×

Electronic device system restoration by tapping mechanism

  • US 10,123,189 B2
  • Filed: 09/30/2013
  • Issued: 11/06/2018
  • Est. Priority Date: 03/21/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • detecting, at a first computing device, that a second computing device is in proximity to the first computing device;

    receiving a message from the second computing device;

    determining, based on the received message, that the second computing device does not contain a user credential of the first computing device and the second computing device is a target device for a system restoration, wherein the first computing device is a source device for the system restoration;

    transmitting, from the first computing device to the second computing device in response to the determining, the user credential of the first computing device; and

    sending, from the first computing device to the second computing device in response to the determining, a location where a cloud storage service stores a copy of the system data of the first computing device such that the second computing device is able to access the location to receive the copy of the system data of the first computing device from the cloud storage service to restore the system state of the first computing device on the second computing device;

    wherein the system data is stored in the first computing device, and the copy of the system data is backed up in the cloud storage service, wherein the second computing device uses the user credential received from the first computing device and the copy of the system data received from the cloud storage service to restore the system state of the first computing device on the second computing device,wherein the user credential expires on the second computing device after a predetermined system event in the second computing device, and wherein a user logs in both the first computing device and the second computing device concurrently using the user credential before the user credential expires on the second computing device.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×