterous.com/labsmotocom-blog-archive-robot-touchscreen-an>>, Apr. 19, 2010, 2 Pages. |
“Actuation Force of Touch Screen”, Retrieved from <<http://www.mecmesin.com/touch-screen-actuation-force-test-cs31>>, Dec. 31, 2010,1 Page. |
“Microsoft Windows Simulator Touch Emulation”, Retrieved from <<blogs.msdn.com/b/visualstudio/archive/2011/09/30/microsoft-windows-simulator-touch-emulation.aspx>>, Sep. 30, 2011, 3 Pages. |
“Second Office Action Issued in Chinese Patent Application No. 201210331655.8”, dated Sep. 29, 2015, 7 Pages. |
“Notice of Allowance Issued in Chinese Patent Application No. 201210331725.X”, dated Aug. 5, 2016, 4 Pages. |
“International Search Report and Written Opinion Issued in PCT Application No. PCT/US2013/053621”, dated Feb. 20, 2013, 10 Pages. |
“International Search Report and Written Opinion Issued in PCT Application No. PCT/US2013/061067”, dated Feb. 7, 2014, 11 pages. |
“Office Action Issued in Japanese Patent Application No. JP2014-529803”, dated Aug. 9, 2016, 3 Pages. (W/o English Translation). |
Kuosmanen, Hans, “OptoFidelity Automating UI Testing”, Retrieved from <<http://www.youtube.com/watch?v=mOZ2r7ZvyTg&feature=player embedded#!section>>, Oct. 14, 2010, 2 Pages. |
Tao, et al., “An Efficient Cost Model for Optimization of Nearest Neighbor Search in Low and Medium Dimensional Spaces”, in Journal of IEEE Transactions on Knowledge and Data Engineering, vol. 16, Issue 10, Oct. 1, 2004, 16 Pages. |
Tsuchiya, et al., “Vib-Touch: Virtual Active Touch Interface for Handheld Devices”, in Proceedings of the 18th IEEE International Symposium on Robot and Human Interactive Communication, Sep. 27, 2009, pp. 12-17. |
Westman, et al., “Color Segmentation by Hierarchical Connected Components Analysis with Image Enhancement by Symmetric Neighborhood Filter”, in Proceedings of the 10th International Conference on Pattern Recognition, Jun. 16, 1990, pp. 796-802. |
Wilson, Andrew D., “Touch Light: An Imaging Touch Screen and Display for Gesture-Based Interaction”, in Proceedings of 6th International Conference on Multimodal Interfaces, Oct. 13, 2004, 8 Pages. |
Wimmer, et al., “Modular and Deformable Touch-Sensitive Surfaces Based on Time Domain Reflectometry”, in Proceedings of the 24th Annual ACM symposium on User interface software and technology, Oct. 2011, 10 Pages. |
Zivkov, et al., “Touch Screen Mobile Application as Part of Testing and Verification System”, in Proceedings of the 35th International Convention MIPRO, May 21, 2012, pp. 892-895. |
Fischer, Dirk, “Capacitive Touch Sensors—Application Fields, Technology Overview and Implementation Example”, in Proceedings of the Human Interfaces, Fujitsu Microelectronics Europe, vol. 4, Jan. 12, 2010, 12 Pages. |
McMahan, et al., “Haptic Display of Realistic Tool Contact via Dynamically Compensated Control of a Dedicated Actuator”, Published in Department of Mechanical Engineering and Applied Mechanics, University of Pennsylvania, Dec. 15, 2009, 9 Pages. |
Kjellgren, Olof, “Developing a Remote Control Application for Windows CE”, A Thesis Performed in Computer Engineering at ABB Robotics, Department of Computer Science and Electronics, Malardalen University, May 30, 2007, 43 Pages. |
Khandkar, et al., “Tool Support for Testing Complex MultiTouch Gestures”, in Proceedings of ACM International Conference on Interactive Tabletops and Surfaces, Nov. 7, 2010, 10 Pages. |
Kastelan, et al., “Touch-Screen Stimulation for Automated Verification of Touchscreen-Based Devices”, in Proceedings of IEEE 19th International Conference and Workshops on Engineering of Computer Based Systems, Apr. 11, 2012, pp. 52-55. |
Takeuchi, et al., “Development of a Multi-fingered Robot Hand with Softness Changeable Skin Mechanism”, in Proceedings of 41st International Symposium on 6th German Conference on Robotics, Jun. 7, 2010, 7 Pages. |
Asif, et al., “MPEG-7 Motion Descriptor Extraction for Panning Camera Using Sprite Generated”, in Proceedings of IEEE Fifth International Conference on Advanced Video and Signal Based Surveillance, Sep. 1, 2008, pp. 60-66. |
Baraldi, et al., “WikiTable: Finger Driven Interaction for Collaborative Knowledge-Building Workspaces”, in Proceedings of the Conference on Computer Vision and Pattern Recognition Workshop, Jun. 17, 2006, 6 Pages. |
Kastelan, et al., “Stimulation Board for Automated Verification of Touchscreen-Based Devices”, in Proceedings of 22nd International Conference on Field Programmable Logic and Applications, Aug. 29, 2012, 2 Pages. |
Hoshino, et al., “Pinching at Finger Tips for Humanoid Robot Hand”, in Proceedings of IEEE International Symposium on Computational Intelligence in Robotics and Automation, Jun. 27, 2005, 9 Pages. |
Cao, et al., “Evaluation of an On-line Adaptive Gesture Interface with Command Prediction”, in Proceedings of Graphics Interface, May 7, 2005, 8 Pages. |
Cao, et al., “ShapeTouch: Leveraging Contact Shape on Interactive Surfaces”, in Proceedings of 3rd IEEE International Workshop on Horizontal Interactive Human Computer Systems, Oct. 1, 2008, pp. 139-146. |
Hoggan, et al., “Mobile Multi-Actuator Tactile Displays”, in Proceedings of the 2nd International Conference on Haptic and Audio Interaction Design, Nov. 29, 2007, 12 Pages. |
Dang, et al., “Hand Distinction for Multi-Touch Tabletop Interaction”, in Proceedings of the ACM International Conference on Interactive Tabletops and Surfaces, Nov. 23, 2009, 8 Pages. |
Dillencourt, et al., “A General Approach to Connected-Component Labeling for Arbitrary Image Representations”, in Journal of the ACM, vol. 39, Issue 2, Apr. 1, 1992, pp. 253-280. |
Levin, et al., “Tactile-Feedback Solutions for an Enhanced User Experience”, in Journal: Information Display, vol. 10, Oct. 2009, pp. 18-21. |
Li, et al., “Role Based Access Control for Social Network Sites”, in Proceedings of Joint Conferences on Pervasive Computing, Dec. 3, 2009, pp. 389-393. |
“Using Low Power Mode on the MPR083 and MPR084”, Published in Freescale Semiconductor Incorporation, Nov. 2007, 5 Pages. |
“TouchSense Systems Immersion”, Published in Haptics and Virtual Reality Laboratory, Jun. 19, 2010, 20 Pages. |
Kenji, Kinoshita, “Coesistence, Sharing and Mutual Prosperity”, Mac and Windows, Mac Fan, Mainichi Communications Ltd., vol. 16, Issue 4, Apr. 2008, 4 Pages. |
“Office Web Apps: Share a SkyDrive folder”, Retrieved from <<http://web.archive.org/web/20101203092306/http://explore.live.com/office-web-apps-skydrive-share-using>>, Retrieved Date: Aug. 8, 2011, 2 Pages. |
Brodkin, Jon, “Windows 8 Hardware: Touchscreens, Sensor Support and Robotic Fingers”, Retrieved from <<http://arstechnica.com/business/news/2011/09/windows-8-hardware-touch-screens-sensor-support-and-robotic-fingers>>, Sep. 2011, 1 Page. |
“Office Web Apps: Share files on SkyDrive”, Retrieved from <<http://web.archive.org/web/20101203074521/http://explore.live.com/office-web-apps-skydrive-share-files-using>>, Retrieved Date: Aug. 8, 2011, 1 Page. |
“OptoFidelity Touch & Test”, Retrieved from <<http://www.ArticleOnePartners.com/index/servefile?fileld=188969>>, Feb. 20, 2012, 2 Pages. |
“OptoFidelity Touch and Test”, Retrieved from <<http://www.ArticleOnePartners.com/index/servefile?fileld=188420>>, May 4, 2012, 2 Pages. |
“MOSS User Permissions and ‘Modify Shared Webpart’ Link”, Retrieved from <<https://social.technet.microsoft.com/Forums/sharepoint/en-US/bf893562-7f49-48bd-8d12-5befca34dba5/moss-user-permissions-and-modify-shared-webpart-link?forum=sharepointgenerallegacy>>, Retrieved Date: Aug. 8, 2011, 3 Pages. |
Binns, Francis Styrion, “Multi-“Touch” Interaction via Visual Tracking”, Published in Bachelor of Science in Computer Science with Honours, the University of Bath, May, 2009, 81 Pages. |
“MAX 11871”, Retrieved from <<http://www.maxim-ic.com/datasheet/index.mvp/id/7203>>, Retrieved Date: May 4, 2011, 2 pages. |
“Linearity Testing Solutions in Touch Panels”, Retrieved from <<advantech.com/machine-automation/.../%7BD05BC586-74DD-4BFA-B81A-2A9F7ED489F/>>, Nov. 15, 2011, 2 Pages. |
“How to Use the Precision Touch Testing Tool”, Retrieved from <<http://feishare.com/attachments/article/279/precision-touch-testing-tool-Windows8-hardware-certification.pdf>>, Apr. 15, 2012, 10 Pages. |
Kuosmanen, Hans, “Testing the Performance of Touch-Enabled Smartphone User Interfaces”, Retrieved from <<http://sine.ni.com/cs/app/doc/p/id/cs-14071#>>, Dec. 31, 2008, 2 Pages. |
Dillow, Clay, “Liquid-Filled Robot Finger More Sensitive to Touch Than a Human's”, Retrieved from <<www.popsci.com/technology/article/2012-06/new-robot-finger-more-sensitive-touch-human>>, Jun. 19, 2012, 3 Pages. |
Cheng, Bowen, “Resistive Touch Screen_Resistance Linearity Test”, Retrieved from<<http://www.youtube.com/watch?v=hb23GpQdXXU>>, Jun. 17, 2008, 2 Pages. |
Cravotta, Robert, “The Battle for Multi-touch”, Retrieved from <<http://www.embeddedinsights.com/channels/2011/04/12/the-battle-for-multi-touch/>>, Apr. 12, 2011, 3 Pages. |
McGlaun, Shane, “Microsoft's Surface 2.0 Stress Testing Robot Called Patty Shown off for First Time”, Retrieved from <<http://www.slashgear.com/microsofts-surface-2-0-stress-testing-robot-called-patty-shown-off-for-first-time-19172971/>>, Aug. 19, 2011, 1 Page. |
“Haptic-Actuator Controllers”, Retrieved from <<http://web.archive.org/web/20120626103908/http://www.maxim-ic.com/products/data_converters/touch-interface/haptic-actuator.cfm>>, Retrieved Date: May 4, 2011, 1 Page. |
Morgan, Jeffrey, “Reducing Internet Traffic by Packaging Multiple HTTP Requests”, Retrieved from <<http://web.archive.org/web/20110122075632/http://usabilityetc.com/articles/http-packages/>>, Retrieved Date: May 20, 2015, 2 Pages. |
“OptoFidelity Two Fingers—robot”, Retrieved from <<https://www.youtube.com/watch?v=YppRASbXHfk&feature=player%20embedded#!section>>, Sep. 15, 2010, 2 Pages. |
“Pension Rallies Hit French Cities”, Retrieved from <<http://www.bbc.com/news/world-europe-11204528>>, Sep. 7, 2010, 3 Pages. |
“Projected Capacitive Test Fixture”, Retrieved from <<http://www.touch-intl.com/downloads/DataSheets%20for%20Web/6500443-PCT-DataSheet-Web.pdf>>, Jan. 2009, 2 Pages. |
“Final Office Action Issued in U.S. Appl. No. 12/941,693”, dated Nov. 26, 2012, 22 Pages. |
“Final Office Action Issued in U.S. Appl. No. 12/941,693,”, dated Nov. 18, 2013, 21 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 12/941,693”, dated Jul. 18, 2012, 19 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 12/941,693”, dated May 16, 2013, 13 Pages. |
“Supplementary Search Report Issued in European Patent Application No. 12829709.0”, dated Mar. 20, 2015, 5 Pages. |
“Supplementary Search Report Issued in European Patent Application No. 12829938.5”, dated Mar. 19, 2015, 5 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 13/099,288”, dated Feb. 6, 2014, 13 Pages. |
“Final Office Action Issued in U.S. Appl. No. 13/152,991”, dated Sep. 20, 2013, 14 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 13/152,991”, dated Mar. 21, 2013, 11 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 13/154,161”, dated Jan. 3, 2014, 14 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 13/156,243”, dated Sep. 19, 2013, 12 Pages. |
“Notice of Allowance Issued in U.S. Appl. No. 13/156,243”, dated Jan. 28, 2014, 8 Pages. |
“Final Office Action Issued in U.S. Appl. No. 13/183,377”, dated Oct. 15, 2013, 12 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 13/183,377”, dated Jun. 21, 2013, 10 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 13/198,036”, dated Jan. 31, 2014, 14 Pages. |
“Notice of Allowance Issued in U.S. Appl. No. 13/198,415”, dated Dec. 26, 2013, 8 Pages. |
“Advisory Action Issued in U.S. Appl. No. 13/228,283”, dated Jul. 9, 2014, 3 Pages. |
“Final Office Action Issued in U.S. Appl. No. 13/228,283”, dated Aug. 5, 2015, 18 Pages. |
“Final Office Action Issued in U.S. Appl. No. 13/228,283”, dated Mar. 7, 2014, 12 Pages. |
“Non Final Office Action Issued in U.S. Appl. No. 13/228,283”, dated Dec. 23, 2014, 14 Pages. |
“Non Final Office Action Issued in U.S. Appl. No. 13/228,283”, dated Aug. 27, 2013, 12 Pages. |
“Final Office Action Issued in U.S. Appl. No. 13/229,121”, dated Nov. 21, 2013, 15 Pages. |
“Final Office Action Issued in U.S. Appl. No. 13/229,121”, dated May 20, 2015, 16 Pages. |
“Non Final Office Action Issued in U.S. Appl. No. 13/229,121”, dated Dec. 24, 2015, 15 Pages. |
“Non Final Office Action Issued in U.S. Appl. No. 13/229,121”, dated Oct. 6, 2014, 12 Pages. |
“Non Final Office Action Issued in U.S. Appl. No. 13/229,121”, dated Jun. 7, 2013, 13 Pages. |
“Final Office Action Issued in U.S. Appl. No. 13/229,214”, dated Jul. 26, 2013, 27 Pages. |
“Final Office Action Issued in U.S. Appl. No. 13/229,214”, dated Oct. 6, 2014, 41 Pages. |
“Final Office Action Issued in U.S. Appl. No. 13/229,214”, dated Oct. 26, 2015, 40 Pages. |
“Non Final Office Action Issued in U.S. Appl. No. 13/229,214”, dated May 7, 2015, 48 Pages. |
“Non Final Office Action Issued in U.S. Appl. No. 13/229,214”, dated Mar. 26, 2014, 27 Pages. |
“Non Final Office Action Issued in U.S. Appl. No. 13/229,214”, dated Feb. 15, 2013, 25 Pages. |
“Notice of Allowance Issued in U.S. Appl. No. 13/229,214”, dated Feb. 26, 2016, 12 Pages. |
“Final Office Action Issued in U.S. Appl. No. 13/293,060”, dated Sep. 25, 2013, 10 Pages. |
“Non Final Office Action Issued in U.S. Appl. No. 13/293,060”, dated Nov. 29, 2013, 11 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 13/293,060”, dated Jul. 12, 2013, 10 Pages. |
“Final Office Action Issued in U.S. Appl. No. 13/530,692”, dated Apr. 10, 2014, 16 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 13/530,692”, dated Jan. 31, 2014, 14 Pages. |
“First Office Action and Search Report Issued in Chinese Patent Application No. 201210331655.8”, dated Jan. 7, 2015, 14 Pages. |
“First Office Action and Search Report Issued in Chinese Patent Application No. 201210331725.X”, dated Feb. 4, 2015, 12 Pages. |
“Second Office Action Issued in Chinese Patent Application No. 201210331725.X”, dated Nov. 4, 2015, 6 Pages. |
“Third Office Action Issued in Chinese Patent Application No. 201210331725.X”, dated Apr. 6, 2016, 5 Pages. |
“International Search Report and Written Opinion Issued in PCT Application No. PCT/US12/53681”, dated Feb. 27, 2013, 11 Pages. |
“International Search Report and Written Opinion Issued in Patent Application No. PCT/US2011/055621”, dated Jun. 13, 2012, 8 Pages. |
“International Search Report and Written Opinion Issued in PCT Application No. PCT/US2011/058855”, dated Mar. 28, 2012, 8 Pages. |
“International Search Report and Written Opinion Issued in Patent Application No. PCT/US2012/024780”, dated Sep. 3, 2012, 9 Pages. |
“International Search Report and Written Opinion Issued in Patent Application No. PCT/US2012/024781” dated Sep. 3, 2012, 9 Pages. |
“International Search Report and Written Opinion Issued in Patent Application No. PCT/US2012/027642”, dated Sep. 3, 2012, 9 Pages. |
“International Search Report and Written Opinion Issued in Patent Application No. PCT/US2013/021787”, dated May 13, 2013, 9 Pages. |
“International Search Report and Written Opinion Issued in Patent Application No. PCT/US2013/046208”, dated Sep. 27, 2013, 12 Pages. |
“Office Action Issued in Japanese Patent Application No. JP2014-529803”, dated Dec. 13, 2016, 6 Pages. |
Number | Date | Country | |
---|---|---|---|
20160308877 A1 | Oct 2016 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13229214 | Sep 2011 | US |
Child | 15192454 | US |