KEYCHAIN SYNCING
First Claim
1. A non-transitory machine-readable medium storing a program which when executed by at least one processing unit of a device synchronizes a set of keychains stored on the device with a set of other devices, the device and the set of other devices communicatively coupled to one another through a peer-to-peer (P2P) network, the program comprising sets of instructions for:
- receiving a modification to a keychain in the set of keychains stored on the device;
generating an update request for each device in the set of other devices in order to synchronize the set of keychains stored on device with the set of other devices; and
transmitting through the P2P network the set of update requests to the set of other devices over a set of separate, secure communication channels.
1 Assignment
0 Petitions
Accused Products
Abstract
Some embodiments provide non-transitory machine-readable medium that stores a program which when executed by at least one processing unit of a device synchronizes a set of keychains stored on the device with a set of other devices. The device and the set of other devices are communicatively coupled to one another through a peer-to-peer (P2P) network. The program receives a modification to a keychain in the set of keychains stored on the device. The program generates an update request for each device in the set of other devices in order to synchronize the set of keychains stored on device with the set of other devices. The program transmits through the P2P network the set of update requests to the set of other devices over a set of separate, secure communication channels.
-
Citations
20 Claims
-
1. A non-transitory machine-readable medium storing a program which when executed by at least one processing unit of a device synchronizes a set of keychains stored on the device with a set of other devices, the device and the set of other devices communicatively coupled to one another through a peer-to-peer (P2P) network, the program comprising sets of instructions for:
-
receiving a modification to a keychain in the set of keychains stored on the device; generating an update request for each device in the set of other devices in order to synchronize the set of keychains stored on device with the set of other devices; and transmitting through the P2P network the set of update requests to the set of other devices over a set of separate, secure communication channels. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for synchronizing a set of keychains stored on a device with a set of other devices, the device and the set of other devices communicatively coupled to one another through a peer-to-peer (P2P) network, the method comprising:
-
receiving a modification to a keychain in the set of keychains stored on the device; generating an update request for each device in the set of other devices in order to synchronize the set of keychains stored on device with the set of other devices; and transmitting through the P2P network the set of update requests to the set of other devices over a set of separate, secure communication channels. - View Dependent Claims (8, 9, 10)
-
-
11. A non-transitory machine-readable medium storing a program which when executed by at least one processing unit of a device processes requests to join a synchronization circle for syncing keychains, the synchronization circle comprising the device and a set of other devices, the program comprising sets of instructions for:
-
receiving a request for a particular device to join the synchronization circle; determine whether the request is authenticated; and when the request is determined as authenticated, prompting for approval of the request; and when approval of the request is received from the user, adding the particular device to the synchronization circle. - View Dependent Claims (12, 13, 14, 15)
-
-
16. For a device, a method for processing requests to join a synchronization circle for syncing keychains, the synchronization circle comprising the device and a set of other devices, the method comprising:
-
receiving a request for a particular device to join the synchronization circle; determine whether the request is authenticated; and when the request is determined as authenticated, prompting for approval of the request; and when approval of the request is received from the user, adding the particular device to the synchronization circle. - View Dependent Claims (17, 18, 19, 20)
-
Specification