This disclosure relates to systems and methods for third party anchoring of metadata in a document. More particularly, this disclosure relates to providing an interface for third party applications to interact with the metadata associated with files stored on a cloud based storage system.
Cloud based storage systems allow users to store files on a network based storage system. Some cloud based storage systems include cloud based applications for the users to access the files on the cloud based storage system using a web based client application. By using the cloud based application, a user may also be able to annotate parts of the file with metadata. For example, a user may wish to mark some text in the file as important by selecting a portion of the document and marking it using a comment feature. The corresponding metadata for the comment is often associated with a proprietary document model. Therefore, access to the metadata may be limited to cloud based applications or native applications designed with knowledge of the proprietary document model.
Sometimes native applications or cloud based applications may not be capable of accessing and modifying all types of file formats. In some cases, the user may need to process the file using an application that serves a very specific functional need. Therefore, there may be a need for accessing the files using third party applications. Third party applications may not understand the document model of cloud based storage files. Therefore, the user may lose information related to the file while trying to access the file using a third party application. To prevent third party applications from losing metadata information, there is a need for exposing the metadata related to content of the document.
Accordingly, systems and methods disclosed herein provide third party applications with access to the metadata related to content of a file stored on a cloud based storage device.
Certain implementations relate to a method of storing metadata for a file on a cloud based storage system. A server may receive a request from a third party application to store metadata for a file. The server may determine a metadata type based on the request. The server may associate the metadata value with an application identifier. The application identifier may identify a third party application. The server may store the metadata value based on the determined metadata type. The stored metadata may be associated with the application identifier and the stored metadata value may include information related to an anchor.
Certain implementations relate to systems for storing metadata for a file on a cloud based storage system. The system may comprise a server that is configured to communicate over a network with a client system. The server may receive a request from a third party application to store metadata for a file. The server may determine a metadata type based on the request. The server may associate the metadata value with an application identifier. The application identifier may identify a third party application. The server may store the metadata value based on the determined metadata type. The stored metadata may be associated with the application identifier and the stored metadata value may include information related to an anchor.
Further features of the disclosure, its nature and various advantages will be apparent upon consideration of the following detailed description, taken in conjunction with the accompanying drawings, in which like reference characters refer to like parts throughout, and in which:
To provide an overall understanding of the systems and methods described herein, certain illustrative examples will now be described, including a system for storing metadata received from a third party application. However, it will be understood that the systems and methods described herein may be adapted and modified as is appropriate for the application being addressed and that the systems and methods described herein may be employed in other suitable applications, and that such other additions and modifications will not depart from the scope thereof.
The present disclosure provides systems and methods for exposing metadata associated with the content of files stored on a cloud based storage system. Interfaces between shared files in cloud based storage systems and third party applications are not well established. The systems and methods disclosed herein provide third party applications with an interface to access metadata related to files stored on a cloud based storage device. In particular, the present disclosure relates to providing, to a third party application, the ability to create and store metadata related to content of files stored on a cloud based storage system.
Data stored on a cloud based storage system may be received by a client system for processing, for example, using a locally installed application on the client system. For example, a text document may be downloaded to a client system and opened with a locally installed document processing application. A web based application that can be accessed online by a user rather than installed locally on a local client system, can also be used to process the text document. These online applications, which may have the same features and functionality as locally installed applications, are typically hosted on a remote server rather than a local client system, which allows the user to access the online applications from any device having internet access. Online applications may be capable of opening and processing data files stored on the cloud based storage system.
The present disclosure provides techniques for interfacing between third party applications, server systems that host online applications, and cloud based storage systems that store data files. In an example implementation, a client system may request, via a third party application, to open and process a data file stored on a cloud based storage system using an online application. The third party application may send a request to access a file to a server that interfaces with the cloud based storage system and the online applications. The request may include file information, which identifies a data file stored on the cloud based storage system, and also identification information of the user. The server may then process the request and provide to the client system the data file. The data file may include metadata associated with the content of the data file.
The metadata associated with the content of the data file may be anchored to one or more positions within the document. The data type for the anchor positions for the metadata may vary based on a file format of the data file. For example, when the data file is a photograph, the anchor position may be a pixel location of the metadata within the photograph. The client system may in turn provide the user with an interface to annotate the copy of the data file with metadata. The interface may be a browser interface, a mobile interface, an application graphical user interface, and/or other suitable interface for interacting with the copy of the data file. The user may use the interface to create metadata and anchor it to the content of the data file. The third party may transmit the metadata and the corresponding anchors to the server. The server may store the metadata received from the client and associate it with a respective document model of the file.
An exemplary system for implementing an interface between a client system, cloud based storage system and an online application system is shown in
The cloud based storage system 104 is a file hosting system that allows users to store and retrieve data accessible to one or more client systems such as the client system 114. This data may be referred to as a user file. As an example, the cloud based storage system 104 may store data on a single server system or in a distributed system. As used herein, the terms “user file” or “shared file” refer to data files stored on cloud based storage system 104, and may be used interchangeably. User files and shared files may be associated with a particular user. Shared files may also include files shared by other users. Examples of user files may be text documents, spreadsheets, multimedia files, and other types of binary data. Each user file may also have metadata associated with the user file. This metadata may be stored on the cloud based storage system 104 in a metadata database 110. The metadata may also be stored within the user file itself. Metadata includes information about the user file. Examples of metadata include filenames, dates and times that the file may have been accessed or processed, security information, generated previews of the file, and any other types of information related to the user file. In some implementations metadata may also be content related metadata. Examples of content related metadata may include comments by users on a selection of a file, tags identifying a user in an image file, tags identifying an author of a specific portion of a file, a thumbnail of the content of the file, and/or other suitable data related to the content of the file.
Server 106 may receive requests for user files from client systems 114 and from third party systems 124 over network 102. In response to the requests, the server 106 accesses user files stored on the cloud based storage system 104. The server 106 in
A client system 114 may send a request for accessing content related metadata to the server 106. The client system 114 may use a native application 116 to interface with the server. In some implementations, the native application 116 may be a web based browser application. The native application 116 may interface with the native database 108 via an online application executing on the server. The online application may have access to the data model of the user file and may service the client systems 114 request to access the content related metadata by accessing the native database 108. The native database 108 may store content related metadata by mapping them to identifiers in memory. An identifier may include alphanumeric characters, and/or other suitable ways to provide a unique identification for the content related metadata. A mapping of the identifier to the metadata may be stored in the native database 108.
In some implementations, the client system 114 may use a third party application 118 as an interface with the server. The third party application 118 may be a document processing application, an image processing application, a spreadsheet application, and/or any other suitable application for interfacing with the user file. The third party application 118 may request the server 106 to access content related metadata. The third party application 118 may not have knowledge of an internal data model. In an illustrative example, the request may be a request to store content related metadata and may include metadata and one or more associated anchor positions of the metadata. The server 106 may service the request from the third party application 118 using the metadata database 110. The server may associate content related metadata with one or more anchors for the metadata. The anchors may contain information related to the location of the content related to the metadata within the user file.
In certain implementations, a third party system 124 may send a request for accessing content related metadata to the server 106. The third party system 124 may be a server system for a third party cloud based application. For example, the third party system 124 could be a server for a web based service for aggregating media files for the user from cloud based storage systems used by the user. The server 106 of the cloud based storage system 104 may service the request from the third party system 124 using the metadata database 110.
In some implementations, the location of the anchor 206 is adjusted with changes made to the text document. In the illustration of
In some implementations, the metadata may include revision information of the image. The revision information may help in preventing stale metadata. Stale metadata may be, for example, anchored to a portion of a file that has been removed, deleted, and or replaced.
In some implementations, metadata may be related to content of the file. In an example implementation, the cloud based storage system may store the metadata related to the content of the file in two parts. One part may include the content of the metadata. For example, a comment related to a selected portion of the file may have a corresponding data structure for storing the comment. Data structure 1100 illustrates an App1.comment data structure 1104 for storing the content of a comment. It is understood that while data structure 1104 illustrates a two part name separated by a “.” between application identifier “App1” and metadata type “comment”, the metadata may not be associated with any particular application. The comment metadata as illustrated in this case may be stored as a “.comment”, “comment”, and/or other suitable namespace format for storing an application agnostic metadata. The comment data structure may store attributes such as type, revision, date, comment identifier, file ID, author, content, anchors, and/or other suitable data for representing the comment. The anchors attribute of the comment data structure may link to an anchor data structure 1106 using an anchor naming convention.
It is possible that a first application may request the server for creating, modifying and/or reading a metadata type associated with a second application. The request from the first application may, in this case, include an application identifier associated with the second application. The server may retrieve metadata associated with the second application in order to service the request from the first application. In some implementations, the naming scheme of the metadata may be used for implementing access control for third party application metadata. For example, it may be possible to limit a first application App1 to only access metadata with “App1” and/or null as an application identifier. In certain cases, third party applications may choose to grant other third party applications rights to create, modify, and/or read their associated metadata values. It is understood that concepts discussed herein of the naming scheme for metadata may also apply to a naming scheme of anchors.
The second part of the data structure may include information about the location of content of the file to which the metadata may be related. In an example implementation, the anchor data structure 1106 may store a list of anchors in a file. In the illustrative data structure 1100, the anchor data structure includes a list of two anchors. In some implementations, individual anchors for a file may be identified by a two-part name form separated by a “.” in the middle. For example the App1.AnchorA name has an “App1” part and an “AnchorA” part. The anchor naming scheme used in the anchor data structure 1106 may be used for identifying an anchor. The first part, App1, in the illustration of the anchor naming convention may correspond to an identifier of a third party application used to create the anchor. If the anchor is associated with a third party application identifier, the third party application may define rules for interpreting the anchor with respect to the content of the file. In some implementations, the anchor may not be related to a third party application, and the “App1” part may be null. For example, a native “AnchorA” may be stored as “AnchorA”, “.AnchorA”, and/or other suitable ways for storing application agnostic anchors. The second part may refer a type for identifying the anchor. The two part form for naming the anchor may reduce collisions between naming schemes for similar anchors used by a different third party application. The comment data structure 1104 may link to the anchor data structure 1106 using the two-part name of the anchor as an identifier.
At step 1214, the server may determine the metadata type received in the request. The server system may use the third party application identifier and/or the metadata type to determine a corresponding metadata type. In response to determining that metadata database does not have a corresponding metadata type, the server may create an entry for the new metadata type in the metadata database. The server may execute validation steps to determine whether data for storing the metadata in the metadata database is included in the request meets a certain standard. In response to determining that the data for storing the metadata is not included in the request, the server may transmit an error message to the third party application. In response to determining that the data for storing the metadata is not included in the request, the server may store metadata as file related metadata.
At step 1218, the server may store the metadata in the metadata database. The server may store the metadata values in a data structure similar to the comment data structure 1104 of
At step 1318, in response to determining that the revision information is not available, the server may associate current revision information with the metadata information. The current revision information may correspond to a most recent state of the file on the cloud based storage system. In associating the current revision information with the metadata, the server may store the revision information in data structures similar to data structures 1104 and 1106 of
At step 1414, the server may receive a request from a third party application to read metadata related to a file and/or metadata related to content included in the file. The request may include information for identifying the metadata content of the file. For example, the request may include a file identifier for identifying the file, an application identifier for identifying a part of the metadata name, a metadata type for identifying the nature of the metadata requested, a metadata identifier for identifying a specific metadata and/or other suitable data for identifying the metadata requested by the third party application. In some implementations, the server may use the application identifier and the metadata type to find data structures similar to data structures 1104 and 1106 of
The server may optionally implement steps 1418 and 1422. At step 1418, the server may determine file revision information. The server may access file related metadata data structure similar to data structure 1102 of
At step 1422, the server may determine a metadata revision number. The server may access a metadata data structure similar to data structures 1104 and 1106 of
At step 1426, the server may transmit the retrieved metadata and/or anchor positions associated with the metadata to the user.
The computing device 1500 comprises at least one communications interface unit 1508, an input/output controller 1510, system memory 1505, and one or more data storage devices 1515. The system memory includes at least one random access memory (RAM 1502) and at least one read-only memory (ROM 1504). All of these elements are in communication with a central processing unit (CPU 1506) to facilitate the operation of the computing device 1500. The computing device 1500 may be configured in many different ways. For example, the computing device 1500 may be a conventional standalone computer or alternatively, the functions of computing device 1500 may be distributed across multiple computer systems and architectures. In
The computing device 1500 may be configured in a distributed architecture, wherein databases and processors are housed in separate units or locations. Some units perform primary processing functions and contain at a minimum a general controller or a processor and a system memory. In distributed architecture implementations, each of these units may be attached via the communications interface unit 1508 to a communications hub or port (not shown) that serves as a primary communication link with other servers, client or user computers and other related devices. The communications hub or port may have minimal processing capability itself, serving primarily as a communications router. A variety of communications protocols may be part of the system, including, but not limited to: Ethernet, SAP, SAS™, ATP, BLUETOOTH™, GSM and TCP/IP.
The CPU 1506 comprises a processor, such as one or more conventional microprocessors and one or more supplementary co-processors such as math co-processors for offloading workload from the CPU 1506. The CPU 1506 is in communication with the communications interface unit 1508 and the input/output controller 1510, through which the CPU 1506 communicates with other devices such as other servers, user terminals, or devices. The communications interface unit 1508 and the input/output controller 1510 may include multiple communication channels for simultaneous communication with, for example, other processors, servers or client terminals.
The CPU 1506 is also in communication with the data storage device. The data storage device may comprise an appropriate combination of magnetic, optical or semiconductor memory, and may include, for example, RAM 1502, ROM 1504, and a flash drive, an optical disc such as a compact disc or a hard disk or drive. The CPU 1506 and the data storage device each may be, for example, located entirely within a single computer or other computing device; or connected to each other by a communication medium, such as a USB port, a serial port cable, a coaxial cable, an Ethernet cable, a telephone line, a radio frequency transceiver or other similar wireless or wired medium or combination of the foregoing. For example, the CPU 1506 may be connected to the data storage device via the communications interface unit 1508. The CPU 1506 may be configured to perform one or more particular processing functions.
The data storage device may store, for example, (i) an operating system 1512 for the computing device 1500; (ii) one or more applications 1514 (for example, computer program code or a computer program product) adapted to direct the CPU 1506 in accordance with the systems and methods described here, and particularly in accordance with the processes described in detail with regard to the CPU 1506; or (iii) database(s) 1516 adapted to store information that may be utilized to store information required by the program.
The operating system 1512 and applications 1514 may be stored, for example, in a compressed, an un-compiled and an encrypted format, and may include computer program code. The instructions of the program may be read into a main memory of the processor from a computer-readable medium other than the data storage device, such as from the ROM 1504 or from the RAM 1502. While execution of sequences of instructions in the program causes the CPU 1506 to perform the process steps described herein, hard-wired circuitry may be used in place of, or in combination with, software instructions for implementation of the processes of the present disclosure. Thus, the systems and methods described are not limited to any specific combination of hardware and software.
Suitable computer program code may be provided for performing one or more functions in relation to editing a sub-section of an electronic document via a notification message as described herein. The program also may include program elements such as an operating system 1512, a database management system and “device drivers” that allow the processor to interface with computer peripheral devices (for example, a video display, a keyboard, a computer mouse, etc.) via the input/output controller 1510.
The term “computer-readable medium” as used herein refers to any non-transitory medium that provides or participates in providing instructions to the processor of the computing device 1500 (or any other processor of a device described herein) for execution. Such a medium may take many forms, including but not limited to, non-volatile media and volatile media. Non-volatile media include, for example, optical, magnetic, or opto-magnetic disks, or integrated circuit memory, such as flash memory. Volatile media include dynamic random access memory (DRAM), which typically constitutes the main memory. Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM, DVD, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, an EPROM or EEPROM (electronically erasable programmable read-only memory), a FLASH-EEPROM, any other memory chip or cartridge, or any other non-transitory medium from which a computer can read.
Various forms of computer readable media may be involved in carrying one or more sequences of one or more instructions to the CPU 1506 (or any other processor of a device described herein) for execution. For example, the instructions may initially be borne on a magnetic disk of a remote computer (not shown). The remote computer can load the instructions into its dynamic memory and send the instructions over an Ethernet connection, a cable line, or even a telephone line using a modem. A communications device local to a computing device 1500 (for example, a server) can receive the data on the respective communications line and place the data on a system bus for the processor. The system bus carries the data to main memory, from which the processor retrieves and executes the instructions. The instructions received by main memory may optionally be stored in memory either before or after execution by the processor. In addition, instructions may be received via a communication port as electrical, electromagnetic or optical signals, which are exemplary forms of wireless communications or data streams that carry various types of information.
While various embodiments of the present disclosure have been shown and described herein, it will be obvious to those skilled in the art that such embodiments are provided by way of example only. Numerous variations, changes, and substitutions will now occur to those skilled in the art without departing from the disclosure. It should be understood that various alternatives to the embodiments of the disclosure described herein may be employed in practicing the disclosure. It is intended that the following claims define the scope of the disclosure and that methods and structures within the scope of these claims and their equivalents be covered thereby.
Number | Name | Date | Kind |
---|---|---|---|
7263688 | Pitzel et al. | Aug 2007 | B2 |
7680932 | Defaix et al. | Mar 2010 | B2 |
7689633 | Li et al. | Mar 2010 | B1 |
7707413 | Lunt et al. | Apr 2010 | B2 |
7711835 | Braddy et al. | May 2010 | B2 |
7734914 | Malasky | Jun 2010 | B1 |
7779113 | Samar | Aug 2010 | B1 |
7827201 | Gordon et al. | Nov 2010 | B1 |
7917888 | Chong et al. | Mar 2011 | B2 |
7941419 | Bhatkar et al. | May 2011 | B2 |
7996380 | Arrouye et al. | Aug 2011 | B2 |
8108427 | Prahlad et al. | Jan 2012 | B2 |
8131723 | Sim-Tang | Mar 2012 | B2 |
8151323 | Harris et al. | Apr 2012 | B2 |
8250455 | Kadowaki et al. | Aug 2012 | B2 |
8341708 | Eatough et al. | Dec 2012 | B1 |
8346781 | Cornelius | Jan 2013 | B1 |
8364759 | Moromisato et al. | Jan 2013 | B2 |
8386478 | Wang | Feb 2013 | B2 |
8468455 | Jorgensen et al. | Jun 2013 | B2 |
8478817 | Duggal | Jul 2013 | B2 |
8484259 | Makkar et al. | Jul 2013 | B1 |
8504689 | Ferris et al. | Aug 2013 | B2 |
8522137 | Brown et al. | Aug 2013 | B1 |
8572033 | Shukla | Oct 2013 | B2 |
8706800 | Ahmed et al. | Apr 2014 | B1 |
8812627 | Donahue et al. | Aug 2014 | B2 |
8856176 | Venu et al. | Oct 2014 | B1 |
20030033369 | Bernhard | Feb 2003 | A1 |
20030126592 | Mishra et al. | Jul 2003 | A1 |
20040059776 | Pitzel et al. | Mar 2004 | A1 |
20040205358 | Erickson | Oct 2004 | A1 |
20040243827 | Aguilera et al. | Dec 2004 | A1 |
20050243760 | Yoshioka | Nov 2005 | A1 |
20050289538 | Black-Ziegelbein et al. | Dec 2005 | A1 |
20060005168 | Singh | Jan 2006 | A1 |
20060070029 | Laborczfalvi et al. | Mar 2006 | A1 |
20060074837 | Braddy et al. | Apr 2006 | A1 |
20070106984 | Birk Olsen et al. | May 2007 | A1 |
20070192739 | Hunleth et al. | Aug 2007 | A1 |
20070240098 | Averett et al. | Oct 2007 | A1 |
20070254631 | Spooner | Nov 2007 | A1 |
20080033921 | Arrouye et al. | Feb 2008 | A1 |
20080162493 | Blohm et al. | Jul 2008 | A1 |
20080172720 | Botz et al. | Jul 2008 | A1 |
20080184157 | Selig | Jul 2008 | A1 |
20080189361 | Greschler et al. | Aug 2008 | A1 |
20090083707 | Fujita et al. | Mar 2009 | A1 |
20090210721 | Phillips | Aug 2009 | A1 |
20090235352 | Schrijen et al. | Sep 2009 | A1 |
20090249185 | Datar et al. | Oct 2009 | A1 |
20090254572 | Redlich et al. | Oct 2009 | A1 |
20090254580 | Laurion | Oct 2009 | A1 |
20090288135 | Chang et al. | Nov 2009 | A1 |
20100005529 | Hemade | Jan 2010 | A1 |
20100083173 | Germann et al. | Apr 2010 | A1 |
20100088234 | Moore et al. | Apr 2010 | A1 |
20100161762 | Saxena | Jun 2010 | A1 |
20100257578 | Shukla et al. | Oct 2010 | A1 |
20100274910 | Ghanaie-Sichanie et al. | Oct 2010 | A1 |
20100281528 | Hayton et al. | Nov 2010 | A1 |
20100325086 | Skinner et al. | Dec 2010 | A1 |
20100325199 | Park et al. | Dec 2010 | A1 |
20110066668 | Guarraci | Mar 2011 | A1 |
20110093507 | Pilip | Apr 2011 | A1 |
20110137979 | Seo et al. | Jun 2011 | A1 |
20110154290 | Kelly | Jun 2011 | A1 |
20110184993 | Chawla et al. | Jul 2011 | A1 |
20110202672 | Narayanaswamy et al. | Aug 2011 | A1 |
20110209045 | Ghosh et al. | Aug 2011 | A1 |
20110231912 | Lee et al. | Sep 2011 | A1 |
20110247074 | Manring et al. | Oct 2011 | A1 |
20110252038 | Schmidt et al. | Oct 2011 | A1 |
20110252071 | Cidon | Oct 2011 | A1 |
20110258535 | Adler, III et al. | Oct 2011 | A1 |
20120005159 | Wang et al. | Jan 2012 | A1 |
20120095878 | Feldman et al. | Apr 2012 | A1 |
20120099135 | Ono | Apr 2012 | A1 |
20120110646 | Ajitomi et al. | May 2012 | A1 |
20120117626 | Yates et al. | May 2012 | A1 |
20120136865 | Blom et al. | May 2012 | A1 |
20120144202 | Counterman | Jun 2012 | A1 |
20120144454 | Lee | Jun 2012 | A1 |
20120158668 | Tu et al. | Jun 2012 | A1 |
20120173612 | Vegesna-Venkata et al. | Jul 2012 | A1 |
20120179746 | Bolgert et al. | Jul 2012 | A1 |
20120192067 | DeLuca et al. | Jul 2012 | A1 |
20120254042 | Ludemann | Oct 2012 | A1 |
20120266229 | Simone et al. | Oct 2012 | A1 |
20130018904 | Mankala et al. | Jan 2013 | A1 |
20130036455 | Bodi et al. | Feb 2013 | A1 |
20130054356 | Richman et al. | Feb 2013 | A1 |
20130086670 | Vangpat et al. | Apr 2013 | A1 |
20130111336 | Dorman et al. | May 2013 | A1 |
20130124606 | Carpenter et al. | May 2013 | A1 |
20130144934 | Swett et al. | Jun 2013 | A1 |
20130150163 | Radek et al. | Jun 2013 | A1 |
20130282752 | Day-Richter et al. | Oct 2013 | A1 |
20130282755 | Procopio et al. | Oct 2013 | A1 |
20130304797 | Warren et al. | Nov 2013 | A1 |
20140074712 | Palmer et al. | Mar 2014 | A1 |
Number | Date | Country |
---|---|---|
20100137323 | Dec 2010 | KR |
20120010397 | Feb 2012 | KR |
10-2012-0065072 | Jun 2012 | KR |
10-2013-0007459 | Jan 2013 | KR |
WO 0135211 | May 2001 | WO |
WO 2010054374 | May 2010 | WO |
Entry |
---|
PCT/US2014/029756 International Search Report dated Jul. 28, 2014. |
Beresford et al., “MockDroid: Trading Privacy for Application Functionality on Smartphones,” HotMobile '11, Mar. 1-3, 2011, Phoenix, AZ, USA, pp. 49-54. |
Bibi et al., “A Platform for Delivering Multimedia Presentations on Cultural Heritage,” 2010 14th Panhellenic Conference on Informatics, pp. 175-179. |
Ellis et al., “Concurrency Control in Groupware Systems,” ACM 1989, pp. 399-407. |
Guo et al., “Building the PolarGrid Portal Using Web 2.0 and OpenSocial,” SC '09, Nov. 14-20, 2009, Portland, Oregon, USA; 8 pages. |
http://web.archive.org/web/20110629120453/https://developer.mozilla.org/en/Setting—up—extension—development—environment, Jun. 29, 2011, printed Jan. 9, 2015, 5 pages. |
http://web.archive.org/web/20111006093926/https://addons.mozilla.org/en-US/firefox/extensions/?sort=featured, Oct. 6, 2011, printed Oct. 26, 2014, 9 pages. |
http://web.archive.org/web/20111219132014/https://addons.mozilla.org/en-US/seamonkey, Dec. 19, 2011, printed Oct. 26, 2014, 5 pages. |
http://web.archive.org/web/20120512130530/https://developer.mozilla.org/en/Setting—up—extension—development—environment, May 12, 2012, 7 pages. |
http://web.archive.org/web/20120819143535/https://addons.mozilla.org/en-US/firefox/extensions/?sort=featured, Aug. 19, 2012, printed Dec. 13, 2013, 3 pages. |
http://web.archive.org/web/20121020134710/https://addons.mozilla.org/en-US/seamonkey/extensions, Oct. 20, 2012, printed Dec. 13, 2013, 3 pages. |
http://web.archive.org/web/20121021135356/http://support.mozilla.org/en-US/kb/find-and-install-add-ons-add-features-to-firefox, Oct. 21, 2012, printed Dec. 13, 2013, 3 pages. |
http://web.archive.org/web20111226173518/http://en.wikipedia.org/wiki/Add-on—(Mozilla), Dec. 26, 2011, printed Oct. 26, 2014, 5 pages. |
http://www-archive.mozilla.org/projects/webservices/, snapshot taken Apr. 21, 2008, printed Dec. 13, 2013, 4 pages. |
https://addons.mozilla.org/en-US/firefox/addon/extension-manager-extended/, printed Oct. 26, 2014, 2 pages. |
https://addons.mozilla.org/En-us/seamonkey/addon/gmail-smime/?src=search, printed Dec. 13, 2013, 2 pages. |
International Search Report and Written Opinion dated Jul. 30, 2014 for Application No. PCT/US2014/032167—, 11 pages. |
International Search Report and Written Opinion for PCT/US2013/037701 dated Jun. 26, 2013—, 10 pages. |
International Search Report and Written Opinion for PCT/US2013/037773 dated Aug. 21, 2013—, 13 pages. |
International Search Report and Written Opinion for PCT/US2013/047877 dated Oct. 31, 2013—, 9 pages. |
Mayer et al., “Third-Party Web Tracking: Policy and Technology,” Proceedings of the 2012 IEEE Symposium on Security and Privacy, pp. 413-427, May 20-23, 2012. |
Nauman et al., “Apex: Extending Android Permission Model and Enforcement with User-Defined Runtime Constraints,” ASIACCS '10, Apr. 13-16, 2010, Beijing, China, pp. 328-332. |
Nichols et al., “High-Latency, Low-Bandwidth Windowing in the Jupiter Collaboration System,” UIST '95. 8th Annual Symposium on User Interface Software and Technology. Proceedings of the ACM Symposium on User Interface Software and Technology, Nov. 14-17, 1995, pp. 111-120. |
The Oauth 2.0 Authorization Protocol; draft ietf-oauth-v2-24; Mar. 8, 2012, 44 pages. |
Zhou et al., “Taming Information-Stealing Smartphone Applications (on Android),” TRUST 2011, LNCS 6740, pp. 93-107, 2011. |
Zissis et al., “Addressing Cloud Computing Security Issues,” Future Generation Computer Systems 28 (2012) 583-592. |
Office Action dated Apr. 11, 2016 in U.S. Appl. No. 14/229,712, (12 pages). |
Number | Date | Country | |
---|---|---|---|
20140280384 A1 | Sep 2014 | US |