Electronic device system restoration by tapping mechanism
First Claim
Patent Images
1. A computer-implemented method comprising:
- detecting, at a first computing device, that a second computing device is in proximity to the first computing device;
receiving a message from the second computing device;
determining, based on the received message, that the second computing device does not contain a user credential of the first computing device and the second computing device is a target device for a system restoration, wherein the first computing device is a source device for the system restoration;
transmitting, from the first computing device to the second computing device in response to the determining, the user credential of the first computing device; and
sending, from the first computing device to the second computing device in response to the determining, a location where a cloud storage service stores a copy of the system data of the first computing device such that the second computing device is able to access the location to receive the copy of the system data of the first computing device from the cloud storage service to restore the system state of the first computing device on the second computing device;
wherein the system data is stored in the first computing device, and the copy of the system data is backed up in the cloud storage service, wherein the second computing device uses the user credential received from the first computing device and the copy of the system data received from the cloud storage service to restore the system state of the first computing device on the second computing device,wherein the user credential expires on the second computing device after a predetermined system event in the second computing device, and wherein a user logs in both the first computing device and the second computing device concurrently using the user credential before the user credential expires on the second computing device.
6 Assignments
0 Petitions
Accused Products
Abstract
Technology disclosed herein includes a method for system restoration between computing devices by a tapping mechanism. A first device detects (e.g., via NFC) a second device in proximity. The first device transmits a user credential of the first device to the second device. Either directly or via a cloud storage service, the first device instructs the second device to download a copy of system data of the first device from the cloud storage service, instead of from the first device. The second device is able to restore a system state of the first device on the second device, using the user credential and the system data.
99 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
detecting, at a first computing device, that a second computing device is in proximity to the first computing device; receiving a message from the second computing device; determining, based on the received message, that the second computing device does not contain a user credential of the first computing device and the second computing device is a target device for a system restoration, wherein the first computing device is a source device for the system restoration; transmitting, from the first computing device to the second computing device in response to the determining, the user credential of the first computing device; and sending, from the first computing device to the second computing device in response to the determining, a location where a cloud storage service stores a copy of the system data of the first computing device such that the second computing device is able to access the location to receive the copy of the system data of the first computing device from the cloud storage service to restore the system state of the first computing device on the second computing device; wherein the system data is stored in the first computing device, and the copy of the system data is backed up in the cloud storage service, wherein the second computing device uses the user credential received from the first computing device and the copy of the system data received from the cloud storage service to restore the system state of the first computing device on the second computing device, wherein the user credential expires on the second computing device after a predetermined system event in the second computing device, and wherein a user logs in both the first computing device and the second computing device concurrently using the user credential before the user credential expires on the second computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computing device comprising:
-
a processor; a storage component configured to store system data of the computing device; a network component configured to communicate with a cloud storage service; and a memory storing instructions which, when executed by the processor, cause the computing device to perform a process including; detecting that a target computing device is in proximity to the computing device; receiving a message from the target computing device; determining, based on the received message, that the target computing device does not contain a user credential of the computing device and the target computing device is a target device for a system restoration, wherein the computing device is a source device for the system restoration; transmitting, to the target computing device in response to the determining, the user credential of the computing device; and sending, from the computing device to the cloud storage service in response to the determining, an instruction for the cloud storage service to send a copy of system data of the computing device to the target computing device such that the target computing device is able to restore a system state of the computing device on the target computing device; wherein the copy of the system data of the computing device is backed up in the cloud storage service, wherein the target computing device uses the user credential received from the computing device and the copy of the system data of the computing device received from the cloud storage service to restore the system state of the computing device on the target computing device, wherein the user credential expires on the target computing device after a predetermined system event in the target computing device, wherein a user logs in both the computing device and the target computing device simultaneously using the user credential before the user credential expires on the target computing device. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A computing device comprising:
-
a processor; a near field communication (NFC) component configured to detect that a source computing device is in proximity to the NFC component of the computing device; a network component configured to communicate with a cloud storage service; and a memory storing instructions which, when executed by the processor, cause the computing device to perform operations including; detecting that the source computing device is in proximity to the NFC component of the computing device; notifying the source computing device that the computing device does not contain a user credential of the source computing device and the computing device is a target device for a system restoration, wherein the source computing device is a source device for the system restoration; receiving, from the source computing device, the user credential of the source computing device; retrieving, from the cloud storage service, a copy of system data of the source computing device; and restoring a system state of the source computing device on the computing device by using the user credential received from the source computing device and the copy of the system data of the source computing device retrieved from the cloud storage to restore the system state of the source computing device on the computing device, wherein the user credential expires on the computing device after a predetermined system event in the computing device, wherein a user logs in both the source computing device and the computing device concurrently using the user credential before the user credential expires on the computing device. - View Dependent Claims (18, 19, 20)
-
Specification