Patents by Inventor Jake Plains

Jake Plains has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180097811
    Abstract: A system and method for delegating permissions to a third party are presented. A request to access a first computing resource of a computer server is received from a first user. The first user is prompted to supply a first authentication credential for access to the first computing resource of the computer server and the first authentication credential is received from the first user. After the first authentication credential is received, a request to access a second computing resource of the computer server is received from the first user. An authentication database is accessed to identify a second user associated with the second computing resource, and a request for a second authentication credential is transmitted to a second user. The second authentication credential is received from the second user. When the second authentication credential is received from the second user, the first user is given access to the second computing resource.
    Type: Application
    Filed: November 17, 2017
    Publication date: April 5, 2018
    Inventors: Arnold Blinn, MIchael S. Bovich, Judd Conrad Jacobs, Jake Plains, Ian Schiffer, Lu Wang
  • Patent number: 9847998
    Abstract: A system and method for delegating permissions to a third party are presented. A request to access a first computing resource of a computer server is received from a first user. The first user is prompted to supply a first authentication credential for access to the first computing resource of the computer server and the first authentication credential is received from the first user. After the first authentication credential is received, a request to access a second computing resource of the computer server is received from the first user. An authentication database is accessed to identify a second user associated with the second computing resource, and a request for a second authentication credential is transmitted to a second user. The second authentication credential is received from the second user. When the second authentication credential is received from the second user, the first user is given access to the second computing resource.
    Type: Grant
    Filed: May 21, 2015
    Date of Patent: December 19, 2017
    Assignee: Go Daddy Operating Company, LLC
    Inventors: Arnold Blinn, Michael S. Bovich, Judd Conrad Jacobs, Jake Plains, Ian Schiffer, Lu Wang
  • Publication number: 20160343055
    Abstract: A system and method are presented. An electronic communication encoding a listing of products that are available for purchase is received. The electronic communication identifies a second user. The listing of products is stored in a database in association with a key and a user accounts database is accessed to determine whether the first user is a delegate of the second user. When the user accounts database contains a record indicating that the first user is a delegate of the second user, the key is encoded into a link in a second electronic communication configured for display on a client device, and the second electronic communication is transmitted to the second user identified in the first electronic communication. The second electronic communication identifies the first user.
    Type: Application
    Filed: May 21, 2015
    Publication date: November 24, 2016
    Inventors: Arnold Blinn, Michael S. Bovich, Judd Conrad Jacobs, Jake Plains, Ian Schiffer, Lu Wang
  • Publication number: 20160344735
    Abstract: A system and method for delegating permissions to a third party are presented. A request to access a first computing resource of a computer server is received from a first user. The first user is prompted to supply a first authentication credential for access to the first computing resource of the computer server and the first authentication credential is received from the first user. After the first authentication credential is received, a request to access a second computing resource of the computer server is received from the first user. An authentication database is accessed to identify a second user associated with the second computing resource, and a request for a second authentication credential is transmitted to a second user. The second authentication credential is received from the second user. When the second authentication credential is received from the second user, the first user is given access to the second computing resource.
    Type: Application
    Filed: May 21, 2015
    Publication date: November 24, 2016
    Inventors: Arnold Blinn, Michael S. Bovich, Judd Conrad Jacobs, Jake Plains, Ian Schiffer, Lu Wang