Patent classifications
H04L67/1095
Transferring application data between devices
Methods, systems, and apparatus are described for transferring application data. In one aspect, a method includes causing, by a first component on a first device to establish a wireless connection with a second device; receiving, from a second component on the second device, data specifying one or more applications that are installed on the second device and supported by the second component, each of the applications being separate from the second component; determining, by the first component, that a first application installed on the first device matches one of the applications installed on the second device, the first application being separate from the first component; receiving, by the first component, first application data from the first application; and causing, by the first component, the first device to send the first application data to the second component running on the second device using the wireless connection.
Synchronizing content
Some embodiments of the subject technology provide a novel system for synchronizing content items among a group of peer devices. The content synchronizing system of some embodiments includes the group of peer devices and a set of one or more synchronizing servers communicatively connected with the peer devices through one or more networks. In some embodiments, the synchronizing system uses a star architecture, in which each peer device offloads its synchronization operations to the synchronizing server set. Without establishing a peer-to-peer communication with any other peer device, the particular peer device in these embodiments supplies an encrypted content item set along with the N−1 encryptions of a content key used to encrypt the content item set to the synchronizing server set so that this server set can distribute the encrypted content item set and an encrypted content key to each of the N−1 peer devices.
Synchronizing content
Some embodiments of the subject technology provide a novel system for synchronizing content items among a group of peer devices. The content synchronizing system of some embodiments includes the group of peer devices and a set of one or more synchronizing servers communicatively connected with the peer devices through one or more networks. In some embodiments, the synchronizing system uses a star architecture, in which each peer device offloads its synchronization operations to the synchronizing server set. Without establishing a peer-to-peer communication with any other peer device, the particular peer device in these embodiments supplies an encrypted content item set along with the N−1 encryptions of a content key used to encrypt the content item set to the synchronizing server set so that this server set can distribute the encrypted content item set and an encrypted content key to each of the N−1 peer devices.
Network vulnerability detection
A method for monitoring a directory environment of a computer network to detect vulnerabilities. The method comprises, at a first computer on the computer network, changing a configuration of the directory environment and, with a replication service, replicating the change at a second computer on the computer network. The method further comprises extracting information relating to the change from the replication service and using the extracted information to detect a vulnerability in the directory environment.
Communication system, communication device, communication method, and program for reliably receiving periodic data
A communication system includes a master device and a slave device that perform, at predetermined periods, communication for sharing storage data stored in a cyclic memory. The master device transmits communication data that includes (i) identification information distinguishing a period relating to the communication data from other periods before and after the period and (ii) target information indicating whether the communication data is a target that is to be communicated by the communication at the predetermined periods or is an exception to be excluded from being the target. The slave device discards the received communication data when (i) the target information included in the received communication data indicates that the communication data is the target and (ii) a period indicated by the identification information included in the communication data is different from a current period, and processes the communication data.
Systems and methods of transferring user information to different devices
A communications system according to certain embodiments includes a mobile device and a second type of communications system, such as a landline telephone system, that share usage information. The shared information can include call logs of in-coming and out-going calls, missed calls, text messages, address book information, GPS data, internet browsing data, and the like.
Systems and methods of transferring user information to different devices
A communications system according to certain embodiments includes a mobile device and a second type of communications system, such as a landline telephone system, that share usage information. The shared information can include call logs of in-coming and out-going calls, missed calls, text messages, address book information, GPS data, internet browsing data, and the like.
Authenticating and creating accounts on behalf of another user
Embodiments described herein provide for a satellite device that can be associated with a user account of a minor aged (e.g., child or adolescent) user that does not have a smartphone that can be used as a companion device to the satellite device. The satellite device can be configured to be used as a primary device, without reliance upon a paired smartphone. Certain information can be synchronized with the satellite device via the association with the family account. During initial configuration, a set of cryptographic keys can be generated to associate the account of the satellite device with the set of accounts in the family. The satellite device can then access calendars, media, or other data that is shared with user accounts within a family of user accounts.
Ransomware protection for cloud storage systems
Exemplary security applications and systems are described herein. Such embodiments may be configured to provide backup functionality and ransomware protection for cloud storage systems. The described embodiments may monitor cloud storage systems to detect and classify various events. And the embodiments may perform any number of actions based on classified events, such as transmitting notifications to users, preventing a user or application from accessing the cloud storage system, and/or restoring infected files.
Ransomware protection for cloud storage systems
Exemplary security applications and systems are described herein. Such embodiments may be configured to provide backup functionality and ransomware protection for cloud storage systems. The described embodiments may monitor cloud storage systems to detect and classify various events. And the embodiments may perform any number of actions based on classified events, such as transmitting notifications to users, preventing a user or application from accessing the cloud storage system, and/or restoring infected files.