Patents by Inventor William Charles Mortimore, Jr.
William Charles Mortimore, Jr. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10552849Abstract: Data to define a travel rewards promotion is received over a network. The travel rewards promotion comprises traveler eligibility criteria and travel rewards criteria. At least one traveler is selected where the travel itinerary of the respective traveler matches traveler eligibility criteria for the promotion. The traveler is notified that he or she is eligible for the travel rewards promotion, the notification comprising a representation of the travel rewards criteria. A travel rewards promotion total is then compiled for the traveler and the traveler is notified of his or her respective promotion rewards total. In one embodiment, the traveler's current context is determined and matched to promotion alert criteria. The traveler is then alerted, over the network, that a travel rewards promotion is available to the respective traveler in the respective traveler's current context, the alert comprising a representation of the travel rewards criteria.Type: GrantFiled: April 30, 2010Date of Patent: February 4, 2020Assignee: Deem, Inc.Inventors: William Charles Mortimore, Jr., Gautam Aggarwal
-
Patent number: 10536463Abstract: Controlling access to sensitive data can be difficult during an application development effort. A developer may not be authorized to see the data that is to be used by the application. Credentials used in a development environment to access development data can require modification when the application is migrated to a deployed environment. Changing the code in the deployed environment increases risks of change induced incidents. The technology disclosed allows for the creation of a named credential object, where the credentials for different environments are stored, and where the named credential object is called by metadata. This allows the promotion of code from a development environment to a deployed environment without changes to code, and without giving access to sensitive data to the developer.Type: GrantFiled: April 17, 2019Date of Patent: January 14, 2020Assignee: salesforce.com, inc.Inventors: Alexey Syomichev, Lawrence Eugenio McAlpin, William Charles Mortimore, Jr.
-
Publication number: 20190372766Abstract: Disclosed are some implementations of systems, apparatus, methods and computer program products for facilitating the authentication of computing system requests across tenants of at least one multi-tenant database system. Authentication is facilitated using a central registry that is accessible by and independent from the tenants of the multi-tenant database system.Type: ApplicationFiled: May 30, 2018Publication date: December 5, 2019Inventors: Matthew Bahrenburg, Alan Vangpat, Anupam Jain, William Charles Mortimore, JR., Srinath Krishna Ananthakrishnan, Peter S. Wisnovsky
-
Publication number: 20190312871Abstract: Controlling access to sensitive data can be difficult during an application development effort. A developer may not be authorized to see the data that is to be used by the application. Credentials used in a development environment to access development data can require modification when the application is migrated to a deployed environment. Changing the code in the deployed environment increases risks of change induced incidents. The technology disclosed allows for the creation of a named credential object, where the credentials for different environments are stored, and where the named credential object is called by metadata. This allows the promotion of code from a development environment to a deployed environment without changes to code, and without giving access to sensitive data to the developer.Type: ApplicationFiled: April 17, 2019Publication date: October 10, 2019Applicant: Salesforce.com, Inc.Inventors: Alexey SYOMICHEV, Lawrence Eugenio McALPIN, William Charles MORTIMORE, JR.
-
Patent number: 10298582Abstract: Controlling access to sensitive data can be difficult during an application development effort. A developer may not be authorized to see the data that is to be used by the application. Credentials used in a development environment to access development data can require modification when the application is migrated to a deployed environment. Changing the code in the deployed environment increases risks of change induced incidents. The technology disclosed allows for the creation of a named credential object, where the credentials for different environments are stored, and where the named credential object is called by metadata. This allows the promotion of code from a development environment to a deployed environment without changes to code, and without giving access to sensitive data to the developer.Type: GrantFiled: May 18, 2016Date of Patent: May 21, 2019Assignee: salesforce.com, inc.Inventors: Alexey Syomichev, Lawrence Eugenio McAlpin, William Charles Mortimore, Jr.
-
Publication number: 20180359233Abstract: Techniques are disclosed relating to contextual authentication across different applications based on user communications. In some embodiments, a user is preauthenticated to certain actions on a second application based on the user's communication via a first application. The user's communication via a first application provides contextual information that may be used to preauthenticate a request to perform an action on the second application. Contextual information may include the user's communication itself and/or communications characteristics that are determined from the user's communications.Type: ApplicationFiled: June 13, 2017Publication date: December 13, 2018Inventors: Josh Alexander, Seth Holloway, Evan Tyler Grim, Ian Glazer, William Charles Mortimore, JR.
-
Publication number: 20180337913Abstract: Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that provide access to one or more resources. The login attempt is analyzed to determine a profile from a plurality of profiles corresponding to the login attempt. The one or more computing devices support the plurality profiles with each profile having a corresponding flow. The flow corresponding to the profile is performed prior to allowing continuation of the login attempt. The login attempt is continued, via the one or more computing devices, after the flow corresponding to the profile is completed. Access is granted to the one or more resources, via the one or more computing devices, in response to a successful completion of the login attempt.Type: ApplicationFiled: July 9, 2018Publication date: November 22, 2018Inventors: William Charles Mortimore, JR., Sergio Isaac Koren, Paul Anthony Mason, Alan Vangpat
-
Patent number: 10021089Abstract: Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that provide access to one or more resources. The login attempt is analyzed to determine a profile from a plurality of profiles corresponding to the login attempt. The one or more computing devices support the plurality profiles with each profile having a corresponding flow. The flow corresponding to the profile is performed prior to allowing continuation of the login attempt. The login attempt is continued, via the one or more computing devices, after the flow corresponding to the profile is completed. Access is granted to the one or more resources, via the one or more computing devices, in response to a successful completion of the login attempt.Type: GrantFiled: April 9, 2015Date of Patent: July 10, 2018Assignee: salesforce.com, inc.Inventors: William Charles Mortimore, Jr., Sergio Isaac Koren, Paul Anthony Mason, Alan Vangpat
-
Publication number: 20170339148Abstract: Controlling access to sensitive data can be difficult during an application development effort. A developer may not be authorized to see the data that is to be used by the application. Credentials used in a development environment to access development data can require modification when the application is migrated to a deployed environment. Changing the code in the deployed environment increases risks of change induced incidents. The technology disclosed allows for the creation of a named credential object, where the credentials for different environments are stored, and where the named credential object is called by metadata. This allows the promotion of code from a development environment to a deployed environment without changes to code, and without giving access to sensitive data to the developer.Type: ApplicationFiled: May 18, 2016Publication date: November 23, 2017Applicant: salesforce.com, inc.Inventors: Alexey Syomichev, Lawrence Eugenio McAlpin, William Charles Mortimore, JR.
-
Patent number: 9647922Abstract: Disclosed are methods, apparatus, systems, and computer readable storage media for trials onboarding. A server may receive a request to generate a trial instance of an organization providing data and functionality for a period of time. Data on the request may also be stored. The trial instance may be selected from a template based on an access channel corresponding to the request.Type: GrantFiled: May 15, 2014Date of Patent: May 9, 2017Assignee: salesforce, inc.Inventors: William Charles Mortimore, Jr., George John Murnock, Jr., Reid A. Elliott, Ture Hoefner, Robert Michael Fitzpatrick, Dileep Burki, Doug Bitting, Erik Jeffrey Nierenberg, Akhilesh Gupta
-
Publication number: 20160301679Abstract: Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that provide access to one or more resources. The login attempt is analyzed to determine a profile from a plurality of profiles corresponding to the login attempt. The one or more computing devices support the plurality profiles with each profile having a corresponding flow. The flow corresponding to the profile is performed prior to allowing continuation of the login attempt. The login attempt is continued, via the one or more computing devices, after the flow corresponding to the profile is completed. Access is granted to the one or more resources, via the one or more computing devices, in response to a successful completion of the login attempt.Type: ApplicationFiled: April 9, 2015Publication date: October 13, 2016Inventors: William Charles Mortimore, JR., Sergio Isaac Koren, Paul Anthony Mason, Alan Vangpat
-
Publication number: 20160072839Abstract: In accordance with embodiments, there are provided mechanisms and methods for facilitating dynamic management of devices participating in a network in an on-demand services environment in an on-demand services environment in a multi-tenant environment according to one embodiment. In one embodiment and by way of example, a method includes receiving, by and incorporating into a database system, a policy document relating to a first computing device over a network, the network including Internet of Things (“IoT”), verifying, by the database, the first computing device based on contents of the policy document, and authorizing, by the database, the first computing device to participate within the network, where participating includes performing one or more tasks within the network on behalf of a user and in accordance with the policy document.Type: ApplicationFiled: September 5, 2014Publication date: March 10, 2016Inventor: William Charles Mortimore, JR.
-
Publication number: 20140344435Abstract: Disclosed are methods, apparatus, systems, and computer readable storage media for trials onboarding. A server may receive a request to generate a trial instance of an organization providing data and functionality for a period of time. Data on the request may also be stored. The trial instance may be selected from a template based on an access channel corresponding to the request.Type: ApplicationFiled: May 15, 2014Publication date: November 20, 2014Inventors: William Charles Mortimore, JR., George John Murnock, JR., Reid A. Elliott, Ture Hoefner, Robert Michael Fitzpatrick, Dileep Burki, Doug Bitting, Erik Jeffrey Nierenberg, Akhilesh Gupta
-
Publication number: 20140019880Abstract: Disclosed are methods, apparatus, systems, and computer-readable storage media for maintaining communities and providing access to communities of users in an online social network. In some implementations, an internal user of an organization is provided access to a community switcher user interface component in a user interface for switching between an external community and an internal community established at a domain associated with an organization. The external community is established at an external community root domain. A community switcher user interface component can be requested and displayed at a computing device. The community switcher user interface component includes a link to the internal community and a link to the external community.Type: ApplicationFiled: March 14, 2013Publication date: January 16, 2014Applicant: salesforce.com, inc.Inventors: John Kucera, Aditya Kuruganti, William Charles Mortimore, JR.
-
Patent number: 8533786Abstract: A method and apparatus for protecting against attacks from outside content is described. In one example, a request is received from a user to access content from a second domain. An active session for the user with the second domain is searched for. If no active session is found, then an active session with a related first domain is searched for. If an active session is found with the first domain, then a session is established with the second domain based on the active session with the first domain. The requested content is then provided to the user based on the established session with the second domain.Type: GrantFiled: April 19, 2011Date of Patent: September 10, 2013Assignee: salesforce.com, inc.Inventors: Harsimranjit Singh Chabbewal, Alan Vangpat, William Charles Mortimore, Jr.
-
Publication number: 20120331536Abstract: A method executable by a server system confirms the identity of a user of a client device. The method receives an activation request from the client device and maintains information corresponding to a destination resource requested by the client device. In response to receiving the activation request, the server system sends a code to a registered device of the user. After sending the code, the server system receives a verification request from the client device. The verification request includes a user-entered representation of the code. In response to receiving the verification request the client device is activated as a new registered device for the user, and the server system seamlessly provides the destination resource to the client device using the maintained information.Type: ApplicationFiled: October 24, 2011Publication date: December 27, 2012Applicant: SALESFORCE.COM, INC.Inventors: Harsimranjit Chabbewal, William Charles Mortimore, JR., Alan Vangpat
-
Publication number: 20120272292Abstract: A method and apparatus for protecting against attacks from outside content is described. In one example, a request is received from a user to access content from a second domain. An active session for the user with the second domain is searched for. If no active session is found, then an active session with a related first domain is searched for. If an active session is found with the first domain, then a session is established with the second domain based on the active session with the first domain. The requested content is then provided to the user based on the established session with the second domain.Type: ApplicationFiled: April 19, 2011Publication date: October 25, 2012Applicant: salesforce.com, inc.Inventors: Harsimranjit Singh Chabbewal, Alan Vangpat, William Charles Mortimore, JR.
-
Publication number: 20120144501Abstract: Various techniques and procedures related to client authorization and the management of protected data resources are presented here. One approach employs a computer-implemented method of regulating access to protected data resources. In accordance with this approach, a client sends a first access token to a server, the first access token having first data access attributes associated therewith. In response to receiving the first access token, the server sends a second access token to the client module, the second access token having second data access attributes associated therewith. The second data access attributes represent expanded or additional data access capabilities granted to the client. The client may then access protected data resources using the second data access token.Type: ApplicationFiled: April 18, 2011Publication date: June 7, 2012Applicant: SALESFORCE.COM, INC.Inventors: Alan Vangpat, William Charles Mortimore, JR.
-
Patent number: 8095402Abstract: A method for transferring a service policy between domains, is described. In one embodiment, the method is to be implemented on a system.Type: GrantFiled: July 10, 2006Date of Patent: January 10, 2012Assignee: Rearden Commerce, Inc.Inventors: Mark Orttung, Matthew Mihic, William Charles Mortimore, Jr., Sean Handel
-
Patent number: 8073719Abstract: A method for core identity with personas across multiple domains with permissions on profile data based on rights of domain, is described. In one embodiment, the method is to be implemented on a system.Type: GrantFiled: June 30, 2006Date of Patent: December 6, 2011Assignee: Rearden Commerce, Inc.Inventors: Mark Orttung, Matthew Mihic, William Charles Mortimore, Jr., Sean Handel