Patents by Inventor Alan Vangpat

Alan Vangpat has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180337913
    Abstract: Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that provide access to one or more resources. The login attempt is analyzed to determine a profile from a plurality of profiles corresponding to the login attempt. The one or more computing devices support the plurality profiles with each profile having a corresponding flow. The flow corresponding to the profile is performed prior to allowing continuation of the login attempt. The login attempt is continued, via the one or more computing devices, after the flow corresponding to the profile is completed. Access is granted to the one or more resources, via the one or more computing devices, in response to a successful completion of the login attempt.
    Type: Application
    Filed: July 9, 2018
    Publication date: November 22, 2018
    Inventors: William Charles Mortimore, JR., Sergio Isaac Koren, Paul Anthony Mason, Alan Vangpat
  • Patent number: 10021089
    Abstract: Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that provide access to one or more resources. The login attempt is analyzed to determine a profile from a plurality of profiles corresponding to the login attempt. The one or more computing devices support the plurality profiles with each profile having a corresponding flow. The flow corresponding to the profile is performed prior to allowing continuation of the login attempt. The login attempt is continued, via the one or more computing devices, after the flow corresponding to the profile is completed. Access is granted to the one or more resources, via the one or more computing devices, in response to a successful completion of the login attempt.
    Type: Grant
    Filed: April 9, 2015
    Date of Patent: July 10, 2018
    Assignee: salesforce.com, inc.
    Inventors: William Charles Mortimore, Jr., Sergio Isaac Koren, Paul Anthony Mason, Alan Vangpat
  • Publication number: 20160301679
    Abstract: Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that provide access to one or more resources. The login attempt is analyzed to determine a profile from a plurality of profiles corresponding to the login attempt. The one or more computing devices support the plurality profiles with each profile having a corresponding flow. The flow corresponding to the profile is performed prior to allowing continuation of the login attempt. The login attempt is continued, via the one or more computing devices, after the flow corresponding to the profile is completed. Access is granted to the one or more resources, via the one or more computing devices, in response to a successful completion of the login attempt.
    Type: Application
    Filed: April 9, 2015
    Publication date: October 13, 2016
    Inventors: William Charles Mortimore, JR., Sergio Isaac Koren, Paul Anthony Mason, Alan Vangpat
  • Patent number: 8850219
    Abstract: Systems and methods are described for communicating between a client machine and a server. A security token message may be transmitted from the server to the client machine. The security token message may include a first security token. The first security token may include a communication interaction identifier that identifies a communication interaction between the client machine and the server and an action request identifier that identifies an action request message capable of being sent from the client machine to the server to request that an action be performed on the server. An action request message including a second security token and transmitted in association with the communication interaction may be received at the server. When it is determined that the first security token matches the second security token, the requested action may be performed.
    Type: Grant
    Filed: January 12, 2011
    Date of Patent: September 30, 2014
    Assignee: salesforce.com, inc.
    Inventors: Peter Dapkus, Alan Vangpat, Nikita Prokopev, Forrest Junod
  • Patent number: 8844013
    Abstract: A method for logging a user into an online host system begins by receiving a login request from a web browser application of a client device, wherein the login request identifies the online host system. The method continues by initiating a single sign-on routine that involves an online third party system and by obtaining third party user data from the online third party system, wherein the obtained third party user data is associated with the user and is maintained by the online third party system. Host system records maintained by the online host system are modified in accordance with the obtained third party user data. Thereafter, the user is automatically logged into the online host system.
    Type: Grant
    Filed: October 2, 2012
    Date of Patent: September 23, 2014
    Assignee: salesforce.com, inc.
    Inventors: Alan Vangpat, Prathima Rao, Charles Mortimore
  • Publication number: 20140013387
    Abstract: Various techniques and procedures related to user authentication, identity providers, and single sign-on (SSO) are presented here. One approach creates an SSO link between two organizations in a streamlined manner using an internal cross-user systemwide digital certificate, and without processing any user-created, user-uploaded, or user-assigned digital certificates. Another approach presented here configures an identity provider service for an entity or organization by processing a single user command. The identity provider service is automatically configured in the background without processing any additional user commands, user instructions, or user-entered data.
    Type: Application
    Filed: September 11, 2013
    Publication date: January 9, 2014
    Applicant: salesforce.com, inc.
    Inventors: Alan Vangpat, Harsimranjit Chabbewal
  • Patent number: 8566917
    Abstract: Various techniques and procedures related to user authentication, identity providers, and single sign-on (SSO) are presented here. One approach creates an SSO link between two organizations in a streamlined manner using an internal cross-user systemwide digital certificate, and without processing any user-created, user-uploaded, or user-assigned digital certificates. Another approach presented here configures an identity provider service for an entity or organization by processing a single user command. The identity provider service is automatically configured in the background without processing any additional user commands, user instructions, or user-entered data.
    Type: Grant
    Filed: December 28, 2010
    Date of Patent: October 22, 2013
    Assignee: salesforce.com, inc.
    Inventors: Alan Vangpat, Harsimranjit Chabbewal
  • Patent number: 8533786
    Abstract: A method and apparatus for protecting against attacks from outside content is described. In one example, a request is received from a user to access content from a second domain. An active session for the user with the second domain is searched for. If no active session is found, then an active session with a related first domain is searched for. If an active session is found with the first domain, then a session is established with the second domain based on the active session with the first domain. The requested content is then provided to the user based on the established session with the second domain.
    Type: Grant
    Filed: April 19, 2011
    Date of Patent: September 10, 2013
    Assignee: salesforce.com, inc.
    Inventors: Harsimranjit Singh Chabbewal, Alan Vangpat, William Charles Mortimore, Jr.
  • Publication number: 20120331536
    Abstract: A method executable by a server system confirms the identity of a user of a client device. The method receives an activation request from the client device and maintains information corresponding to a destination resource requested by the client device. In response to receiving the activation request, the server system sends a code to a registered device of the user. After sending the code, the server system receives a verification request from the client device. The verification request includes a user-entered representation of the code. In response to receiving the verification request the client device is activated as a new registered device for the user, and the server system seamlessly provides the destination resource to the client device using the maintained information.
    Type: Application
    Filed: October 24, 2011
    Publication date: December 27, 2012
    Applicant: SALESFORCE.COM, INC.
    Inventors: Harsimranjit Chabbewal, William Charles Mortimore, JR., Alan Vangpat
  • Publication number: 20120272292
    Abstract: A method and apparatus for protecting against attacks from outside content is described. In one example, a request is received from a user to access content from a second domain. An active session for the user with the second domain is searched for. If no active session is found, then an active session with a related first domain is searched for. If an active session is found with the first domain, then a session is established with the second domain based on the active session with the first domain. The requested content is then provided to the user based on the established session with the second domain.
    Type: Application
    Filed: April 19, 2011
    Publication date: October 25, 2012
    Applicant: salesforce.com, inc.
    Inventors: Harsimranjit Singh Chabbewal, Alan Vangpat, William Charles Mortimore, JR.
  • Publication number: 20120144501
    Abstract: Various techniques and procedures related to client authorization and the management of protected data resources are presented here. One approach employs a computer-implemented method of regulating access to protected data resources. In accordance with this approach, a client sends a first access token to a server, the first access token having first data access attributes associated therewith. In response to receiving the first access token, the server sends a second access token to the client module, the second access token having second data access attributes associated therewith. The second data access attributes represent expanded or additional data access capabilities granted to the client. The client may then access protected data resources using the second data access token.
    Type: Application
    Filed: April 18, 2011
    Publication date: June 7, 2012
    Applicant: SALESFORCE.COM, INC.
    Inventors: Alan Vangpat, William Charles Mortimore, JR.
  • Publication number: 20110283110
    Abstract: Systems and methods are described for communicating between a client machine and a server. A security token message may be transmitted from the server to the client machine. The security token message may include a first security token. The first security token may include a communication interaction identifier that identifies a communication interaction between the client machine and the server and an action request identifier that identifies an action request message capable of being sent from the client machine to the server to request that an action be performed on the server. An action request message including a second security token and transmitted in association with the communication interaction may be received at the server. When it is determined that the first security token matches the second security token, the requested action may be performed.
    Type: Application
    Filed: January 12, 2011
    Publication date: November 17, 2011
    Applicant: SALESFORCE.COM, INC.
    Inventors: Peter Dapkus, Alan Vangpat, Nikita Prokopev, Forrest Junod
  • Publication number: 20110231919
    Abstract: Various techniques and procedures related to user authentication, identity providers, and single sign-on (SSO) are presented here. One approach creates an SSO link between two organizations in a streamlined manner using an internal cross-user systemwide digital certificate, and without processing any user-created, user-uploaded, or user-assigned digital certificates. Another approach presented here configures an identity provider service for an entity or organization by processing a single user command. The identity provider service is automatically configured in the background without processing any additional user commands, user instructions, or user-entered data.
    Type: Application
    Filed: December 28, 2010
    Publication date: September 22, 2011
    Applicant: SALESFORCE.COM, INC.
    Inventors: Alan Vangpat, Harsimranjit Chabbewal