Search International and National Patent Collections
Some content of this application is unavailable at the moment.
If this situation persists, please contact us atFeedback&Contact
1. (US20160098779) Providing access to a networked application without authentication
Note: Text based on automatic Optical Character Recognition processes. Please use the PDF version for legal matters

Claims

1. A method comprising: using an application server computer, receiving, from an authenticated client, a first set of data including, a particular email address of an unauthenticated client and a set of inventory requested by the authenticated client with quantity information for each inventory;
using the application server computer, automatically generating a security sandboxed data entry page having a unique web address within a web application program, wherein the security sandboxed data entry page comprises at least some elements from the first set of data and is associated with a data processing function of the web application program;
wherein no authentication is required to access the security sandboxed data entry page;
using the application server computer, automatically generating an electronic notification with a link to the unique web address, and sending the electronic notification to the particular email address;
receiving, from the unauthenticated client through the security sandboxed data entry page, a second set of data indicating the unauthenticated client passed a first authentication;
wherein the second set of data includes an indication related to the quantity information;
matching the second set of data with the first set of data to a certain tolerance, including matching the quantity information as a second authentication;
in response to passing both the first authentication and the second authentication, storing the second set of data directly in a client database for the authenticated client;
wherein the first set of data is associated with fields defining purchase order information, and the second set of data is associated with fields defining invoice information;
wherein the method is performed by one or more computing devices.
2. The method of claim 1, wherein the fields defining purchase order information comprise purchase order number and price; wherein the fields defining invoice information comprise invoice number, invoice date, and taxes.
3. The method of claim 1, further comprising storing a record of at least one IP address; wherein enabling the data entry occurs upon comparing the IP address from the record to an IP address associated with the unauthenticated client.
4. The method of claim 1, further comprising deactivating the security sandboxed data entry page after receiving the second set of data.
5. The method of claim 1, wherein the security sandboxed data entry page includes additional links to pages within the web application program; wherein using the additional links comprises an authentication step.
6. The method of claim 1, wherein the method further comprises preventing unrestricted access to the security sandboxed data entry page after receiving the second set of data.
7. A server computer comprising:
an interface configured to receive, from an authenticated client, a first set of data including, a particular email address of an unauthenticated client and a set of inventory requested by the authenticated client with quantity information for each inventory item;
a page generator configured to automatically generate a security sandboxed data entry page having a unique web address within a web application program, wherein the security sandboxed data entry page comprises at least some elements from the first set of data and is associated with a data processing function of the web application program;
wherein no authentication is required to access the security sandboxed data entry page;
a notification engine configured to automatically generate an electronic notification with a link to the unique web address, and to send the electronic notification to the particular email address;
an application database configured to receive, from the unauthenticated client through the security sandboxed data entry page, a second set of data indicating the unauthenticated client passed a first authentication;
wherein the second set of data includes an indication related to the quantity information;
an application server configured to match the second set of data with the first set of data to a certain tolerance, including matching the quantity information as a second authentication;
an enterprise resource planning interface configured to store the second set of data directly in a client database for the authenticated client in response to passing both the first authentication and the second authentication;
wherein the first set of data is associated with fields defining purchase order information, and the second set of data is associated with fields defining invoice information.
8. The server computer of claim 7, wherein the fields defining purchase order information comprise purchase order number and price; wherein the fields defining invoice information comprise invoice number, invoice date, and taxes.
9. The server computer of claim 7, further comprising an authentication module with a record of at least one IP address; wherein enabling the data entry without requiring authentication occurs upon comparing the IP address from the record to an IP address associated with the unauthenticated client.
10. The server computer of claim 7, further comprising a security sandbox manager configured to deactivate the security sandboxed data entry page after receiving the second set of data.
11. The server computer of claim 7, wherein the page generator is configured to include, in the security sandboxed data entry page, additional links to pages within the web application program; wherein the server computer further comprises an authentication module configured to activate in response to the unauthenticated client using the additional links.
12. The server computer of claim 7, wherein the server computer further comprises an authentication module configured to prevent unrestricted access to the security sandboxed data entry page after receiving the second set of data.
13. The method of claim 1, further comprising, receiving a third set of data including an indication related to the quantity information; and matching the third set of data with the first set of data and the second set of data to a certain tolerance as a third authentication.
14. The method of claim 13, further comprising, receiving a fourth set of data from including an indication related to the quantity information; and matching the fourth set of data with the first set of data, the second set of data, and the third set of data to a certain tolerance as a fourth authentication.
15. The server computer of claim 7, wherein the application server is further configured to, receive a third set of data including an indication related to the quantity information; and to match the third set of data with the first set of data and the second set of data to a certain tolerance as a third authentication.
16. The server computer of claim 15, wherein the application server is further configured to receive a fourth set of data including an indication related to the quantity information; and to match the fourth set of data with the first set of data, the second set of data, and the third set of data to a certain tolerance as a fourth authentication.