John's Patents

Methods and systems for associating a team with a meeting

Abstract

A method for associating a team with a meeting for prospective meeting includes receiving a meeting invitation comprising first information, wherein the first information comprises data identifying the prospective meeting attendees, receiving second information for a plurality of teams, wherein the second information comprises data identifying members for each one of the plurality of teams, comparing the first information with the second information to determine a match metric for each one of the plurality of teams, and determining a matching team from the plurality of teams for which the match metric is above a match threshold value. The method further includes, in response to determining that the match metric is below the match threshold value computed for each one of the plurality of teams, creating a new team, and associating one of the matching team or the new team with the meeting for prospective meeting attendees.

Collaborative communications environment and automatic account creation thereof

Abstract

A method includes receiving a signal associated with an electronic meeting invitation for users to attend the electronic meeting. The users include members of an organization and at least one nonmember of the organization. Responsive to receiving the signal, an online collaborative team is automatically created within an online chat environment. The team members of the online collaborative team include the members and the at least one nonmember. In some embodiments, an online collaborative team account is automatically created for the at least one nonmember responsive to determining that the at least one nonmember has no online collaborative team account.

Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys

Abstract

A key management system includes secured data stored on a first system secured by a control key stored securely on a key server. The secured data is secured against attacks such as unauthorized use, modification or access, where authorization to access the secured data is determined by knowledge of an access private key of an access key pair. When an authorized user is to access the secured data, the first system generates a request to the key server, signed with the access private key, wherein the request is for a decryption control key and the request includes a one-time public key of a key pair generated by the first system for the request. The first system can decrypt the decryption control key from the response, using a one-time private key. The first system can then decrypt the secured data with the decryption control key remaining secured in transport.