US 12,273,347 B2
Techniques and architectures for sharing remote resources among a trusted group of users
Jayanth Parayil Kumarji, San Francisco, CA (US); Priyadarshini Mitra, San Francisco, CA (US); Kevin Terusaki, Oakland, CA (US); Zhidong Ke, Milpitas, CA (US); Yifeng Liu, Palo Alto, CA (US); Utsavi Benani, Fremont, CA (US); Heng Zhang, San Jose, CA (US); Evan Jiang, San Francisco, CA (US); Birva Joshi, San Francisco, CA (US); and Yogesh Patel, Dublin, CA (US)
Assigned to Salesforce, Inc., San Francisco, CA (US)
Filed by Salesforce, Inc., San Francisco, CA (US)
Filed on Apr. 22, 2021, as Appl. No. 17/238,180.
Prior Publication US 2022/0345458 A1, Oct. 27, 2022
Int. Cl. H04L 29/06 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/102 (2013.01) [H04L 63/0807 (2013.01); H04L 63/104 (2013.01); H04L 63/105 (2013.01)] 8 Claims
OG exemplary drawing
 
1. A system comprising one or more servers, the one or more servers being configured to:
determine that a first user has opted in to a trusted group to share a remote secure resource with members of the trusted group, the trusted group including a second user, wherein users can be dynamically added to and removed from the trusted group, any member of which can access the secure resource utilizing the first user's credentials;
receive, from a platform application server, a request from the first user to access the remote secure resource that is hosted in a computing environment that is distinct from a local computing environment in which the request is made, the platform application server managing meeting and recording metadata;
validate, with a resource activity application server, credentials for the first user to access the local computing environment, the resource activity application server managing user platform credentials;
forward the request to a resource activity application server upon successful validation of the credentials for the first user, wherein the forwarded request for access to the secure resource comprises at least a server-to-server token associated with the request;
utilize credentials of the second user; and
receive information to allow access to the remote secure resource by the first user providing access to the remote secure resource utilizing the credentials for the second user through a user interface of the local computing environment.