Low-latency media sharing
First Claim
1. A computer-implemented method comprising:
- receiving, by a first device at a first time, a first encrypted image from a second device, the second device within communicable range of the first device, the first encrypted image associated with a first identifier, wherein there is relationship data associated with at least one of the first device and the second device, the relationship data representing at least one previous interaction involving the first device and the second device;
receiving, by the first device, a second encrypted image from the second device, the second encrypted image associated with a second identifier;
storing, by the first device, the first encrypted image in a cache;
storing, by the first device, the second encrypted image in the cache;
receiving, by the first device at a second time, a first cryptographic key from the second device, wherein the second time is after the first time and the first cryptographic key is associated with the first identifier;
identifying, based on the first identifier, the first encrypted image in the cache, wherein the first encrypted data is associated with the first cryptographic key;
generating a first image by decrypting the first encrypted image using the first cryptographic key; and
displaying the first image.
1 Assignment
0 Petitions
Accused Products
Abstract
Devices, systems and methods are disclosed that receive encrypted media files from a remote device during pre-caching. The encrypted media files may be transferred from the remote devices prior to a user issuing a request to share the particular media file. The remote device may maintain cryptographic keys associated with the sent encrypted media files and only share a cryptographic key associated with a media file the user wishes to share. Without the cryptographic keys, the local device cannot access the contents of the pre-shared encrypted media files in a cache. Upon the user sharing the media file and the local device receiving the cryptographic key, the local device may use the cryptographic key to decrypt the encrypted media file and display the media file at a significantly reduced latency than if the media file were sent only upon the sharing request.
-
Citations
24 Claims
-
1. A computer-implemented method comprising:
-
receiving, by a first device at a first time, a first encrypted image from a second device, the second device within communicable range of the first device, the first encrypted image associated with a first identifier, wherein there is relationship data associated with at least one of the first device and the second device, the relationship data representing at least one previous interaction involving the first device and the second device; receiving, by the first device, a second encrypted image from the second device, the second encrypted image associated with a second identifier; storing, by the first device, the first encrypted image in a cache; storing, by the first device, the second encrypted image in the cache; receiving, by the first device at a second time, a first cryptographic key from the second device, wherein the second time is after the first time and the first cryptographic key is associated with the first identifier; identifying, based on the first identifier, the first encrypted image in the cache, wherein the first encrypted data is associated with the first cryptographic key; generating a first image by decrypting the first encrypted image using the first cryptographic key; and displaying the first image. - View Dependent Claims (2, 3, 4)
-
-
5. A computer-implemented method, the method comprising:
-
receiving, by a first device at a first time, first encrypted data from a second device, the second device in physical proximity to the first device, the first encrypted data associated with a first identifier, wherein there is relationship data associated with at least one of the first device and the second device, the relationship data representing at least one previous interaction involving the first device and the second device; receiving, by the first device, second encrypted data from the second device, the second encrypted data associated with a second identifier; storing, by the first device, the first encrypted data in a cache; storing, by the first device, the second encrypted data in the cache; receiving, at a second time, a first cryptographic key from the second device, wherein the second time is after the first time and the first cryptographic key is associated with the first identifier; identifying, based on the first identifier, the first encrypted data in the cache, wherein the first encrypted data is associated with the first cryptographic key; generating first data by decrypting the first encrypted data using the first cryptographic key; and displaying the first data. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computing system, comprising:
-
a first device, the first device including, at least one processor; a memory device including instructions operable to be executed by the at least one processor to cause the first device to; receive, at a first time, first encrypted data from a second device, the second device in physical proximity to the first device, the first encrypted data associated with a first identifier, wherein there is relationship data associated with at least one of the first device and the second device, the relationship data representing at least one previous interaction involving the first device and the second device; receive second encrypted data from the second device, the second encrypted data associated with a second identifier; store the first encrypted data in a cache; store the second encrypted data in the cache; receive, at a second time, a first cryptographic key from the second device, wherein the second time is after the first time and the first cryptographic key is associated with the first identifier; identify, based on the first identifier, the first encrypted data in the cache, wherein the first encrypted data is associated with the first cryptographic key; generate first data by decrypting the first encrypted data using the first cryptographic key; and display the first data. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification