Systems and methods generate an account recovery key for a protected system. The account recovery key may comprise a plurality of words that may be supplied to regain access to an account on a protected system if the account has been lost due to the actions of a malicious user or if the password to the account has been forgotten by the user.
Facilitating Client-Side Data-Management For Web-Based Applications
Duane S. Hess - Palo Alto CA, US Michael H. Tsao - San Mateo CA, US Christopher M. Prince - San Francisco CA, US Andrew J. Palay - Mountain View CA, US
Assignee:
Google Inc. - Mountain View CA
International Classification:
G06F 7/00 G06F 17/00 G06F 17/30
US Classification:
707706, 707712, 707769, 707802
Abstract:
A database engine embedded within a browser implements a system that facilitates managing client-side data for web-based applications. During operation, the system receives a Uniform Resource Locator (URL) at the browser. The system then retrieves a web-page associated with the URL. Next, the system executes a script associated with the web-page. While executing this script, the system receives a request to open a database. In response to this request, the system uses the database engine to open a database associated with the web-page, wherein the database engine is embedded in the browser. The system then uses the database engine to execute database commands.
Method And Apparatus For Fulfilling Browser Requests From A Local Cache
Michael M. Nordman - Mountain View CA, US Michael H. Tsao - San Mateo CA, US Christopher M. Prince - San Francisco CA, US Andrew J. Palay - Mountain View CA, US
Assignee:
Google Inc. - Mountain View CA
International Classification:
G06F 15/16
US Classification:
709218
Abstract:
One embodiment of the present invention provides a system that facilitates intercepting browser communication protocol requests at a client. In addition, the system optionally fulfills the requests with content which is locally cached on the client rather than with content from a web server, which is located externally from the client. During operation, the system receives a communication protocol request at a browser's communication protocol stack. In response to the request, the system identifies a Uniform Resource Locator (URL) for the request. The system also determines if an item of content identified by the URL can be retrieved from a local cache. If so, the system fulfills the request from the local cache.
Paul Buchheit - Mountain View CA, US Yingwei Cui - Cupertino CA, US Jing Lim - Santa Clara CA, US Narayanan Shivakumar - San Jose CA, US Michael Tsao - San Mateo CA, US Russ Tuck - San Jose CA, US
International Classification:
G06F017/60
US Classification:
705014000
Abstract:
An asynchronous and opportunistically available scheme under which a user's e-mail (or a document including e-mail content) is rendered immediately, and later updated with appropriate advertisements if and when they became available, is described. This scheme ensures that the availability of advertisements will not adversely affect the rendering of the e-mail content. For example, a Web-based e-mail server may facilitate the serving of advertisements with e-mail by (a) accepting a request for a document including e-mail, (b) generating a request identifier, (c) serving the requested document in association with the request identifier, and (d) obtaining at least one ad relevant to content of the e-mail. The Web-based e-mail server may further (e) store the obtained ad(s), (f) accept an ad request, (g) read the stored ad(s) using information from the ad request, and (h) serve the ad(s).
Method, System, And Computer Program Product For Improved Synchronization Efficiency For Mobile Devices, Including Database Hashing And Caching Of Web Access Errors
Antony Sargent - Menlo Park CA, US Duane Hess - Cupertino CA, US Ramandeep Sethi - Fremont CA, US Michael Tsao - San Mateo CA, US
International Classification:
G06F 15/16
US Classification:
709219000
Abstract:
Methods, systems, apparatuses, and computer program products for improving efficiency in transfer of content to mobile devices are provided. In a first aspect, hashing is used in a synchronization server to determine whether objects have changed, and therefore need to be updated on the mobile device and/or on the mobile device server. For example, databases are hashed on a record-by-record basis. Records determined to be changed are transmitted to the mobile device and/or updated on the synchronization server. In another embodiment, errors occurring during attempts to obtain unavailable web content are cached (i.e., “negative caching”). The cached errors are accessed during subsequent attempts to obtain the unavailable web content to avoid spending time on the subsequent attempts.