Synchronizing Configuration Information Among Multiple Clients
First Claim
1. A method for providing configuration information, comprising:
- at a server computer having one or more processors and memory storing programs executed by the one or more processors;
receiving a user identifier from a first client device using a network;
identifying configuration information associated with the user identifier; and
providing the identified configuration information to the first client device using the network, wherein the identified configuration information is to configure a user-specified portion of one or more applications on the first client device by merging with existing configuration information for the one or more applications on the first client device;
wherein the configuration information provided to the first client device includes encrypted configuration information previously received from a second client device, and the encrypted configuration information was encrypted at the second client device using a user key associated with the user identifier, and the server computer is configured to receive an encrypted version of the user key from the second client device and provide the encrypted user key to the first client device.
1 Assignment
0 Petitions
Accused Products
Abstract
A user of multiple client devices (clients) makes application configuration changes on the clients from time to time. The configuration changes are stored in a local event log on each client, as well as in a synchronization server. When one of the clients connects to the synchronization server, for example when the user logs into the synchronization server while using a respective client, the configuration information in the server and client is synchronized. Conflicts, if any, in the configuration changes for a respective application are resolved in accordance with a conflict resolution procedure or conflict resolution rules associated with that application.
-
Citations
30 Claims
-
1. A method for providing configuration information, comprising:
-
at a server computer having one or more processors and memory storing programs executed by the one or more processors; receiving a user identifier from a first client device using a network; identifying configuration information associated with the user identifier; and providing the identified configuration information to the first client device using the network, wherein the identified configuration information is to configure a user-specified portion of one or more applications on the first client device by merging with existing configuration information for the one or more applications on the first client device; wherein the configuration information provided to the first client device includes encrypted configuration information previously received from a second client device, and the encrypted configuration information was encrypted at the second client device using a user key associated with the user identifier, and the server computer is configured to receive an encrypted version of the user key from the second client device and provide the encrypted user key to the first client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer system, comprising:
-
one or more central processing units to execute programs; memory; and one or more programs, stored in the memory and executed by the processor, the one or more programs including; instructions for receiving a user identifier from a first client device at a server computer using a network; instructions for identifying, at the server computer, configuration information associated with the user identifier; and instructions for providing the configuration information to the first client device using the network, wherein the configuration information is to configure a user-specified portion of one or more applications on the first client device by merging with existing configuration information for the one or more applications on the first client device, wherein the configuration information provided to the first client device includes encrypted configuration information previously received from a second client device, and the encrypted configuration information was encrypted at the second client device using a user key associated with the user identifier, and the server computer is configured to receive an encrypted version of the user key from the second client device and provide the encrypted user key to the first client device. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
-
23. A non-transitory computer readable storage medium for storing a computer program product, for use in conjunction with a computer system, the computer program product comprising memory and one or more programs, stored in the memory, the one of more programs including:
-
instructions for receiving a user identifier from a first client device at a server computer using a network; instructions for identifying, at the server computer, configuration information associated with the user identifier; and instructions for providing the identified configuration information to the first client device using the network, wherein the identified configuration information is to configure a user-specified portion of one or more applications on the first client device by merging with existing configuration information for the one or more applications on the first client device; wherein the configuration information provided to the first client device includes encrypted configuration information previously received from a second client device, and the encrypted configuration information was encrypted at the second client device using a user key associated with the user identifier, and the server computer is configured to receive an encrypted version of the user key from the second client device and provide the encrypted user key to the first client device. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30)
-
Specification