Secure and seamless offline file transfer through peer to peer wireless communication
First Claim
1. A computer-implemented method comprising:
- receiving, from an online system by a first client device associated with a first user, a list of a plurality of trusted users that are trusted by the first user, wherein the list is generated based upon social network connection information associated with the first user;
receiving, by the first client device, a limited range signal broadcast by a second client device;
determining, by the first client device, that the second client device is associated with a second user from the plurality of trusted users based on the list and the limited range signal;
responsive to determining that the second client device is associated with the second user from the plurality of trusted users, providing connection information from the first device to the second device for establishing a limited range connection according to a limited range communication protocol;
establishing, between the first client device and the second client device, the limited range connection according to the limited range communication protocol if the first user matches a trusted user of a second list stored on the second client device based upon the connection information provided by the first device, the second list indicating a second plurality of trusted users that are users trusted by the second user, the second list generated based upon social network connection information associated with the second user; and
transmitting, by the first client device to the second client device, content via the limited range connection responsive to the establishing of the limited range connection.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer system allows two devices operated by two users from a plurality of trusted users to establish a direct peer to peer limited range wireless connection based on a social network connection between the users. The first client device associated with a first user receives a list of the plurality of trusted users from the computer system. The first client device receives a limited range signal broadcast by a second client device. The first client device determines that the second client device is associated with a second user from the plurality of trusted users based on the list and the limited range signal. Responsive to determining that the second client device is associated with the second user from the plurality of trusted users, the first client device establishes a direct peer to peer wireless connection. The first client device transmits content to the second client device via the peer to peer wireless connection.
-
Citations
20 Claims
-
1. A computer-implemented method comprising:
-
receiving, from an online system by a first client device associated with a first user, a list of a plurality of trusted users that are trusted by the first user, wherein the list is generated based upon social network connection information associated with the first user; receiving, by the first client device, a limited range signal broadcast by a second client device; determining, by the first client device, that the second client device is associated with a second user from the plurality of trusted users based on the list and the limited range signal; responsive to determining that the second client device is associated with the second user from the plurality of trusted users, providing connection information from the first device to the second device for establishing a limited range connection according to a limited range communication protocol; establishing, between the first client device and the second client device, the limited range connection according to the limited range communication protocol if the first user matches a trusted user of a second list stored on the second client device based upon the connection information provided by the first device, the second list indicating a second plurality of trusted users that are users trusted by the second user, the second list generated based upon social network connection information associated with the second user; and transmitting, by the first client device to the second client device, content via the limited range connection responsive to the establishing of the limited range connection. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer readable medium storing program code, the program code comprising instructions that when executed by a processor cause the processor to:
-
receive from an online system, at a first client device associated with a first user, a list of a plurality of trusted users that are trusted by the first user, wherein the list is generated based upon social network connection information associated with the first user; receive a limited range signal broadcast by a second client device; determine that the second client device is associated with a second user from the plurality of trusted users based on the list and the limited range signal; responsive to determining that the second client device is associated with the second user from the plurality of trusted users, provide connection information from the first device to the second device for establishing a limited range connection according to a limited range communication protocol; establish, between the first client device and the second client device, the limited range connection according to the limited range communication protocol if the first user matches a trusted user of a second list stored on the second client device based upon the connection information provided by the first device, the second list indicating a second plurality of trusted users that are users trusted by the second user, the second list generated based upon social network connection information associated with the second user; and transmit to the second client device, content via the limited range connection responsive to the establishing of the limited range connection. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification