EP3230855A1 - Method for late binding identity to account - Google Patents

Method for late binding identity to account

Info

Publication number
EP3230855A1
EP3230855A1 EP15867799.7A EP15867799A EP3230855A1 EP 3230855 A1 EP3230855 A1 EP 3230855A1 EP 15867799 A EP15867799 A EP 15867799A EP 3230855 A1 EP3230855 A1 EP 3230855A1
Authority
EP
European Patent Office
Prior art keywords
user
information
workspace
user account
projected workspace
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP15867799.7A
Other languages
German (de)
French (fr)
Other versions
EP3230855A4 (en
Inventor
Waitung CHEUNG
Chunhsiao LIN
Hocheung CHEUNG
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Able World International Ltd
Original Assignee
Able World International Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/577,772 external-priority patent/US9626157B2/en
Application filed by Able World International Ltd filed Critical Able World International Ltd
Publication of EP3230855A1 publication Critical patent/EP3230855A1/en
Publication of EP3230855A4 publication Critical patent/EP3230855A4/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0277Online advertisement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Definitions

  • the present invention relates to a method for late binding identity to account.
  • a network service platform is designed for allowing people to build new contact information or share information through the internet.
  • many network service platforms that provide services and application programs have been very well developed.
  • most of the network service platforms such as shopping network platforms (e.g., eBay) or social networking sites (e.g., Facebook, Twitter, Plurk, Google+, etc. ) request the user to firstly complete the registration process before logging into the network service platforms. After the registration process is completed and the user logins into the network service platforms, the user can acquire or enjoy the services and functions that are provided by the network service platforms.
  • a user In most existing network service platforms (e.g., Google, Opera, Facebook, etc. ) , a user is able to access a network service platform after the user is registered with a user account. On the other hand, if the user is not registered or authorized, the user cannot view the contents or use the provided services. In some network service platforms, the user is forced to press “like” or give authority to provide personal information in order to use a particular program or read a particular article. However, the user possibly does not know or trust the network service platforms. For example, the user wishes to share a mind test game link on Facebook with friends. If the friends are interested in playing the mind test game, the friends of the user have to press “like” of that game on Facebook and give authority to provide their personal information to the program of the mind test game. Furthermore, the user in a specified network service platform (e.g., Facebook) is not authorized to activate a specific function to a friend in a different network service platform (e.g., Twitter) .
  • a specified network service platform e.
  • the present invention provides a method for late binding identity to account.
  • most of the network service platforms request the user to firstly complete the registration process before logging into the network service platforms.
  • a concept of the present invention is to support a user to start using the network service platform with a user account, which is automatically generated from the network service platform without identity registration. Consequently, the user can access the services or functions of the network service platform without the previous registration, the user can share services (e.g., contents) or functions of the network service platform to the users in different network service platforms.
  • a method for late binding identity to account includes the following steps. Firstly, a projectable space instance for modeling a workspace is provided to a system, wherein an information importer, an information and/or a tool is configured in the projectable space instance. Then, the workspace is projected to a machine, and a user account is provided for allowing a user to access the projected workspace. The user account is automatically generated by the system under a condition that the user does not provide an authorized identity to login into the projected workspace.
  • the user accesses the projected workspace to drive the information importer, the information and/or the tool
  • the user is requested to provide an authorized identity and binding the authorized identity to the user account so as to activate an access right for the information importer, the information and/or the tool.
  • the user is allowed to login into the projected workspace from the machine or an additional machine according to the authorized identity bound to the user account.
  • the system includes a server, and the projectable space instance is provided to the server.
  • the user account is automatically generated by the server under the condition that the user does not provide an authorized identity to login into the projected workspace.
  • the information and/or the tool is imported into the projected workspace through the information importer.
  • the information is a unified information unit after an original information acquired from an information source is unified, and/or the tool is a unified tool after an original tool acquired from an information source is unified.
  • the original information is modeled into the unified information unit with a unified data model, and/or the original tool is modeled into the unified tool with another unified data model.
  • the information source is a network service platform.
  • the method further includes a step of binding the user account to a machine code of the machine so as to lock the user account on the machine.
  • the machine is identified according to the machine code.
  • the method further includes a step of allowing the projected workspace to record a historical usage of the user.
  • the historical usage is recorded in a storage medium that is accessible by the projected workspace.
  • the storage medium is a browser cookie, a browser cache or a file.
  • the historical usage contains a browsing history, an executed operation log and/or any form of information for reasonably analyzing a preference of the user.
  • the projected workspace tracks the historical usage of the user according to the user account.
  • the projected workspace after the projected workspace tracks and analyzes the historical usage of the user, the projected workspace provides a service and/or a content to the user.
  • the method further includes a step of providing a label to label the automatically-generated user account under a condition that the user expects to create a role with a designated name and to access the projected workspace on the machine under the designated name without giving authorized identity.
  • a content of the label is a true name or a fake name that is provided by the user so as to label the user account.
  • the user is allowed to provide plural authorized identities to bind to the user account, and any of the plural authorized identities is identifiable by the projected workspace.
  • the projected workspace tracks the user account.
  • the user account is automatically generated by the system when the user accesses the projected workspace at a first time.
  • the method further includes a step of allowing the system to automatically generating an additional user account to an additional user and binding a known identity of the additional user to the additional user account.
  • the additional user account is generated when the user accessing the projected workspace shares the projected workspace to the additional user or invites the additional user to access the projected workspace.
  • the projectable space instance is an object, an extensible markup language document, or an instance which is instantiated with a structured language or a structured protocol.
  • a computer program product for late binding identity to account.
  • the computer program product includes a program code. While the computer program product is executed in a computer, the program code performs the following steps. Firstly, a projectable space instance for modeling a workspace is provided to a system, wherein an information importer, an information and/or a tool is configured in the projectable space instance. Then, the workspace is projected to a machine, and a user account is provided for allowing a user to access the projected workspace. The user account is automatically generated by the system under a condition that the user does not provide an authorized identity to login into the projected workspace.
  • the user accesses the projected workspace to drive the information importer, the information and/or the tool
  • the user is requested to provide an authorized identity and binding the authorized identity to the user account so as to activate an access right for the information importer, the information and/or the tool.
  • the user is allowed to login into the projected workspace from the machine or an additional machine according to the authorized identity bound to the user account.
  • FIG. 1 is a schematic diagram illustrating an implementation concept of a unifying method according to an embodiment
  • FIG. 2 is a schematic diagram illustrating an implementation concept of using the unified script as an intermediate language for implementing the personal workspace
  • FIG. 3 is a schematic diagram illustrating a preferred configuration of a personal workspace
  • FIG. 4 is a schematic diagram illustrating an initial state of the method of projecting the workspace according to an embodiment of the present invention
  • FIGS. 5A and 5B are schematic diagrams illustrating operating concepts of the method of projecting the workspace as shown in FIG. 4;
  • FIG. 6 is a schematic diagram illustrating the relationship between a projectable space instance as shown in FIG. 4 and a projected workspace as shown in FIG. 5B;
  • FIG. 7 is a flowchart illustrating a method for late binding identity to account according to an embodiment of the present invention.
  • FIG. 8 schematically illustrates an implementation concept of a mechanism using the method of FIG. 7;
  • FIG. 9 schematically illustrates an implementation concept of the method of FIG. 7 and the mechanism of FIG. 8 when a user accesses the projected workspace at a first time
  • FIG. 10 schematically illustrates an implementation concept of the method of FIG. 7 and the mechanism of FIG. 8 when a user accesses the projected workspace at a next time;
  • FIG. 11 schematically illustrates an implementation concept of providing a label to label the automatically-generated user account according to an embodiment of the present invention
  • FIG. 12 schematically illustrates an implementation concept of mutually binding an authorized identity between the user account and an additional network service platform by the method of FIG. 7 and the mechanism of FIG. 8;
  • FIG. 13 schematically illustrates an implementation concept of binding an identity of Facebook to the user account corresponding to the projected workspace
  • FIG. 14 is a flowchart illustrating a method for automatically generating a user account for a receiver while sharing content to the receiver.
  • FIG. 15 is a schematic block diagram illustrating a computer program product using the method of FIG. 7.
  • the term “information source” used herein is defined as a sequence of symbols that can be interpreted as a message in the most limited technical meaning. And the message is used for organizing and labeling information.
  • the information source includes website (such as internet service) , intranet, social network, software, electronic book, database and other media of information (such as storage media of non-transitory computer or storage media of mobile device) .
  • original information used herein is a file, a web page, a database row, a policy, a rule or any data accessible in a corresponding machine and server, but is not limited thereto.
  • original tool used herein is a utility program, a widget, an intelligent agent, an application, a service or any executable component accessible in a corresponding machine and server, but is not limited thereto. It is noted that the information sources, the original information and the original tool are not restricted to the above examples.
  • original information and “original tool” are implementation examples of “original matters” used herein.
  • a plurality of “original matters” from identical or different “information sources” are modeled to a plurality of “unified matters” by a unifying method. Consequently, the “unified matters” in the same execution environment are compatible with each other and cooperate to perform a specified task.
  • the “unified tool” and the “unified information unit” are implementation examples of the “unified matters” .
  • the term “Matterizer” used herein is a means, a device or a program code to perform the unifying process.
  • the above unifying method comprises steps of: modeling at least one original information obtained from at least one information source of multiple information sources into a unified information unit with one unified data model via re-organizing the original information, and/or modeling at least one original tool obtained from at least one information source of multiple information sources into a unified tool with another unified data model via re-organizing the original tool.
  • the one unified data model and another unified data model could be identical or different, and the unifying method described above could be completed through a matterizer.
  • FIG. 1 is a schematic diagram illustrating an implementation concept of a unifying method according to an embodiment.
  • the matterizer 992 re-organizes an attribute and a link of an original matter 991 with a unified data model 993, and thus models the original matter 991 into a unified matter 994. Consequently, the basic attribute of the unified matter 994 include a type of the original matter 991 and a link indicating where the original matter 994 is located.
  • the original matter 991 at least includes an original information (not shown) or an original tool (not shown) , but is not limited thereto.
  • the unified information unit is directly produced through the matterizer 992. If the attribute accessible from the original information does not correspond to the attribute to be unified in the unified information unit, the original information is firstly re-defined by logically re-organizing the attributes and the link of the original information, and then the original information is converted into a new original information with the attributes which correspond to attributes to be unified in the unified information unit. Consequently, the unified information unit is indirectly produced.
  • the unified tool is directly produced by the matterizer 992.
  • the unified tool is indirectly produced via an adapter and/or a software development kit (SDK) of the original tool to drive the original tool.
  • SDK software development kit
  • the descriptions of the unifying method” may be referred to the US Patent Application No. 14/324,069, entitled “A method of unifying information and tool from a plurality of information sources” , and also referred to the China Patent Application No. 201410768564.X, entitled “A method of unifying information and tool from a plurality of information sources and computer product and device using the method” .
  • the detailed descriptions thereof are omitted.
  • the first unifying method is applied to a method of unifying the information of Garmin satellite navigation.
  • a point-of-interest (POI) function of the Garmin satellite navigation the method of unifying the information is employed to unify the imported original point information (i.e., an original information) into the corresponding unified point information (i.e., a unified information unit) .
  • the second unifying method is applied to a method of unifying the tool of an Android system.
  • the Android system is a Linux-based open source mobile operating system.
  • most application programs i.e., original tools
  • the application program (i.e., the original tool) written in the Java programming language can be modelled into a unified application program (i.e., the unified tool) compatible with the Android system so as to be executed in the Android system.
  • the term “workspace” used herein is a working environment for providing interactions among the at least one matterizer, the at least one tool and/or the at least one information so as to implement a specified task. Moreover, the at least one tool and/or at least one information can be imported into the workspace through the at least one matterizer. However, the way of importing the information and/or tool into the workspace is not restricted. Hereinafter, information importers such as the information importers 9881, 9882 and 9883 of FIG. 2, the Dropbox importer 9761’ of FIG. 6 and the information importer 760 of FIG. 13 are some examples of the matterizer.
  • the term “unified script” used herein is an intermediate language to implement the workspace. Moreover, via the “unified script” , the at least one matterizer, the at least one tool and/or the at least one information can be provided to the workspace (e.g., built in or plugged in the workspace) .
  • the above at least one information is a unified information unit which is produced after at least one original information obtained from at least one information source is unified
  • the above at least one tool is a unified tool which is produced after at least one original tool obtained from at least one information source is unified.
  • the required unified information unit and/or the required unified tool from the corresponding information source can be added to the personal workspace (e.g., built in or plugged in the personal workspace) .
  • the “workspace” is a user-orientated “personal workspace” .
  • FIG. 2 is a schematic diagram illustrating an implementation concept of using the unified script as an intermediate language for implementing the personal workspace.
  • FIG. 3 is a schematic diagram illustrating a preferred configuration of a personal workspace.
  • a unified information unit 985’ corresponding to an original information 985 in Dropbox 982
  • a first unified tool 986’ corresponding to a compatible original tool 986 in a cloud storage 983
  • a second unified tool 987’ corresponding to an incompatible original tool 987 in a server 984 are combined together into a personal workspace 981 according to the required tasks.
  • a unified script 980 as an intermediate language for implementing the personal workspace 981 is firstly compiled, and then an information importer 9881 of the Dropbox 982, an information importer 9882 of the cloud storage 983 and an information importer 9883 of the server 984 are configured through the unified script 980. Moreover, after the original information 985 in the Dropbox 982 is unified into the unified information unit 985’ by the information importer 9881, the unified information unit 985’ is imported into the personal workspace 981.
  • the original tool stored in the cloud storage 983 is the compatible original tool 986, which is compatible with the component architecture of the unified tool in the personal workspace 981.
  • the first unified tool 986’ corresponding to the compatible original tool 986 is directly provided to the personal workspace 981 through the information importer 9882 of the unified script 980.
  • the original tool stored in the server 984 is the incompatible original tool 987, which is incompatible with the component architecture of the unified tool in the personal workspace 981.
  • the second unified tool 987’ corresponding to the incompatible original tool 987 is provided to the personal workspace 981 through the compatible adapter 989 and the information importer 9883 of the unified script 980.
  • the user can configure and arrange (e.g., group or place) the unified information unit 985’ , the first unified tool 986’a nd the second unified tool 987’ in a specific area of the personal workspace 981 according to the practical requirements.
  • the user can perform specified tasks by using the unified tool to access or control the corresponding unified information unit.
  • the above personal workspace is presented herein for purpose of illustration and description only, and it is noted that the applications of the workspace in the present invention is not restricted.
  • the unified script as the intermediate language for implementing the workspace can be previously edited. Consequently, the workspace equips the default matterizer, the default information and/or the default tool.
  • This workspace is not limited to be operated by a single user. According to the practical requirements, this workspace can be operated by multiple users at the same time or at different times.
  • the “workspace” used herein is obtained by “amethod of projecting a workspace” to any electronic device with computational capability.
  • An example of the electronic device includes but is not limited to a mobile phone, a tablet computer, a notebook computer or a desktop computer. Consequently, the “projected workspace” can be operated by any user through any electronic device with computational capability.
  • the method of projecting the workspace comprises the following steps. Firstly, a projectable space instance instantiated by the unified script is obtained through a uniform resource identifier (URI) .
  • URI uniform resource identifier
  • the unified script is defined to configure at least one of the matterizer, the information and the tool to model the workspace.
  • the projectable space instance is used to build the projected workspace corresponding to the workspace, and thus provide an interface for operating at least one of the matterizer, the information and the tool to implement a task.
  • a projector parses the projectable space instance and build a working environment to configure at least one of the matterizer, the information and the tool so as to execute the projected workspace for providing interactions between at least one user and the projected workspace.
  • the projector is acquired from a remote data station, the projectable space instance or a preloaded application program, and loaded into an engine for providing a compatible environment to execute the projector.
  • An example of the engine includes but is not limited to a Javascript engine, a Windows application or a Linux application.
  • the unified script can be declared by a document type definition (DTD) , an extensible markup language (XML) Schema, a structured language or a structured protocol.
  • the projectable space instance is an object, an extensible markup language (XML) document, or an instance instantiated with a structured language or a structured protocol.
  • FIG. 4 is a schematic diagram illustrating an initial state of the method of projecting the workspace according to an embodiment of the present invention.
  • FIGS. 5A and 5B are schematic diagrams illustrating operating concepts of the method of projecting the workspace as shown in FIG. 4.
  • FIG. 6 is a schematic diagram illustrating the relationship between a projectable space instance as shown in FIG. 4 and a projected workspace as shown in FIG. 5B.
  • a first electronic device 971 and a second electronic device 972 are in communication with each other (e.g., through network connection) . Moreover, the first electronic device 971 stores a projectable space instance 973, and the second electronic device 972 has a built-in projector 974.
  • the unified script 9731 is declared by a document type definition (DTD) and defined to configure at least one information importer (i.e., an example of the matterizer) , at least one unified information unit and/or at least one unified tool to model a workspace, and the projectable space instance 973 is an instance instantiated with the extensible markup language (XML) .
  • the projectable space instance 973 is used for building a projected workspace 976 corresponding to the workspace.
  • the information importer, the unified information and/or the unified tool is allowed to be added to or removed from the projectable space instance 973.
  • the projector 974 of the second electronic device 972 will build a working environment 975 in the second electronic device 972 for executing the projected workspace 976.
  • the projector 974 provides a microkernel 977 (see FIG. 6) to the working environment 975 for equipping at least one information importer, at least one unified information and/or at least one unified tool that will be added to the projected workspace 976.
  • the second electronic device 972 acquires the projectable space instance 973 from the first electronic device 971 through a URI
  • the projector 974 of the second electronic device 972 starts to parse the projectable space instance 973 (see FIG. 5A) .
  • the projected workspace 976 is built in the working environment 975 according to parsed contents of the projectable space instance 973 (see FIG. 5B) . Accordingly, a user of the second electronic device 972 can interact with the projected workspace 976 through the second electronic device 972 so as to perform related tasks.
  • the relationships between the unified script 9731, the projectable space instance 973 and the projected workspace 976 will be illustrated in more detailed through a usage situation as shown in FIG. 6.
  • the usage situation as shown in FIG. 6 is related to a process of building a projected workspace that is capable of accessing jpg format image files and gif format image files from a specified internet space and allowing the image files to be viewed by a user.
  • the unified script 9731 is declared by the Document Type Definition (DTD)
  • the projectable space instance 973 is instantiated with XML.
  • an information importer and a unified tool are added into the projectable space instance 973, and at least one unified information unit corresponding to the original information is imported into the projected workspace 976 through the information importer.
  • the information importer is a Dropbox importer.
  • the information of the Dropbox importer is disclosed in the dashed line frame 9761 of FIG. 6.
  • the original information includes a jpg format image file 9791, a jpg format image file 9792 and a gif format image file 9793 in Dropbox 979 (i.e., an information source) .
  • the unified information units includes a unified jpg format image file 9791’ , a unified jpg format image file 9792’a nd a unified gif format image file 9793’ , which will be described later.
  • the unified tool is an image viewer for accessing image files which are imported into the projected workspace 976. The information of the image viewer is disclosed in the dashed line frame 9762 of FIG. 6.
  • the projected workspace 976 is built after the projectable space instance 973 is parsed by the projector 974 of the second electronic device 972.
  • the Dropbox importer 9761’ corresponding to the dashed line frame 9761 and the image viewer 9762’ corresponding to the dashed line frame 9762 are configured in the projected workspace 976.
  • the jpg format image file 9791, the jpg format image file 9792 and the gif format image file 9793 in Dropbox 979 are unified and imported into the projected workspace 976 by the Dropbox importer 9761’ .
  • the unified jpg format image file 9791’ corresponding to the jpg format image file 9791, the unified jpg format image file 9792’ corresponding to the jpg format image file 9792 and the unified gif format image file 9793’ corresponding to the gif format image file 9793 are displayed on the projected workspace 976.
  • the image viewer 9762’ will access the contents of the corresponding unified image files 9791’ , 9792’ or 9793’ to allow the unified image files 9791’ , 9792’ or 9793’ to be viewed by the user.
  • the Dropbox importer 9761’a nd the image viewer 9762’ mentioned above are equipped by the microkernel 977.
  • the URI of the projectable space instance 973 may be a HTTP (hypertext transfer protocol) URI or a FTP (file transfer protocol) URI.
  • the URI of the projectable space instance 973 can also be a local file URI.
  • the types of the URI of the projectable space instance 973 are not restricted.
  • any workspace can be projected to any electronic device with computational capability. That is, any workspace can be delivered to any electronic device with computational capability.
  • the present invention provides a method for late binding identity. The concepts of the method will be illustrated in more details as follows.
  • FIG. 7 is a flowchart illustrating a method for late binding identity to account according to an embodiment of the present invention.
  • the method comprises the following steps. Firstly, a projectable space instance for modeling a workspace is provided to a system, wherein an information importer, an information and/or a tool is configured in the projectable space instance (Step S110) . Then, the workspace is projected to a machine, and a user account is provided for allowing a user to access the projected workspace, wherein the user does not provide an authorized identity to login into the projected workspace (Step S120) .
  • Step S130 While the user accesses the projected workspace to drive the information importer, the information and/or the tool, the user is requested to provide an authorized identity, and the authorized identity is bound to the user account so as to activate an access right for the information importer, the information and/or the tool. Then, the user is allowed to login into the projected workspace from the machine or an additional machine according to the authorized identity bound to the user account (Step S140) .
  • FIG. 8 schematically illustrates an implementation concept of a mechanism using the method of FIG. 7.
  • An example of the system 1 includes but is not limited to a network service platform.
  • the system 1 can provide the functions of internet access, internet transit, domain name registration and hosting, dial-up access, leased line access and collocation.
  • the service provider of the network service platform may have various forms.
  • the service provider is a commercial service provider, a community-owned service provider or a non-profit service provider such as the provider of the workspace.
  • the system 1 comprises a server 210.
  • the server 210 comprises a projectable space instance 212 for modeling a workspace.
  • the server 210 is executed and driven locally or remotely.
  • An example of the machine 220 includes but is not limited to a desktop computer, a notebook computer, a personal tablet computer, a smart phone, a mobile device or a wearable device.
  • the machine 220 can acquire the projectable space instance 212 through a uniform resource identifier (URI) corresponding to the projectable space instance 212.
  • URI uniform resource identifier
  • the projected workspace 211 is built in the machine 220 through a web browser 221 and a projector 222, wherein the projector 222 is loaded into the web browser 221.
  • the server 210 will automatically create or generate a user account 230.
  • a browser cookie 240 is a storage medium. Whenever the user accesses the projected workspace 211 through the web browser 221 of the machine 220, the browser cookie 240 is used for recording an historical usage 241 of the projected workspace 211 on the machine 220 and corresponding to the user account 230.
  • the historical usage 241 contains a browsing history, an executed operation log, or any form of information for reasonably analyzing a user preference.
  • the projected workspace 211 is allowed to track the historical usage 241 of the user according to the user account 230. Consequently, the services and/or contents that are better or the user are interested in can be further provided to the user.
  • the browser cookie 240 for recording the historical usage 241 corresponding to the user account 230 is presented herein for purpose of illustration and description only.
  • the storage medium for recording the historical usage 241 corresponding to the user account 230 is not restricted.
  • any other storage medium e.g., a browser cache or a file
  • a browser cache or a file that is accessible by the projected workspace 211 can be used for recording the historical usage 241 corresponding to the user account 230.
  • FIG. 9 schematically illustrates an implementation concept of the method of FIG. 7 and the mechanism of FIG. 8 when a user accesses the projected workspace at a first time.
  • FIG. 10 schematically illustrates an implementation concept of the method of FIG. 7 and the mechanism of FIG. 8 when a user accesses the projected workspace at a next time.
  • the server 210 When a user 200 accesses the projected workspace 211 at the first time through the web browser 221 of the machine 220, the server 210 will automatically create or generate a user account 230.
  • the historical usage 241 corresponding to the user account 230 is started to be recorded in the browser cookie 240.
  • the browser cookie 240 further records any operation of the projected workspace 211 corresponding to the user account 230. Consequently, when the user 200 uses the web browser 221 of the machine 220 in the next time and accesses the projected workspace 211 again with the user account 230, the past historical usage corresponding to the user account 230 is still retained.
  • the method of FIG. 7 further comprises a step of binding the user account 230 to a machine code of the machine 210 so as to lock the user account 230 on the machine 210.
  • the machine 210 can be identified according to machine code.
  • the machine code is an IP code (e.g., IP: 210.32.54.123) . If the user 200 accesses the projected workspace 211 through the web browser 221 of the machine 220 not at the first time (i.e., at the second time or at more than the second time) , the projected workspace 211 will read the historical record corresponding to the user account 230 from the browser cookie 240 because the user account 230 has been bound to the IP code.
  • the historical record corresponding to the user account 230 indicates any past operation of the projected workspace 211 corresponding to the user account 230. Similarly, any subsequent operation of the projected workspace 211 corresponding to the user account 230 is still recorded in the browser cookie 240.
  • the method of the present invention can be applied to the machines in public places or public machines (e.g., the computing devices in public places or public computing devices) .
  • the use situations of applying the method of the present invention to the above machines will be illustrated as follows.
  • the machines in public places or public machines cannot identify the users who use the machines because the same machine is possibly used by many different users at different times.
  • the present invention further provides a method of distinguishing and identifying a user account of a specific user. That is, the method of FIG. 7 further comprises a step of providing a label to label the automatically-generated user account. Consequently, the user can create a role with a designated name and access the projected workspace on the machine under the designated name without giving authorized identity.
  • FIG. 11 schematically illustrates an implementation concept of providing a label to label the automatically-generated user account according to an embodiment of the present invention.
  • the server 210 will automatically create or generate a user account 530 for the user 500.
  • the user account 530 is bound to a machine code of the machine 510 (e.g., IP: 210.32.54.123) , so that the user account 530 is locked on the machine 510.
  • a label for the machine code IP: 210.32.54.123
  • the server 210 can authenticate and identify the user 500 by inputting the label corresponding to the user account 530. Consequently, the user 500 can login into the projected workspace 511 again and use the projected workspace 511.
  • an additional label for the machine code (IP: 210.32.54.123) is also automatically generated by the server 210.
  • the additional user 501 can login into the projected workspace 511 or other projected workspace again by inputting the additional label corresponding to the user account.
  • the method of the present invention can distinguish from different users who connect to the server through the same machine.
  • the server will generate a new label to the user regardless of whether the user accesses the projected workspace through the web browser of the machine at the first time.
  • the user can disable the above function of providing the new label in order to prevent from memorizing the label every time.
  • An example of the content of the label includes but is not limit to a word, number or any combination thereof a word, number or any combination thereof.
  • the content of the label is randomly provided by the server or decided by the user.
  • the content of the label is a true name or a fake name that is provided by the user.
  • the authentication method of identifying the user by using the label to label the user account has another advantage that the same user can possess many roles corresponding to different projected workspaces. Moreover, in case that the user expects to create a role with a designated name and access the projected workspace on the machine under the designated name without giving authorized identity, the above authentication method of identifying the user by using the label to label the user account can be performed.
  • FIG. 12 schematically illustrates an implementation concept of mutually binding an authorized identity between the user account and an additional network service platform by the method of FIG. 7 and the mechanism of FIG. 8.
  • a user 600 accesses a projected workspace 611 through a web browser 621 of a machine 620 and uses the services or functions of the projected workspace 611.
  • some services or functions are provided by another network service platform (also referred hereinafter as an additional network service platform) , and the user 600 needs an additional authorized identity to acquire the services or functions from the additional network service platform. If the authorized identity of the additional network service platform for the user has been bound to the user account 630, the user can use these services or functions via the authorized identity.
  • the authorized identity of the additional network service platform for the user has not been bound to the user account 630, it is necessary to bind the authorized identity of the additional network service platform to the user account 630 in order to obtain the right of using the services or functions from the additional network service platform.
  • the user 600 may assign one or plural authorized identities and bind the one or plural authorized identities to the user account 630.
  • the user 600 can issue a request to bind the authorized identities of other network service platforms to the user account 630 via the machine 610 so as to implement the binding authentication between the user account 630 and one or plural network service platforms which need the authorized identities.
  • the user accesses the projected workspace 611 to operate the services or functions of other network service platforms through the user account 630, the user can directly access these services or functions without the need of inputting the authorized identity again. That is, the user account 630 will automatically implement the authentication with the network service platforms.
  • FIG. 13 schematically illustrates an implementation concept of binding an identity of Facebook to the user account corresponding to the projected workspace.
  • a Facebook tool and an information importer 760 are configured in the projected workspace 711.
  • the Facebook tool is an example of the unified tool, and indicated by a Facebook icon 770.
  • the information of a Facebook server 750 is imported into the projected workspace 711 through the information importer 760.
  • a window 780 is shown in the projected workspace 711, and the window 780 is redirected to the Facebook webpage.
  • the authorized identity e.g., the personal account and password of Facebook
  • the projected workspace 711 inquires the user whether the authorized identity of Facebook is bound to the user account. If the authorized identity is bound to the user account, when the user accesses the projected workspace 711 through the user account at the next time, the user can directly use the services or functions of Facebook without the need of inputting the personal account and password of Facebook.
  • the user can login into the projected workspace 711 and use the projected workspace 711 from any machine through the authorized identity of Facebook.
  • the user can login into the projected workspace 711 and use the projected workspace 711 from any machine through any known identity.
  • the above example of accessing the projected workspace through the user account is presented herein for purpose of illustration and description only.
  • a known identity of the additional user is firstly provided to the projected workspace. Then, an additional user account for the additional user is automatically generated by the server, and the known identity of the additional user is bound to the additional user account. Then, a notification message is issued to the known identity of the additional user in a wireless transmission manner or a wired transmission manner.
  • the known identity of the additional user is an account or an identity that is identified by any network service platform. For example, the known identity of the additional user is an account or an authorized identity of the additional user for a social networking site or an account of an electronic mail of the additional user.
  • the notification message contains the uniform resource identifier (URI) of the projectable space instance corresponding to the projected workspace. Consequently, when the additional user uses the known identity and clicks or opens the notification message (e.g., the additional user uses the account of Facebook to receive the notification message from Facebook and clicks the URI of the notification message) , the additional user can access the projected workspace. Under this circumstance, the user can share the projected workspace to the additional user.
  • URI uniform resource identifier
  • FIG. 14 is a flowchart illustrating a method for automatically generating a user account for a receiver while sharing content to the receiver.
  • the method of FIG. 14 illustrates a content sharing method for sharing content to an additional user while a user accesses the projected workspace via the user account and browses each of the network information in the projected workspace.
  • the content sharing method comprises the following steps. Firstly, when the user wants to share the content to the additional user, the user checks if the additional user has a user account (also referred as a second user account) of the server (Step S210) . If the judging condition of the step S210 is satisfied, the content is shared to the second user content (Step S240) .
  • a user account also referred as a second user account
  • a step S220 is performed to judge whether a known identity of the additional user is provided. If the judging condition of the step S220 is not satisfied, the flowchart is ended and the content is not shared. Whereas, if the judging condition of the step S220 is satisfied, a step S230 is performed. In the step S230, the server will automatically generate the second user account for the additional user and bind the known identity of the additional user to the second user account.
  • the second user account created in the step S230 is shared to the known identity of the additional user in the known network resource through a link.
  • the additional user can directly access the projected workspace via the second user account so as to browse the content that is shared by the user.
  • the known identity or the authorized identity e.g., the account name or the password
  • the above known network resource is a social networking site (e.g., Facebook or Twitter) or any other appropriate network service (e.g., an electronic mail) .
  • FIG. 15 is a schematic block diagram illustrating a computer program product using the method of FIG. 7.
  • the computer program product 7 is a software package.
  • the computer program product 7 is used for late binding identity to account.
  • the computer program product 7 contains a program code 71. While the computer program product 7 is executed in a computer 6, the program code 71 can perform the steps of the method of FIG. 11. The implementations of these steps are similar to those mentioned above, and the detailed descriptions thereof are omitted.
  • the present invention provides a method for late binding identity to account.
  • the present invention has the following advantages. Firstly, the user does not need to perform a registration process before the user logins into or connects to the network service platform. Even if the user logins into the network service platform at the first time and the user has not been authenticated by the network service platform, the network service platform will automatically generate the user account for the user. Secondly, the network service platform is able to analyze the user preference by tracking and analyzing the history usage of the user account. Thirdly, the user can make an authorized identity bound to the user account. Consequently, the user can access the projected workspace in a different machine via the user account.
  • the user is allowed to use an anonymous identity to access the projected workspace and randomly place any information and function component in the projected workspace.
  • a first user who has any know identity of a second user in a different network service platform can share content to the second user or invite the second user.

Abstract

A method for late binding identity to account includes following steps. Firstly, a projectable space instance for modeling a workspace is provided to a system, wherein an information importer, an information and/or a tool is configured in the projectable space instance (S110). Then, the workspace is projected to a machine, and a user account is provided for allowing a user to access the projected workspace,wherein the user account is automatically generated by the system without providing any authorized identity (S120). While the user accesses the projected workspace to drive the information importer, the information and/or the tool, the user is requested to provide an authorized identity and the authorized identity is bound to the user account (S130). Then, the user is allowed to login into the projected workspace from the machine or an additional machine according to the authorized identity bound to the user account (S140).

Description

    METHOD FOR LATE BINDING IDENTITY TO ACCOUNT TECHNICAL FIELD
  • The present invention relates to a method for late binding identity to account.
  • BACKGROUND
  • In today’s digital lives, using a variety of network service platforms is an important trend. A network service platform is designed for allowing people to build new contact information or share information through the internet. Nowadays, many network service platforms that provide services and application programs have been very well developed. However, most of the network service platforms such as shopping network platforms (e.g., eBay) or social networking sites (e.g., Facebook, Twitter, Plurk, Google+, etc. ) request the user to firstly complete the registration process before logging into the network service platforms. After the registration process is completed and the user logins into the network service platforms, the user can acquire or enjoy the services and functions that are provided by the network service platforms.
  • In most existing network service platforms (e.g., Google, Opera, Facebook, etc. ) , a user is able to access a network service platform after the user is registered with a user account. On the other hand, if the user is not registered or authorized, the user cannot view the contents or use the provided services. In some network service platforms, the user is forced to press “like” or give authority to provide personal information in order to use a particular program or read a particular article. However, the user possibly does not know or trust the network service platforms. For example, the user wishes to share a mind test game link on Facebook with friends. If the friends are interested in playing the mind test game, the friends of the user have to press “like” of that game on Facebook and give authority to provide their personal information to the program of the mind test game. Furthermore, the user in a specified network service platform (e.g., Facebook) is  not authorized to activate a specific function to a friend in a different network service platform (e.g., Twitter) .
  • Therefore, it is desired to provide a network service platform that allows the user to access the services or functions without the previous registration and allows the user to share services (e.g., contents) or functions of the network service platform to the users in different network service platforms.
  • SUMMARY
  • For solving the drawbacks of the conventional technologies, the present invention provides a method for late binding identity to account. Conventionally, most of the network service platforms request the user to firstly complete the registration process before logging into the network service platforms. A concept of the present invention is to support a user to start using the network service platform with a user account, which is automatically generated from the network service platform without identity registration. Consequently, the user can access the services or functions of the network service platform without the previous registration, the user can share services (e.g., contents) or functions of the network service platform to the users in different network service platforms.
  • In accordance with an aspect of the present invention, there is provided a method for late binding identity to account. The method includes the following steps. Firstly, a projectable space instance for modeling a workspace is provided to a system, wherein an information importer, an information and/or a tool is configured in the projectable space instance. Then, the workspace is projected to a machine, and a user account is provided for allowing a user to access the projected workspace. The user account is automatically generated by the system under a condition that the user does not provide an authorized identity to login into the projected workspace. While the user accesses the projected workspace to drive the information importer, the information and/or the tool, the user is requested to provide an authorized identity and binding the authorized identity to the user account so as to activate an access right for the information importer, the  information and/or the tool. Then, the user is allowed to login into the projected workspace from the machine or an additional machine according to the authorized identity bound to the user account.
  • In an embodiment, the system includes a server, and the projectable space instance is provided to the server. The user account is automatically generated by the server under the condition that the user does not provide an authorized identity to login into the projected workspace.
  • In an embodiment, the information and/or the tool is imported into the projected workspace through the information importer.
  • In an embodiment, the information is a unified information unit after an original information acquired from an information source is unified, and/or the tool is a unified tool after an original tool acquired from an information source is unified.
  • In an embodiment, the original information is modeled into the unified information unit with a unified data model, and/or the original tool is modeled into the unified tool with another unified data model.
  • In an embodiment, the information source is a network service platform.
  • In an embodiment, the method further includes a step of binding the user account to a machine code of the machine so as to lock the user account on the machine.
  • In an embodiment, the machine is identified according to the machine code.
  • In an embodiment, the method further includes a step of allowing the projected workspace to record a historical usage of the user.
  • In an embodiment, the historical usage is recorded in a storage medium that is accessible by the projected workspace.
  • In an embodiment, the storage medium is a browser cookie, a browser cache or a file.
  • In an embodiment, the historical usage contains a browsing history, an executed operation log and/or any form of information for reasonably analyzing a preference of the user.
  • In an embodiment, the projected workspace tracks the historical usage of the user according to the user account.
  • In an embodiment, after the projected workspace tracks and analyzes the historical usage of the user, the projected workspace provides a service and/or a content to the user.
  • In an embodiment, the method further includes a step of providing a label to label the automatically-generated user account under a condition that the user expects to create a role with a designated name and to access the projected workspace on the machine under the designated name without giving authorized identity.
  • In an embodiment, a content of the label is a true name or a fake name that is provided by the user so as to label the user account.
  • In an embodiment, the user is allowed to provide plural authorized identities to bind to the user account, and any of the plural authorized identities is identifiable by the projected workspace.
  • In an embodiment, when the user logins into the projected workspace from the additional machine according to the authorized identity bound to the user account, the projected workspace tracks the user account.
  • In an embodiment, the user account is automatically generated by the system when the user accesses the projected workspace at a first time.
  • In an embodiment, the method further includes a step of allowing the system to automatically generating an additional user account to an additional user and binding a known identity of the additional user to the additional user account. The additional user account is generated when the user accessing the projected workspace shares the projected workspace to the additional user or invites the additional user to access the projected workspace.
  • In an embodiment, the projectable space instance is an object, an extensible markup language document, or an instance which is instantiated with a structured language or a structured protocol.
  • In accordance with another aspect of the present invention, there is provided a computer program product for late binding identity to account. The computer program product includes a program code. While the computer program product is executed in a computer, the program code performs the following steps. Firstly, a projectable space instance for modeling a workspace is provided to a system, wherein an information importer, an information and/or a tool is configured in the projectable space instance. Then, the workspace is projected to a machine, and a user account is provided for allowing a user to access the projected workspace. The user account is automatically generated by the system under a condition that the user does not provide an authorized identity to login into the projected workspace. While the user accesses the projected workspace to drive the information importer, the information and/or the tool, the user is requested to provide an authorized identity and binding the authorized identity to the user account so as to activate an access right for the information importer, the information and/or the tool. Then, the user is allowed to login into the projected workspace from the machine or an additional machine according to the authorized identity bound to the user account.
  • The above objects and advantages of the present invention will become more readily apparent to those ordinarily skilled in the art after reviewing the following detailed description and accompanying drawings, in which:
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a schematic diagram illustrating an implementation concept of a unifying method according to an embodiment;
  • FIG. 2 is a schematic diagram illustrating an implementation concept of using the unified script as an intermediate language for implementing the personal workspace;
  • FIG. 3 is a schematic diagram illustrating a preferred configuration of a personal workspace;
  • FIG. 4 is a schematic diagram illustrating an initial state of the method of projecting the workspace according to an embodiment of the present invention;
  • FIGS. 5A and 5B are schematic diagrams illustrating operating concepts of the method of projecting the workspace as shown in FIG. 4;
  • FIG. 6 is a schematic diagram illustrating the relationship between a projectable space instance as shown in FIG. 4 and a projected workspace as shown in FIG. 5B;
  • FIG. 7 is a flowchart illustrating a method for late binding identity to account according to an embodiment of the present invention;
  • FIG. 8 schematically illustrates an implementation concept of a mechanism using the method of FIG. 7;
  • FIG. 9 schematically illustrates an implementation concept of the method of FIG. 7 and the mechanism of FIG. 8 when a user accesses the projected workspace at a first time;
  • FIG. 10 schematically illustrates an implementation concept of the method of FIG. 7 and the mechanism of FIG. 8 when a user accesses the projected workspace at a next time;
  • FIG. 11 schematically illustrates an implementation concept of providing a label to label the automatically-generated user account according to an embodiment of the present invention;
  • FIG. 12 schematically illustrates an implementation concept of mutually binding an authorized identity between the user account and an additional network service platform by the method of FIG. 7 and the mechanism of FIG. 8;
  • FIG. 13 schematically illustrates an implementation concept of binding an identity of Facebook to the user account corresponding to the projected workspace;
  • FIG. 14 is a flowchart illustrating a method for automatically generating a user account for a receiver while sharing content to the receiver; and
  • FIG. 15 is a schematic block diagram illustrating a computer program product using the method of FIG. 7.
  • DETAILED DESCRIPTION
  • The present invention is more fully appreciated by reference to the following description, including the following glossary of terms and the concluding examples. For the sake of brevity, the disclosures of the publications, including patents, cited in this specification are herein incorporated by reference.
  • The examples below are non-limiting and are merely representative of various aspects and features of the present invention. The term “information source” used herein is defined as a sequence of symbols that can be interpreted as a message in the most limited technical meaning. And the message is used for organizing and labeling information. For example, the information source includes website (such as internet service) , intranet, social network, software, electronic book, database and other media of information (such as storage media of non-transitory computer or storage media of mobile device) . The term “original information” used herein is a file, a web page, a database row, a policy, a rule or any data accessible in a corresponding machine and server, but is not limited thereto. The term “original tool” used herein is a utility program, a widget, an intelligent agent, an application, a service or any executable component accessible in a corresponding machine and server, but is not limited thereto. It is noted that the information sources, the original information and the original tool are not restricted to the above examples.
  • Moreover, “original information” and “original tool” are implementation examples of “original matters” used herein. In accordance with the present invention, a plurality of “original matters” from identical or different “information sources” are modeled to a plurality of “unified matters” by a unifying method. Consequently, the “unified matters” in the same execution environment are compatible with each other and cooperate to perform a specified task. The “unified tool” and the “unified information unit” are implementation examples of  the “unified matters” . Moreover, the term “Matterizer” used herein is a means, a device or a program code to perform the unifying process.
  • In an embodiment, the above unifying method comprises steps of: modeling at least one original information obtained from at least one information source of multiple information sources into a unified information unit with one unified data model via re-organizing the original information, and/or modeling at least one original tool obtained from at least one information source of multiple information sources into a unified tool with another unified data model via re-organizing the original tool. The one unified data model and another unified data model could be identical or different, and the unifying method described above could be completed through a matterizer.
  • Please refer to FIG. 1. FIG. 1 is a schematic diagram illustrating an implementation concept of a unifying method according to an embodiment. As shown in FIG. 1, the matterizer 992 re-organizes an attribute and a link of an original matter 991 with a unified data model 993, and thus models the original matter 991 into a unified matter 994. Consequently, the basic attribute of the unified matter 994 include a type of the original matter 991 and a link indicating where the original matter 994 is located.
  • In this embodiment, the original matter 991 at least includes an original information (not shown) or an original tool (not shown) , but is not limited thereto. In the above unifying method, if the attribute accessible from the original information corresponds to the attribute to be unified in the unified information unit, the unified information unit is directly produced through the matterizer 992. If the attribute accessible from the original information does not correspond to the attribute to be unified in the unified information unit, the original information is firstly re-defined by logically re-organizing the attributes and the link of the original information, and then the original information is converted into a new original information with the attributes which correspond to attributes to be unified  in the unified information unit. Consequently, the unified information unit is indirectly produced.
  • Moreover, if the original tool is compatible with the working environment of the workspace, the unified tool is directly produced by the matterizer 992. On the other hand, if the original tool is incompatible with the working environment of the workspace, the unified tool is indirectly produced via an adapter and/or a software development kit (SDK) of the original tool to drive the original tool. The adapter provides an interface implementation compatible with the working environment.
  • Herein, “the descriptions of the unifying method” , “the methods of obtaining the unified matters” and “the descriptions of the matterizer” may be referred to the US Patent Application No. 14/324,069, entitled “A method of unifying information and tool from a plurality of information sources” , and also referred to the China Patent Application No. 201410768564.X, entitled “A method of unifying information and tool from a plurality of information sources and computer product and device using the method” . The detailed descriptions thereof are omitted.
  • The above unifying method is presented herein for purpose of illustration and description only. The method of unifying a plurality of original matters from different information sources is not restricted. However, those skilled in the art will readily observe that numerous modifications and alterations may be made while retaining the teachings of the invention.
  • Hereinafter, two other unifying methods will be illustrated. The first unifying method is applied to a method of unifying the information of Garmin satellite navigation. Through a point-of-interest (POI) function of the Garmin satellite navigation, the method of unifying the information is employed to unify the imported original point information (i.e., an original information) into the corresponding unified point information (i.e., a unified information unit) . The second unifying method is applied to a method of unifying the tool of an Android system. The Android system is a Linux-based open source mobile operating system. However, most application programs (i.e., original tools) are written in  the Java programming language. Consequently, the application program (i.e., the original tool) written in the Java programming language can be modelled into a unified application program (i.e., the unified tool) compatible with the Android system so as to be executed in the Android system.
  • The term “workspace” used herein is a working environment for providing interactions among the at least one matterizer, the at least one tool and/or the at least one information so as to implement a specified task. Moreover, the at least one tool and/or at least one information can be imported into the workspace through the at least one matterizer. However, the way of importing the information and/or tool into the workspace is not restricted. Hereinafter, information importers such as the information importers 9881, 9882 and 9883 of FIG. 2, the Dropbox importer 9761’ of FIG. 6 and the information importer 760 of FIG. 13 are some examples of the matterizer. The term “unified script” used herein is an intermediate language to implement the workspace. Moreover, via the “unified script” , the at least one matterizer, the at least one tool and/or the at least one information can be provided to the workspace (e.g., built in or plugged in the workspace) .
  • In an embodiment, the above at least one information is a unified information unit which is produced after at least one original information obtained from at least one information source is unified, and the above at least one tool is a unified tool which is produced after at least one original tool obtained from at least one information source is unified. Moreover, according to different tasks, the required unified information unit and/or the required unified tool from the corresponding information source can be added to the personal workspace (e.g., built in or plugged in the personal workspace) . In other words, the “workspace” is a user-orientated “personal workspace” .
  • Please refer to FIG. 2 and FIG. 3. FIG. 2 is a schematic diagram illustrating an implementation concept of using the unified script as an intermediate language for implementing the personal workspace. FIG. 3 is a schematic diagram  illustrating a preferred configuration of a personal workspace. As shown in FIG. 2 and FIG. 3, a unified information unit 985’ corresponding to an original information 985 in Dropbox 982, a first unified tool 986’ corresponding to a compatible original tool 986 in a cloud storage 983 and a second unified tool 987’ corresponding to an incompatible original tool 987 in a server 984 are combined together into a personal workspace 981 according to the required tasks. In particular, a unified script 980 as an intermediate language for implementing the personal workspace 981 is firstly compiled, and then an information importer 9881 of the Dropbox 982, an information importer 9882 of the cloud storage 983 and an information importer 9883 of the server 984 are configured through the unified script 980. Moreover, after the original information 985 in the Dropbox 982 is unified into the unified information unit 985’ by the information importer 9881, the unified information unit 985’ is imported into the personal workspace 981.
  • As shown in FIG. 2 and FIG. 3, the original tool stored in the cloud storage 983 is the compatible original tool 986, which is compatible with the component architecture of the unified tool in the personal workspace 981. Moreover, the first unified tool 986’ corresponding to the compatible original tool 986 is directly provided to the personal workspace 981 through the information importer 9882 of the unified script 980.
  • As shown in FIG. 2 and FIG. 3, the original tool stored in the server 984 is the incompatible original tool 987, which is incompatible with the component architecture of the unified tool in the personal workspace 981. Moreover, the second unified tool 987’ corresponding to the incompatible original tool 987 is provided to the personal workspace 981 through the compatible adapter 989 and the information importer 9883 of the unified script 980.
  • As shown in FIG. 3, the user can configure and arrange (e.g., group or place) the unified information unit 985’ , the first unified tool 986’a nd the second unified tool 987’ in a specific area of the personal workspace 981 according to the practical requirements. Moreover, according to the operational relationship  between the unified tool and the unified information unit (e.g., the clicking or dragging actions between the two) , the user can perform specified tasks by using the unified tool to access or control the corresponding unified information unit.
  • Herein, “the descriptions of using the unified script as the intermediate language for implementing the personal workspace” and “the descriptions of allowing the required unified information unit and/or the required unified tool from the corresponding information sources to be arbitrarily combined together into the personal workspace according to the practical requirements” may be referred to the US Patent Application No. 14/325,466, entitled “Method for performing task on unified information units in a personal workspace” , and also referred to the China Patent Application No. 201410796528.4, entitled “A method of combining unified matters in a personal workspace and computer product and device using the method” . The detailed descriptions thereof are omitted.
  • The above personal workspace is presented herein for purpose of illustration and description only, and it is noted that the applications of the workspace in the present invention is not restricted. For example, the unified script as the intermediate language for implementing the workspace can be previously edited. Consequently, the workspace equips the default matterizer, the default information and/or the default tool. This workspace is not limited to be operated by a single user. According to the practical requirements, this workspace can be operated by multiple users at the same time or at different times.
  • Moreover, the “workspace” used herein is obtained by “amethod of projecting a workspace” to any electronic device with computational capability. An example of the electronic device includes but is not limited to a mobile phone, a tablet computer, a notebook computer or a desktop computer. Consequently, the “projected workspace” can be operated by any user through any electronic device with computational capability.
  • In an embodiment, the method of projecting the workspace comprises the following steps. Firstly, a projectable space instance instantiated by the unified  script is obtained through a uniform resource identifier (URI) . As mentioned above, the unified script is defined to configure at least one of the matterizer, the information and the tool to model the workspace. Moreover, the projectable space instance is used to build the projected workspace corresponding to the workspace, and thus provide an interface for operating at least one of the matterizer, the information and the tool to implement a task. Then, a projector parses the projectable space instance and build a working environment to configure at least one of the matterizer, the information and the tool so as to execute the projected workspace for providing interactions between at least one user and the projected workspace.
  • The projector is acquired from a remote data station, the projectable space instance or a preloaded application program, and loaded into an engine for providing a compatible environment to execute the projector. An example of the engine includes but is not limited to a Javascript engine, a Windows application or a Linux application. Preferably but not exclusively, the unified script can be declared by a document type definition (DTD) , an extensible markup language (XML) Schema, a structured language or a structured protocol. Preferably but not exclusively, the projectable space instance is an object, an extensible markup language (XML) document, or an instance instantiated with a structured language or a structured protocol.
  • Please refer to FIG. 4, FIG. 5A, FIG. 5B and FIG. 6. FIG. 4 is a schematic diagram illustrating an initial state of the method of projecting the workspace according to an embodiment of the present invention. FIGS. 5A and 5B are schematic diagrams illustrating operating concepts of the method of projecting the workspace as shown in FIG. 4. FIG. 6 is a schematic diagram illustrating the relationship between a projectable space instance as shown in FIG. 4 and a projected workspace as shown in FIG. 5B.
  • In the initial state of FIG. 4, a first electronic device 971 and a second electronic device 972 are in communication with each other (e.g., through network  connection) . Moreover, the first electronic device 971 stores a projectable space instance 973, and the second electronic device 972 has a built-in projector 974.
  • In this embodiment, the unified script 9731 is declared by a document type definition (DTD) and defined to configure at least one information importer (i.e., an example of the matterizer) , at least one unified information unit and/or at least one unified tool to model a workspace, and the projectable space instance 973 is an instance instantiated with the extensible markup language (XML) . As shown in FIG. 6, the projectable space instance 973 is used for building a projected workspace 976 corresponding to the workspace. Moreover, the information importer, the unified information and/or the unified tool is allowed to be added to or removed from the projectable space instance 973.
  • The projector 974 of the second electronic device 972 will build a working environment 975 in the second electronic device 972 for executing the projected workspace 976. In addition, the projector 974 provides a microkernel 977 (see FIG. 6) to the working environment 975 for equipping at least one information importer, at least one unified information and/or at least one unified tool that will be added to the projected workspace 976. When the second electronic device 972 acquires the projectable space instance 973 from the first electronic device 971 through a URI, the projector 974 of the second electronic device 972 starts to parse the projectable space instance 973 (see FIG. 5A) . After the projectable space instance 973 is parsed by the projector 974, the projected workspace 976 is built in the working environment 975 according to parsed contents of the projectable space instance 973 (see FIG. 5B) . Accordingly, a user of the second electronic device 972 can interact with the projected workspace 976 through the second electronic device 972 so as to perform related tasks.
  • The relationships between the unified script 9731, the projectable space instance 973 and the projected workspace 976 will be illustrated in more detailed through a usage situation as shown in FIG. 6. The usage situation as shown in FIG. 6 is related to a process of building a projected workspace that is capable of  accessing jpg format image files and gif format image files from a specified internet space and allowing the image files to be viewed by a user. In this usage situation, the unified script 9731 is declared by the Document Type Definition (DTD) , and the projectable space instance 973 is instantiated with XML.
  • Moreover, an information importer and a unified tool are added into the projectable space instance 973, and at least one unified information unit corresponding to the original information is imported into the projected workspace 976 through the information importer. In this usage situation, the information importer is a Dropbox importer. The information of the Dropbox importer is disclosed in the dashed line frame 9761 of FIG. 6. The original information includes a jpg format image file 9791, a jpg format image file 9792 and a gif format image file 9793 in Dropbox 979 (i.e., an information source) . The unified information units includes a unified jpg format image file 9791’ , a unified jpg format image file 9792’a nd a unified gif format image file 9793’ , which will be described later. The unified tool is an image viewer for accessing image files which are imported into the projected workspace 976. The information of the image viewer is disclosed in the dashed line frame 9762 of FIG. 6.
  • As mentioned above, the projected workspace 976 is built after the projectable space instance 973 is parsed by the projector 974 of the second electronic device 972. In this embodiment, the Dropbox importer 9761’ corresponding to the dashed line frame 9761 and the image viewer 9762’ corresponding to the dashed line frame 9762 are configured in the projected workspace 976. Moreover, the jpg format image file 9791, the jpg format image file 9792 and the gif format image file 9793 in Dropbox 979 are unified and imported into the projected workspace 976 by the Dropbox importer 9761’ . Consequently, the unified jpg format image file 9791’ corresponding to the jpg format image file 9791, the unified jpg format image file 9792’ corresponding to the jpg format image file 9792 and the unified gif format image file 9793’ corresponding to the gif format image file 9793 are displayed on the projected  workspace 976. When the user of the second electronic device 972 manipulates any of the unified image files 9791’ , 9792’a nd 9793’ by any specified operating means (such as an action of clicking any of the unified images files 9791’ , 9792’ and 9793’ or an action of dragging and dropping any of the image files 9791’ , 9792’a nd 9793’ to the image viewer 9762’ ) , the image viewer 9762’ will access the contents of the corresponding unified image files 9791’ , 9792’ or 9793’ to allow the unified image files 9791’ , 9792’ or 9793’ to be viewed by the user. Moreover, the Dropbox importer 9761’a nd the image viewer 9762’ mentioned above are equipped by the microkernel 977.
  • It is noted that the URI of the projectable space instance 973 may be a HTTP (hypertext transfer protocol) URI or a FTP (file transfer protocol) URI. In case that the first electronic device 971 and the second electronic device 972 are integrated into one device, the URI of the projectable space instance 973 can also be a local file URI. However, the types of the URI of the projectable space instance 973 are not restricted.
  • Herein, “the descriptions of the method of projecting the workspace” may be referred to the US Patent Application No. 14/577,772, entitled “Method of projecting a workspace and system using the same” , and also referred to the China Patent Application No. 201410814138.5, entitled “Method of projecting a workspace and system using the same” . The detailed descriptions thereof are omitted.
  • The above method of projecting the workspace to any electronic device with computational capability is presented herein for purpose of illustration and description only. The method of projecting the workspace to any electronic device with computational capability is not restricted. However, those skilled in the art will readily observe that numerous modifications and alterations may be made while retaining the teachings of the invention.
  • Moreover, any workspace can be projected to any electronic device with computational capability. That is, any workspace can be delivered to any  electronic device with computational capability. The present invention provides a method for late binding identity. The concepts of the method will be illustrated in more details as follows.
  • FIG. 7 is a flowchart illustrating a method for late binding identity to account according to an embodiment of the present invention. The method comprises the following steps. Firstly, a projectable space instance for modeling a workspace is provided to a system, wherein an information importer, an information and/or a tool is configured in the projectable space instance (Step S110) . Then, the workspace is projected to a machine, and a user account is provided for allowing a user to access the projected workspace, wherein the user does not provide an authorized identity to login into the projected workspace (Step S120) . While the user accesses the projected workspace to drive the information importer, the information and/or the tool, the user is requested to provide an authorized identity, and the authorized identity is bound to the user account so as to activate an access right for the information importer, the information and/or the tool (Step S130) . Then, the user is allowed to login into the projected workspace from the machine or an additional machine according to the authorized identity bound to the user account (Step S140) .
  • FIG. 8 schematically illustrates an implementation concept of a mechanism using the method of FIG. 7. An example of the system 1 includes but is not limited to a network service platform. The system 1 can provide the functions of internet access, internet transit, domain name registration and hosting, dial-up access, leased line access and collocation. The service provider of the network service platform may have various forms. For example, the service provider is a commercial service provider, a community-owned service provider or a non-profit service provider such as the provider of the workspace. In this embodiment, the system 1 comprises a server 210. The server 210 comprises a projectable space instance 212 for modeling a workspace. Moreover, the server 210 is executed and driven locally or remotely.
  • An example of the machine 220 includes but is not limited to a desktop computer, a notebook computer, a personal tablet computer, a smart phone, a mobile device or a wearable device. The machine 220 can acquire the projectable space instance 212 through a uniform resource identifier (URI) corresponding to the projectable space instance 212. Moreover, the projected workspace 211 is built in the machine 220 through a web browser 221 and a projector 222, wherein the projector 222 is loaded into the web browser 221. When a user accesses the projected workspace 211 through the web browser 221 of the machine 220 at the first time, the server 210 will automatically create or generate a user account 230.
  • Moreover, a browser cookie 240 is a storage medium. Whenever the user accesses the projected workspace 211 through the web browser 221 of the machine 220, the browser cookie 240 is used for recording an historical usage 241 of the projected workspace 211 on the machine 220 and corresponding to the user account 230. The historical usage 241 contains a browsing history, an executed operation log, or any form of information for reasonably analyzing a user preference. In other words, the projected workspace 211 is allowed to track the historical usage 241 of the user according to the user account 230. Consequently, the services and/or contents that are better or the user are interested in can be further provided to the user. The browser cookie 240 for recording the historical usage 241 corresponding to the user account 230 is presented herein for purpose of illustration and description only. It is noted that the storage medium for recording the historical usage 241 corresponding to the user account 230 is not restricted. For example, any other storage medium (e.g., a browser cache or a file) that is accessible by the projected workspace 211 can be used for recording the historical usage 241 corresponding to the user account 230.
  • Please refer to FIGS. 9 and 10. FIG. 9 schematically illustrates an implementation concept of the method of FIG. 7 and the mechanism of FIG. 8 when a user accesses the projected workspace at a first time. FIG. 10 schematically illustrates an implementation concept of the method of FIG. 7 and  the mechanism of FIG. 8 when a user accesses the projected workspace at a next time. When a user 200 accesses the projected workspace 211 at the first time through the web browser 221 of the machine 220, the server 210 will automatically create or generate a user account 230. In addition, the historical usage 241 corresponding to the user account 230 is started to be recorded in the browser cookie 240. For example, the browser cookie 240 further records any operation of the projected workspace 211 corresponding to the user account 230. Consequently, when the user 200 uses the web browser 221 of the machine 220 in the next time and accesses the projected workspace 211 again with the user account 230, the past historical usage corresponding to the user account 230 is still retained.
  • Optionally, the method of FIG. 7 further comprises a step of binding the user account 230 to a machine code of the machine 210 so as to lock the user account 230 on the machine 210. The machine 210 can be identified according to machine code. In an embodiment, the machine code is an IP code (e.g., IP: 210.32.54.123) . If the user 200 accesses the projected workspace 211 through the web browser 221 of the machine 220 not at the first time (i.e., at the second time or at more than the second time) , the projected workspace 211 will read the historical record corresponding to the user account 230 from the browser cookie 240 because the user account 230 has been bound to the IP code. The historical record corresponding to the user account 230 indicates any past operation of the projected workspace 211 corresponding to the user account 230. Similarly, any subsequent operation of the projected workspace 211 corresponding to the user account 230 is still recorded in the browser cookie 240.
  • The method of the present invention can be applied to the machines in public places or public machines (e.g., the computing devices in public places or public computing devices) . The use situations of applying the method of the present invention to the above machines will be illustrated as follows. Generally, the machines in public places or public machines cannot identify the users who use the  machines because the same machine is possibly used by many different users at different times. For solving the above drawbacks, the present invention further provides a method of distinguishing and identifying a user account of a specific user. That is, the method of FIG. 7 further comprises a step of providing a label to label the automatically-generated user account. Consequently, the user can create a role with a designated name and access the projected workspace on the machine under the designated name without giving authorized identity.
  • FIG. 11 schematically illustrates an implementation concept of providing a label to label the automatically-generated user account according to an embodiment of the present invention. As mentioned above, when a user 500 accesses a projected workspace 511 through a web browser 521 of the machine 520, the server 210 will automatically create or generate a user account 530 for the user 500. In addition, the user account 530 is bound to a machine code of the machine 510 (e.g., IP: 210.32.54.123) , so that the user account 530 is locked on the machine 510. Moreover, a label for the machine code (IP: 210.32.54.123) is automatically generated to label the user account 530. Consequently, when the user 500 accesses the projected workspace 511 through the web browser 521 of the machine 520 at the next time, the server 210 can authenticate and identify the user 500 by inputting the label corresponding to the user account 530. Consequently, the user 500 can login into the projected workspace 511 again and use the projected workspace 511.
  • On the other hand, when an additional user 501 accesses the projected workspace 511 or other projected workspace through the web browser 521 of the machine 520, an additional label for the machine code (IP: 210.32.54.123) is also automatically generated by the server 210. As mentioned above, the additional user 501 can login into the projected workspace 511 or other projected workspace again by inputting the additional label corresponding to the user account. In other words, the method of the present invention can distinguish from different users who connect to the server through the same machine.
  • In a preferred embodiment, the server will generate a new label to the user regardless of whether the user accesses the projected workspace through the web browser of the machine at the first time. Of course, the user can disable the above function of providing the new label in order to prevent from memorizing the label every time. An example of the content of the label includes but is not limit to a word, number or any combination thereof a word, number or any combination thereof. The content of the label is randomly provided by the server or decided by the user. For example, the content of the label is a true name or a fake name that is provided by the user. The authentication method of identifying the user by using the label to label the user account has another advantage that the same user can possess many roles corresponding to different projected workspaces. Moreover, in case that the user expects to create a role with a designated name and access the projected workspace on the machine under the designated name without giving authorized identity, the above authentication method of identifying the user by using the label to label the user account can be performed.
  • FIG. 12 schematically illustrates an implementation concept of mutually binding an authorized identity between the user account and an additional network service platform by the method of FIG. 7 and the mechanism of FIG. 8. As shown in FIG. 12, a user 600 accesses a projected workspace 611 through a web browser 621 of a machine 620 and uses the services or functions of the projected workspace 611. For example, some services or functions are provided by another network service platform (also referred hereinafter as an additional network service platform) , and the user 600 needs an additional authorized identity to acquire the services or functions from the additional network service platform. If the authorized identity of the additional network service platform for the user has been bound to the user account 630, the user can use these services or functions via the authorized identity. Whereas, if the authorized identity of the additional network service platform for the user has not been bound to the user account 630, it is necessary to bind the authorized identity of the additional network service platform  to the user account 630 in order to obtain the right of using the services or functions from the additional network service platform.
  • Regardless of whether the user 600 has the authorized identity of the additional network service platform or the user creates the authorized identity of any network service platform at the first time, the user 600 may assign one or plural authorized identities and bind the one or plural authorized identities to the user account 630. In particular, the user 600 can issue a request to bind the authorized identities of other network service platforms to the user account 630 via the machine 610 so as to implement the binding authentication between the user account 630 and one or plural network service platforms which need the authorized identities. Afterwards, if the user accesses the projected workspace 611 to operate the services or functions of other network service platforms through the user account 630, the user can directly access these services or functions without the need of inputting the authorized identity again. That is, the user account 630 will automatically implement the authentication with the network service platforms.
  • FIG. 13 schematically illustrates an implementation concept of binding an identity of Facebook to the user account corresponding to the projected workspace. As shown in FIG. 13, a Facebook tool and an information importer 760 are configured in the projected workspace 711. The Facebook tool is an example of the unified tool, and indicated by a Facebook icon 770. The information of a Facebook server 750 is imported into the projected workspace 711 through the information importer 760. When the user clicks the Facebook icon 770, a window 780 is shown in the projected workspace 711, and the window 780 is redirected to the Facebook webpage. After the user inputs the authorized identity (e.g., the personal account and password of Facebook) into the Facebook webpage, the services or functions provided by Facebook can be obtained. Meanwhile, the projected workspace 711 inquires the user whether the authorized identity of Facebook is bound to the user account. If the authorized identity is bound to the  user account, when the user accesses the projected workspace 711 through the user account at the next time, the user can directly use the services or functions of Facebook without the need of inputting the personal account and password of Facebook.
  • Since the authorized identity of Facebook has been bound to the user account, the user can login into the projected workspace 711 and use the projected workspace 711 from any machine through the authorized identity of Facebook. Of course, the user can login into the projected workspace 711 and use the projected workspace 711 from any machine through any known identity. The above example of accessing the projected workspace through the user account is presented herein for purpose of illustration and description only.
  • Moreover, when the user wants to share the projected workspace to an additional user or invite the additional user to access the projected workspace through the user account, a known identity of the additional user is firstly provided to the projected workspace. Then, an additional user account for the additional user is automatically generated by the server, and the known identity of the additional user is bound to the additional user account. Then, a notification message is issued to the known identity of the additional user in a wireless transmission manner or a wired transmission manner. The known identity of the additional user is an account or an identity that is identified by any network service platform. For example, the known identity of the additional user is an account or an authorized identity of the additional user for a social networking site or an account of an electronic mail of the additional user. Moreover, the notification message contains the uniform resource identifier (URI) of the projectable space instance corresponding to the projected workspace. Consequently, when the additional user uses the known identity and clicks or opens the notification message (e.g., the additional user uses the account of Facebook to receive the notification message from Facebook and clicks the URI of the notification  message) , the additional user can access the projected workspace. Under this circumstance, the user can share the projected workspace to the additional user.
  • FIG. 14 is a flowchart illustrating a method for automatically generating a user account for a receiver while sharing content to the receiver. The method of FIG. 14 illustrates a content sharing method for sharing content to an additional user while a user accesses the projected workspace via the user account and browses each of the network information in the projected workspace. The content sharing method comprises the following steps. Firstly, when the user wants to share the content to the additional user, the user checks if the additional user has a user account (also referred as a second user account) of the server (Step S210) . If the judging condition of the step S210 is satisfied, the content is shared to the second user content (Step S240) . Whereas, if the judging condition of the step S210 is not satisfied, a step S220 is performed to judge whether a known identity of the additional user is provided. If the judging condition of the step S220 is not satisfied, the flowchart is ended and the content is not shared. Whereas, if the judging condition of the step S220 is satisfied, a step S230 is performed. In the step S230, the server will automatically generate the second user account for the additional user and bind the known identity of the additional user to the second user account.
  • Moreover, if the user realizes that a known identity of the additional user in a known network resource, the second user account created in the step S230 is shared to the known identity of the additional user in the known network resource through a link. Once the additional user opens the link in the known network resource, the additional user can directly access the projected workspace via the second user account so as to browse the content that is shared by the user. Moreover, the known identity or the authorized identity (e.g., the account name or the password) that is bound to the second user account can be changed by the additional user. The above known network resource is a social networking site  (e.g., Facebook or Twitter) or any other appropriate network service (e.g., an electronic mail) .
  • FIG. 15 is a schematic block diagram illustrating a computer program product using the method of FIG. 7. For example, the computer program product 7 is a software package. The computer program product 7 is used for late binding identity to account. Moreover, the computer program product 7 contains a program code 71. While the computer program product 7 is executed in a computer 6, the program code 71 can perform the steps of the method of FIG. 11. The implementations of these steps are similar to those mentioned above, and the detailed descriptions thereof are omitted.
  • From the above descriptions, the present invention provides a method for late binding identity to account. The present invention has the following advantages. Firstly, the user does not need to perform a registration process before the user logins into or connects to the network service platform. Even if the user logins into the network service platform at the first time and the user has not been authenticated by the network service platform, the network service platform will automatically generate the user account for the user. Secondly, the network service platform is able to analyze the user preference by tracking and analyzing the history usage of the user account. Thirdly, the user can make an authorized identity bound to the user account. Consequently, the user can access the projected workspace in a different machine via the user account. Fourthly, the user is allowed to use an anonymous identity to access the projected workspace and randomly place any information and function component in the projected workspace. Fifthly, a first user who has any know identity of a second user in a different network service platform can share content to the second user or invite the second user.
  • While the invention has been described in terms of what is presently considered to be the most practical and preferred embodiments, it is to be understood that the invention needs not be limited to the disclosed embodiments.  On the contrary, it is intended to cover various modifications and similar arrangements included within the spirit and scope of the appended claims which are to be accorded with the broadest interpretation so as to encompass all such modifications and similar structures.

Claims (22)

  1. A method for late binding identity to account, comprising:
    providing a projectable space instance for modeling a workspace to a system, wherein an information importer, an information and/or a tool is configured in the projectable space instance;
    projecting the workspace to a machine, and providing a user account for allowing a user to access the projected workspace, wherein the user account is automatically generated by the system under a condition that the user does not provide an authorized identity to login into the projected workspace;
    while the user accesses the projected workspace to drive the information importer, the information and/or the tool, requesting the user to provide an authorized identity and binding the authorized identity to the user account so as to activate an access right for the information importer, the information and/or the tool; and
    allowing the user to login into the projected workspace from the machine or an additional machine according to the authorized identity bound to the user account.
  2. The method according to claim 1, wherein the system comprises a server, and the projectable space instance is provided to the server, wherein the user account is automatically generated by the server under the condition that the user does not provide an authorized identity to login into the projected workspace.
  3. The method according to claim 1, wherein the information and/or the tool is imported into the projected workspace through the information importer.
  4. The method according to claim 1, wherein the information is a unified information unit after an original information acquired from an information source is unified, and/or the tool is a unified tool after an original tool acquired from an  information source is unified.
  5. The method according to claim 4, wherein the original information is modeled into the unified information unit with a unified data model, and/or the original tool is modeled into the unified tool with another unified data model.
  6. The method according to claim 4, wherein the information source is a network service platform.
  7. The method according to claim 1, further comprising a step of binding the user account to a machine code of the machine so as to lock the user account on the machine.
  8. The method according to claim 7, wherein the machine is identified according to the machine code.
  9. The method according to claim 1, further comprising a step of allowing the projected workspace to record a historical usage of the user.
  10. The method according to claim 9, wherein the historical usage is recorded in a storage medium that is accessible by the projected workspace.
  11. The method according to claim 10, wherein the storage medium is a browser cookie, a browser cache or a file.
  12. The method according to claim 9, wherein the historical usage contains a browsing history, an executed operation log and/or any form of information for reasonably analyzing a preference of the user.
  13. The method according to claim 9, wherein the projected workspace tracks the historical usage of the user according to the user account.
  14. The method according to claim 13, wherein after the projected workspace tracks and analyzes the historical usage of the user, the projected workspace  provides a service and/or a content to the user.
  15. The method according to claim 1, further comprising a step of providing a label to label the automatically-generated user account under a condition that the user expects to create a role with a designated name and to access the projected workspace on the machine under the designated name without giving authorized identity.
  16. The method according to claim 15, wherein a content of the label is a true name or a fake name that is provided by the user so as to label the user account.
  17. The method according to claim 1, wherein the user is allowed to provide plural authorized identities to bind to the user account, and any of the plural authorized identities is identifiable by the projected workspace.
  18. The method according to claim 17, wherein when the user logins into the projected workspace from the additional machine according to the authorized identity bound to the user account, the projected workspace tracks the user account.
  19. The method according to claim 1, wherein the user account is automatically generated by the system when the user accesses the projected workspace at a first time.
  20. The method according to claim 1, further comprising a step of allowing the system to automatically generating an additional user account to an additional user and binding a known identity of the additional user to the additional user account, wherein the additional user account is generated when the user accessing the projected workspace shares the projected workspace to the additional user or invites the additional user to access the projected workspace.
  21. The method according to claim 1, wherein the projectable space instance is an object, an extensible markup language document, or an instance which is  instantiated with a structured language or a structured protocol.
  22. A computer program product for late binding identity to account, the computer program product comprising a program code, wherein while the computer program product is executed in a computer, the program code performs steps of:
    providing a projectable space instance for modeling a workspace to a system, wherein an information importer, an information and/or a tool is configured in the projectable space instance;
    projecting the workspace to a machine, and providing a user account for allowing a user to access the projected workspace, wherein the user account is automatically generated by the system under a condition that the user does not provide an authorized identity to login into the projected workspace;
    while the user accesses the projected workspace to drive the information importer, the information and/or the tool, requesting the user to provide an authorized identity and binding the authorized identity to the user account so as to activate an access right for the information importer, the information and/or the tool; and
    allowing the user to login into the projected workspace from the machine or an additional machine with the authorized identity bound to the user account.
EP15867799.7A 2014-12-12 2015-12-11 Method for late binding identity to account Withdrawn EP3230855A4 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
CN201410768564 2014-12-12
CN201410796528 2014-12-18
US14/577,772 US9626157B2 (en) 2014-07-03 2014-12-19 Method of projecting a workspace and system using the same
CN201410814138 2014-12-23
PCT/CN2015/097139 WO2016091213A1 (en) 2014-12-12 2015-12-11 Method for late binding identity to account

Publications (2)

Publication Number Publication Date
EP3230855A1 true EP3230855A1 (en) 2017-10-18
EP3230855A4 EP3230855A4 (en) 2017-10-18

Family

ID=56106741

Family Applications (2)

Application Number Title Priority Date Filing Date
EP15866890.5A Withdrawn EP3230940A4 (en) 2014-12-12 2015-12-11 Method for constructing interactive digital catalog, and computer-readable storage medium and interactive digital catalog using the same
EP15867799.7A Withdrawn EP3230855A4 (en) 2014-12-12 2015-12-11 Method for late binding identity to account

Family Applications Before (1)

Application Number Title Priority Date Filing Date
EP15866890.5A Withdrawn EP3230940A4 (en) 2014-12-12 2015-12-11 Method for constructing interactive digital catalog, and computer-readable storage medium and interactive digital catalog using the same

Country Status (5)

Country Link
EP (2) EP3230940A4 (en)
JP (2) JP2018502384A (en)
CN (3) CN107111514B (en)
TW (3) TW201633172A (en)
WO (3) WO2016091210A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112104663B (en) * 2020-10-30 2023-06-23 上海连尚网络科技有限公司 Method and equipment for managing login user and user equipment
CN117407855B (en) * 2023-12-14 2024-02-09 四川数产范式科技有限公司 Unified user authentication method, system, equipment and medium based on dimension projection

Family Cites Families (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1302038A (en) * 1999-12-29 2001-07-04 英业达集团(南京)电子技术有限公司 Realizing method for personal web page reading mechanism
CN1330336A (en) * 2000-03-26 2002-01-09 艾尤尼沃斯·Com公司 Information system for publicating constibution with different forms
EP1323017A2 (en) * 2000-07-14 2003-07-02 E-Book Systems Pte. Ltd. A novel book-like internet browser for electronic information
US20020184116A1 (en) 2001-04-04 2002-12-05 Iuniverse.Com Data structure for holding product information
CN1279438C (en) * 2002-07-03 2006-10-11 无敌科技(西安)有限公司 Process for preparing interactive electronic book
KR100500245B1 (en) * 2003-02-18 2005-07-11 삼성전자주식회사 Storage Medium Having Object-Oriented Program
CN1549155A (en) * 2003-05-14 2004-11-24 魏 茹 Dynamic book for documents demonstration and operation based on web
SG119242A1 (en) * 2004-07-30 2006-02-28 Third Sight Pte Ltd Method of populating a collaborative workspace anda system for providing the same
JP2008533587A (en) * 2005-03-10 2008-08-21 ナショナル ユニバーシティ オブ シンガポール Electronic document creation authoring tool and electronic document creation method
US20070061755A1 (en) * 2005-09-09 2007-03-15 Microsoft Corporation Reading mode for electronic documents
US8990215B1 (en) * 2007-05-21 2015-03-24 Amazon Technologies, Inc. Obtaining and verifying search indices
US9166954B2 (en) * 2008-02-29 2015-10-20 Adobe Systems Incorporated Document-authorized access to a shared workspace
US8219498B2 (en) * 2009-05-27 2012-07-10 International Business Machines Corporation Forming dynamic real-time activity groups
CN106445983A (en) * 2009-07-06 2017-02-22 孟智平 Method for constructing and generating webpage, and system
CN101697156B (en) * 2009-10-29 2016-01-06 孟智平 A kind of method and system of constructing chain web pages
CN102129364B (en) * 2010-01-14 2013-09-25 中国电信股份有限公司 Method for embedding widget toolbar in application program and rapid widget accessing method
CN101916245B (en) * 2010-08-30 2016-07-06 中国电信股份有限公司 A kind of e-book annotation on electronic reader realizes method and apparatus
US20120324005A1 (en) * 2011-05-27 2012-12-20 Gargi Nalawade Dynamic avatar provisioning
US20130047089A1 (en) * 2011-08-21 2013-02-21 Murali S. Kulathungam System and Method to Consolidate and Update Digital Address Books
CN102510369A (en) * 2011-08-23 2012-06-20 潘燕辉 User identity (ID) information recording method of system without registered user
CN103139137B (en) * 2011-11-22 2015-11-18 腾讯科技(深圳)有限公司 Network service provider method and device
TWI461931B (en) * 2012-01-19 2014-11-21 Trustview Inc Method for transmitting protected digital document and system thereof
CN103248657B (en) * 2012-02-10 2016-08-31 董天群 Web Publishing facility information method and facility information sharing method thereof
TW201335772A (en) * 2012-02-22 2013-09-01 Chidopi Co Ltd Editing system and method
US20130311258A1 (en) * 2012-05-16 2013-11-21 Yahoo! Inc. Differential deals in a theme group
CN103533006B (en) * 2012-07-06 2019-09-24 中兴通讯股份有限公司 A kind of joint cloud disk client, server, system and joint cloud disk service method
CN102946404B (en) * 2012-07-20 2015-10-14 珠海金山办公软件有限公司 At method and the device of user side display selectivity synchronization folder
JP6032997B2 (en) * 2012-08-10 2016-11-30 靖 佐藤 Content distribution system and content distribution method
US20140101137A1 (en) * 2012-10-10 2014-04-10 Salesforce.Com, Inc. System and method for a contact persona-based group in a social media network
CN103067373A (en) * 2012-12-20 2013-04-24 天津书生投资有限公司 User registration method
CN103092980A (en) * 2013-01-31 2013-05-08 中国科学院自动化研究所 Method and system of data automatic conversion and storage
CN103152353B (en) * 2013-03-15 2016-08-03 东莞宇龙通信科技有限公司 The Explore of Unified Management Ideas of interactive information and device
CN104038508A (en) * 2014-07-02 2014-09-10 携程计算机技术(上海)有限公司 Setting system and method for website account access permission
CN104796436B (en) * 2015-05-20 2018-10-23 郑州悉知信息科技股份有限公司 User login method, system, the first Platform Server and related platform server

Also Published As

Publication number Publication date
CN107111635B (en) 2021-04-27
CN107113334B (en) 2021-04-27
CN107111514A (en) 2017-08-29
WO2016091210A1 (en) 2016-06-16
TW201631504A (en) 2016-09-01
WO2016091213A1 (en) 2016-06-16
EP3230855A4 (en) 2017-10-18
TW201633172A (en) 2016-09-16
CN107111635A (en) 2017-08-29
WO2016091211A1 (en) 2016-06-16
JP2018502384A (en) 2018-01-25
CN107111514B (en) 2020-08-28
CN107113334A (en) 2017-08-29
EP3230940A1 (en) 2017-10-18
TW201636891A (en) 2016-10-16
JP2018500676A (en) 2018-01-11
EP3230940A4 (en) 2017-10-18

Similar Documents

Publication Publication Date Title
US20170364330A1 (en) Method for late binding identity to account
CN106170804B (en) Document management and collaboration system
US10659566B1 (en) Demo recording utility
US9430449B2 (en) Systems, methods, and media for managing editable previews of webpages
US8769119B2 (en) Method and apparatus for pushing applications to a website visitor during co-browsing
EP2922273A1 (en) Resource sharing method, apparatus, system, and terminal, and resource management center
US9996381B1 (en) Live application management workflow using metadata capture
US20170249170A1 (en) Home system establishing method
US11882154B2 (en) Template representation of security resources
US10733036B2 (en) Programmatic implementations generated from an API call log
US10747390B1 (en) Graphical composer for policy management
WO2016091213A1 (en) Method for late binding identity to account
US11449186B2 (en) System and method for optimized generation of a single page application for multi-page applications
US20170244649A1 (en) Method of and a system for providing access to a file to a web resource
US11467868B1 (en) Service relationship orchestration service
WO2016000655A1 (en) Home system establishing method
WO2016112844A1 (en) Property management method and property management system and machine using the same
EP3251032A1 (en) Interactive operation method, and transmitter machine, receiver machine and interactive operation system using the same
Machiraju et al. Develop Bots Using. NET Core
Webber-Cross Learning Windows Azure Mobile Services for Windows 8 and Windows Phone 8
Dimac Rebuilding old WordPress page into modern web application
Viitanen Integrating two digital signage management systems: case: FirstView MediaCloud and Samsung MagicINFO
WO2016000640A1 (en) Cooperative work method on webpage
KOSOGLOU Design and Implementation of a Multi-client API for Wahlzeit
EP3232384A1 (en) Network service providing method and network service station using method

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20170704

A4 Supplementary search report drawn up and despatched

Effective date: 20170901

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20190125

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20200701