ADVANCED SECURITY PROTOCOL FOR BROADCASTING AND SYNCHRONIZING SHARED FOLDERS OVER LOCAL AREA NETWORK
First Claim
1. A computer-implemented method comprising:
- receiving, at a first client device from a content management system, a shared secret key associated with a shared folder;
generating, via at least one processor, a secure identifier based on the shared secret key; and
broadcasting the secure identifier to at least a second client device.
4 Assignments
0 Petitions
Accused Products
Abstract
A method, system, and manufacture for securely broadcasting shared folders from one client device to other client devices and synchronizing the shared folders over a local area network. A first client device, associated with a content management system, generates a secure identifier for a shared folder, using a shared secret key that is associated with the shared folder. The first client device announces the secure identifier over a local area network to other client devices on the local area network including a second client device. The first client device receives a synchronization request for the shared folder from the second client device. After authenticating, using the shared secret key, that the second client device has authorization to access the shared folder, the first client device synchronizes the shared folder with the second client device over the local area network.
-
Citations
20 Claims
-
1. A computer-implemented method comprising:
-
receiving, at a first client device from a content management system, a shared secret key associated with a shared folder; generating, via at least one processor, a secure identifier based on the shared secret key; and broadcasting the secure identifier to at least a second client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable medium storing computer executable instructions for causing a computer to perform the method comprising:
-
receiving, at a first client device from a content management system, a shared folder having a folder identifier and a shared secret key; receiving a first secure identifier from a second client device; generating a second secure identifier based on the shared secret key; and when the first secure identifier matches the second secure identifier, associating the folder identifier with the second client device. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A manufacture comprising:
-
a computer-readable medium; and computer-readable instructions, stored on the computer-readable medium, that when executed are effective to cause a computer to; generate, at a first client device, a secure identifier for a shared folder, using a shared secret key associated with the shared folder; announce the secure identifier to at least a second client device; receive a synchronization request for the shared folder from the second client device; and in response to authenticating, using the shared secret key, that the second client device has authorization to access the shared folder, synchronize the shared folder with the second client device over a local area network. - View Dependent Claims (17, 18, 19, 20)
-
Specification